<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2026-04-14T06:49:37</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:205690" version="1" class="patch">
	<metadata>
		<title>NetworkManager-1.38.2-150400.1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246/" source="CVE"/>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<reference ref_id="CVE-2018-1000135" ref_url="https://www.suse.com/security/cve/CVE-2018-1000135/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="CVE-2020-10754" ref_url="https://www.suse.com/security/cve/CVE-2020-10754/" source="CVE"/>
		<reference ref_id="CVE-2020-13529" ref_url="https://www.suse.com/security/cve/CVE-2020-13529/" source="CVE"/>
		<reference ref_id="CVE-2021-20297" ref_url="https://www.suse.com/security/cve/CVE-2021-20297/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-1.38.2-150400.1.3 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2006-7246">CVE-2006-7246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2924">CVE-2015-2924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0764">CVE-2016-0764 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000135/">CVE-2018-1000135 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000135">CVE-2018-1000135 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10754/">CVE-2020-10754 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10754">CVE-2020-10754 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13529/">CVE-2020-13529 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20297/">CVE-2021-20297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20297">CVE-2021-20297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904852" comment="NetworkManager-1.38.2-150400.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904853" comment="NetworkManager-bluetooth-1.38.2-150400.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904854" comment="NetworkManager-cloud-setup-1.38.2-150400.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904855" comment="NetworkManager-pppoe-1.38.2-150400.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904856" comment="NetworkManager-tui-1.38.2-150400.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904857" comment="NetworkManager-wwan-1.38.2-150400.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904858" comment="libnm0-1.38.2-150400.1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904859" comment="typelib-1_0-NM-1_0-1.38.2-150400.1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205691" version="1" class="patch">
	<metadata>
		<title>afterburn-5.2.0-150400.1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-35905" ref_url="https://www.suse.com/security/cve/CVE-2020-35905/" source="CVE"/>
		<reference ref_id="CVE-2020-36465" ref_url="https://www.suse.com/security/cve/CVE-2020-36465/" source="CVE"/>
		<reference ref_id="CVE-2021-27378" ref_url="https://www.suse.com/security/cve/CVE-2021-27378/" source="CVE"/>
		<reference ref_id="CVE-2021-32714" ref_url="https://www.suse.com/security/cve/CVE-2021-32714/" source="CVE"/>
		<reference ref_id="CVE-2021-32715" ref_url="https://www.suse.com/security/cve/CVE-2021-32715/" source="CVE"/>
		<reference ref_id="CVE-2021-38191" ref_url="https://www.suse.com/security/cve/CVE-2021-38191/" source="CVE"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<description>
These are all security issues fixed in the afterburn-5.2.0-150400.1.5 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-35905/">CVE-2020-35905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35905">CVE-2020-35905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36465/">CVE-2020-36465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-36465">CVE-2020-36465 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27378/">CVE-2021-27378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27378">CVE-2021-27378 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32714/">CVE-2021-32714 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32714">CVE-2021-32714 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32715/">CVE-2021-32715 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32715">CVE-2021-32715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38191/">CVE-2021-38191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-38191">CVE-2021-38191 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904860" comment="afterburn-5.2.0-150400.1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904861" comment="afterburn-dracut-5.2.0-150400.1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205692" version="1" class="patch">
	<metadata>
		<title>aide-0.16-24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<description>
These are all security issues fixed in the aide-0.16-24.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664151" comment="aide-0.16-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205693" version="1" class="patch">
	<metadata>
		<title>apparmor-parser-3.0.4-150400.5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507/" source="CVE"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
These are all security issues fixed in the apparmor-parser-3.0.4-150400.5.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6507">CVE-2017-6507 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904862" comment="apparmor-parser-3.0.4-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904863" comment="libapparmor1-3.0.4-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904864" comment="pam_apparmor-3.0.4-150400.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205694" version="1" class="patch">
	<metadata>
		<title>augeas-1.12.0-150400.3.3.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.12.0-150400.3.3.6 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7555">CVE-2017-7555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009894380" comment="augeas-1.12.0-150400.3.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894382" comment="augeas-lenses-1.12.0-150400.3.3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894383" comment="libaugeas0-1.12.0-150400.3.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205695" version="1" class="patch">
	<metadata>
		<title>avahi-0.8-150400.5.73 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-6519" ref_url="https://www.suse.com/security/cve/CVE-2017-6519/" source="CVE"/>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<reference ref_id="CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720/" source="CVE"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="CVE-2021-3502" ref_url="https://www.suse.com/security/cve/CVE-2021-3502/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.8-150400.5.73 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6519/">CVE-2017-6519 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6519">CVE-2017-6519 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000845">CVE-2018-1000845 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26720">CVE-2021-26720 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3502/">CVE-2021-3502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3502">CVE-2021-3502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887248" comment="avahi-0.8-150400.5.73 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887253" comment="libavahi-client3-0.8-150400.5.73 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887255" comment="libavahi-common3-0.8-150400.5.73 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887257" comment="libavahi-core7-0.8-150400.5.73 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205696" version="1" class="patch">
	<metadata>
		<title>aws-cli-1.24.4-150200.30.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-15869" ref_url="https://www.suse.com/security/cve/CVE-2018-15869/" source="CVE"/>
		<description>
These are all security issues fixed in the aws-cli-1.24.4-150200.30.8.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15869/">CVE-2018-15869 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15869">CVE-2018-15869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904865" comment="aws-cli-1.24.4-150200.30.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205697" version="1" class="patch">
	<metadata>
		<title>bash-4.4-150400.25.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-4.4-150400.25.22 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9401">CVE-2016-9401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887262" comment="bash-4.4-150400.25.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887266" comment="bash-sh-4.4-150400.25.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887267" comment="libreadline7-7.0-150400.25.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205698" version="1" class="patch">
	<metadata>
		<title>bcm43xx-firmware-20180314-150400.28.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-10370" ref_url="https://www.suse.com/security/cve/CVE-2020-10370/" source="CVE"/>
		<description>
These are all security issues fixed in the bcm43xx-firmware-20180314-150400.28.5 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10370/">CVE-2020-10370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-10370">CVE-2020-10370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887271" comment="bcm43xx-firmware-20180314-150400.28.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205699" version="1" class="patch">
	<metadata>
		<title>btrfsmaintenance-0.4.2-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-14722" ref_url="https://www.suse.com/security/cve/CVE-2018-14722/" source="CVE"/>
		<description>
These are all security issues fixed in the btrfsmaintenance-0.4.2-3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14722/">CVE-2018-14722 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14722">CVE-2018-14722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893508" comment="btrfsmaintenance-0.4.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205700" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.8-150400.1.122 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.8-150400.1.122 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3189">CVE-2016-3189 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887280" comment="bzip2-1.0.8-150400.1.122 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887281" comment="libbz2-1-1.0.8-150400.1.122 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205701" version="1" class="patch">
	<metadata>
		<title>chrony-4.1-150400.19.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-1567" ref_url="https://www.suse.com/security/cve/CVE-2016-1567/" source="CVE"/>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<description>
These are all security issues fixed in the chrony-4.1-150400.19.4 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1567/">CVE-2016-1567 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1567">CVE-2016-1567 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14367">CVE-2020-14367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887308" comment="chrony-4.1-150400.19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887310" comment="chrony-pool-suse-4.1-150400.19.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205702" version="1" class="patch">
	<metadata>
		<title>cifs-utils-6.15-150400.3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-14342" ref_url="https://www.suse.com/security/cve/CVE-2020-14342/" source="CVE"/>
		<reference ref_id="CVE-2021-20208" ref_url="https://www.suse.com/security/cve/CVE-2021-20208/" source="CVE"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="CVE-2022-29869" ref_url="https://www.suse.com/security/cve/CVE-2022-29869/" source="CVE"/>
		<description>
These are all security issues fixed in the cifs-utils-6.15-150400.3.9.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14342/">CVE-2020-14342 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14342">CVE-2020-14342 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20208/">CVE-2021-20208 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20208">CVE-2021-20208 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29869/">CVE-2022-29869 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29869">CVE-2022-29869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009716241" comment="cifs-utils-6.15-150400.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205703" version="1" class="patch">
	<metadata>
		<title>cni-0.7.1-150100.3.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<description>
These are all security issues fixed in the cni-0.7.1-150100.3.8.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20206">CVE-2021-20206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725840" comment="cni-0.7.1-150100.3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205704" version="1" class="patch">
	<metadata>
		<title>cni-plugins-0.8.6-150100.3.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-10749" ref_url="https://www.suse.com/security/cve/CVE-2020-10749/" source="CVE"/>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<description>
These are all security issues fixed in the cni-plugins-0.8.6-150100.3.11.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10749/">CVE-2020-10749 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10749">CVE-2020-10749 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20206">CVE-2021-20206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725841" comment="cni-plugins-0.8.6-150100.3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205705" version="1" class="patch">
	<metadata>
		<title>conmon-2.1.5-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2022-1708" ref_url="https://www.suse.com/security/cve/CVE-2022-1708/" source="CVE"/>
		<description>
These are all security issues fixed in the conmon-2.1.5-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1708/">CVE-2022-1708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1708">CVE-2022-1708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729770" comment="conmon-2.1.5-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205706" version="1" class="patch">
	<metadata>
		<title>conntrack-tools-1.4.5-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-6496" ref_url="https://www.suse.com/security/cve/CVE-2015-6496/" source="CVE"/>
		<description>
These are all security issues fixed in the conntrack-tools-1.4.5-1.46 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6496/">CVE-2015-6496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6496">CVE-2015-6496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881770" comment="conntrack-tools-1.4.5-1.46 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205707" version="1" class="patch">
	<metadata>
		<title>containerd-1.6.12-150000.79.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<reference ref_id="CVE-2020-15157" ref_url="https://www.suse.com/security/cve/CVE-2020-15157/" source="CVE"/>
		<reference ref_id="CVE-2020-15257" ref_url="https://www.suse.com/security/cve/CVE-2020-15257/" source="CVE"/>
		<reference ref_id="CVE-2021-21334" ref_url="https://www.suse.com/security/cve/CVE-2021-21334/" source="CVE"/>
		<reference ref_id="CVE-2021-32760" ref_url="https://www.suse.com/security/cve/CVE-2021-32760/" source="CVE"/>
		<reference ref_id="CVE-2021-41103" ref_url="https://www.suse.com/security/cve/CVE-2021-41103/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<reference ref_id="CVE-2022-23471" ref_url="https://www.suse.com/security/cve/CVE-2022-23471/" source="CVE"/>
		<reference ref_id="CVE-2022-23648" ref_url="https://www.suse.com/security/cve/CVE-2022-23648/" source="CVE"/>
		<reference ref_id="CVE-2022-24769" ref_url="https://www.suse.com/security/cve/CVE-2022-24769/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-31030" ref_url="https://www.suse.com/security/cve/CVE-2022-31030/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.6.12-150000.79.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15157/">CVE-2020-15157 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15157">CVE-2020-15157 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15257/">CVE-2020-15257 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15257">CVE-2020-15257 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21334/">CVE-2021-21334 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21334">CVE-2021-21334 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32760/">CVE-2021-32760 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41103/">CVE-2021-41103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23471/">CVE-2022-23471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23471">CVE-2022-23471 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23648/">CVE-2022-23648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24769/">CVE-2022-24769 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31030/">CVE-2022-31030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31030">CVE-2022-31030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009728091" comment="containerd-1.6.12-150000.79.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205708" version="1" class="patch">
	<metadata>
		<title>containerized-data-importer-manifests-1.51.0-150400.4.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<description>
These are all security issues fixed in the containerized-data-importer-manifests-1.51.0-150400.4.7.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904866" comment="containerized-data-importer-manifests-1.51.0-150400.4.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205709" version="1" class="patch">
	<metadata>
		<title>coolkey-1.1.0-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129/" source="CVE"/>
		<description>
These are all security issues fixed in the coolkey-1.1.0-1.31 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4129">CVE-2007-4129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904510" comment="coolkey-1.1.0-1.31 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205710" version="1" class="patch">
	<metadata>
		<title>coreutils-8.32-150400.7.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<reference ref_id="CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.32-150400.7.5 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4041">CVE-2015-4041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4042">CVE-2015-4042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7476">CVE-2017-7476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887349" comment="coreutils-8.32-150400.7.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205711" version="1" class="patch">
	<metadata>
		<title>cpio-2.13-150400.1.98 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<reference ref_id="CVE-2015-1197" ref_url="https://www.suse.com/security/cve/CVE-2015-1197/" source="CVE"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.13-150400.1.98 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9112">CVE-2014-9112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1197/">CVE-2015-1197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1197">CVE-2015-1197 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2037">CVE-2016-2037 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14866">CVE-2019-14866 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887353" comment="cpio-2.13-150400.1.98 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205712" version="1" class="patch">
	<metadata>
		<title>cracklib-2.9.7-11.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the cracklib-2.9.7-11.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6318">CVE-2016-6318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009893485" comment="cracklib-2.9.7-11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893487" comment="cracklib-dict-small-2.9.7-11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893488" comment="libcrack2-2.9.7-11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205713" version="1" class="patch">
	<metadata>
		<title>cryptsetup-2.4.3-150400.1.110 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-14382" ref_url="https://www.suse.com/security/cve/CVE-2020-14382/" source="CVE"/>
		<reference ref_id="CVE-2021-4122" ref_url="https://www.suse.com/security/cve/CVE-2021-4122/" source="CVE"/>
		<description>
These are all security issues fixed in the cryptsetup-2.4.3-150400.1.110 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14382/">CVE-2020-14382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14382">CVE-2020-14382 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4122/">CVE-2021-4122 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4122">CVE-2021-4122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887368" comment="cryptsetup-2.4.3-150400.1.110 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887372" comment="libcryptsetup12-2.4.3-150400.1.110 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887374" comment="libcryptsetup12-hmac-2.4.3-150400.1.110 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205714" version="1" class="patch">
	<metadata>
		<title>cups-config-2.2.7-150000.3.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<reference ref_id="CVE-2017-18248" ref_url="https://www.suse.com/security/cve/CVE-2017-18248/" source="CVE"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<reference ref_id="CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700/" source="CVE"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="CVE-2019-8842" ref_url="https://www.suse.com/security/cve/CVE-2019-8842/" source="CVE"/>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="CVE-2022-26691" ref_url="https://www.suse.com/security/cve/CVE-2022-26691/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-config-2.2.7-150000.3.35.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5519">CVE-2012-5519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3537">CVE-2014-3537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5029">CVE-2014-5029 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5030">CVE-2014-5030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5031">CVE-2014-5031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1158">CVE-2015-1158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1159">CVE-2015-1159 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18248/">CVE-2017-18248 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18248">CVE-2017-18248 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4180">CVE-2018-4180 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4181">CVE-2018-4181 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4182">CVE-2018-4182 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4183">CVE-2018-4183 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-4700">CVE-2018-4700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8842/">CVE-2019-8842 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8842">CVE-2019-8842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10001">CVE-2020-10001 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25317">CVE-2021-25317 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26691/">CVE-2022-26691 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26691">CVE-2022-26691 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904867" comment="cups-config-2.2.7-150000.3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904868" comment="libcups2-2.2.7-150000.3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205715" version="1" class="patch">
	<metadata>
		<title>curl-7.79.1-150400.5.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2015-3236" ref_url="https://www.suse.com/security/cve/CVE-2015-3236/" source="CVE"/>
		<reference ref_id="CVE-2015-3237" ref_url="https://www.suse.com/security/cve/CVE-2015-3237/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="CVE-2016-8625" ref_url="https://www.suse.com/security/cve/CVE-2016-8625/" source="CVE"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2016-9594" ref_url="https://www.suse.com/security/cve/CVE-2016-9594/" source="CVE"/>
		<reference ref_id="CVE-2017-1000099" ref_url="https://www.suse.com/security/cve/CVE-2017-1000099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101/" source="CVE"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257/" source="CVE"/>
		<reference ref_id="CVE-2017-2629" ref_url="https://www.suse.com/security/cve/CVE-2017-2629/" source="CVE"/>
		<reference ref_id="CVE-2017-7468" ref_url="https://www.suse.com/security/cve/CVE-2017-7468/" source="CVE"/>
		<reference ref_id="CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816/" source="CVE"/>
		<reference ref_id="CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817/" source="CVE"/>
		<reference ref_id="CVE-2017-8818" ref_url="https://www.suse.com/security/cve/CVE-2017-8818/" source="CVE"/>
		<reference ref_id="CVE-2017-9502" ref_url="https://www.suse.com/security/cve/CVE-2017-9502/" source="CVE"/>
		<reference ref_id="CVE-2018-0500" ref_url="https://www.suse.com/security/cve/CVE-2018-0500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000005" ref_url="https://www.suse.com/security/cve/CVE-2018-1000005/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="CVE-2018-1000300" ref_url="https://www.suse.com/security/cve/CVE-2018-1000300/" source="CVE"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-15601" ref_url="https://www.suse.com/security/cve/CVE-2019-15601/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<reference ref_id="CVE-2019-5435" ref_url="https://www.suse.com/security/cve/CVE-2019-5435/" source="CVE"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="CVE-2019-5481" ref_url="https://www.suse.com/security/cve/CVE-2019-5481/" source="CVE"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<reference ref_id="CVE-2020-8169" ref_url="https://www.suse.com/security/cve/CVE-2020-8169/" source="CVE"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<reference ref_id="CVE-2020-8286" ref_url="https://www.suse.com/security/cve/CVE-2020-8286/" source="CVE"/>
		<reference ref_id="CVE-2021-22297" ref_url="https://www.suse.com/security/cve/CVE-2021-22297/" source="CVE"/>
		<reference ref_id="CVE-2021-22298" ref_url="https://www.suse.com/security/cve/CVE-2021-22298/" source="CVE"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<reference ref_id="CVE-2021-22890" ref_url="https://www.suse.com/security/cve/CVE-2021-22890/" source="CVE"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="CVE-2021-22901" ref_url="https://www.suse.com/security/cve/CVE-2021-22901/" source="CVE"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<reference ref_id="CVE-2021-22945" ref_url="https://www.suse.com/security/cve/CVE-2021-22945/" source="CVE"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<reference ref_id="CVE-2022-22576" ref_url="https://www.suse.com/security/cve/CVE-2022-22576/" source="CVE"/>
		<reference ref_id="CVE-2022-27774" ref_url="https://www.suse.com/security/cve/CVE-2022-27774/" source="CVE"/>
		<reference ref_id="CVE-2022-27775" ref_url="https://www.suse.com/security/cve/CVE-2022-27775/" source="CVE"/>
		<reference ref_id="CVE-2022-27776" ref_url="https://www.suse.com/security/cve/CVE-2022-27776/" source="CVE"/>
		<reference ref_id="CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<reference ref_id="CVE-2022-32205" ref_url="https://www.suse.com/security/cve/CVE-2022-32205/" source="CVE"/>
		<reference ref_id="CVE-2022-32206" ref_url="https://www.suse.com/security/cve/CVE-2022-32206/" source="CVE"/>
		<reference ref_id="CVE-2022-32207" ref_url="https://www.suse.com/security/cve/CVE-2022-32207/" source="CVE"/>
		<reference ref_id="CVE-2022-32208" ref_url="https://www.suse.com/security/cve/CVE-2022-32208/" source="CVE"/>
		<reference ref_id="CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221/" source="CVE"/>
		<reference ref_id="CVE-2022-35252" ref_url="https://www.suse.com/security/cve/CVE-2022-35252/" source="CVE"/>
		<reference ref_id="CVE-2022-42916" ref_url="https://www.suse.com/security/cve/CVE-2022-42916/" source="CVE"/>
		<reference ref_id="CVE-2022-43551" ref_url="https://www.suse.com/security/cve/CVE-2022-43551/" source="CVE"/>
		<reference ref_id="CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552/" source="CVE"/>
		<reference ref_id="CVE-2023-23914" ref_url="https://www.suse.com/security/cve/CVE-2023-23914/" source="CVE"/>
		<reference ref_id="CVE-2023-23915" ref_url="https://www.suse.com/security/cve/CVE-2023-23915/" source="CVE"/>
		<reference ref_id="CVE-2023-23916" ref_url="https://www.suse.com/security/cve/CVE-2023-23916/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.79.1-150400.5.15.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3143">CVE-2015-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3144">CVE-2015-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3145">CVE-2015-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3148">CVE-2015-3148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3153">CVE-2015-3153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3236/">CVE-2015-3236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3236">CVE-2015-3236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3237/">CVE-2015-3237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3237">CVE-2015-3237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0755">CVE-2016-0755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7167">CVE-2016-7167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8615">CVE-2016-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8616">CVE-2016-8616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8617">CVE-2016-8617 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8618">CVE-2016-8618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8619">CVE-2016-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8620">CVE-2016-8620 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8621">CVE-2016-8621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8622">CVE-2016-8622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8623">CVE-2016-8623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8624">CVE-2016-8624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8625/">CVE-2016-8625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8625">CVE-2016-8625 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9594/">CVE-2016-9594 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9594">CVE-2016-9594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000099/">CVE-2017-1000099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000099">CVE-2017-1000099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000100">CVE-2017-1000100 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000101">CVE-2017-1000101 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000254">CVE-2017-1000254 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000257">CVE-2017-1000257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2629/">CVE-2017-2629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2629">CVE-2017-2629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7468/">CVE-2017-7468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7468">CVE-2017-7468 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8816">CVE-2017-8816 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8817">CVE-2017-8817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8818/">CVE-2017-8818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8818">CVE-2017-8818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9502/">CVE-2017-9502 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9502">CVE-2017-9502 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0500/">CVE-2018-0500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0500">CVE-2018-0500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000005/">CVE-2018-1000005 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000005">CVE-2018-1000005 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000007">CVE-2018-1000007 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000120">CVE-2018-1000120 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000121">CVE-2018-1000121 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000122">CVE-2018-1000122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000300/">CVE-2018-1000300 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000300">CVE-2018-1000300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000301">CVE-2018-1000301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16839">CVE-2018-16839 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16840">CVE-2018-16840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16890">CVE-2018-16890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15601/">CVE-2019-15601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15601">CVE-2019-15601 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3822">CVE-2019-3822 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3823">CVE-2019-3823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5435/">CVE-2019-5435 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5435">CVE-2019-5435 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5481/">CVE-2019-5481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5481">CVE-2019-5481 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8169/">CVE-2020-8169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8169">CVE-2020-8169 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231">CVE-2020-8231 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8284">CVE-2020-8284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8285">CVE-2020-8285 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8286/">CVE-2020-8286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8286">CVE-2020-8286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22297/">CVE-2021-22297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-22297">CVE-2021-22297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22298/">CVE-2021-22298 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22298">CVE-2021-22298 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22876">CVE-2021-22876 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22890/">CVE-2021-22890 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22890">CVE-2021-22890 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22901/">CVE-2021-22901 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22901">CVE-2021-22901 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">CVE-2021-22922 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">CVE-2021-22923 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">CVE-2021-22924 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22925">CVE-2021-22925 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22945/">CVE-2021-22945 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22945">CVE-2021-22945 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">CVE-2021-22946 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">CVE-2021-22947 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22576/">CVE-2022-22576 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">CVE-2022-22576 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27774/">CVE-2022-27774 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">CVE-2022-27774 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27775/">CVE-2022-27775 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27775">CVE-2022-27775 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27776/">CVE-2022-27776 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">CVE-2022-27776 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27781">CVE-2022-27781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32205/">CVE-2022-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32205">CVE-2022-32205 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32206/">CVE-2022-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32206">CVE-2022-32206 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32207/">CVE-2022-32207 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32207">CVE-2022-32207 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32208/">CVE-2022-32208 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35252/">CVE-2022-35252 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35252">CVE-2022-35252 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42916/">CVE-2022-42916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42916">CVE-2022-42916 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-43551/">CVE-2022-43551 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43551">CVE-2022-43551 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23914/">CVE-2023-23914 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23914">CVE-2023-23914 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23915/">CVE-2023-23915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23915">CVE-2023-23915 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23916/">CVE-2023-23916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23916">CVE-2023-23916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009739936" comment="curl-7.79.1-150400.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739939" comment="libcurl4-7.79.1-150400.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205716" version="1" class="patch">
	<metadata>
		<title>cyrus-sasl-2.1.27-150300.4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<reference ref_id="CVE-2020-8032" ref_url="https://www.suse.com/security/cve/CVE-2020-8032/" source="CVE"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
These are all security issues fixed in the cyrus-sasl-2.1.27-150300.4.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8032/">CVE-2020-8032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8032">CVE-2020-8032 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669166" comment="cyrus-sasl-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669171" comment="cyrus-sasl-digestmd5-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669173" comment="cyrus-sasl-gssapi-2.1.27-150300.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669179" comment="libsasl2-3-2.1.27-150300.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205717" version="1" class="patch">
	<metadata>
		<title>db48-utils-4.8.30-150000.7.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-2708" ref_url="https://www.suse.com/security/cve/CVE-2019-2708/" source="CVE"/>
		<description>
These are all security issues fixed in the db48-utils-4.8.30-150000.7.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2708/">CVE-2019-2708 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2708">CVE-2019-2708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009725448" comment="db48-utils-4.8.30-150000.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009725449" comment="libdb-4_8-4.8.30-150000.7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205718" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.12.2-150400.18.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<reference ref_id="CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512/" source="CVE"/>
		<reference ref_id="CVE-2022-42010" ref_url="https://www.suse.com/security/cve/CVE-2022-42010/" source="CVE"/>
		<reference ref_id="CVE-2022-42011" ref_url="https://www.suse.com/security/cve/CVE-2022-42011/" source="CVE"/>
		<reference ref_id="CVE-2022-42012" ref_url="https://www.suse.com/security/cve/CVE-2022-42012/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.12.2-150400.18.5.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3636">CVE-2014-3636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3637">CVE-2014-3637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3639">CVE-2014-3639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7824">CVE-2014-7824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8148">CVE-2014-8148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0245">CVE-2015-0245 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35512">CVE-2020-35512 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42010/">CVE-2022-42010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42011/">CVE-2022-42011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42012/">CVE-2022-42012 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717526" comment="dbus-1-1.12.2-150400.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717530" comment="dbus-1-x11-1.12.2-150400.18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717531" comment="libdbus-1-3-1.12.2-150400.18.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205719" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.86-150400.14.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<reference ref_id="CVE-2020-14312" ref_url="https://www.suse.com/security/cve/CVE-2020-14312/" source="CVE"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.86-150400.14.3 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3294">CVE-2015-3294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8899">CVE-2015-8899 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14491">CVE-2017-14491 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14492">CVE-2017-14492 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14493">CVE-2017-14493 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14494">CVE-2017-14494 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14495">CVE-2017-14495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14496">CVE-2017-14496 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15107">CVE-2017-15107 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14834">CVE-2019-14834 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14312/">CVE-2020-14312 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14312">CVE-2020-14312 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887385" comment="dnsmasq-2.86-150400.14.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205720" version="1" class="patch">
	<metadata>
		<title>docker-20.10.17_ce-150000.169.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-5277" ref_url="https://www.suse.com/security/cve/CVE-2014-5277/" source="CVE"/>
		<reference ref_id="CVE-2014-6407" ref_url="https://www.suse.com/security/cve/CVE-2014-6407/" source="CVE"/>
		<reference ref_id="CVE-2014-6408" ref_url="https://www.suse.com/security/cve/CVE-2014-6408/" source="CVE"/>
		<reference ref_id="CVE-2014-8178" ref_url="https://www.suse.com/security/cve/CVE-2014-8178/" source="CVE"/>
		<reference ref_id="CVE-2014-8179" ref_url="https://www.suse.com/security/cve/CVE-2014-8179/" source="CVE"/>
		<reference ref_id="CVE-2014-9356" ref_url="https://www.suse.com/security/cve/CVE-2014-9356/" source="CVE"/>
		<reference ref_id="CVE-2014-9357" ref_url="https://www.suse.com/security/cve/CVE-2014-9357/" source="CVE"/>
		<reference ref_id="CVE-2014-9358" ref_url="https://www.suse.com/security/cve/CVE-2014-9358/" source="CVE"/>
		<reference ref_id="CVE-2015-3627" ref_url="https://www.suse.com/security/cve/CVE-2015-3627/" source="CVE"/>
		<reference ref_id="CVE-2015-3629" ref_url="https://www.suse.com/security/cve/CVE-2015-3629/" source="CVE"/>
		<reference ref_id="CVE-2015-3630" ref_url="https://www.suse.com/security/cve/CVE-2015-3630/" source="CVE"/>
		<reference ref_id="CVE-2015-3631" ref_url="https://www.suse.com/security/cve/CVE-2015-3631/" source="CVE"/>
		<reference ref_id="CVE-2016-3697" ref_url="https://www.suse.com/security/cve/CVE-2016-3697/" source="CVE"/>
		<reference ref_id="CVE-2016-8867" ref_url="https://www.suse.com/security/cve/CVE-2016-8867/" source="CVE"/>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2017-14992" ref_url="https://www.suse.com/security/cve/CVE-2017-14992/" source="CVE"/>
		<reference ref_id="CVE-2017-16539" ref_url="https://www.suse.com/security/cve/CVE-2017-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-10892" ref_url="https://www.suse.com/security/cve/CVE-2018-10892/" source="CVE"/>
		<reference ref_id="CVE-2018-15664" ref_url="https://www.suse.com/security/cve/CVE-2018-15664/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-20699" ref_url="https://www.suse.com/security/cve/CVE-2018-20699/" source="CVE"/>
		<reference ref_id="CVE-2019-13509" ref_url="https://www.suse.com/security/cve/CVE-2019-13509/" source="CVE"/>
		<reference ref_id="CVE-2019-14271" ref_url="https://www.suse.com/security/cve/CVE-2019-14271/" source="CVE"/>
		<reference ref_id="CVE-2020-13401" ref_url="https://www.suse.com/security/cve/CVE-2020-13401/" source="CVE"/>
		<reference ref_id="CVE-2020-15257" ref_url="https://www.suse.com/security/cve/CVE-2020-15257/" source="CVE"/>
		<reference ref_id="CVE-2021-21284" ref_url="https://www.suse.com/security/cve/CVE-2021-21284/" source="CVE"/>
		<reference ref_id="CVE-2021-21285" ref_url="https://www.suse.com/security/cve/CVE-2021-21285/" source="CVE"/>
		<reference ref_id="CVE-2021-41089" ref_url="https://www.suse.com/security/cve/CVE-2021-41089/" source="CVE"/>
		<reference ref_id="CVE-2021-41091" ref_url="https://www.suse.com/security/cve/CVE-2021-41091/" source="CVE"/>
		<reference ref_id="CVE-2021-41092" ref_url="https://www.suse.com/security/cve/CVE-2021-41092/" source="CVE"/>
		<reference ref_id="CVE-2021-41103" ref_url="https://www.suse.com/security/cve/CVE-2021-41103/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="CVE-2022-24769" ref_url="https://www.suse.com/security/cve/CVE-2022-24769/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-20.10.17_ce-150000.169.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5277/">CVE-2014-5277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5277">CVE-2014-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6407/">CVE-2014-6407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6407">CVE-2014-6407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6408/">CVE-2014-6408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6408">CVE-2014-6408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8178/">CVE-2014-8178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8178">CVE-2014-8178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8179/">CVE-2014-8179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8179">CVE-2014-8179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9356/">CVE-2014-9356 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9356">CVE-2014-9356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9357/">CVE-2014-9357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9357">CVE-2014-9357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9358/">CVE-2014-9358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9358">CVE-2014-9358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3627/">CVE-2015-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3627">CVE-2015-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3629/">CVE-2015-3629 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3629">CVE-2015-3629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3630/">CVE-2015-3630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3630">CVE-2015-3630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3631/">CVE-2015-3631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3631">CVE-2015-3631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3697/">CVE-2016-3697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3697">CVE-2016-3697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8867/">CVE-2016-8867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8867">CVE-2016-8867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14992/">CVE-2017-14992 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14992">CVE-2017-14992 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16539/">CVE-2017-16539 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16539">CVE-2017-16539 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10892/">CVE-2018-10892 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10892">CVE-2018-10892 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15664/">CVE-2018-15664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15664">CVE-2018-15664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20699/">CVE-2018-20699 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20699">CVE-2018-20699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13509/">CVE-2019-13509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13509">CVE-2019-13509 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14271/">CVE-2019-14271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14271">CVE-2019-14271 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13401/">CVE-2020-13401 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13401">CVE-2020-13401 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15257/">CVE-2020-15257 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15257">CVE-2020-15257 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21284/">CVE-2021-21284 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21284">CVE-2021-21284 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21285/">CVE-2021-21285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21285">CVE-2021-21285 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41089/">CVE-2021-41089 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41089">CVE-2021-41089 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41091/">CVE-2021-41091 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41091">CVE-2021-41091 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41092/">CVE-2021-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41092">CVE-2021-41092 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41103/">CVE-2021-41103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24769/">CVE-2022-24769 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904869" comment="docker-20.10.17_ce-150000.169.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205721" version="1" class="patch">
	<metadata>
		<title>docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-4.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-4.31.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882521" comment="docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-4.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205722" version="1" class="patch">
	<metadata>
		<title>docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2019-16884" ref_url="https://www.suse.com/security/cve/CVE-2019-16884/" source="CVE"/>
		<reference ref_id="CVE-2019-19921" ref_url="https://www.suse.com/security/cve/CVE-2019-19921/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16884/">CVE-2019-16884 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16884">CVE-2019-16884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19921/">CVE-2019-19921 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19921">CVE-2019-19921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494431" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205723" version="1" class="patch">
	<metadata>
		<title>dracut-055+suse.331.g05b9ccb7-150400.3.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-055+suse.331.g05b9ccb7-150400.3.16.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8637">CVE-2016-8637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904870" comment="dracut-055+suse.331.g05b9ccb7-150400.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904871" comment="dracut-fips-055+suse.331.g05b9ccb7-150400.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904872" comment="dracut-mkinitrd-deprecated-055+suse.331.g05b9ccb7-150400.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205724" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.46.4-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<reference ref_id="CVE-2019-5094" ref_url="https://www.suse.com/security/cve/CVE-2019-5094/" source="CVE"/>
		<reference ref_id="CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188/" source="CVE"/>
		<reference ref_id="CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.46.4-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0247">CVE-2015-0247 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1572">CVE-2015-1572 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5094/">CVE-2019-5094 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5094">CVE-2019-5094 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5188">CVE-2019-5188 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682222" comment="e2fsprogs-1.46.4-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682226" comment="libcom_err2-1.46.4-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009682230" comment="libext2fs2-1.46.4-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205725" version="1" class="patch">
	<metadata>
		<title>elfutils-0.185-150400.5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7146" ref_url="https://www.suse.com/security/cve/CVE-2019-7146/" source="CVE"/>
		<reference ref_id="CVE-2019-7148" ref_url="https://www.suse.com/security/cve/CVE-2019-7148/" source="CVE"/>
		<reference ref_id="CVE-2019-7149" ref_url="https://www.suse.com/security/cve/CVE-2019-7149/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7664" ref_url="https://www.suse.com/security/cve/CVE-2019-7664/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.185-150400.5.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9447">CVE-2014-9447 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18310">CVE-2018-18310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18520">CVE-2018-18520 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18521">CVE-2018-18521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7146/">CVE-2019-7146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7146">CVE-2019-7146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7148/">CVE-2019-7148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7148">CVE-2019-7148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7149/">CVE-2019-7149 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7149">CVE-2019-7149 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7150">CVE-2019-7150 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7664/">CVE-2019-7664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7664">CVE-2019-7664 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7665">CVE-2019-7665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009894397" comment="elfutils-0.185-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894400" comment="libasm1-0.185-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894402" comment="libdw1-0.185-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894405" comment="libelf1-0.185-150400.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205726" version="1" class="patch">
	<metadata>
		<title>file-5.32-7.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<reference ref_id="CVE-2017-1000249" ref_url="https://www.suse.com/security/cve/CVE-2017-1000249/" source="CVE"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<reference ref_id="CVE-2019-8905" ref_url="https://www.suse.com/security/cve/CVE-2019-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-8906" ref_url="https://www.suse.com/security/cve/CVE-2019-8906/" source="CVE"/>
		<reference ref_id="CVE-2019-8907" ref_url="https://www.suse.com/security/cve/CVE-2019-8907/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.32-7.14.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3710">CVE-2014-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8116">CVE-2014-8116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8117">CVE-2014-8117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000249/">CVE-2017-1000249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000249">CVE-2017-1000249 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10360">CVE-2018-10360 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8905/">CVE-2019-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8905">CVE-2019-8905 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8906/">CVE-2019-8906 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8906">CVE-2019-8906 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8907/">CVE-2019-8907 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8907">CVE-2019-8907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009893456" comment="file-5.32-7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893458" comment="file-magic-5.32-7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893459" comment="libmagic1-5.32-7.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205727" version="1" class="patch">
	<metadata>
		<title>firewalld-0.9.3-150400.8.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-5410" ref_url="https://www.suse.com/security/cve/CVE-2016-5410/" source="CVE"/>
		<description>
These are all security issues fixed in the firewalld-0.9.3-150400.8.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5410/">CVE-2016-5410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5410">CVE-2016-5410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904736" comment="firewalld-0.9.3-150400.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904737" comment="python3-firewall-0.9.3-150400.8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205728" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.7-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.7-3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3297">CVE-2009-3297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0541">CVE-2011-0541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3202">CVE-2015-3202 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10906">CVE-2018-10906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489671" comment="fuse-2.9.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489674" comment="libfuse2-2.9.7-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205729" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.52.9-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464/" source="CVE"/>
		<reference ref_id="CVE-2019-20446" ref_url="https://www.suse.com/security/cve/CVE-2019-20446/" source="CVE"/>
		<reference ref_id="CVE-2021-25900" ref_url="https://www.suse.com/security/cve/CVE-2021-25900/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.52.9-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11464">CVE-2017-11464 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20446/">CVE-2019-20446 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20446">CVE-2019-20446 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25900/">CVE-2021-25900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25900">CVE-2021-25900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009893629" comment="gdk-pixbuf-loader-rsvg-2.52.9-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893630" comment="librsvg-2-2-2.52.9-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205730" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-query-loaders-2.42.9-150400.5.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<reference ref_id="CVE-2020-29385" ref_url="https://www.suse.com/security/cve/CVE-2020-29385/" source="CVE"/>
		<reference ref_id="CVE-2021-44648" ref_url="https://www.suse.com/security/cve/CVE-2021-44648/" source="CVE"/>
		<reference ref_id="CVE-2021-46829" ref_url="https://www.suse.com/security/cve/CVE-2021-46829/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-query-loaders-2.42.9-150400.5.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7552">CVE-2015-7552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7673">CVE-2015-7673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7674">CVE-2015-7674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6352">CVE-2016-6352 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2862">CVE-2017-2862 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2870">CVE-2017-2870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6312">CVE-2017-6312 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6313">CVE-2017-6313 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29385/">CVE-2020-29385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29385">CVE-2020-29385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44648/">CVE-2021-44648 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44648">CVE-2021-44648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46829/">CVE-2021-46829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46829">CVE-2021-46829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009709915" comment="gdk-pixbuf-query-loaders-2.42.9-150400.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709918" comment="libgdk_pixbuf-2_0-0-2.42.9-150400.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009709920" comment="typelib-1_0-GdkPixbuf-2_0-2.42.9-150400.5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205731" version="1" class="patch">
	<metadata>
		<title>glib-networking-2.70.1-150400.1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<description>
These are all security issues fixed in the glib-networking-2.70.1-150400.1.6 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13645">CVE-2020-13645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887435" comment="glib-networking-2.70.1-150400.1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205732" version="1" class="patch">
	<metadata>
		<title>glib2-tools-2.70.5-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="CVE-2020-6750" ref_url="https://www.suse.com/security/cve/CVE-2020-6750/" source="CVE"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-tools-2.70.5-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16428">CVE-2018-16428 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16429">CVE-2018-16429 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6750/">CVE-2020-6750 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6750">CVE-2020-6750 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904873" comment="glib2-tools-2.70.5-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904874" comment="libgio-2_0-0-2.70.5-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904875" comment="libglib-2_0-0-2.70.5-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904876" comment="libgmodule-2_0-0-2.70.5-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904877" comment="libgobject-2_0-0-2.70.5-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205733" version="1" class="patch">
	<metadata>
		<title>glibc-2.31-150300.41.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2010-3192" ref_url="https://www.suse.com/security/cve/CVE-2010-3192/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228/" source="CVE"/>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417/" source="CVE"/>
		<reference ref_id="CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426/" source="CVE"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="CVE-2019-19126" ref_url="https://www.suse.com/security/cve/CVE-2019-19126/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="CVE-2020-1751" ref_url="https://www.suse.com/security/cve/CVE-2020-1751/" source="CVE"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<reference ref_id="CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618/" source="CVE"/>
		<reference ref_id="CVE-2020-29562" ref_url="https://www.suse.com/security/cve/CVE-2020-29562/" source="CVE"/>
		<reference ref_id="CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573/" source="CVE"/>
		<reference ref_id="CVE-2021-27645" ref_url="https://www.suse.com/security/cve/CVE-2021-27645/" source="CVE"/>
		<reference ref_id="CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326/" source="CVE"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.31-150300.41.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3192/">CVE-2010-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3192">CVE-2010-3192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3406">CVE-2012-3406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4458">CVE-2013-4458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7817">CVE-2014-7817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8121">CVE-2014-8121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9402">CVE-2014-9402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9761">CVE-2014-9761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1472">CVE-2015-1472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1473">CVE-2015-1473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1781">CVE-2015-1781 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5180">CVE-2015-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7547">CVE-2015-7547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8776">CVE-2015-8776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8777">CVE-2015-8777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8778">CVE-2015-8778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8779">CVE-2015-8779 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10228">CVE-2016-10228 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">CVE-2016-10739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1234">CVE-2016-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3075">CVE-2016-3075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3706">CVE-2016-3706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4429">CVE-2016-4429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5417">CVE-2016-5417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6323">CVE-2016-6323 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000366">CVE-2017-1000366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000408">CVE-2017-1000408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000409">CVE-2017-1000409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12132">CVE-2017-12132 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12133">CVE-2017-12133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15670">CVE-2017-15670 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15671">CVE-2017-15671 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15804">CVE-2017-15804 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16997">CVE-2017-16997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17426">CVE-2017-17426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18269">CVE-2017-18269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11236">CVE-2018-11236 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11237">CVE-2018-11237 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6485">CVE-2018-6485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6551">CVE-2018-6551 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19126/">CVE-2019-19126 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">CVE-2019-19126 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1751/">CVE-2020-1751 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">CVE-2020-1751 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">CVE-2020-27618 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29562/">CVE-2020-29562 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29562">CVE-2020-29562 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29573">CVE-2020-29573 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27645/">CVE-2021-27645 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27645">CVE-2021-27645 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">CVE-2021-3326 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904878" comment="glibc-2.31-150300.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904879" comment="glibc-devel-2.31-150300.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904880" comment="glibc-locale-2.31-150300.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904881" comment="glibc-locale-base-2.31-150300.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205734" version="1" class="patch">
	<metadata>
		<title>gnutls-3.7.3-150400.4.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<reference ref_id="CVE-2018-16868" ref_url="https://www.suse.com/security/cve/CVE-2018-16868/" source="CVE"/>
		<reference ref_id="CVE-2019-3829" ref_url="https://www.suse.com/security/cve/CVE-2019-3829/" source="CVE"/>
		<reference ref_id="CVE-2019-3836" ref_url="https://www.suse.com/security/cve/CVE-2019-3836/" source="CVE"/>
		<reference ref_id="CVE-2020-11501" ref_url="https://www.suse.com/security/cve/CVE-2020-11501/" source="CVE"/>
		<reference ref_id="CVE-2020-13777" ref_url="https://www.suse.com/security/cve/CVE-2020-13777/" source="CVE"/>
		<reference ref_id="CVE-2020-24659" ref_url="https://www.suse.com/security/cve/CVE-2020-24659/" source="CVE"/>
		<reference ref_id="CVE-2021-20231" ref_url="https://www.suse.com/security/cve/CVE-2021-20231/" source="CVE"/>
		<reference ref_id="CVE-2021-20232" ref_url="https://www.suse.com/security/cve/CVE-2021-20232/" source="CVE"/>
		<reference ref_id="CVE-2022-2509" ref_url="https://www.suse.com/security/cve/CVE-2022-2509/" source="CVE"/>
		<reference ref_id="CVE-2023-0361" ref_url="https://www.suse.com/security/cve/CVE-2023-0361/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.7.3-150400.4.27.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8564">CVE-2014-8564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6251">CVE-2015-6251 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10790">CVE-2017-10790 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7869">CVE-2017-7869 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10844">CVE-2018-10844 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10845">CVE-2018-10845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10846">CVE-2018-10846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16868/">CVE-2018-16868 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16868">CVE-2018-16868 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3829/">CVE-2019-3829 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3829">CVE-2019-3829 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3836/">CVE-2019-3836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3836">CVE-2019-3836 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11501/">CVE-2020-11501 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11501">CVE-2020-11501 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13777/">CVE-2020-13777 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13777">CVE-2020-13777 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24659/">CVE-2020-24659 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24659">CVE-2020-24659 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20231/">CVE-2021-20231 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20231">CVE-2021-20231 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20232/">CVE-2021-20232 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20232">CVE-2021-20232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2509/">CVE-2022-2509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2509">CVE-2022-2509 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0361/">CVE-2023-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0361">CVE-2023-0361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009740467" comment="gnutls-3.7.3-150400.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740471" comment="libgnutls30-3.7.3-150400.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740473" comment="libgnutls30-hmac-3.7.3-150400.4.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205735" version="1" class="patch">
	<metadata>
		<title>gpg2-2.2.27-150300.3.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-1000858" ref_url="https://www.suse.com/security/cve/CVE-2018-1000858/" source="CVE"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="CVE-2018-9234" ref_url="https://www.suse.com/security/cve/CVE-2018-9234/" source="CVE"/>
		<reference ref_id="CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050/" source="CVE"/>
		<reference ref_id="CVE-2019-14855" ref_url="https://www.suse.com/security/cve/CVE-2019-14855/" source="CVE"/>
		<reference ref_id="CVE-2020-25125" ref_url="https://www.suse.com/security/cve/CVE-2020-25125/" source="CVE"/>
		<reference ref_id="CVE-2022-34903" ref_url="https://www.suse.com/security/cve/CVE-2022-34903/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.2.27-150300.3.5.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000858/">CVE-2018-1000858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000858">CVE-2018-1000858 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-9234/">CVE-2018-9234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9234">CVE-2018-9234 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13050">CVE-2019-13050 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14855/">CVE-2019-14855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14855">CVE-2019-14855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25125/">CVE-2020-25125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25125">CVE-2020-25125 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34903/">CVE-2022-34903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009700997" comment="gpg2-2.2.27-150300.3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205736" version="1" class="patch">
	<metadata>
		<title>gptfdisk-1.0.8-150400.1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-0256" ref_url="https://www.suse.com/security/cve/CVE-2020-0256/" source="CVE"/>
		<reference ref_id="CVE-2021-0308" ref_url="https://www.suse.com/security/cve/CVE-2021-0308/" source="CVE"/>
		<description>
These are all security issues fixed in the gptfdisk-1.0.8-150400.1.7 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-0256/">CVE-2020-0256 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0256">CVE-2020-0256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-0308/">CVE-2021-0308 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0308">CVE-2021-0308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887458" comment="gptfdisk-1.0.8-150400.1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205737" version="1" class="patch">
	<metadata>
		<title>grep-3.1-150000.4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-1345" ref_url="https://www.suse.com/security/cve/CVE-2015-1345/" source="CVE"/>
		<description>
These are all security issues fixed in the grep-3.1-150000.4.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1345/">CVE-2015-1345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1345">CVE-2015-1345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894412" comment="grep-3.1-150000.4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205738" version="1" class="patch">
	<metadata>
		<title>groff-1.22.4-150400.3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080/" source="CVE"/>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.22.4-150400.3.4 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5080">CVE-2009-5080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-5081">CVE-2009-5081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887463" comment="groff-1.22.4-150400.3.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205739" version="1" class="patch">
	<metadata>
		<title>grub2-2.06-150400.11.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="CVE-2021-3695" ref_url="https://www.suse.com/security/cve/CVE-2021-3695/" source="CVE"/>
		<reference ref_id="CVE-2021-3696" ref_url="https://www.suse.com/security/cve/CVE-2021-3696/" source="CVE"/>
		<reference ref_id="CVE-2021-3697" ref_url="https://www.suse.com/security/cve/CVE-2021-3697/" source="CVE"/>
		<reference ref_id="CVE-2021-3981" ref_url="https://www.suse.com/security/cve/CVE-2021-3981/" source="CVE"/>
		<reference ref_id="CVE-2021-46705" ref_url="https://www.suse.com/security/cve/CVE-2021-46705/" source="CVE"/>
		<reference ref_id="CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601/" source="CVE"/>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<reference ref_id="CVE-2022-28734" ref_url="https://www.suse.com/security/cve/CVE-2022-28734/" source="CVE"/>
		<reference ref_id="CVE-2022-28735" ref_url="https://www.suse.com/security/cve/CVE-2022-28735/" source="CVE"/>
		<reference ref_id="CVE-2022-28736" ref_url="https://www.suse.com/security/cve/CVE-2022-28736/" source="CVE"/>
		<reference ref_id="CVE-2022-3775" ref_url="https://www.suse.com/security/cve/CVE-2022-3775/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.06-150400.11.17.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8370">CVE-2015-8370 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14309">CVE-2020-14309 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14310">CVE-2020-14310 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14311">CVE-2020-14311 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3695/">CVE-2021-3695 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3696/">CVE-2021-3696 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3697/">CVE-2021-3697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3981/">CVE-2021-3981 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3981">CVE-2021-3981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46705/">CVE-2021-46705 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46705">CVE-2021-46705 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-28734/">CVE-2022-28734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28735/">CVE-2022-28735 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28735">CVE-2022-28735 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28736/">CVE-2022-28736 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3775/">CVE-2022-3775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009726179" comment="grub2-2.06-150400.11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904882" comment="grub2-arm64-efi-2.06-150400.11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904883" comment="grub2-i386-pc-2.06-150400.11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904884" comment="grub2-powerpc-ieee1275-2.06-150400.11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904885" comment="grub2-s390x-emu-2.06-150400.11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904886" comment="grub2-snapper-plugin-2.06-150400.11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904887" comment="grub2-x86_64-efi-2.06-150400.11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904888" comment="grub2-x86_64-xen-2.06-150400.11.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205740" version="1" class="patch">
	<metadata>
		<title>gstreamer-1.20.1-150400.1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845/" source="CVE"/>
		<reference ref_id="CVE-2017-5846" ref_url="https://www.suse.com/security/cve/CVE-2017-5846/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-1.20.1-150400.1.5 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10198">CVE-2016-10198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10199">CVE-2016-10199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5837">CVE-2017-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5839">CVE-2017-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5840">CVE-2017-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5841">CVE-2017-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5842">CVE-2017-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5843">CVE-2017-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5844">CVE-2017-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5845">CVE-2017-5845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5846/">CVE-2017-5846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5846">CVE-2017-5846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5847">CVE-2017-5847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5848">CVE-2017-5848 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887474" comment="gstreamer-1.20.1-150400.1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887478" comment="libgstreamer-1_0-0-1.20.1-150400.1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205741" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.20.1-150400.1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.20.1-150400.1.9 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9928">CVE-2019-9928 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887480" comment="gstreamer-plugins-base-1.20.1-150400.1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887483" comment="libgstallocators-1_0-0-1.20.1-150400.1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887484" comment="libgstapp-1_0-0-1.20.1-150400.1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887485" comment="libgstaudio-1_0-0-1.20.1-150400.1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887487" comment="libgstgl-1_0-0-1.20.1-150400.1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887488" comment="libgstpbutils-1_0-0-1.20.1-150400.1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887489" comment="libgstriff-1_0-0-1.20.1-150400.1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887493" comment="libgsttag-1_0-0-1.20.1-150400.1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887494" comment="libgstvideo-1_0-0-1.20.1-150400.1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205742" version="1" class="patch">
	<metadata>
		<title>gtk2-tools-2.24.33-150400.2.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-tools-2.24.33-150400.2.11 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7447">CVE-2013-7447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887512" comment="gtk2-tools-2.24.33-150400.2.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887513" comment="libgtk-2_0-0-2.24.33-150400.2.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205743" version="1" class="patch">
	<metadata>
		<title>guestfs-data-1.44.2-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2022-2211" ref_url="https://www.suse.com/security/cve/CVE-2022-2211/" source="CVE"/>
		<description>
These are all security issues fixed in the guestfs-data-1.44.2-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2211/">CVE-2022-2211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2211">CVE-2022-2211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009698993" comment="guestfs-data-1.44.2-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698994" comment="guestfs-tools-1.44.2-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698998" comment="libguestfs0-1.44.2-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698999" comment="perl-Sys-Guestfs-1.44.2-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205744" version="1" class="patch">
	<metadata>
		<title>gzip-1.10-150200.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
These are all security issues fixed in the gzip-1.10-150200.10.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009682353" comment="gzip-1.10-150200.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679123" comment="liblzma5-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679125" comment="xz-5.2.3-150000.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205745" version="1" class="patch">
	<metadata>
		<title>haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-3281" ref_url="https://www.suse.com/security/cve/CVE-2015-3281/" source="CVE"/>
		<reference ref_id="CVE-2018-11469" ref_url="https://www.suse.com/security/cve/CVE-2018-11469/" source="CVE"/>
		<reference ref_id="CVE-2018-14645" ref_url="https://www.suse.com/security/cve/CVE-2018-14645/" source="CVE"/>
		<reference ref_id="CVE-2018-20102" ref_url="https://www.suse.com/security/cve/CVE-2018-20102/" source="CVE"/>
		<reference ref_id="CVE-2018-20103" ref_url="https://www.suse.com/security/cve/CVE-2018-20103/" source="CVE"/>
		<reference ref_id="CVE-2018-20615" ref_url="https://www.suse.com/security/cve/CVE-2018-20615/" source="CVE"/>
		<reference ref_id="CVE-2019-14241" ref_url="https://www.suse.com/security/cve/CVE-2019-14241/" source="CVE"/>
		<reference ref_id="CVE-2019-18277" ref_url="https://www.suse.com/security/cve/CVE-2019-18277/" source="CVE"/>
		<reference ref_id="CVE-2020-11100" ref_url="https://www.suse.com/security/cve/CVE-2020-11100/" source="CVE"/>
		<reference ref_id="CVE-2021-39240" ref_url="https://www.suse.com/security/cve/CVE-2021-39240/" source="CVE"/>
		<reference ref_id="CVE-2021-39241" ref_url="https://www.suse.com/security/cve/CVE-2021-39241/" source="CVE"/>
		<reference ref_id="CVE-2021-39242" ref_url="https://www.suse.com/security/cve/CVE-2021-39242/" source="CVE"/>
		<reference ref_id="CVE-2021-40346" ref_url="https://www.suse.com/security/cve/CVE-2021-40346/" source="CVE"/>
		<reference ref_id="CVE-2022-0711" ref_url="https://www.suse.com/security/cve/CVE-2022-0711/" source="CVE"/>
		<reference ref_id="CVE-2023-0056" ref_url="https://www.suse.com/security/cve/CVE-2023-0056/" source="CVE"/>
		<description>
These are all security issues fixed in the haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3281/">CVE-2015-3281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3281">CVE-2015-3281 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11469/">CVE-2018-11469 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11469">CVE-2018-11469 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14645/">CVE-2018-14645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14645">CVE-2018-14645 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20102/">CVE-2018-20102 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20102">CVE-2018-20102 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20103/">CVE-2018-20103 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20103">CVE-2018-20103 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20615/">CVE-2018-20615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20615">CVE-2018-20615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14241/">CVE-2019-14241 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14241">CVE-2019-14241 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18277/">CVE-2019-18277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18277">CVE-2019-18277 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11100/">CVE-2020-11100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11100">CVE-2020-11100 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39240/">CVE-2021-39240 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39240">CVE-2021-39240 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39241/">CVE-2021-39241 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39241">CVE-2021-39241 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-39242/">CVE-2021-39242 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39242">CVE-2021-39242 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40346/">CVE-2021-40346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40346">CVE-2021-40346 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0711/">CVE-2022-0711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0711">CVE-2022-0711 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0056/">CVE-2023-0056 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0056">CVE-2023-0056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739103" comment="haproxy-2.4.8+git0.d1f8d41e0-150400.3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205746" version="1" class="patch">
	<metadata>
		<title>iscsiuio-0.7.8.6-150400.39.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-13987" ref_url="https://www.suse.com/security/cve/CVE-2020-13987/" source="CVE"/>
		<reference ref_id="CVE-2020-13988" ref_url="https://www.suse.com/security/cve/CVE-2020-13988/" source="CVE"/>
		<reference ref_id="CVE-2020-17437" ref_url="https://www.suse.com/security/cve/CVE-2020-17437/" source="CVE"/>
		<reference ref_id="CVE-2020-17438" ref_url="https://www.suse.com/security/cve/CVE-2020-17438/" source="CVE"/>
		<description>
These are all security issues fixed in the iscsiuio-0.7.8.6-150400.39.8.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-13987/">CVE-2020-13987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13987">CVE-2020-13987 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13988/">CVE-2020-13988 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13988">CVE-2020-13988 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-17437/">CVE-2020-17437 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17437">CVE-2020-17437 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-17438/">CVE-2020-17438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17438">CVE-2020-17438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904752" comment="iscsiuio-0.7.8.6-150400.39.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904753" comment="libopeniscsiusr0_2_0-2.1.7-150400.39.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904754" comment="open-iscsi-2.1.7-150400.39.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205747" version="1" class="patch">
	<metadata>
		<title>jq-1.6-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-8863" ref_url="https://www.suse.com/security/cve/CVE-2015-8863/" source="CVE"/>
		<reference ref_id="CVE-2016-4074" ref_url="https://www.suse.com/security/cve/CVE-2016-4074/" source="CVE"/>
		<description>
These are all security issues fixed in the jq-1.6-3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8863/">CVE-2015-8863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8863">CVE-2015-8863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4074/">CVE-2016-4074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4074">CVE-2016-4074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887090" comment="jq-1.6-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887092" comment="libjq1-1.6-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205748" version="1" class="patch">
	<metadata>
		<title>kdump-1.0.2+git20.g64239cc-150400.3.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759/" source="CVE"/>
		<description>
These are all security issues fixed in the kdump-1.0.2+git20.g64239cc-150400.3.11.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5759">CVE-2016-5759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904889" comment="kdump-1.0.2+git20.g64239cc-150400.3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205749" version="1" class="patch">
	<metadata>
		<title>keepalived-2.2.2-150400.3.7.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-19044" ref_url="https://www.suse.com/security/cve/CVE-2018-19044/" source="CVE"/>
		<reference ref_id="CVE-2018-19045" ref_url="https://www.suse.com/security/cve/CVE-2018-19045/" source="CVE"/>
		<reference ref_id="CVE-2018-19046" ref_url="https://www.suse.com/security/cve/CVE-2018-19046/" source="CVE"/>
		<reference ref_id="CVE-2021-44225" ref_url="https://www.suse.com/security/cve/CVE-2021-44225/" source="CVE"/>
		<description>
These are all security issues fixed in the keepalived-2.2.2-150400.3.7.2 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19044/">CVE-2018-19044 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19044">CVE-2018-19044 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-19045/">CVE-2018-19045 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19045">CVE-2018-19045 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-19046/">CVE-2018-19046 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19046">CVE-2018-19046 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-44225/">CVE-2021-44225 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44225">CVE-2021-44225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904890" comment="keepalived-2.2.2-150400.3.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205750" version="1" class="patch">
	<metadata>
		<title>kernel-default-5.14.21-150400.24.46.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-3695" ref_url="https://www.suse.com/security/cve/CVE-2016-3695/" source="CVE"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18198" ref_url="https://www.suse.com/security/cve/CVE-2019-18198/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18786" ref_url="https://www.suse.com/security/cve/CVE-2019-18786/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-18811" ref_url="https://www.suse.com/security/cve/CVE-2019-18811/" source="CVE"/>
		<reference ref_id="CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812/" source="CVE"/>
		<reference ref_id="CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813/" source="CVE"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19037" ref_url="https://www.suse.com/security/cve/CVE-2019-19037/" source="CVE"/>
		<reference ref_id="CVE-2019-19043" ref_url="https://www.suse.com/security/cve/CVE-2019-19043/" source="CVE"/>
		<reference ref_id="CVE-2019-19044" ref_url="https://www.suse.com/security/cve/CVE-2019-19044/" source="CVE"/>
		<reference ref_id="CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047/" source="CVE"/>
		<reference ref_id="CVE-2019-19048" ref_url="https://www.suse.com/security/cve/CVE-2019-19048/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19050" ref_url="https://www.suse.com/security/cve/CVE-2019-19050/" source="CVE"/>
		<reference ref_id="CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19053" ref_url="https://www.suse.com/security/cve/CVE-2019-19053/" source="CVE"/>
		<reference ref_id="CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054/" source="CVE"/>
		<reference ref_id="CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19061" ref_url="https://www.suse.com/security/cve/CVE-2019-19061/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19064" ref_url="https://www.suse.com/security/cve/CVE-2019-19064/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19069" ref_url="https://www.suse.com/security/cve/CVE-2019-19069/" source="CVE"/>
		<reference ref_id="CVE-2019-19070" ref_url="https://www.suse.com/security/cve/CVE-2019-19070/" source="CVE"/>
		<reference ref_id="CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071/" source="CVE"/>
		<reference ref_id="CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078/" source="CVE"/>
		<reference ref_id="CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080/" source="CVE"/>
		<reference ref_id="CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081/" source="CVE"/>
		<reference ref_id="CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082/" source="CVE"/>
		<reference ref_id="CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083/" source="CVE"/>
		<reference ref_id="CVE-2019-19241" ref_url="https://www.suse.com/security/cve/CVE-2019-19241/" source="CVE"/>
		<reference ref_id="CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19602" ref_url="https://www.suse.com/security/cve/CVE-2019-19602/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770/" source="CVE"/>
		<reference ref_id="CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807/" source="CVE"/>
		<reference ref_id="CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922/" source="CVE"/>
		<reference ref_id="CVE-2019-19947" ref_url="https://www.suse.com/security/cve/CVE-2019-19947/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-20422" ref_url="https://www.suse.com/security/cve/CVE-2019-20422/" source="CVE"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2020-0110" ref_url="https://www.suse.com/security/cve/CVE-2020-0110/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-11884" ref_url="https://www.suse.com/security/cve/CVE-2020-11884/" source="CVE"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464/" source="CVE"/>
		<reference ref_id="CVE-2020-12465" ref_url="https://www.suse.com/security/cve/CVE-2020-12465/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657/" source="CVE"/>
		<reference ref_id="CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659/" source="CVE"/>
		<reference ref_id="CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769/" source="CVE"/>
		<reference ref_id="CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<reference ref_id="CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<reference ref_id="CVE-2020-16119" ref_url="https://www.suse.com/security/cve/CVE-2020-16119/" source="CVE"/>
		<reference ref_id="CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-2521" ref_url="https://www.suse.com/security/cve/CVE-2020-2521/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27194" ref_url="https://www.suse.com/security/cve/CVE-2020-27194/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-27675" ref_url="https://www.suse.com/security/cve/CVE-2020-27675/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370/" source="CVE"/>
		<reference ref_id="CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2020-36516" ref_url="https://www.suse.com/security/cve/CVE-2020-36516/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="CVE-2020-8835" ref_url="https://www.suse.com/security/cve/CVE-2020-8835/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177/" source="CVE"/>
		<reference ref_id="CVE-2021-20268" ref_url="https://www.suse.com/security/cve/CVE-2021-20268/" source="CVE"/>
		<reference ref_id="CVE-2021-20321" ref_url="https://www.suse.com/security/cve/CVE-2021-20321/" source="CVE"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28952" ref_url="https://www.suse.com/security/cve/CVE-2021-28952/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33061" ref_url="https://www.suse.com/security/cve/CVE-2021-33061/" source="CVE"/>
		<reference ref_id="CVE-2021-33135" ref_url="https://www.suse.com/security/cve/CVE-2021-33135/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="CVE-2021-3489" ref_url="https://www.suse.com/security/cve/CVE-2021-3489/" source="CVE"/>
		<reference ref_id="CVE-2021-3490" ref_url="https://www.suse.com/security/cve/CVE-2021-3490/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38166" ref_url="https://www.suse.com/security/cve/CVE-2021-38166/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38206" ref_url="https://www.suse.com/security/cve/CVE-2021-38206/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="CVE-2021-38209" ref_url="https://www.suse.com/security/cve/CVE-2021-38209/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-39685" ref_url="https://www.suse.com/security/cve/CVE-2021-39685/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4037" ref_url="https://www.suse.com/security/cve/CVE-2021-4037/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4090" ref_url="https://www.suse.com/security/cve/CVE-2021-4090/" source="CVE"/>
		<reference ref_id="CVE-2021-41073" ref_url="https://www.suse.com/security/cve/CVE-2021-41073/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4148" ref_url="https://www.suse.com/security/cve/CVE-2021-4148/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-4204" ref_url="https://www.suse.com/security/cve/CVE-2021-4204/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42327" ref_url="https://www.suse.com/security/cve/CVE-2021-42327/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="CVE-2021-43057" ref_url="https://www.suse.com/security/cve/CVE-2021-43057/" source="CVE"/>
		<reference ref_id="CVE-2021-43267" ref_url="https://www.suse.com/security/cve/CVE-2021-43267/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2021-45402" ref_url="https://www.suse.com/security/cve/CVE-2021-45402/" source="CVE"/>
		<reference ref_id="CVE-2021-45480" ref_url="https://www.suse.com/security/cve/CVE-2021-45480/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0168" ref_url="https://www.suse.com/security/cve/CVE-2022-0168/" source="CVE"/>
		<reference ref_id="CVE-2022-0171" ref_url="https://www.suse.com/security/cve/CVE-2022-0171/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0264" ref_url="https://www.suse.com/security/cve/CVE-2022-0264/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0382" ref_url="https://www.suse.com/security/cve/CVE-2022-0382/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0494" ref_url="https://www.suse.com/security/cve/CVE-2022-0494/" source="CVE"/>
		<reference ref_id="CVE-2022-0500" ref_url="https://www.suse.com/security/cve/CVE-2022-0500/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0742" ref_url="https://www.suse.com/security/cve/CVE-2022-0742/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-0886" ref_url="https://www.suse.com/security/cve/CVE-2022-0886/" source="CVE"/>
		<reference ref_id="CVE-2022-0995" ref_url="https://www.suse.com/security/cve/CVE-2022-0995/" source="CVE"/>
		<reference ref_id="CVE-2022-0998" ref_url="https://www.suse.com/security/cve/CVE-2022-0998/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1012" ref_url="https://www.suse.com/security/cve/CVE-2022-1012/" source="CVE"/>
		<reference ref_id="CVE-2022-1015" ref_url="https://www.suse.com/security/cve/CVE-2022-1015/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-1158" ref_url="https://www.suse.com/security/cve/CVE-2022-1158/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1195" ref_url="https://www.suse.com/security/cve/CVE-2022-1195/" source="CVE"/>
		<reference ref_id="CVE-2022-1198" ref_url="https://www.suse.com/security/cve/CVE-2022-1198/" source="CVE"/>
		<reference ref_id="CVE-2022-1199" ref_url="https://www.suse.com/security/cve/CVE-2022-1199/" source="CVE"/>
		<reference ref_id="CVE-2022-1204" ref_url="https://www.suse.com/security/cve/CVE-2022-1204/" source="CVE"/>
		<reference ref_id="CVE-2022-1205" ref_url="https://www.suse.com/security/cve/CVE-2022-1205/" source="CVE"/>
		<reference ref_id="CVE-2022-1263" ref_url="https://www.suse.com/security/cve/CVE-2022-1263/" source="CVE"/>
		<reference ref_id="CVE-2022-1280" ref_url="https://www.suse.com/security/cve/CVE-2022-1280/" source="CVE"/>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-1508" ref_url="https://www.suse.com/security/cve/CVE-2022-1508/" source="CVE"/>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-1651" ref_url="https://www.suse.com/security/cve/CVE-2022-1651/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-1671" ref_url="https://www.suse.com/security/cve/CVE-2022-1671/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="CVE-2022-1789" ref_url="https://www.suse.com/security/cve/CVE-2022-1789/" source="CVE"/>
		<reference ref_id="CVE-2022-1836" ref_url="https://www.suse.com/security/cve/CVE-2022-1836/" source="CVE"/>
		<reference ref_id="CVE-2022-1852" ref_url="https://www.suse.com/security/cve/CVE-2022-1852/" source="CVE"/>
		<reference ref_id="CVE-2022-1882" ref_url="https://www.suse.com/security/cve/CVE-2022-1882/" source="CVE"/>
		<reference ref_id="CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966/" source="CVE"/>
		<reference ref_id="CVE-2022-1972" ref_url="https://www.suse.com/security/cve/CVE-2022-1972/" source="CVE"/>
		<reference ref_id="CVE-2022-1974" ref_url="https://www.suse.com/security/cve/CVE-2022-1974/" source="CVE"/>
		<reference ref_id="CVE-2022-1975" ref_url="https://www.suse.com/security/cve/CVE-2022-1975/" source="CVE"/>
		<reference ref_id="CVE-2022-1998" ref_url="https://www.suse.com/security/cve/CVE-2022-1998/" source="CVE"/>
		<reference ref_id="CVE-2022-20008" ref_url="https://www.suse.com/security/cve/CVE-2022-20008/" source="CVE"/>
		<reference ref_id="CVE-2022-20132" ref_url="https://www.suse.com/security/cve/CVE-2022-20132/" source="CVE"/>
		<reference ref_id="CVE-2022-20154" ref_url="https://www.suse.com/security/cve/CVE-2022-20154/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-20369" ref_url="https://www.suse.com/security/cve/CVE-2022-20369/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<reference ref_id="CVE-2022-21505" ref_url="https://www.suse.com/security/cve/CVE-2022-21505/" source="CVE"/>
		<reference ref_id="CVE-2022-2153" ref_url="https://www.suse.com/security/cve/CVE-2022-2153/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-2318" ref_url="https://www.suse.com/security/cve/CVE-2022-2318/" source="CVE"/>
		<reference ref_id="CVE-2022-23222" ref_url="https://www.suse.com/security/cve/CVE-2022-23222/" source="CVE"/>
		<reference ref_id="CVE-2022-23960" ref_url="https://www.suse.com/security/cve/CVE-2022-23960/" source="CVE"/>
		<reference ref_id="CVE-2022-24122" ref_url="https://www.suse.com/security/cve/CVE-2022-24122/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="CVE-2022-25636" ref_url="https://www.suse.com/security/cve/CVE-2022-25636/" source="CVE"/>
		<reference ref_id="CVE-2022-2585" ref_url="https://www.suse.com/security/cve/CVE-2022-2585/" source="CVE"/>
		<reference ref_id="CVE-2022-2586" ref_url="https://www.suse.com/security/cve/CVE-2022-2586/" source="CVE"/>
		<reference ref_id="CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588/" source="CVE"/>
		<reference ref_id="CVE-2022-2602" ref_url="https://www.suse.com/security/cve/CVE-2022-2602/" source="CVE"/>
		<reference ref_id="CVE-2022-26365" ref_url="https://www.suse.com/security/cve/CVE-2022-26365/" source="CVE"/>
		<reference ref_id="CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373/" source="CVE"/>
		<reference ref_id="CVE-2022-2639" ref_url="https://www.suse.com/security/cve/CVE-2022-2639/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663/" source="CVE"/>
		<reference ref_id="CVE-2022-26878" ref_url="https://www.suse.com/security/cve/CVE-2022-26878/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-27223" ref_url="https://www.suse.com/security/cve/CVE-2022-27223/" source="CVE"/>
		<reference ref_id="CVE-2022-28356" ref_url="https://www.suse.com/security/cve/CVE-2022-28356/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="CVE-2022-28693" ref_url="https://www.suse.com/security/cve/CVE-2022-28693/" source="CVE"/>
		<reference ref_id="CVE-2022-2873" ref_url="https://www.suse.com/security/cve/CVE-2022-2873/" source="CVE"/>
		<reference ref_id="CVE-2022-28748" ref_url="https://www.suse.com/security/cve/CVE-2022-28748/" source="CVE"/>
		<reference ref_id="CVE-2022-28893" ref_url="https://www.suse.com/security/cve/CVE-2022-28893/" source="CVE"/>
		<reference ref_id="CVE-2022-2905" ref_url="https://www.suse.com/security/cve/CVE-2022-2905/" source="CVE"/>
		<reference ref_id="CVE-2022-29156" ref_url="https://www.suse.com/security/cve/CVE-2022-29156/" source="CVE"/>
		<reference ref_id="CVE-2022-2938" ref_url="https://www.suse.com/security/cve/CVE-2022-2938/" source="CVE"/>
		<reference ref_id="CVE-2022-29581" ref_url="https://www.suse.com/security/cve/CVE-2022-29581/" source="CVE"/>
		<reference ref_id="CVE-2022-29582" ref_url="https://www.suse.com/security/cve/CVE-2022-29582/" source="CVE"/>
		<reference ref_id="CVE-2022-2959" ref_url="https://www.suse.com/security/cve/CVE-2022-2959/" source="CVE"/>
		<reference ref_id="CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964/" source="CVE"/>
		<reference ref_id="CVE-2022-2977" ref_url="https://www.suse.com/security/cve/CVE-2022-2977/" source="CVE"/>
		<reference ref_id="CVE-2022-2978" ref_url="https://www.suse.com/security/cve/CVE-2022-2978/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="CVE-2022-3078" ref_url="https://www.suse.com/security/cve/CVE-2022-3078/" source="CVE"/>
		<reference ref_id="CVE-2022-3104" ref_url="https://www.suse.com/security/cve/CVE-2022-3104/" source="CVE"/>
		<reference ref_id="CVE-2022-3105" ref_url="https://www.suse.com/security/cve/CVE-2022-3105/" source="CVE"/>
		<reference ref_id="CVE-2022-3106" ref_url="https://www.suse.com/security/cve/CVE-2022-3106/" source="CVE"/>
		<reference ref_id="CVE-2022-3107" ref_url="https://www.suse.com/security/cve/CVE-2022-3107/" source="CVE"/>
		<reference ref_id="CVE-2022-3108" ref_url="https://www.suse.com/security/cve/CVE-2022-3108/" source="CVE"/>
		<reference ref_id="CVE-2022-3111" ref_url="https://www.suse.com/security/cve/CVE-2022-3111/" source="CVE"/>
		<reference ref_id="CVE-2022-3112" ref_url="https://www.suse.com/security/cve/CVE-2022-3112/" source="CVE"/>
		<reference ref_id="CVE-2022-3113" ref_url="https://www.suse.com/security/cve/CVE-2022-3113/" source="CVE"/>
		<reference ref_id="CVE-2022-3114" ref_url="https://www.suse.com/security/cve/CVE-2022-3114/" source="CVE"/>
		<reference ref_id="CVE-2022-3115" ref_url="https://www.suse.com/security/cve/CVE-2022-3115/" source="CVE"/>
		<reference ref_id="CVE-2022-3169" ref_url="https://www.suse.com/security/cve/CVE-2022-3169/" source="CVE"/>
		<reference ref_id="CVE-2022-3176" ref_url="https://www.suse.com/security/cve/CVE-2022-3176/" source="CVE"/>
		<reference ref_id="CVE-2022-3202" ref_url="https://www.suse.com/security/cve/CVE-2022-3202/" source="CVE"/>
		<reference ref_id="CVE-2022-32250" ref_url="https://www.suse.com/security/cve/CVE-2022-32250/" source="CVE"/>
		<reference ref_id="CVE-2022-32296" ref_url="https://www.suse.com/security/cve/CVE-2022-32296/" source="CVE"/>
		<reference ref_id="CVE-2022-3239" ref_url="https://www.suse.com/security/cve/CVE-2022-3239/" source="CVE"/>
		<reference ref_id="CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303/" source="CVE"/>
		<reference ref_id="CVE-2022-3344" ref_url="https://www.suse.com/security/cve/CVE-2022-3344/" source="CVE"/>
		<reference ref_id="CVE-2022-33740" ref_url="https://www.suse.com/security/cve/CVE-2022-33740/" source="CVE"/>
		<reference ref_id="CVE-2022-33741" ref_url="https://www.suse.com/security/cve/CVE-2022-33741/" source="CVE"/>
		<reference ref_id="CVE-2022-33742" ref_url="https://www.suse.com/security/cve/CVE-2022-33742/" source="CVE"/>
		<reference ref_id="CVE-2022-33743" ref_url="https://www.suse.com/security/cve/CVE-2022-33743/" source="CVE"/>
		<reference ref_id="CVE-2022-33981" ref_url="https://www.suse.com/security/cve/CVE-2022-33981/" source="CVE"/>
		<reference ref_id="CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424/" source="CVE"/>
		<reference ref_id="CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435/" source="CVE"/>
		<reference ref_id="CVE-2022-34918" ref_url="https://www.suse.com/security/cve/CVE-2022-34918/" source="CVE"/>
		<reference ref_id="CVE-2022-3521" ref_url="https://www.suse.com/security/cve/CVE-2022-3521/" source="CVE"/>
		<reference ref_id="CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524/" source="CVE"/>
		<reference ref_id="CVE-2022-3526" ref_url="https://www.suse.com/security/cve/CVE-2022-3526/" source="CVE"/>
		<reference ref_id="CVE-2022-3535" ref_url="https://www.suse.com/security/cve/CVE-2022-3535/" source="CVE"/>
		<reference ref_id="CVE-2022-3542" ref_url="https://www.suse.com/security/cve/CVE-2022-3542/" source="CVE"/>
		<reference ref_id="CVE-2022-3545" ref_url="https://www.suse.com/security/cve/CVE-2022-3545/" source="CVE"/>
		<reference ref_id="CVE-2022-3564" ref_url="https://www.suse.com/security/cve/CVE-2022-3564/" source="CVE"/>
		<reference ref_id="CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565/" source="CVE"/>
		<reference ref_id="CVE-2022-3566" ref_url="https://www.suse.com/security/cve/CVE-2022-3566/" source="CVE"/>
		<reference ref_id="CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567/" source="CVE"/>
		<reference ref_id="CVE-2022-3577" ref_url="https://www.suse.com/security/cve/CVE-2022-3577/" source="CVE"/>
		<reference ref_id="CVE-2022-3586" ref_url="https://www.suse.com/security/cve/CVE-2022-3586/" source="CVE"/>
		<reference ref_id="CVE-2022-3594" ref_url="https://www.suse.com/security/cve/CVE-2022-3594/" source="CVE"/>
		<reference ref_id="CVE-2022-3619" ref_url="https://www.suse.com/security/cve/CVE-2022-3619/" source="CVE"/>
		<reference ref_id="CVE-2022-3621" ref_url="https://www.suse.com/security/cve/CVE-2022-3621/" source="CVE"/>
		<reference ref_id="CVE-2022-3625" ref_url="https://www.suse.com/security/cve/CVE-2022-3625/" source="CVE"/>
		<reference ref_id="CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628/" source="CVE"/>
		<reference ref_id="CVE-2022-3629" ref_url="https://www.suse.com/security/cve/CVE-2022-3629/" source="CVE"/>
		<reference ref_id="CVE-2022-3633" ref_url="https://www.suse.com/security/cve/CVE-2022-3633/" source="CVE"/>
		<reference ref_id="CVE-2022-3635" ref_url="https://www.suse.com/security/cve/CVE-2022-3635/" source="CVE"/>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<reference ref_id="CVE-2022-3643" ref_url="https://www.suse.com/security/cve/CVE-2022-3643/" source="CVE"/>
		<reference ref_id="CVE-2022-3646" ref_url="https://www.suse.com/security/cve/CVE-2022-3646/" source="CVE"/>
		<reference ref_id="CVE-2022-3649" ref_url="https://www.suse.com/security/cve/CVE-2022-3649/" source="CVE"/>
		<reference ref_id="CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879/" source="CVE"/>
		<reference ref_id="CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946/" source="CVE"/>
		<reference ref_id="CVE-2022-3707" ref_url="https://www.suse.com/security/cve/CVE-2022-3707/" source="CVE"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188/" source="CVE"/>
		<reference ref_id="CVE-2022-39189" ref_url="https://www.suse.com/security/cve/CVE-2022-39189/" source="CVE"/>
		<reference ref_id="CVE-2022-39190" ref_url="https://www.suse.com/security/cve/CVE-2022-39190/" source="CVE"/>
		<reference ref_id="CVE-2022-40476" ref_url="https://www.suse.com/security/cve/CVE-2022-40476/" source="CVE"/>
		<reference ref_id="CVE-2022-40768" ref_url="https://www.suse.com/security/cve/CVE-2022-40768/" source="CVE"/>
		<reference ref_id="CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095/" source="CVE"/>
		<reference ref_id="CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218/" source="CVE"/>
		<reference ref_id="CVE-2022-4129" ref_url="https://www.suse.com/security/cve/CVE-2022-4129/" source="CVE"/>
		<reference ref_id="CVE-2022-4139" ref_url="https://www.suse.com/security/cve/CVE-2022-4139/" source="CVE"/>
		<reference ref_id="CVE-2022-41674" ref_url="https://www.suse.com/security/cve/CVE-2022-41674/" source="CVE"/>
		<reference ref_id="CVE-2022-41848" ref_url="https://www.suse.com/security/cve/CVE-2022-41848/" source="CVE"/>
		<reference ref_id="CVE-2022-41849" ref_url="https://www.suse.com/security/cve/CVE-2022-41849/" source="CVE"/>
		<reference ref_id="CVE-2022-41850" ref_url="https://www.suse.com/security/cve/CVE-2022-41850/" source="CVE"/>
		<reference ref_id="CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858/" source="CVE"/>
		<reference ref_id="CVE-2022-42328" ref_url="https://www.suse.com/security/cve/CVE-2022-42328/" source="CVE"/>
		<reference ref_id="CVE-2022-42329" ref_url="https://www.suse.com/security/cve/CVE-2022-42329/" source="CVE"/>
		<reference ref_id="CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703/" source="CVE"/>
		<reference ref_id="CVE-2022-42719" ref_url="https://www.suse.com/security/cve/CVE-2022-42719/" source="CVE"/>
		<reference ref_id="CVE-2022-42720" ref_url="https://www.suse.com/security/cve/CVE-2022-42720/" source="CVE"/>
		<reference ref_id="CVE-2022-42721" ref_url="https://www.suse.com/security/cve/CVE-2022-42721/" source="CVE"/>
		<reference ref_id="CVE-2022-42722" ref_url="https://www.suse.com/security/cve/CVE-2022-42722/" source="CVE"/>
		<reference ref_id="CVE-2022-42895" ref_url="https://www.suse.com/security/cve/CVE-2022-42895/" source="CVE"/>
		<reference ref_id="CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896/" source="CVE"/>
		<reference ref_id="CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750/" source="CVE"/>
		<reference ref_id="CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378/" source="CVE"/>
		<reference ref_id="CVE-2022-4379" ref_url="https://www.suse.com/security/cve/CVE-2022-4379/" source="CVE"/>
		<reference ref_id="CVE-2022-4382" ref_url="https://www.suse.com/security/cve/CVE-2022-4382/" source="CVE"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-45869" ref_url="https://www.suse.com/security/cve/CVE-2022-45869/" source="CVE"/>
		<reference ref_id="CVE-2022-45888" ref_url="https://www.suse.com/security/cve/CVE-2022-45888/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="CVE-2022-4662" ref_url="https://www.suse.com/security/cve/CVE-2022-4662/" source="CVE"/>
		<reference ref_id="CVE-2022-47520" ref_url="https://www.suse.com/security/cve/CVE-2022-47520/" source="CVE"/>
		<reference ref_id="CVE-2022-47929" ref_url="https://www.suse.com/security/cve/CVE-2022-47929/" source="CVE"/>
		<reference ref_id="CVE-2023-0122" ref_url="https://www.suse.com/security/cve/CVE-2023-0122/" source="CVE"/>
		<reference ref_id="CVE-2023-0179" ref_url="https://www.suse.com/security/cve/CVE-2023-0179/" source="CVE"/>
		<reference ref_id="CVE-2023-0266" ref_url="https://www.suse.com/security/cve/CVE-2023-0266/" source="CVE"/>
		<reference ref_id="CVE-2023-0590" ref_url="https://www.suse.com/security/cve/CVE-2023-0590/" source="CVE"/>
		<reference ref_id="CVE-2023-23454" ref_url="https://www.suse.com/security/cve/CVE-2023-23454/" source="CVE"/>
		<reference ref_id="CVE-2023-23455" ref_url="https://www.suse.com/security/cve/CVE-2023-23455/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-5.14.21-150400.24.46.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3695/">CVE-2016-3695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3695">CVE-2016-3695 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000251">CVE-2017-1000251 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12153">CVE-2017-12153 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14051">CVE-2017-14051 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16536">CVE-2017-16536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16537">CVE-2017-16537 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16646">CVE-2017-16646 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16648">CVE-2017-16648 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10323">CVE-2018-10323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12232">CVE-2018-12232 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13053">CVE-2018-13053 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20669">CVE-2018-20669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0154">CVE-2019-0154 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14615">CVE-2019-14615 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14815">CVE-2019-14815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14901">CVE-2019-14901 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15030">CVE-2019-15030 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15031">CVE-2019-15031 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15098">CVE-2019-15098 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15099">CVE-2019-15099 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15290">CVE-2019-15290 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15291">CVE-2019-15291 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15504">CVE-2019-15504 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18198/">CVE-2019-18198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18198">CVE-2019-18198 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18683">CVE-2019-18683 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18786/">CVE-2019-18786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18786">CVE-2019-18786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18808">CVE-2019-18808 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18809">CVE-2019-18809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18811/">CVE-2019-18811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18811">CVE-2019-18811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18812">CVE-2019-18812 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18813">CVE-2019-18813 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18814">CVE-2019-18814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19037/">CVE-2019-19037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19037">CVE-2019-19037 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19043/">CVE-2019-19043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19043">CVE-2019-19043 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19044/">CVE-2019-19044 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19044">CVE-2019-19044 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19045">CVE-2019-19045 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19046">CVE-2019-19046 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19047">CVE-2019-19047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19048/">CVE-2019-19048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19048">CVE-2019-19048 at NVD</cve>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19049">CVE-2019-19049 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19050/">CVE-2019-19050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19050">CVE-2019-19050 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19051">CVE-2019-19051 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19052">CVE-2019-19052 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19053/">CVE-2019-19053 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19053">CVE-2019-19053 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19054">CVE-2019-19054 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19055">CVE-2019-19055 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19056">CVE-2019-19056 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19057">CVE-2019-19057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19058">CVE-2019-19058 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19060">CVE-2019-19060 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19061/">CVE-2019-19061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19061">CVE-2019-19061 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19062">CVE-2019-19062 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19063">CVE-2019-19063 at NVD</cve>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19064/">CVE-2019-19064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19064">CVE-2019-19064 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19065">CVE-2019-19065 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19066">CVE-2019-19066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19067">CVE-2019-19067 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19068">CVE-2019-19068 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19069/">CVE-2019-19069 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19069">CVE-2019-19069 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19070/">CVE-2019-19070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19070">CVE-2019-19070 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19071">CVE-2019-19071 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19072">CVE-2019-19072 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19073">CVE-2019-19073 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19074">CVE-2019-19074 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19075">CVE-2019-19075 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19077">CVE-2019-19077 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19078">CVE-2019-19078 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19080">CVE-2019-19080 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19081">CVE-2019-19081 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19082">CVE-2019-19082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19083">CVE-2019-19083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19241/">CVE-2019-19241 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19241">CVE-2019-19241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19252">CVE-2019-19252 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19462">CVE-2019-19462 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19525">CVE-2019-19525 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19526">CVE-2019-19526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19528">CVE-2019-19528 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19529">CVE-2019-19529 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19533">CVE-2019-19533 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19534">CVE-2019-19534 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19602/">CVE-2019-19602 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19602">CVE-2019-19602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19767">CVE-2019-19767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19769">CVE-2019-19769 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19770">CVE-2019-19770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19807">CVE-2019-19807 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19922">CVE-2019-19922 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19947/">CVE-2019-19947 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19947">CVE-2019-19947 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19965">CVE-2019-19965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20422/">CVE-2019-20422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20422">CVE-2019-20422 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20810">CVE-2019-20810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20812">CVE-2019-20812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3016">CVE-2019-3016 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8912">CVE-2019-8912 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0110/">CVE-2020-0110 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0110">CVE-2020-0110 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0427">CVE-2020-0427 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0432">CVE-2020-0432 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0444">CVE-2020-0444 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135">CVE-2020-10135 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10711">CVE-2020-10711 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10751">CVE-2020-10751 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10766">CVE-2020-10766 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10767">CVE-2020-10767 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10768">CVE-2020-10768 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10781">CVE-2020-10781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11494">CVE-2020-11494 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11884/">CVE-2020-11884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11884">CVE-2020-11884 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12351">CVE-2020-12351 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12362">CVE-2020-12362 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12363">CVE-2020-12363 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12364">CVE-2020-12364 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12373">CVE-2020-12373 at NVD</cve>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12464">CVE-2020-12464 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12465/">CVE-2020-12465 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12465">CVE-2020-12465 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12655">CVE-2020-12655 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12656">CVE-2020-12656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12657">CVE-2020-12657 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12659">CVE-2020-12659 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12769">CVE-2020-12769 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12770">CVE-2020-12770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12771">CVE-2020-12771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12888">CVE-2020-12888 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13143">CVE-2020-13143 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14314">CVE-2020-14314 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14356">CVE-2020-14356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14385">CVE-2020-14385 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14390">CVE-2020-14390 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14416">CVE-2020-14416 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15393">CVE-2020-15393 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15780">CVE-2020-15780 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16119/">CVE-2020-16119 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16119">CVE-2020-16119 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16120">CVE-2020-16120 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16166">CVE-2020-16166 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24490">CVE-2020-24490 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2521/">CVE-2020-2521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-2521">CVE-2020-2521 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25284">CVE-2020-25284 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25285">CVE-2020-25285 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25639">CVE-2020-25639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25641">CVE-2020-25641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25704">CVE-2020-25704 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26088">CVE-2020-26088 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27068">CVE-2020-27068 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27170">CVE-2020-27170 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27171">CVE-2020-27171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-27194/">CVE-2020-27194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27194">CVE-2020-27194 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27673">CVE-2020-27673 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27675/">CVE-2020-27675 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27675">CVE-2020-27675 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27815">CVE-2020-27815 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27825">CVE-2020-27825 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27830">CVE-2020-27830 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27835">CVE-2020-27835 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28941">CVE-2020-28941 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29368">CVE-2020-29368 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29369">CVE-2020-29369 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29370">CVE-2020-29370 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29371">CVE-2020-29371 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29373">CVE-2020-29373 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29568">CVE-2020-29568 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35519">CVE-2020-35519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36310">CVE-2020-36310 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36311">CVE-2020-36311 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36312">CVE-2020-36312 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36516/">CVE-2020-36516 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36516">CVE-2020-36516 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8428">CVE-2020-8428 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8835/">CVE-2020-8835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8835">CVE-2020-8835 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8992">CVE-2020-8992 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0342">CVE-2021-0342 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20177">CVE-2021-20177 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20268/">CVE-2021-20268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20268">CVE-2021-20268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20321/">CVE-2021-20321 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21781">CVE-2021-21781 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22600">CVE-2021-22600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26341">CVE-2021-26341 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">CVE-2021-26932 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28375">CVE-2021-28375 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28714">CVE-2021-28714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28952/">CVE-2021-28952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28952">CVE-2021-28952 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28964">CVE-2021-28964 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">CVE-2021-28971 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29155">CVE-2021-29155 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29265">CVE-2021-29265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29647">CVE-2021-29647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33061/">CVE-2021-33061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33061">CVE-2021-33061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33135/">CVE-2021-33135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33135">CVE-2021-33135 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33200">CVE-2021-33200 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3348">CVE-2021-3348 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33624">CVE-2021-33624 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3428">CVE-2021-3428 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3444">CVE-2021-3444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3489/">CVE-2021-3489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3489">CVE-2021-3489 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3490/">CVE-2021-3490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3490">CVE-2021-3490 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3491">CVE-2021-3491 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35039">CVE-2021-35039 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3542">CVE-2021-3542 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3612">CVE-2021-3612 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3659">CVE-2021-3659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3732">CVE-2021-3732 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3739">CVE-2021-3739 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3743">CVE-2021-3743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3744">CVE-2021-3744 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3759">CVE-2021-3759 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3764">CVE-2021-3764 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38166/">CVE-2021-38166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38166">CVE-2021-38166 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38204">CVE-2021-38204 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38205">CVE-2021-38205 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38206/">CVE-2021-38206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38206">CVE-2021-38206 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38207">CVE-2021-38207 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38209/">CVE-2021-38209 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38209">CVE-2021-38209 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3896">CVE-2021-3896 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39685/">CVE-2021-39685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39685">CVE-2021-39685 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39698">CVE-2021-39698 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4001">CVE-2021-4001 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4037/">CVE-2021-4037 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4037">CVE-2021-4037 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4090/">CVE-2021-4090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4090">CVE-2021-4090 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41073/">CVE-2021-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41073">CVE-2021-41073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4135">CVE-2021-4135 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4148/">CVE-2021-4148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4148">CVE-2021-4148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41864">CVE-2021-41864 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4204/">CVE-2021-4204 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4204">CVE-2021-4204 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42252">CVE-2021-42252 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42327/">CVE-2021-42327 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43057/">CVE-2021-43057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43057">CVE-2021-43057 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43267/">CVE-2021-43267 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43267">CVE-2021-43267 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43975">CVE-2021-43975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44733">CVE-2021-44733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44879">CVE-2021-44879 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45402/">CVE-2021-45402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45402">CVE-2021-45402 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45480/">CVE-2021-45480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45480">CVE-2021-45480 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">CVE-2021-45868 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0168/">CVE-2022-0168 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0171/">CVE-2022-0171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0171">CVE-2022-0171 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0264/">CVE-2022-0264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0264">CVE-2022-0264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0322">CVE-2022-0322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0382/">CVE-2022-0382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0382">CVE-2022-0382 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0435">CVE-2022-0435 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0494/">CVE-2022-0494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0494">CVE-2022-0494 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0500/">CVE-2022-0500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0500">CVE-2022-0500 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0516">CVE-2022-0516 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-0644">CVE-2022-0644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0742/">CVE-2022-0742 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0742">CVE-2022-0742 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0854">CVE-2022-0854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0886/">CVE-2022-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-0886">CVE-2022-0886 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0995/">CVE-2022-0995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0995">CVE-2022-0995 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0998/">CVE-2022-0998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0998">CVE-2022-0998 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1012/">CVE-2022-1012 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1015/">CVE-2022-1015 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1015">CVE-2022-1015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1055">CVE-2022-1055 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1158/">CVE-2022-1158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1195/">CVE-2022-1195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1195">CVE-2022-1195 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1198/">CVE-2022-1198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1198">CVE-2022-1198 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1199/">CVE-2022-1199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1199">CVE-2022-1199 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1204/">CVE-2022-1204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1204">CVE-2022-1204 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1205/">CVE-2022-1205 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1205">CVE-2022-1205 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1263/">CVE-2022-1263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1263">CVE-2022-1263 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1280/">CVE-2022-1280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1280">CVE-2022-1280 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1508/">CVE-2022-1508 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1508">CVE-2022-1508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1651/">CVE-2022-1651 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1651">CVE-2022-1651 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1671/">CVE-2022-1671 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1671">CVE-2022-1671 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1789/">CVE-2022-1789 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1836/">CVE-2022-1836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-1836">CVE-2022-1836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1852/">CVE-2022-1852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1882/">CVE-2022-1882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1882">CVE-2022-1882 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1966">CVE-2022-1966 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1972/">CVE-2022-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-1972">CVE-2022-1972 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1974/">CVE-2022-1974 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1974">CVE-2022-1974 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1975/">CVE-2022-1975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1975">CVE-2022-1975 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1998/">CVE-2022-1998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1998">CVE-2022-1998 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-20008/">CVE-2022-20008 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20008">CVE-2022-20008 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-20132/">CVE-2022-20132 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20132">CVE-2022-20132 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20154/">CVE-2022-20154 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20154">CVE-2022-20154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20369/">CVE-2022-20369 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20369">CVE-2022-20369 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21127">CVE-2022-21127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21180">CVE-2022-21180 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21505/">CVE-2022-21505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-21505">CVE-2022-21505 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2153/">CVE-2022-2153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2153">CVE-2022-2153 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2318/">CVE-2022-2318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23222/">CVE-2022-23222 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23222">CVE-2022-23222 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23960/">CVE-2022-23960 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23960">CVE-2022-23960 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24122/">CVE-2022-24122 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24122">CVE-2022-24122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24958">CVE-2022-24958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24959">CVE-2022-24959 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25258">CVE-2022-25258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25375">CVE-2022-25375 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25636/">CVE-2022-25636 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25636">CVE-2022-25636 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2585/">CVE-2022-2585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2586/">CVE-2022-2586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2602/">CVE-2022-2602 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-26365/">CVE-2022-26365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2639/">CVE-2022-2639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2639">CVE-2022-2639 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-26878/">CVE-2022-26878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26878">CVE-2022-26878 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">CVE-2022-26966 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27223/">CVE-2022-27223 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27223">CVE-2022-27223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28356/">CVE-2022-28356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28356">CVE-2022-28356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28693/">CVE-2022-28693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-28693">CVE-2022-28693 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2873/">CVE-2022-2873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2873">CVE-2022-2873 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28748/">CVE-2022-28748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-28748">CVE-2022-28748 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28893/">CVE-2022-28893 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2905/">CVE-2022-2905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29156/">CVE-2022-29156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29156">CVE-2022-29156 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2938/">CVE-2022-2938 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2938">CVE-2022-2938 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29581/">CVE-2022-29581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29581">CVE-2022-29581 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29582/">CVE-2022-29582 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29582">CVE-2022-29582 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2959/">CVE-2022-2959 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2959">CVE-2022-2959 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2977/">CVE-2022-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2977">CVE-2022-2977 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2978/">CVE-2022-2978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2978">CVE-2022-2978 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3078/">CVE-2022-3078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3078">CVE-2022-3078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3104/">CVE-2022-3104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3104">CVE-2022-3104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3105/">CVE-2022-3105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3105">CVE-2022-3105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3106/">CVE-2022-3106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3106">CVE-2022-3106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3107/">CVE-2022-3107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3107">CVE-2022-3107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3108/">CVE-2022-3108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3108">CVE-2022-3108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3111/">CVE-2022-3111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3111">CVE-2022-3111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3112/">CVE-2022-3112 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3112">CVE-2022-3112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3113/">CVE-2022-3113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3113">CVE-2022-3113 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3114/">CVE-2022-3114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3114">CVE-2022-3114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3115/">CVE-2022-3115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3115">CVE-2022-3115 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3169/">CVE-2022-3169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3169">CVE-2022-3169 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3176/">CVE-2022-3176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3176">CVE-2022-3176 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3202/">CVE-2022-3202 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3202">CVE-2022-3202 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32250/">CVE-2022-32250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32296/">CVE-2022-32296 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32296">CVE-2022-32296 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3239/">CVE-2022-3239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3239">CVE-2022-3239 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3344/">CVE-2022-3344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3344">CVE-2022-3344 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33740/">CVE-2022-33740 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33741/">CVE-2022-33741 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33742/">CVE-2022-33742 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33743/">CVE-2022-33743 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33981/">CVE-2022-33981 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33981">CVE-2022-33981 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34918/">CVE-2022-34918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3521/">CVE-2022-3521 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3521">CVE-2022-3521 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3526/">CVE-2022-3526 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3526">CVE-2022-3526 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3535/">CVE-2022-3535 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3535">CVE-2022-3535 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3542/">CVE-2022-3542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3542">CVE-2022-3542 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3545/">CVE-2022-3545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3545">CVE-2022-3545 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3564/">CVE-2022-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3566/">CVE-2022-3566 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3566">CVE-2022-3566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3567">CVE-2022-3567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3577/">CVE-2022-3577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3577">CVE-2022-3577 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3586/">CVE-2022-3586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3586">CVE-2022-3586 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3594/">CVE-2022-3594 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3619/">CVE-2022-3619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3621/">CVE-2022-3621 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3621">CVE-2022-3621 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3625/">CVE-2022-3625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3625">CVE-2022-3625 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3629/">CVE-2022-3629 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3629">CVE-2022-3629 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3633/">CVE-2022-3633 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3633">CVE-2022-3633 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3635/">CVE-2022-3635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3635">CVE-2022-3635 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-3643/">CVE-2022-3643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3643">CVE-2022-3643 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3646/">CVE-2022-3646 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3646">CVE-2022-3646 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3649/">CVE-2022-3649 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3649">CVE-2022-3649 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3707/">CVE-2022-3707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3903">CVE-2022-3903 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39188">CVE-2022-39188 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39189/">CVE-2022-39189 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39189">CVE-2022-39189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39190/">CVE-2022-39190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40476/">CVE-2022-40476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40476">CVE-2022-40476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40768/">CVE-2022-40768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4095">CVE-2022-4095 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4129/">CVE-2022-4129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4129">CVE-2022-4129 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4139/">CVE-2022-4139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4139">CVE-2022-4139 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41674/">CVE-2022-41674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41848/">CVE-2022-41848 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41848">CVE-2022-41848 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41849/">CVE-2022-41849 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41849">CVE-2022-41849 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41850/">CVE-2022-41850 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41850">CVE-2022-41850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41858">CVE-2022-41858 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42328/">CVE-2022-42328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42328">CVE-2022-42328 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42329/">CVE-2022-42329 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42329">CVE-2022-42329 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42703">CVE-2022-42703 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42719/">CVE-2022-42719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42720/">CVE-2022-42720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42721/">CVE-2022-42721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42722/">CVE-2022-42722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42895/">CVE-2022-42895 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42895">CVE-2022-42895 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4379/">CVE-2022-4379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4382/">CVE-2022-4382 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45869/">CVE-2022-45869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45888/">CVE-2022-45888 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45888">CVE-2022-45888 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4662/">CVE-2022-4662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4662">CVE-2022-4662 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-47520/">CVE-2022-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47520">CVE-2022-47520 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47929/">CVE-2022-47929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47929">CVE-2022-47929 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0122/">CVE-2023-0122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0122">CVE-2023-0122 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0179/">CVE-2023-0179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0266/">CVE-2023-0266 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0590/">CVE-2023-0590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23454/">CVE-2023-23454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23455/">CVE-2023-23455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739211" comment="kernel-default-5.14.21-150400.24.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205751" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-all-20220509-150400.4.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<reference ref_id="CVE-2021-26312" ref_url="https://www.suse.com/security/cve/CVE-2021-26312/" source="CVE"/>
		<reference ref_id="CVE-2021-26339" ref_url="https://www.suse.com/security/cve/CVE-2021-26339/" source="CVE"/>
		<reference ref_id="CVE-2021-26342" ref_url="https://www.suse.com/security/cve/CVE-2021-26342/" source="CVE"/>
		<reference ref_id="CVE-2021-26347" ref_url="https://www.suse.com/security/cve/CVE-2021-26347/" source="CVE"/>
		<reference ref_id="CVE-2021-26348" ref_url="https://www.suse.com/security/cve/CVE-2021-26348/" source="CVE"/>
		<reference ref_id="CVE-2021-26349" ref_url="https://www.suse.com/security/cve/CVE-2021-26349/" source="CVE"/>
		<reference ref_id="CVE-2021-26350" ref_url="https://www.suse.com/security/cve/CVE-2021-26350/" source="CVE"/>
		<reference ref_id="CVE-2021-26364" ref_url="https://www.suse.com/security/cve/CVE-2021-26364/" source="CVE"/>
		<reference ref_id="CVE-2021-26372" ref_url="https://www.suse.com/security/cve/CVE-2021-26372/" source="CVE"/>
		<reference ref_id="CVE-2021-26373" ref_url="https://www.suse.com/security/cve/CVE-2021-26373/" source="CVE"/>
		<reference ref_id="CVE-2021-26375" ref_url="https://www.suse.com/security/cve/CVE-2021-26375/" source="CVE"/>
		<reference ref_id="CVE-2021-26376" ref_url="https://www.suse.com/security/cve/CVE-2021-26376/" source="CVE"/>
		<reference ref_id="CVE-2021-26378" ref_url="https://www.suse.com/security/cve/CVE-2021-26378/" source="CVE"/>
		<reference ref_id="CVE-2021-26388" ref_url="https://www.suse.com/security/cve/CVE-2021-26388/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-33155" ref_url="https://www.suse.com/security/cve/CVE-2021-33155/" source="CVE"/>
		<reference ref_id="CVE-2021-46744" ref_url="https://www.suse.com/security/cve/CVE-2021-46744/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-all-20220509-150400.4.13.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26312/">CVE-2021-26312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26312">CVE-2021-26312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26339/">CVE-2021-26339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26339">CVE-2021-26339 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-26342/">CVE-2021-26342 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26342">CVE-2021-26342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26347/">CVE-2021-26347 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26347">CVE-2021-26347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26348/">CVE-2021-26348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26348">CVE-2021-26348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26349/">CVE-2021-26349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26349">CVE-2021-26349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26350/">CVE-2021-26350 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26350">CVE-2021-26350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26364/">CVE-2021-26364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26364">CVE-2021-26364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26372/">CVE-2021-26372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26372">CVE-2021-26372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26373/">CVE-2021-26373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26373">CVE-2021-26373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26375/">CVE-2021-26375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26375">CVE-2021-26375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26376/">CVE-2021-26376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26376">CVE-2021-26376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26378/">CVE-2021-26378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26378">CVE-2021-26378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26388/">CVE-2021-26388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26388">CVE-2021-26388 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33155/">CVE-2021-33155 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33155">CVE-2021-33155 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46744/">CVE-2021-46744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46744">CVE-2021-46744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904891" comment="kernel-firmware-all-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904892" comment="kernel-firmware-amdgpu-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904893" comment="kernel-firmware-ath10k-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904894" comment="kernel-firmware-ath11k-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904895" comment="kernel-firmware-atheros-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904896" comment="kernel-firmware-bluetooth-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904897" comment="kernel-firmware-bnx2-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904898" comment="kernel-firmware-brcm-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904899" comment="kernel-firmware-chelsio-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904900" comment="kernel-firmware-dpaa2-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904901" comment="kernel-firmware-i915-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904902" comment="kernel-firmware-intel-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904903" comment="kernel-firmware-iwlwifi-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904904" comment="kernel-firmware-liquidio-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904905" comment="kernel-firmware-marvell-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904906" comment="kernel-firmware-media-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904907" comment="kernel-firmware-mediatek-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904908" comment="kernel-firmware-mellanox-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904909" comment="kernel-firmware-mwifiex-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904910" comment="kernel-firmware-network-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904911" comment="kernel-firmware-nfp-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904912" comment="kernel-firmware-nvidia-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904913" comment="kernel-firmware-platform-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904914" comment="kernel-firmware-prestera-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904915" comment="kernel-firmware-qcom-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904916" comment="kernel-firmware-qlogic-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904917" comment="kernel-firmware-radeon-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904918" comment="kernel-firmware-realtek-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904919" comment="kernel-firmware-serial-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904920" comment="kernel-firmware-sound-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904921" comment="kernel-firmware-ti-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904922" comment="kernel-firmware-ueagle-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904923" comment="kernel-firmware-usb-network-20220509-150400.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904924" comment="ucode-amd-20220509-150400.4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205752" version="1" class="patch">
	<metadata>
		<title>kernel-rt-5.14.21-150400.15.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-3695" ref_url="https://www.suse.com/security/cve/CVE-2016-3695/" source="CVE"/>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18198" ref_url="https://www.suse.com/security/cve/CVE-2019-18198/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18786" ref_url="https://www.suse.com/security/cve/CVE-2019-18786/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-18811" ref_url="https://www.suse.com/security/cve/CVE-2019-18811/" source="CVE"/>
		<reference ref_id="CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812/" source="CVE"/>
		<reference ref_id="CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813/" source="CVE"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19037" ref_url="https://www.suse.com/security/cve/CVE-2019-19037/" source="CVE"/>
		<reference ref_id="CVE-2019-19043" ref_url="https://www.suse.com/security/cve/CVE-2019-19043/" source="CVE"/>
		<reference ref_id="CVE-2019-19044" ref_url="https://www.suse.com/security/cve/CVE-2019-19044/" source="CVE"/>
		<reference ref_id="CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047/" source="CVE"/>
		<reference ref_id="CVE-2019-19048" ref_url="https://www.suse.com/security/cve/CVE-2019-19048/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19050" ref_url="https://www.suse.com/security/cve/CVE-2019-19050/" source="CVE"/>
		<reference ref_id="CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19053" ref_url="https://www.suse.com/security/cve/CVE-2019-19053/" source="CVE"/>
		<reference ref_id="CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054/" source="CVE"/>
		<reference ref_id="CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19061" ref_url="https://www.suse.com/security/cve/CVE-2019-19061/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19064" ref_url="https://www.suse.com/security/cve/CVE-2019-19064/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19069" ref_url="https://www.suse.com/security/cve/CVE-2019-19069/" source="CVE"/>
		<reference ref_id="CVE-2019-19070" ref_url="https://www.suse.com/security/cve/CVE-2019-19070/" source="CVE"/>
		<reference ref_id="CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071/" source="CVE"/>
		<reference ref_id="CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078/" source="CVE"/>
		<reference ref_id="CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080/" source="CVE"/>
		<reference ref_id="CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081/" source="CVE"/>
		<reference ref_id="CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082/" source="CVE"/>
		<reference ref_id="CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083/" source="CVE"/>
		<reference ref_id="CVE-2019-19241" ref_url="https://www.suse.com/security/cve/CVE-2019-19241/" source="CVE"/>
		<reference ref_id="CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19602" ref_url="https://www.suse.com/security/cve/CVE-2019-19602/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770/" source="CVE"/>
		<reference ref_id="CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807/" source="CVE"/>
		<reference ref_id="CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922/" source="CVE"/>
		<reference ref_id="CVE-2019-19947" ref_url="https://www.suse.com/security/cve/CVE-2019-19947/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-20422" ref_url="https://www.suse.com/security/cve/CVE-2019-20422/" source="CVE"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2020-0110" ref_url="https://www.suse.com/security/cve/CVE-2020-0110/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-11884" ref_url="https://www.suse.com/security/cve/CVE-2020-11884/" source="CVE"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464/" source="CVE"/>
		<reference ref_id="CVE-2020-12465" ref_url="https://www.suse.com/security/cve/CVE-2020-12465/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657/" source="CVE"/>
		<reference ref_id="CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659/" source="CVE"/>
		<reference ref_id="CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769/" source="CVE"/>
		<reference ref_id="CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<reference ref_id="CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<reference ref_id="CVE-2020-16119" ref_url="https://www.suse.com/security/cve/CVE-2020-16119/" source="CVE"/>
		<reference ref_id="CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-2521" ref_url="https://www.suse.com/security/cve/CVE-2020-2521/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27194" ref_url="https://www.suse.com/security/cve/CVE-2020-27194/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-27675" ref_url="https://www.suse.com/security/cve/CVE-2020-27675/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370/" source="CVE"/>
		<reference ref_id="CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2020-36516" ref_url="https://www.suse.com/security/cve/CVE-2020-36516/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="CVE-2020-8835" ref_url="https://www.suse.com/security/cve/CVE-2020-8835/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177/" source="CVE"/>
		<reference ref_id="CVE-2021-20268" ref_url="https://www.suse.com/security/cve/CVE-2021-20268/" source="CVE"/>
		<reference ref_id="CVE-2021-20321" ref_url="https://www.suse.com/security/cve/CVE-2021-20321/" source="CVE"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28952" ref_url="https://www.suse.com/security/cve/CVE-2021-28952/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33061" ref_url="https://www.suse.com/security/cve/CVE-2021-33061/" source="CVE"/>
		<reference ref_id="CVE-2021-33135" ref_url="https://www.suse.com/security/cve/CVE-2021-33135/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="CVE-2021-3489" ref_url="https://www.suse.com/security/cve/CVE-2021-3489/" source="CVE"/>
		<reference ref_id="CVE-2021-3490" ref_url="https://www.suse.com/security/cve/CVE-2021-3490/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38166" ref_url="https://www.suse.com/security/cve/CVE-2021-38166/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38206" ref_url="https://www.suse.com/security/cve/CVE-2021-38206/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="CVE-2021-38209" ref_url="https://www.suse.com/security/cve/CVE-2021-38209/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-39685" ref_url="https://www.suse.com/security/cve/CVE-2021-39685/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4037" ref_url="https://www.suse.com/security/cve/CVE-2021-4037/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4090" ref_url="https://www.suse.com/security/cve/CVE-2021-4090/" source="CVE"/>
		<reference ref_id="CVE-2021-41073" ref_url="https://www.suse.com/security/cve/CVE-2021-41073/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4148" ref_url="https://www.suse.com/security/cve/CVE-2021-4148/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-4204" ref_url="https://www.suse.com/security/cve/CVE-2021-4204/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42327" ref_url="https://www.suse.com/security/cve/CVE-2021-42327/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="CVE-2021-43057" ref_url="https://www.suse.com/security/cve/CVE-2021-43057/" source="CVE"/>
		<reference ref_id="CVE-2021-43267" ref_url="https://www.suse.com/security/cve/CVE-2021-43267/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2021-45402" ref_url="https://www.suse.com/security/cve/CVE-2021-45402/" source="CVE"/>
		<reference ref_id="CVE-2021-45480" ref_url="https://www.suse.com/security/cve/CVE-2021-45480/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0168" ref_url="https://www.suse.com/security/cve/CVE-2022-0168/" source="CVE"/>
		<reference ref_id="CVE-2022-0171" ref_url="https://www.suse.com/security/cve/CVE-2022-0171/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0264" ref_url="https://www.suse.com/security/cve/CVE-2022-0264/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0382" ref_url="https://www.suse.com/security/cve/CVE-2022-0382/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0494" ref_url="https://www.suse.com/security/cve/CVE-2022-0494/" source="CVE"/>
		<reference ref_id="CVE-2022-0500" ref_url="https://www.suse.com/security/cve/CVE-2022-0500/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0742" ref_url="https://www.suse.com/security/cve/CVE-2022-0742/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-0886" ref_url="https://www.suse.com/security/cve/CVE-2022-0886/" source="CVE"/>
		<reference ref_id="CVE-2022-0995" ref_url="https://www.suse.com/security/cve/CVE-2022-0995/" source="CVE"/>
		<reference ref_id="CVE-2022-0998" ref_url="https://www.suse.com/security/cve/CVE-2022-0998/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1012" ref_url="https://www.suse.com/security/cve/CVE-2022-1012/" source="CVE"/>
		<reference ref_id="CVE-2022-1015" ref_url="https://www.suse.com/security/cve/CVE-2022-1015/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-1158" ref_url="https://www.suse.com/security/cve/CVE-2022-1158/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1195" ref_url="https://www.suse.com/security/cve/CVE-2022-1195/" source="CVE"/>
		<reference ref_id="CVE-2022-1198" ref_url="https://www.suse.com/security/cve/CVE-2022-1198/" source="CVE"/>
		<reference ref_id="CVE-2022-1199" ref_url="https://www.suse.com/security/cve/CVE-2022-1199/" source="CVE"/>
		<reference ref_id="CVE-2022-1204" ref_url="https://www.suse.com/security/cve/CVE-2022-1204/" source="CVE"/>
		<reference ref_id="CVE-2022-1205" ref_url="https://www.suse.com/security/cve/CVE-2022-1205/" source="CVE"/>
		<reference ref_id="CVE-2022-1263" ref_url="https://www.suse.com/security/cve/CVE-2022-1263/" source="CVE"/>
		<reference ref_id="CVE-2022-1280" ref_url="https://www.suse.com/security/cve/CVE-2022-1280/" source="CVE"/>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-1508" ref_url="https://www.suse.com/security/cve/CVE-2022-1508/" source="CVE"/>
		<reference ref_id="CVE-2022-1516" ref_url="https://www.suse.com/security/cve/CVE-2022-1516/" source="CVE"/>
		<reference ref_id="CVE-2022-1651" ref_url="https://www.suse.com/security/cve/CVE-2022-1651/" source="CVE"/>
		<reference ref_id="CVE-2022-1652" ref_url="https://www.suse.com/security/cve/CVE-2022-1652/" source="CVE"/>
		<reference ref_id="CVE-2022-1671" ref_url="https://www.suse.com/security/cve/CVE-2022-1671/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1734" ref_url="https://www.suse.com/security/cve/CVE-2022-1734/" source="CVE"/>
		<reference ref_id="CVE-2022-1789" ref_url="https://www.suse.com/security/cve/CVE-2022-1789/" source="CVE"/>
		<reference ref_id="CVE-2022-1836" ref_url="https://www.suse.com/security/cve/CVE-2022-1836/" source="CVE"/>
		<reference ref_id="CVE-2022-1852" ref_url="https://www.suse.com/security/cve/CVE-2022-1852/" source="CVE"/>
		<reference ref_id="CVE-2022-1882" ref_url="https://www.suse.com/security/cve/CVE-2022-1882/" source="CVE"/>
		<reference ref_id="CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966/" source="CVE"/>
		<reference ref_id="CVE-2022-1972" ref_url="https://www.suse.com/security/cve/CVE-2022-1972/" source="CVE"/>
		<reference ref_id="CVE-2022-1974" ref_url="https://www.suse.com/security/cve/CVE-2022-1974/" source="CVE"/>
		<reference ref_id="CVE-2022-1975" ref_url="https://www.suse.com/security/cve/CVE-2022-1975/" source="CVE"/>
		<reference ref_id="CVE-2022-1998" ref_url="https://www.suse.com/security/cve/CVE-2022-1998/" source="CVE"/>
		<reference ref_id="CVE-2022-20008" ref_url="https://www.suse.com/security/cve/CVE-2022-20008/" source="CVE"/>
		<reference ref_id="CVE-2022-20132" ref_url="https://www.suse.com/security/cve/CVE-2022-20132/" source="CVE"/>
		<reference ref_id="CVE-2022-20154" ref_url="https://www.suse.com/security/cve/CVE-2022-20154/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-20369" ref_url="https://www.suse.com/security/cve/CVE-2022-20369/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21127" ref_url="https://www.suse.com/security/cve/CVE-2022-21127/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-21180" ref_url="https://www.suse.com/security/cve/CVE-2022-21180/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<reference ref_id="CVE-2022-21505" ref_url="https://www.suse.com/security/cve/CVE-2022-21505/" source="CVE"/>
		<reference ref_id="CVE-2022-2153" ref_url="https://www.suse.com/security/cve/CVE-2022-2153/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-2318" ref_url="https://www.suse.com/security/cve/CVE-2022-2318/" source="CVE"/>
		<reference ref_id="CVE-2022-23222" ref_url="https://www.suse.com/security/cve/CVE-2022-23222/" source="CVE"/>
		<reference ref_id="CVE-2022-23960" ref_url="https://www.suse.com/security/cve/CVE-2022-23960/" source="CVE"/>
		<reference ref_id="CVE-2022-24122" ref_url="https://www.suse.com/security/cve/CVE-2022-24122/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="CVE-2022-25636" ref_url="https://www.suse.com/security/cve/CVE-2022-25636/" source="CVE"/>
		<reference ref_id="CVE-2022-2585" ref_url="https://www.suse.com/security/cve/CVE-2022-2585/" source="CVE"/>
		<reference ref_id="CVE-2022-2586" ref_url="https://www.suse.com/security/cve/CVE-2022-2586/" source="CVE"/>
		<reference ref_id="CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588/" source="CVE"/>
		<reference ref_id="CVE-2022-2602" ref_url="https://www.suse.com/security/cve/CVE-2022-2602/" source="CVE"/>
		<reference ref_id="CVE-2022-26365" ref_url="https://www.suse.com/security/cve/CVE-2022-26365/" source="CVE"/>
		<reference ref_id="CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373/" source="CVE"/>
		<reference ref_id="CVE-2022-2639" ref_url="https://www.suse.com/security/cve/CVE-2022-2639/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663/" source="CVE"/>
		<reference ref_id="CVE-2022-26878" ref_url="https://www.suse.com/security/cve/CVE-2022-26878/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-27223" ref_url="https://www.suse.com/security/cve/CVE-2022-27223/" source="CVE"/>
		<reference ref_id="CVE-2022-28356" ref_url="https://www.suse.com/security/cve/CVE-2022-28356/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="CVE-2022-28693" ref_url="https://www.suse.com/security/cve/CVE-2022-28693/" source="CVE"/>
		<reference ref_id="CVE-2022-2873" ref_url="https://www.suse.com/security/cve/CVE-2022-2873/" source="CVE"/>
		<reference ref_id="CVE-2022-28748" ref_url="https://www.suse.com/security/cve/CVE-2022-28748/" source="CVE"/>
		<reference ref_id="CVE-2022-28893" ref_url="https://www.suse.com/security/cve/CVE-2022-28893/" source="CVE"/>
		<reference ref_id="CVE-2022-2905" ref_url="https://www.suse.com/security/cve/CVE-2022-2905/" source="CVE"/>
		<reference ref_id="CVE-2022-29156" ref_url="https://www.suse.com/security/cve/CVE-2022-29156/" source="CVE"/>
		<reference ref_id="CVE-2022-2938" ref_url="https://www.suse.com/security/cve/CVE-2022-2938/" source="CVE"/>
		<reference ref_id="CVE-2022-29581" ref_url="https://www.suse.com/security/cve/CVE-2022-29581/" source="CVE"/>
		<reference ref_id="CVE-2022-29582" ref_url="https://www.suse.com/security/cve/CVE-2022-29582/" source="CVE"/>
		<reference ref_id="CVE-2022-2959" ref_url="https://www.suse.com/security/cve/CVE-2022-2959/" source="CVE"/>
		<reference ref_id="CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964/" source="CVE"/>
		<reference ref_id="CVE-2022-2977" ref_url="https://www.suse.com/security/cve/CVE-2022-2977/" source="CVE"/>
		<reference ref_id="CVE-2022-2978" ref_url="https://www.suse.com/security/cve/CVE-2022-2978/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="CVE-2022-3078" ref_url="https://www.suse.com/security/cve/CVE-2022-3078/" source="CVE"/>
		<reference ref_id="CVE-2022-3104" ref_url="https://www.suse.com/security/cve/CVE-2022-3104/" source="CVE"/>
		<reference ref_id="CVE-2022-3105" ref_url="https://www.suse.com/security/cve/CVE-2022-3105/" source="CVE"/>
		<reference ref_id="CVE-2022-3106" ref_url="https://www.suse.com/security/cve/CVE-2022-3106/" source="CVE"/>
		<reference ref_id="CVE-2022-3107" ref_url="https://www.suse.com/security/cve/CVE-2022-3107/" source="CVE"/>
		<reference ref_id="CVE-2022-3108" ref_url="https://www.suse.com/security/cve/CVE-2022-3108/" source="CVE"/>
		<reference ref_id="CVE-2022-3111" ref_url="https://www.suse.com/security/cve/CVE-2022-3111/" source="CVE"/>
		<reference ref_id="CVE-2022-3112" ref_url="https://www.suse.com/security/cve/CVE-2022-3112/" source="CVE"/>
		<reference ref_id="CVE-2022-3113" ref_url="https://www.suse.com/security/cve/CVE-2022-3113/" source="CVE"/>
		<reference ref_id="CVE-2022-3114" ref_url="https://www.suse.com/security/cve/CVE-2022-3114/" source="CVE"/>
		<reference ref_id="CVE-2022-3115" ref_url="https://www.suse.com/security/cve/CVE-2022-3115/" source="CVE"/>
		<reference ref_id="CVE-2022-3169" ref_url="https://www.suse.com/security/cve/CVE-2022-3169/" source="CVE"/>
		<reference ref_id="CVE-2022-3176" ref_url="https://www.suse.com/security/cve/CVE-2022-3176/" source="CVE"/>
		<reference ref_id="CVE-2022-3202" ref_url="https://www.suse.com/security/cve/CVE-2022-3202/" source="CVE"/>
		<reference ref_id="CVE-2022-32250" ref_url="https://www.suse.com/security/cve/CVE-2022-32250/" source="CVE"/>
		<reference ref_id="CVE-2022-32296" ref_url="https://www.suse.com/security/cve/CVE-2022-32296/" source="CVE"/>
		<reference ref_id="CVE-2022-3239" ref_url="https://www.suse.com/security/cve/CVE-2022-3239/" source="CVE"/>
		<reference ref_id="CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303/" source="CVE"/>
		<reference ref_id="CVE-2022-3344" ref_url="https://www.suse.com/security/cve/CVE-2022-3344/" source="CVE"/>
		<reference ref_id="CVE-2022-33740" ref_url="https://www.suse.com/security/cve/CVE-2022-33740/" source="CVE"/>
		<reference ref_id="CVE-2022-33741" ref_url="https://www.suse.com/security/cve/CVE-2022-33741/" source="CVE"/>
		<reference ref_id="CVE-2022-33742" ref_url="https://www.suse.com/security/cve/CVE-2022-33742/" source="CVE"/>
		<reference ref_id="CVE-2022-33743" ref_url="https://www.suse.com/security/cve/CVE-2022-33743/" source="CVE"/>
		<reference ref_id="CVE-2022-33981" ref_url="https://www.suse.com/security/cve/CVE-2022-33981/" source="CVE"/>
		<reference ref_id="CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424/" source="CVE"/>
		<reference ref_id="CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435/" source="CVE"/>
		<reference ref_id="CVE-2022-34918" ref_url="https://www.suse.com/security/cve/CVE-2022-34918/" source="CVE"/>
		<reference ref_id="CVE-2022-3521" ref_url="https://www.suse.com/security/cve/CVE-2022-3521/" source="CVE"/>
		<reference ref_id="CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524/" source="CVE"/>
		<reference ref_id="CVE-2022-3526" ref_url="https://www.suse.com/security/cve/CVE-2022-3526/" source="CVE"/>
		<reference ref_id="CVE-2022-3535" ref_url="https://www.suse.com/security/cve/CVE-2022-3535/" source="CVE"/>
		<reference ref_id="CVE-2022-3542" ref_url="https://www.suse.com/security/cve/CVE-2022-3542/" source="CVE"/>
		<reference ref_id="CVE-2022-3545" ref_url="https://www.suse.com/security/cve/CVE-2022-3545/" source="CVE"/>
		<reference ref_id="CVE-2022-3564" ref_url="https://www.suse.com/security/cve/CVE-2022-3564/" source="CVE"/>
		<reference ref_id="CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565/" source="CVE"/>
		<reference ref_id="CVE-2022-3566" ref_url="https://www.suse.com/security/cve/CVE-2022-3566/" source="CVE"/>
		<reference ref_id="CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567/" source="CVE"/>
		<reference ref_id="CVE-2022-3577" ref_url="https://www.suse.com/security/cve/CVE-2022-3577/" source="CVE"/>
		<reference ref_id="CVE-2022-3586" ref_url="https://www.suse.com/security/cve/CVE-2022-3586/" source="CVE"/>
		<reference ref_id="CVE-2022-3594" ref_url="https://www.suse.com/security/cve/CVE-2022-3594/" source="CVE"/>
		<reference ref_id="CVE-2022-3619" ref_url="https://www.suse.com/security/cve/CVE-2022-3619/" source="CVE"/>
		<reference ref_id="CVE-2022-3621" ref_url="https://www.suse.com/security/cve/CVE-2022-3621/" source="CVE"/>
		<reference ref_id="CVE-2022-3625" ref_url="https://www.suse.com/security/cve/CVE-2022-3625/" source="CVE"/>
		<reference ref_id="CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628/" source="CVE"/>
		<reference ref_id="CVE-2022-36280" ref_url="https://www.suse.com/security/cve/CVE-2022-36280/" source="CVE"/>
		<reference ref_id="CVE-2022-3629" ref_url="https://www.suse.com/security/cve/CVE-2022-3629/" source="CVE"/>
		<reference ref_id="CVE-2022-3633" ref_url="https://www.suse.com/security/cve/CVE-2022-3633/" source="CVE"/>
		<reference ref_id="CVE-2022-3635" ref_url="https://www.suse.com/security/cve/CVE-2022-3635/" source="CVE"/>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<reference ref_id="CVE-2022-3643" ref_url="https://www.suse.com/security/cve/CVE-2022-3643/" source="CVE"/>
		<reference ref_id="CVE-2022-3646" ref_url="https://www.suse.com/security/cve/CVE-2022-3646/" source="CVE"/>
		<reference ref_id="CVE-2022-3649" ref_url="https://www.suse.com/security/cve/CVE-2022-3649/" source="CVE"/>
		<reference ref_id="CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879/" source="CVE"/>
		<reference ref_id="CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946/" source="CVE"/>
		<reference ref_id="CVE-2022-3707" ref_url="https://www.suse.com/security/cve/CVE-2022-3707/" source="CVE"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188/" source="CVE"/>
		<reference ref_id="CVE-2022-39189" ref_url="https://www.suse.com/security/cve/CVE-2022-39189/" source="CVE"/>
		<reference ref_id="CVE-2022-39190" ref_url="https://www.suse.com/security/cve/CVE-2022-39190/" source="CVE"/>
		<reference ref_id="CVE-2022-40476" ref_url="https://www.suse.com/security/cve/CVE-2022-40476/" source="CVE"/>
		<reference ref_id="CVE-2022-40768" ref_url="https://www.suse.com/security/cve/CVE-2022-40768/" source="CVE"/>
		<reference ref_id="CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095/" source="CVE"/>
		<reference ref_id="CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218/" source="CVE"/>
		<reference ref_id="CVE-2022-4129" ref_url="https://www.suse.com/security/cve/CVE-2022-4129/" source="CVE"/>
		<reference ref_id="CVE-2022-4139" ref_url="https://www.suse.com/security/cve/CVE-2022-4139/" source="CVE"/>
		<reference ref_id="CVE-2022-41674" ref_url="https://www.suse.com/security/cve/CVE-2022-41674/" source="CVE"/>
		<reference ref_id="CVE-2022-41848" ref_url="https://www.suse.com/security/cve/CVE-2022-41848/" source="CVE"/>
		<reference ref_id="CVE-2022-41849" ref_url="https://www.suse.com/security/cve/CVE-2022-41849/" source="CVE"/>
		<reference ref_id="CVE-2022-41850" ref_url="https://www.suse.com/security/cve/CVE-2022-41850/" source="CVE"/>
		<reference ref_id="CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858/" source="CVE"/>
		<reference ref_id="CVE-2022-42328" ref_url="https://www.suse.com/security/cve/CVE-2022-42328/" source="CVE"/>
		<reference ref_id="CVE-2022-42329" ref_url="https://www.suse.com/security/cve/CVE-2022-42329/" source="CVE"/>
		<reference ref_id="CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703/" source="CVE"/>
		<reference ref_id="CVE-2022-42719" ref_url="https://www.suse.com/security/cve/CVE-2022-42719/" source="CVE"/>
		<reference ref_id="CVE-2022-42720" ref_url="https://www.suse.com/security/cve/CVE-2022-42720/" source="CVE"/>
		<reference ref_id="CVE-2022-42721" ref_url="https://www.suse.com/security/cve/CVE-2022-42721/" source="CVE"/>
		<reference ref_id="CVE-2022-42722" ref_url="https://www.suse.com/security/cve/CVE-2022-42722/" source="CVE"/>
		<reference ref_id="CVE-2022-42895" ref_url="https://www.suse.com/security/cve/CVE-2022-42895/" source="CVE"/>
		<reference ref_id="CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896/" source="CVE"/>
		<reference ref_id="CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750/" source="CVE"/>
		<reference ref_id="CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378/" source="CVE"/>
		<reference ref_id="CVE-2022-4379" ref_url="https://www.suse.com/security/cve/CVE-2022-4379/" source="CVE"/>
		<reference ref_id="CVE-2022-4382" ref_url="https://www.suse.com/security/cve/CVE-2022-4382/" source="CVE"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-45869" ref_url="https://www.suse.com/security/cve/CVE-2022-45869/" source="CVE"/>
		<reference ref_id="CVE-2022-45888" ref_url="https://www.suse.com/security/cve/CVE-2022-45888/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="CVE-2022-4662" ref_url="https://www.suse.com/security/cve/CVE-2022-4662/" source="CVE"/>
		<reference ref_id="CVE-2022-47520" ref_url="https://www.suse.com/security/cve/CVE-2022-47520/" source="CVE"/>
		<reference ref_id="CVE-2022-47929" ref_url="https://www.suse.com/security/cve/CVE-2022-47929/" source="CVE"/>
		<reference ref_id="CVE-2023-0045" ref_url="https://www.suse.com/security/cve/CVE-2023-0045/" source="CVE"/>
		<reference ref_id="CVE-2023-0122" ref_url="https://www.suse.com/security/cve/CVE-2023-0122/" source="CVE"/>
		<reference ref_id="CVE-2023-0179" ref_url="https://www.suse.com/security/cve/CVE-2023-0179/" source="CVE"/>
		<reference ref_id="CVE-2023-0266" ref_url="https://www.suse.com/security/cve/CVE-2023-0266/" source="CVE"/>
		<reference ref_id="CVE-2023-0590" ref_url="https://www.suse.com/security/cve/CVE-2023-0590/" source="CVE"/>
		<reference ref_id="CVE-2023-23454" ref_url="https://www.suse.com/security/cve/CVE-2023-23454/" source="CVE"/>
		<reference ref_id="CVE-2023-23455" ref_url="https://www.suse.com/security/cve/CVE-2023-23455/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-rt-5.14.21-150400.15.11.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3695/">CVE-2016-3695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3695">CVE-2016-3695 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000251">CVE-2017-1000251 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12153">CVE-2017-12153 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14051">CVE-2017-14051 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16536">CVE-2017-16536 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16537">CVE-2017-16537 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16646">CVE-2017-16646 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16648">CVE-2017-16648 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10323">CVE-2018-10323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12232">CVE-2018-12232 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13053">CVE-2018-13053 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20669">CVE-2018-20669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0154">CVE-2019-0154 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14615">CVE-2019-14615 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14815">CVE-2019-14815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14901">CVE-2019-14901 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15030">CVE-2019-15030 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15031">CVE-2019-15031 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15098">CVE-2019-15098 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15099">CVE-2019-15099 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15290">CVE-2019-15290 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15291">CVE-2019-15291 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15504">CVE-2019-15504 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18198/">CVE-2019-18198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18198">CVE-2019-18198 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18683">CVE-2019-18683 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18786/">CVE-2019-18786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18786">CVE-2019-18786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18808">CVE-2019-18808 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18809">CVE-2019-18809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18811/">CVE-2019-18811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18811">CVE-2019-18811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18812">CVE-2019-18812 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18813">CVE-2019-18813 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18814">CVE-2019-18814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19037/">CVE-2019-19037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19037">CVE-2019-19037 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19043/">CVE-2019-19043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19043">CVE-2019-19043 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19044/">CVE-2019-19044 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19044">CVE-2019-19044 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19045">CVE-2019-19045 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19046">CVE-2019-19046 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19047">CVE-2019-19047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19048/">CVE-2019-19048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19048">CVE-2019-19048 at NVD</cve>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19049">CVE-2019-19049 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19050/">CVE-2019-19050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19050">CVE-2019-19050 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19051">CVE-2019-19051 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19052">CVE-2019-19052 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19053/">CVE-2019-19053 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19053">CVE-2019-19053 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19054">CVE-2019-19054 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19055">CVE-2019-19055 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19056">CVE-2019-19056 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19057">CVE-2019-19057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19058">CVE-2019-19058 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19060">CVE-2019-19060 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19061/">CVE-2019-19061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19061">CVE-2019-19061 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19062">CVE-2019-19062 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19063">CVE-2019-19063 at NVD</cve>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19064/">CVE-2019-19064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19064">CVE-2019-19064 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19065">CVE-2019-19065 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19066">CVE-2019-19066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19067">CVE-2019-19067 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19068">CVE-2019-19068 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19069/">CVE-2019-19069 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19069">CVE-2019-19069 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19070/">CVE-2019-19070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19070">CVE-2019-19070 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19071">CVE-2019-19071 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19072">CVE-2019-19072 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19073">CVE-2019-19073 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19074">CVE-2019-19074 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19075">CVE-2019-19075 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19077">CVE-2019-19077 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19078">CVE-2019-19078 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19080">CVE-2019-19080 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19081">CVE-2019-19081 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19082">CVE-2019-19082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19083">CVE-2019-19083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19241/">CVE-2019-19241 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19241">CVE-2019-19241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19252">CVE-2019-19252 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19462">CVE-2019-19462 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19525">CVE-2019-19525 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19526">CVE-2019-19526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19528">CVE-2019-19528 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19529">CVE-2019-19529 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19533">CVE-2019-19533 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19534">CVE-2019-19534 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19602/">CVE-2019-19602 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19602">CVE-2019-19602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19767">CVE-2019-19767 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19769">CVE-2019-19769 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19770">CVE-2019-19770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19807">CVE-2019-19807 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19922">CVE-2019-19922 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19947/">CVE-2019-19947 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19947">CVE-2019-19947 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19965">CVE-2019-19965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20422/">CVE-2019-20422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20422">CVE-2019-20422 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20810">CVE-2019-20810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20812">CVE-2019-20812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3016">CVE-2019-3016 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8912">CVE-2019-8912 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0110/">CVE-2020-0110 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0110">CVE-2020-0110 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0427">CVE-2020-0427 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0432">CVE-2020-0432 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0444">CVE-2020-0444 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135">CVE-2020-10135 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10711">CVE-2020-10711 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10751">CVE-2020-10751 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10766">CVE-2020-10766 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10767">CVE-2020-10767 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10768">CVE-2020-10768 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10781">CVE-2020-10781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11494">CVE-2020-11494 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11884/">CVE-2020-11884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11884">CVE-2020-11884 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12351">CVE-2020-12351 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12362">CVE-2020-12362 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12363">CVE-2020-12363 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12364">CVE-2020-12364 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12373">CVE-2020-12373 at NVD</cve>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12464">CVE-2020-12464 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12465/">CVE-2020-12465 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12465">CVE-2020-12465 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12655">CVE-2020-12655 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12656">CVE-2020-12656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12657">CVE-2020-12657 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12659">CVE-2020-12659 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12769">CVE-2020-12769 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12770">CVE-2020-12770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12771">CVE-2020-12771 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12888">CVE-2020-12888 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13143">CVE-2020-13143 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14314">CVE-2020-14314 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14356">CVE-2020-14356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14385">CVE-2020-14385 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14390">CVE-2020-14390 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14416">CVE-2020-14416 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15393">CVE-2020-15393 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15780">CVE-2020-15780 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16119/">CVE-2020-16119 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16119">CVE-2020-16119 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16120">CVE-2020-16120 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16166">CVE-2020-16166 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24490">CVE-2020-24490 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2521/">CVE-2020-2521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-2521">CVE-2020-2521 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25284">CVE-2020-25284 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25285">CVE-2020-25285 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25639">CVE-2020-25639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25641">CVE-2020-25641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25704">CVE-2020-25704 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26088">CVE-2020-26088 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27068">CVE-2020-27068 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27170">CVE-2020-27170 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27171">CVE-2020-27171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-27194/">CVE-2020-27194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27194">CVE-2020-27194 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27673">CVE-2020-27673 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27675/">CVE-2020-27675 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27675">CVE-2020-27675 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27815">CVE-2020-27815 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27825">CVE-2020-27825 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27830">CVE-2020-27830 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27835">CVE-2020-27835 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28941">CVE-2020-28941 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29368">CVE-2020-29368 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29369">CVE-2020-29369 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29370">CVE-2020-29370 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29371">CVE-2020-29371 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29373">CVE-2020-29373 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29568">CVE-2020-29568 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35519">CVE-2020-35519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36310">CVE-2020-36310 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36311">CVE-2020-36311 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36312">CVE-2020-36312 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36516/">CVE-2020-36516 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36516">CVE-2020-36516 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8428">CVE-2020-8428 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8835/">CVE-2020-8835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8835">CVE-2020-8835 at NVD</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8992">CVE-2020-8992 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0342">CVE-2021-0342 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20177">CVE-2021-20177 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20268/">CVE-2021-20268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20268">CVE-2021-20268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20321/">CVE-2021-20321 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21781">CVE-2021-21781 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22600">CVE-2021-22600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26341">CVE-2021-26341 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">CVE-2021-26932 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28375">CVE-2021-28375 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28714">CVE-2021-28714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28952/">CVE-2021-28952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28952">CVE-2021-28952 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28964">CVE-2021-28964 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">CVE-2021-28971 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29155">CVE-2021-29155 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29265">CVE-2021-29265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29647">CVE-2021-29647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33061/">CVE-2021-33061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33061">CVE-2021-33061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33135/">CVE-2021-33135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33135">CVE-2021-33135 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33200">CVE-2021-33200 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3348">CVE-2021-3348 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33624">CVE-2021-33624 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3428">CVE-2021-3428 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3444">CVE-2021-3444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3489/">CVE-2021-3489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3489">CVE-2021-3489 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3490/">CVE-2021-3490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3490">CVE-2021-3490 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3491">CVE-2021-3491 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35039">CVE-2021-35039 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3542">CVE-2021-3542 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3612">CVE-2021-3612 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3659">CVE-2021-3659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3732">CVE-2021-3732 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3739">CVE-2021-3739 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3743">CVE-2021-3743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3744">CVE-2021-3744 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3759">CVE-2021-3759 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3764">CVE-2021-3764 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38166/">CVE-2021-38166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38166">CVE-2021-38166 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38204">CVE-2021-38204 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38205">CVE-2021-38205 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38206/">CVE-2021-38206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38206">CVE-2021-38206 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38207">CVE-2021-38207 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38209/">CVE-2021-38209 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38209">CVE-2021-38209 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3896">CVE-2021-3896 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39685/">CVE-2021-39685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39685">CVE-2021-39685 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39698">CVE-2021-39698 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4001">CVE-2021-4001 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4037/">CVE-2021-4037 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4037">CVE-2021-4037 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4090/">CVE-2021-4090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4090">CVE-2021-4090 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41073/">CVE-2021-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41073">CVE-2021-41073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4135">CVE-2021-4135 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4148/">CVE-2021-4148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4148">CVE-2021-4148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41864">CVE-2021-41864 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4204/">CVE-2021-4204 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4204">CVE-2021-4204 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42252">CVE-2021-42252 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42327/">CVE-2021-42327 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43057/">CVE-2021-43057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43057">CVE-2021-43057 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43267/">CVE-2021-43267 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43267">CVE-2021-43267 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43975">CVE-2021-43975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44733">CVE-2021-44733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44879">CVE-2021-44879 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45402/">CVE-2021-45402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45402">CVE-2021-45402 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45480/">CVE-2021-45480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45480">CVE-2021-45480 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">CVE-2021-45868 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0168/">CVE-2022-0168 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0171/">CVE-2022-0171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0171">CVE-2022-0171 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0264/">CVE-2022-0264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0264">CVE-2022-0264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0322">CVE-2022-0322 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0382/">CVE-2022-0382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0382">CVE-2022-0382 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0435">CVE-2022-0435 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0494/">CVE-2022-0494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0494">CVE-2022-0494 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0500/">CVE-2022-0500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0500">CVE-2022-0500 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0516">CVE-2022-0516 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-0644">CVE-2022-0644 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0742/">CVE-2022-0742 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0742">CVE-2022-0742 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0854">CVE-2022-0854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0886/">CVE-2022-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-0886">CVE-2022-0886 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0995/">CVE-2022-0995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0995">CVE-2022-0995 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0998/">CVE-2022-0998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0998">CVE-2022-0998 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1012/">CVE-2022-1012 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1015/">CVE-2022-1015 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1015">CVE-2022-1015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1055">CVE-2022-1055 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1158/">CVE-2022-1158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1195/">CVE-2022-1195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1195">CVE-2022-1195 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1198/">CVE-2022-1198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1198">CVE-2022-1198 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1199/">CVE-2022-1199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1199">CVE-2022-1199 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1204/">CVE-2022-1204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1204">CVE-2022-1204 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1205/">CVE-2022-1205 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1205">CVE-2022-1205 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1263/">CVE-2022-1263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1263">CVE-2022-1263 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1280/">CVE-2022-1280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1280">CVE-2022-1280 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1508/">CVE-2022-1508 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1508">CVE-2022-1508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1516/">CVE-2022-1516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1516">CVE-2022-1516 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1651/">CVE-2022-1651 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1651">CVE-2022-1651 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1652/">CVE-2022-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1652">CVE-2022-1652 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1671/">CVE-2022-1671 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1671">CVE-2022-1671 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1734/">CVE-2022-1734 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1734">CVE-2022-1734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1789/">CVE-2022-1789 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1836/">CVE-2022-1836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-1836">CVE-2022-1836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1852/">CVE-2022-1852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1882/">CVE-2022-1882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1882">CVE-2022-1882 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1966">CVE-2022-1966 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1972/">CVE-2022-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-1972">CVE-2022-1972 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1974/">CVE-2022-1974 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1974">CVE-2022-1974 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1975/">CVE-2022-1975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1975">CVE-2022-1975 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1998/">CVE-2022-1998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1998">CVE-2022-1998 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-20008/">CVE-2022-20008 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20008">CVE-2022-20008 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-20132/">CVE-2022-20132 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20132">CVE-2022-20132 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20154/">CVE-2022-20154 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20154">CVE-2022-20154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20369/">CVE-2022-20369 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20369">CVE-2022-20369 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21127/">CVE-2022-21127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21127">CVE-2022-21127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21180/">CVE-2022-21180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21180">CVE-2022-21180 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21505/">CVE-2022-21505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-21505">CVE-2022-21505 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2153/">CVE-2022-2153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2153">CVE-2022-2153 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2318/">CVE-2022-2318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2318">CVE-2022-2318 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23222/">CVE-2022-23222 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23222">CVE-2022-23222 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23960/">CVE-2022-23960 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23960">CVE-2022-23960 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24122/">CVE-2022-24122 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24122">CVE-2022-24122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24958">CVE-2022-24958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24959">CVE-2022-24959 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25258">CVE-2022-25258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25375">CVE-2022-25375 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25636/">CVE-2022-25636 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25636">CVE-2022-25636 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2585/">CVE-2022-2585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2586/">CVE-2022-2586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2602/">CVE-2022-2602 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-26365/">CVE-2022-26365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26365">CVE-2022-26365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2639/">CVE-2022-2639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2639">CVE-2022-2639 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-26878/">CVE-2022-26878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26878">CVE-2022-26878 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">CVE-2022-26966 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27223/">CVE-2022-27223 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27223">CVE-2022-27223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28356/">CVE-2022-28356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28356">CVE-2022-28356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28693/">CVE-2022-28693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-28693">CVE-2022-28693 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2873/">CVE-2022-2873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2873">CVE-2022-2873 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28748/">CVE-2022-28748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-28748">CVE-2022-28748 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28893/">CVE-2022-28893 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2905/">CVE-2022-2905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29156/">CVE-2022-29156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29156">CVE-2022-29156 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2938/">CVE-2022-2938 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2938">CVE-2022-2938 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29581/">CVE-2022-29581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29581">CVE-2022-29581 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29582/">CVE-2022-29582 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29582">CVE-2022-29582 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2959/">CVE-2022-2959 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2959">CVE-2022-2959 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2977/">CVE-2022-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2977">CVE-2022-2977 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2978/">CVE-2022-2978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2978">CVE-2022-2978 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3078/">CVE-2022-3078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3078">CVE-2022-3078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3104/">CVE-2022-3104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3104">CVE-2022-3104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3105/">CVE-2022-3105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3105">CVE-2022-3105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3106/">CVE-2022-3106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3106">CVE-2022-3106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3107/">CVE-2022-3107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3107">CVE-2022-3107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3108/">CVE-2022-3108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3108">CVE-2022-3108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3111/">CVE-2022-3111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3111">CVE-2022-3111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3112/">CVE-2022-3112 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3112">CVE-2022-3112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3113/">CVE-2022-3113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3113">CVE-2022-3113 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3114/">CVE-2022-3114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3114">CVE-2022-3114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3115/">CVE-2022-3115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3115">CVE-2022-3115 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3169/">CVE-2022-3169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3169">CVE-2022-3169 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3176/">CVE-2022-3176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3176">CVE-2022-3176 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3202/">CVE-2022-3202 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3202">CVE-2022-3202 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32250/">CVE-2022-32250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32296/">CVE-2022-32296 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32296">CVE-2022-32296 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3239/">CVE-2022-3239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3239">CVE-2022-3239 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3344/">CVE-2022-3344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3344">CVE-2022-3344 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33740/">CVE-2022-33740 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33740">CVE-2022-33740 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33741/">CVE-2022-33741 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33741">CVE-2022-33741 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-33742/">CVE-2022-33742 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33742">CVE-2022-33742 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33743/">CVE-2022-33743 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33981/">CVE-2022-33981 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33981">CVE-2022-33981 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34918/">CVE-2022-34918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3521/">CVE-2022-3521 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3521">CVE-2022-3521 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3526/">CVE-2022-3526 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3526">CVE-2022-3526 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3535/">CVE-2022-3535 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3535">CVE-2022-3535 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3542/">CVE-2022-3542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3542">CVE-2022-3542 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3545/">CVE-2022-3545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3545">CVE-2022-3545 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3564/">CVE-2022-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3566/">CVE-2022-3566 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3566">CVE-2022-3566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3567">CVE-2022-3567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3577/">CVE-2022-3577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3577">CVE-2022-3577 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3586/">CVE-2022-3586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3586">CVE-2022-3586 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3594/">CVE-2022-3594 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3619/">CVE-2022-3619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3621/">CVE-2022-3621 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3621">CVE-2022-3621 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3625/">CVE-2022-3625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3625">CVE-2022-3625 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36280/">CVE-2022-36280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3629/">CVE-2022-3629 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3629">CVE-2022-3629 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3633/">CVE-2022-3633 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3633">CVE-2022-3633 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3635/">CVE-2022-3635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3635">CVE-2022-3635 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-3643/">CVE-2022-3643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3643">CVE-2022-3643 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3646/">CVE-2022-3646 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3646">CVE-2022-3646 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3649/">CVE-2022-3649 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3649">CVE-2022-3649 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3707/">CVE-2022-3707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3903">CVE-2022-3903 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39188">CVE-2022-39188 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39189/">CVE-2022-39189 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39189">CVE-2022-39189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39190/">CVE-2022-39190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40476/">CVE-2022-40476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40476">CVE-2022-40476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40768/">CVE-2022-40768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40768">CVE-2022-40768 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4095">CVE-2022-4095 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4129/">CVE-2022-4129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4129">CVE-2022-4129 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4139/">CVE-2022-4139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4139">CVE-2022-4139 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41674/">CVE-2022-41674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41848/">CVE-2022-41848 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41848">CVE-2022-41848 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41849/">CVE-2022-41849 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41849">CVE-2022-41849 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41850/">CVE-2022-41850 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41850">CVE-2022-41850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41858">CVE-2022-41858 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42328/">CVE-2022-42328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42328">CVE-2022-42328 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42329/">CVE-2022-42329 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42329">CVE-2022-42329 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42703">CVE-2022-42703 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42719/">CVE-2022-42719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42720/">CVE-2022-42720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42721/">CVE-2022-42721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42722/">CVE-2022-42722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42895/">CVE-2022-42895 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42895">CVE-2022-42895 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4379/">CVE-2022-4379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4382/">CVE-2022-4382 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45869/">CVE-2022-45869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45888/">CVE-2022-45888 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45888">CVE-2022-45888 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4662/">CVE-2022-4662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4662">CVE-2022-4662 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-47520/">CVE-2022-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47520">CVE-2022-47520 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47929/">CVE-2022-47929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47929">CVE-2022-47929 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0045/">CVE-2023-0045 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0045">CVE-2023-0045 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0122/">CVE-2023-0122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0122">CVE-2023-0122 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0179/">CVE-2023-0179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0266/">CVE-2023-0266 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0590/">CVE-2023-0590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23454/">CVE-2023-23454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23455/">CVE-2023-23455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904925" comment="kernel-rt-5.14.21-150400.15.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205753" version="1" class="patch">
	<metadata>
		<title>kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2022-41973" ref_url="https://www.suse.com/security/cve/CVE-2022-41973/" source="CVE"/>
		<reference ref_id="CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974/" source="CVE"/>
		<description>
These are all security issues fixed in the kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41973/">CVE-2022-41973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41973">CVE-2022-41973 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009720090" comment="kpartx-0.9.0+62+suse.3e048d4-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720093" comment="libmpath0-0.9.0+62+suse.3e048d4-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009720094" comment="multipath-tools-0.9.0+62+suse.3e048d4-150400.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205754" version="1" class="patch">
	<metadata>
		<title>krb5-1.19.2-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<reference ref_id="CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368/" source="CVE"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-37750" ref_url="https://www.suse.com/security/cve/CVE-2021-37750/" source="CVE"/>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.19.2-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5351">CVE-2014-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5352">CVE-2014-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5353">CVE-2014-5353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5354">CVE-2014-5354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9421">CVE-2014-9421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9422">CVE-2014-9422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9423">CVE-2014-9423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2694">CVE-2015-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2695">CVE-2015-2695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2696">CVE-2015-2696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2697">CVE-2015-2697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2698">CVE-2015-2698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8629">CVE-2015-8629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8630">CVE-2015-8630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8631">CVE-2015-8631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3119">CVE-2016-3119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3120">CVE-2016-3120 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11368">CVE-2017-11368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11462">CVE-2017-11462 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20217">CVE-2018-20217 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5729">CVE-2018-5729 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5730">CVE-2018-5730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28196">CVE-2020-28196 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37750/">CVE-2021-37750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">CVE-2021-37750 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726194" comment="krb5-1.19.2-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205755" version="1" class="patch">
	<metadata>
		<title>kubevirt-manifests-0.54.0-150400.3.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="CVE-2022-1798" ref_url="https://www.suse.com/security/cve/CVE-2022-1798/" source="CVE"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<description>
These are all security issues fixed in the kubevirt-manifests-0.54.0-150400.3.7.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1798/">CVE-2022-1798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1798">CVE-2022-1798 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904926" comment="kubevirt-manifests-0.54.0-150400.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904927" comment="kubevirt-virtctl-0.54.0-150400.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205756" version="1" class="patch">
	<metadata>
		<title>less-590-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-9488" ref_url="https://www.suse.com/security/cve/CVE-2014-9488/" source="CVE"/>
		<reference ref_id="CVE-2022-46663" ref_url="https://www.suse.com/security/cve/CVE-2022-46663/" source="CVE"/>
		<description>
These are all security issues fixed in the less-590-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9488/">CVE-2014-9488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9488">CVE-2014-9488 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46663/">CVE-2022-46663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46663">CVE-2022-46663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009738824" comment="less-590-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205757" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.6.5-150000.3.24.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="CVE-2022-3554" ref_url="https://www.suse.com/security/cve/CVE-2022-3554/" source="CVE"/>
		<reference ref_id="CVE-2022-3555" ref_url="https://www.suse.com/security/cve/CVE-2022-3555/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.6.5-150000.3.24.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14598">CVE-2018-14598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14599">CVE-2018-14599 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14600">CVE-2018-14600 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3554/">CVE-2022-3554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3554">CVE-2022-3554 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3555/">CVE-2022-3555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3555">CVE-2022-3555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721526" comment="libX11-6-1.6.5-150000.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904928" comment="libX11-data-1.6.5-150000.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721530" comment="libX11-xcb1-1.6.5-150000.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205758" version="1" class="patch">
	<metadata>
		<title>libXcursor1-1.1.15-1.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor1-1.1.15-1.18 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2003">CVE-2013-2003 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16612">CVE-2017-16612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881980" comment="libXcursor1-1.1.15-1.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205759" version="1" class="patch">
	<metadata>
		<title>libXext6-1.3.3-1.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext6-1.3.3-1.30 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1982">CVE-2013-1982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881984" comment="libXext6-1.3.3-1.30 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205760" version="1" class="patch">
	<metadata>
		<title>libXfixes3-6.0.0-150400.1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes3-6.0.0-150400.1.4 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1983">CVE-2013-1983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887638" comment="libXfixes3-6.0.0-150400.1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205761" version="1" class="patch">
	<metadata>
		<title>libXi6-1.7.9-3.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi6-1.7.9-3.2.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1984">CVE-2013-1984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1995">CVE-2013-1995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1998">CVE-2013-1998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881994" comment="libXi6-1.7.9-3.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205762" version="1" class="patch">
	<metadata>
		<title>libXinerama1-1.1.3-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama1-1.1.3-1.22 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1985">CVE-2013-1985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881997" comment="libXinerama1-1.1.3-1.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205763" version="1" class="patch">
	<metadata>
		<title>libXrandr2-1.5.1-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr2-1.5.1-2.17 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1986">CVE-2013-1986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7947">CVE-2016-7947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7948">CVE-2016-7948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882001" comment="libXrandr2-1.5.1-2.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205764" version="1" class="patch">
	<metadata>
		<title>libXrender1-0.9.10-1.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender1-0.9.10-1.30 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1987">CVE-2013-1987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882003" comment="libXrender1-0.9.10-1.30 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205765" version="1" class="patch">
	<metadata>
		<title>libXtst6-1.2.3-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst6-1.2.3-1.24 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2063">CVE-2013-2063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882008" comment="libXtst6-1.2.3-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205766" version="1" class="patch">
	<metadata>
		<title>libXv1-1.0.11-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv1-1.0.11-1.23 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1989">CVE-2013-1989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2066">CVE-2013-2066 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5407">CVE-2016-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882011" comment="libXv1-1.0.11-1.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205767" version="1" class="patch">
	<metadata>
		<title>libarchive13-3.5.1-150400.3.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8917" ref_url="https://www.suse.com/security/cve/CVE-2015-8917/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<reference ref_id="CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<reference ref_id="CVE-2017-5601" ref_url="https://www.suse.com/security/cve/CVE-2017-5601/" source="CVE"/>
		<reference ref_id="CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877/" source="CVE"/>
		<reference ref_id="CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878/" source="CVE"/>
		<reference ref_id="CVE-2018-1000879" ref_url="https://www.suse.com/security/cve/CVE-2018-1000879/" source="CVE"/>
		<reference ref_id="CVE-2018-1000880" ref_url="https://www.suse.com/security/cve/CVE-2018-1000880/" source="CVE"/>
		<reference ref_id="CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019/" source="CVE"/>
		<reference ref_id="CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020/" source="CVE"/>
		<reference ref_id="CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408/" source="CVE"/>
		<reference ref_id="CVE-2019-19221" ref_url="https://www.suse.com/security/cve/CVE-2019-19221/" source="CVE"/>
		<reference ref_id="CVE-2021-23177" ref_url="https://www.suse.com/security/cve/CVE-2021-23177/" source="CVE"/>
		<reference ref_id="CVE-2021-31566" ref_url="https://www.suse.com/security/cve/CVE-2021-31566/" source="CVE"/>
		<reference ref_id="CVE-2021-36976" ref_url="https://www.suse.com/security/cve/CVE-2021-36976/" source="CVE"/>
		<reference ref_id="CVE-2022-26280" ref_url="https://www.suse.com/security/cve/CVE-2022-26280/" source="CVE"/>
		<reference ref_id="CVE-2022-36227" ref_url="https://www.suse.com/security/cve/CVE-2022-36227/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive13-3.5.1-150400.3.12.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0211">CVE-2013-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2304">CVE-2015-2304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8917/">CVE-2015-8917 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8917">CVE-2015-8917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8928">CVE-2015-8928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8933">CVE-2015-8933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8934">CVE-2015-8934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1541">CVE-2016-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4300">CVE-2016-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4301">CVE-2016-4301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4809">CVE-2016-4809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5418">CVE-2016-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5844">CVE-2016-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6250">CVE-2016-6250 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8687">CVE-2016-8687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8688">CVE-2016-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8689">CVE-2016-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14166">CVE-2017-14166 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14501">CVE-2017-14501 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14502">CVE-2017-14502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14503">CVE-2017-14503 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5601/">CVE-2017-5601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5601">CVE-2017-5601 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000877">CVE-2018-1000877 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000878">CVE-2018-1000878 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000879/">CVE-2018-1000879 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000879">CVE-2018-1000879 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000880/">CVE-2018-1000880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000880">CVE-2018-1000880 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000019">CVE-2019-1000019 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000020">CVE-2019-1000020 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18408">CVE-2019-18408 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19221/">CVE-2019-19221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19221">CVE-2019-19221 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-23177/">CVE-2021-23177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23177">CVE-2021-23177 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-31566/">CVE-2021-31566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31566">CVE-2021-31566 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36976/">CVE-2021-36976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36976">CVE-2021-36976 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26280/">CVE-2022-26280 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26280">CVE-2022-26280 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-36227/">CVE-2022-36227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36227">CVE-2022-36227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009726466" comment="libarchive13-3.5.1-150400.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205768" version="1" class="patch">
	<metadata>
		<title>libaudit1-3.0.6-150400.2.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186/" source="CVE"/>
		<description>
These are all security issues fixed in the libaudit1-3.0.6-150400.2.13 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5186">CVE-2015-5186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887239" comment="libaudit1-3.0.6-150400.2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887241" comment="libauparse0-3.0.6-150400.2.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205769" version="1" class="patch">
	<metadata>
		<title>libblkid1-2.37.2-150400.8.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-2779" ref_url="https://www.suse.com/security/cve/CVE-2016-2779/" source="CVE"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<reference ref_id="CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600/" source="CVE"/>
		<reference ref_id="CVE-2021-3995" ref_url="https://www.suse.com/security/cve/CVE-2021-3995/" source="CVE"/>
		<reference ref_id="CVE-2021-3996" ref_url="https://www.suse.com/security/cve/CVE-2021-3996/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid1-2.37.2-150400.8.14.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9114">CVE-2014-9114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5218">CVE-2015-5218 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2779/">CVE-2016-2779 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2779">CVE-2016-2779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5011">CVE-2016-5011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2616">CVE-2017-2616 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">CVE-2021-37600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3995/">CVE-2021-3995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3995">CVE-2021-3995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3996/">CVE-2021-3996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3996">CVE-2021-3996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904929" comment="libblkid1-2.37.2-150400.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904930" comment="libfdisk1-2.37.2-150400.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904931" comment="libmount1-2.37.2-150400.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904932" comment="libsmartcols1-2.37.2-150400.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904933" comment="libuuid1-2.37.2-150400.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904934" comment="util-linux-2.37.2-150400.8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904935" comment="util-linux-systemd-2.37.2-150400.8.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205770" version="1" class="patch">
	<metadata>
		<title>libbluetooth3-5.62-150400.4.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797/" source="CVE"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801/" source="CVE"/>
		<reference ref_id="CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802/" source="CVE"/>
		<reference ref_id="CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804/" source="CVE"/>
		<reference ref_id="CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917/" source="CVE"/>
		<reference ref_id="CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918/" source="CVE"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-3588" ref_url="https://www.suse.com/security/cve/CVE-2021-3588/" source="CVE"/>
		<reference ref_id="CVE-2022-0204" ref_url="https://www.suse.com/security/cve/CVE-2022-0204/" source="CVE"/>
		<reference ref_id="CVE-2022-3563" ref_url="https://www.suse.com/security/cve/CVE-2022-3563/" source="CVE"/>
		<description>
These are all security issues fixed in the libbluetooth3-5.62-150400.4.8.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9797">CVE-2016-9797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9798">CVE-2016-9798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9800">CVE-2016-9800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9801">CVE-2016-9801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9802">CVE-2016-9802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9804">CVE-2016-9804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9917">CVE-2016-9917 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9918">CVE-2016-9918 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3588/">CVE-2021-3588 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3588">CVE-2021-3588 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-0204/">CVE-2022-0204 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0204">CVE-2022-0204 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3563/">CVE-2022-3563 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3563">CVE-2022-3563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733525" comment="libbluetooth3-5.62-150400.4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205771" version="1" class="patch">
	<metadata>
		<title>libbrotlicommon1-1.0.7-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<description>
These are all security issues fixed in the libbrotlicommon1-1.0.7-3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8927">CVE-2020-8927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658532" comment="libbrotlicommon1-1.0.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658533" comment="libbrotlidec1-1.0.7-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205772" version="1" class="patch">
	<metadata>
		<title>libbsd0-0.8.7-3.3.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-20367" ref_url="https://www.suse.com/security/cve/CVE-2019-20367/" source="CVE"/>
		<description>
These are all security issues fixed in the libbsd0-0.8.7-3.3.17 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20367/">CVE-2019-20367 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20367">CVE-2019-20367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492024" comment="libbsd0-0.8.7-3.3.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205773" version="1" class="patch">
	<metadata>
		<title>libcairo-gobject2-1.16.0-150400.9.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<description>
These are all security issues fixed in the libcairo-gobject2-1.16.0-150400.9.6 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9082">CVE-2016-9082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">CVE-2017-7475 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9814">CVE-2017-9814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887287" comment="libcairo-gobject2-1.16.0-150400.9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887289" comment="libcairo2-1.16.0-150400.9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205774" version="1" class="patch">
	<metadata>
		<title>libcares2-1.19.0-150000.3.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904/" source="CVE"/>
		<description>
These are all security issues fixed in the libcares2-1.19.0-150000.3.20.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5180">CVE-2016-5180 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000381">CVE-2017-1000381 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8277">CVE-2020-8277 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739292" comment="libcares2-1.19.0-150000.3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205775" version="1" class="patch">
	<metadata>
		<title>libcolord2-1.4.5-150400.4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-42523" ref_url="https://www.suse.com/security/cve/CVE-2021-42523/" source="CVE"/>
		<description>
These are all security issues fixed in the libcolord2-1.4.5-150400.4.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42523/">CVE-2021-42523 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42523">CVE-2021-42523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009714517" comment="libcolord2-1.4.5-150400.4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205776" version="1" class="patch">
	<metadata>
		<title>libcontainers-common-20210626-150400.1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-15664" ref_url="https://www.suse.com/security/cve/CVE-2018-15664/" source="CVE"/>
		<reference ref_id="CVE-2019-10152" ref_url="https://www.suse.com/security/cve/CVE-2019-10152/" source="CVE"/>
		<reference ref_id="CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370/" source="CVE"/>
		<reference ref_id="CVE-2020-15157" ref_url="https://www.suse.com/security/cve/CVE-2020-15157/" source="CVE"/>
		<reference ref_id="CVE-2021-20199" ref_url="https://www.suse.com/security/cve/CVE-2021-20199/" source="CVE"/>
		<reference ref_id="CVE-2021-20291" ref_url="https://www.suse.com/security/cve/CVE-2021-20291/" source="CVE"/>
		<reference ref_id="CVE-2021-3602" ref_url="https://www.suse.com/security/cve/CVE-2021-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the libcontainers-common-20210626-150400.1.3 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15664/">CVE-2018-15664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15664">CVE-2018-15664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10152/">CVE-2019-10152 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10152">CVE-2019-10152 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14370">CVE-2020-14370 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15157/">CVE-2020-15157 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15157">CVE-2020-15157 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20199/">CVE-2021-20199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20199">CVE-2021-20199 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20291/">CVE-2021-20291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20291">CVE-2021-20291 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3602/">CVE-2021-3602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3602">CVE-2021-3602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887668" comment="libcontainers-common-20210626-150400.1.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205777" version="1" class="patch">
	<metadata>
		<title>libekmfweb1-2.19.0-150400.7.15.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-25316" ref_url="https://www.suse.com/security/cve/CVE-2021-25316/" source="CVE"/>
		<description>
These are all security issues fixed in the libekmfweb1-2.19.0-150400.7.15.2 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25316/">CVE-2021-25316 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25316">CVE-2021-25316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904936" comment="libekmfweb1-2.19.0-150400.7.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904937" comment="libkmipclient1-2.19.0-150400.7.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904938" comment="s390-tools-2.19.0-150400.7.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205778" version="1" class="patch">
	<metadata>
		<title>libevent-2_1-8-2.1.8-2.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_1-8-2.1.8-2.23 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6272">CVE-2014-6272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882142" comment="libevent-2_1-8-2.1.8-2.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205779" version="1" class="patch">
	<metadata>
		<title>libexpat1-2.4.4-150400.3.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2013-0340" ref_url="https://www.suse.com/security/cve/CVE-2013-0340/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<reference ref_id="CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680/" source="CVE"/>
		<description>
These are all security issues fixed in the libexpat1-2.4.4-150400.3.12.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6702">CVE-2012-6702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0340/">CVE-2013-0340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">CVE-2013-0340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1283">CVE-2015-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4472">CVE-2016-4472 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5300">CVE-2016-5300 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009722359" comment="libexpat1-2.4.4-150400.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205780" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.79.4-150400.3.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-18508" ref_url="https://www.suse.com/security/cve/CVE-2018-18508/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-23491" ref_url="https://www.suse.com/security/cve/CVE-2022-23491/" source="CVE"/>
		<reference ref_id="CVE-2022-3479" ref_url="https://www.suse.com/security/cve/CVE-2022-3479/" source="CVE"/>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.79.4-150400.3.26.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1569">CVE-2014-1569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12384">CVE-2018-12384 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12404">CVE-2018-12404 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18508/">CVE-2018-18508 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18508">CVE-2018-18508 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23491/">CVE-2022-23491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23491">CVE-2022-23491 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3479/">CVE-2022-3479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3479">CVE-2022-3479 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009739294" comment="libfreebl3-3.79.4-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739296" comment="libfreebl3-hmac-3.79.4-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739298" comment="libsoftokn3-3.79.4-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739300" comment="libsoftokn3-hmac-3.79.4-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739302" comment="mozilla-nss-3.79.4-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739304" comment="mozilla-nss-certs-3.79.4-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739309" comment="mozilla-nss-tools-3.79.4-150400.3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205781" version="1" class="patch">
	<metadata>
		<title>libfreetype6-2.10.4-150000.4.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<reference ref_id="CVE-2018-6942" ref_url="https://www.suse.com/security/cve/CVE-2018-6942/" source="CVE"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2022-27404" ref_url="https://www.suse.com/security/cve/CVE-2022-27404/" source="CVE"/>
		<reference ref_id="CVE-2022-27405" ref_url="https://www.suse.com/security/cve/CVE-2022-27405/" source="CVE"/>
		<reference ref_id="CVE-2022-27406" ref_url="https://www.suse.com/security/cve/CVE-2022-27406/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreetype6-2.10.4-150000.4.12.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2240">CVE-2014-2240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9656">CVE-2014-9656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9659">CVE-2014-9659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9662">CVE-2014-9662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9665">CVE-2014-9665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9666">CVE-2014-9666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9668">CVE-2014-9668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9672">CVE-2014-9672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8105">CVE-2017-8105 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8287">CVE-2017-8287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6942/">CVE-2018-6942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6942">CVE-2018-6942 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27404/">CVE-2022-27404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27404">CVE-2022-27404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27405/">CVE-2022-27405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27405">CVE-2022-27405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27406/">CVE-2022-27406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27406">CVE-2022-27406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708193" comment="libfreetype6-2.10.4-150000.4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205782" version="1" class="patch">
	<metadata>
		<title>libfribidi0-1.0.10-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397/" source="CVE"/>
		<reference ref_id="CVE-2022-25308" ref_url="https://www.suse.com/security/cve/CVE-2022-25308/" source="CVE"/>
		<reference ref_id="CVE-2022-25309" ref_url="https://www.suse.com/security/cve/CVE-2022-25309/" source="CVE"/>
		<reference ref_id="CVE-2022-25310" ref_url="https://www.suse.com/security/cve/CVE-2022-25310/" source="CVE"/>
		<description>
These are all security issues fixed in the libfribidi0-1.0.10-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18397">CVE-2019-18397 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25308/">CVE-2022-25308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25308">CVE-2022-25308 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-25309/">CVE-2022-25309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25309">CVE-2022-25309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25310/">CVE-2022-25310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25310">CVE-2022-25310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009691894" comment="libfribidi0-1.0.10-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205783" version="1" class="patch">
	<metadata>
		<title>libgbm1-21.2.4-150400.68.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<description>
These are all security issues fixed in the libgbm1-21.2.4-150400.68.9.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5068">CVE-2019-5068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904939" comment="libgbm1-21.2.4-150400.68.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205784" version="1" class="patch">
	<metadata>
		<title>libgcrypt20-1.9.4-150400.6.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="CVE-2015-5738" ref_url="https://www.suse.com/security/cve/CVE-2015-5738/" source="CVE"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-0379" ref_url="https://www.suse.com/security/cve/CVE-2017-0379/" source="CVE"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2019-12904" ref_url="https://www.suse.com/security/cve/CVE-2019-12904/" source="CVE"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<reference ref_id="CVE-2021-3345" ref_url="https://www.suse.com/security/cve/CVE-2021-3345/" source="CVE"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt20-1.9.4-150400.6.5.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3591">CVE-2014-3591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0837">CVE-2015-0837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5738/">CVE-2015-5738 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5738">CVE-2015-5738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511 at SUSE</cve>
	<cve impact="low" cvss3="2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7511">CVE-2015-7511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6313">CVE-2016-6313 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2017-0379/">CVE-2017-0379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0379">CVE-2017-0379 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7526">CVE-2017-7526 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12904/">CVE-2019-12904 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12904">CVE-2019-12904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3345/">CVE-2021-3345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3345">CVE-2021-3345 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904940" comment="libgcrypt20-1.9.4-150400.6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904941" comment="libgcrypt20-hmac-1.9.4-150400.6.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205785" version="1" class="patch">
	<metadata>
		<title>libgmp10-6.1.2-4.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<description>
These are all security issues fixed in the libgmp10-6.1.2-4.9.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656939" comment="libgmp10-6.1.2-4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205786" version="1" class="patch">
	<metadata>
		<title>libgraphite2-3-1.3.11-150000.4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999/" source="CVE"/>
		<description>
These are all security issues fixed in the libgraphite2-3-1.3.11-150000.4.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1521">CVE-2016-1521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7999">CVE-2018-7999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893637" comment="libgraphite2-3-1.3.11-150000.4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205787" version="1" class="patch">
	<metadata>
		<title>libharfbuzz-gobject0-3.4.0-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2022-33068" ref_url="https://www.suse.com/security/cve/CVE-2022-33068/" source="CVE"/>
		<description>
These are all security issues fixed in the libharfbuzz-gobject0-3.4.0-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33068/">CVE-2022-33068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33068">CVE-2022-33068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009702488" comment="libharfbuzz-gobject0-3.4.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702491" comment="libharfbuzz0-3.4.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009702493" comment="typelib-1_0-HarfBuzz-0_0-3.4.0-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205788" version="1" class="patch">
	<metadata>
		<title>libhivex0-1.3.21-150400.2.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-3504" ref_url="https://www.suse.com/security/cve/CVE-2021-3504/" source="CVE"/>
		<reference ref_id="CVE-2021-3622" ref_url="https://www.suse.com/security/cve/CVE-2021-3622/" source="CVE"/>
		<description>
These are all security issues fixed in the libhivex0-1.3.21-150400.2.10 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3504/">CVE-2021-3504 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3504">CVE-2021-3504 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3622/">CVE-2021-3622 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3622">CVE-2021-3622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887516" comment="libhivex0-1.3.21-150400.2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887517" comment="perl-Win-Hivex-1.3.21-150400.2.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205789" version="1" class="patch">
	<metadata>
		<title>libhogweed6-3.7.3-150400.2.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<reference ref_id="CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489/" source="CVE"/>
		<reference ref_id="CVE-2018-16869" ref_url="https://www.suse.com/security/cve/CVE-2018-16869/" source="CVE"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed6-3.7.3-150400.2.21 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8803">CVE-2015-8803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8804">CVE-2015-8804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8805">CVE-2015-8805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6489">CVE-2016-6489 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16869/">CVE-2018-16869 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16869">CVE-2018-16869 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887707" comment="libhogweed6-3.7.3-150400.2.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887710" comment="libnettle8-3.7.3-150400.2.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205790" version="1" class="patch">
	<metadata>
		<title>libicu-suse65_1-65.1-150200.4.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-21913" ref_url="https://www.suse.com/security/cve/CVE-2020-21913/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu-suse65_1-65.1-150200.4.5.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21913/">CVE-2020-21913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21913">CVE-2020-21913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009707445" comment="libicu-suse65_1-65.1-150200.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893870" comment="libicu65_1-bedata-65.1-150200.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893871" comment="libicu65_1-ledata-65.1-150200.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205791" version="1" class="patch">
	<metadata>
		<title>libidn2-0-2.2.0-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="CVE-2019-12290" ref_url="https://www.suse.com/security/cve/CVE-2019-12290/" source="CVE"/>
		<reference ref_id="CVE-2019-18224" ref_url="https://www.suse.com/security/cve/CVE-2019-18224/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn2-0-2.2.0-3.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2059">CVE-2015-2059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8948">CVE-2015-8948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6261">CVE-2016-6261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6262">CVE-2016-6262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6263">CVE-2016-6263 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12290/">CVE-2019-12290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-12290">CVE-2019-12290 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18224/">CVE-2019-18224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18224">CVE-2019-18224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882169" comment="libidn2-0-2.2.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205792" version="1" class="patch">
	<metadata>
		<title>libjansson4-2.9-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-6401" ref_url="https://www.suse.com/security/cve/CVE-2013-6401/" source="CVE"/>
		<description>
These are all security issues fixed in the libjansson4-2.9-1.24 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6401/">CVE-2013-6401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6401">CVE-2013-6401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882196" comment="libjansson4-2.9-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205793" version="1" class="patch">
	<metadata>
		<title>libjbig2-2.1-3.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libjbig2-2.1-3.2.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6369">CVE-2013-6369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887750" comment="libjbig2-2.1-3.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205794" version="1" class="patch">
	<metadata>
		<title>libjpeg8-8.2.2-150400.15.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<reference ref_id="CVE-2018-19644" ref_url="https://www.suse.com/security/cve/CVE-2018-19644/" source="CVE"/>
		<reference ref_id="CVE-2018-19664" ref_url="https://www.suse.com/security/cve/CVE-2018-19664/" source="CVE"/>
		<reference ref_id="CVE-2018-20330" ref_url="https://www.suse.com/security/cve/CVE-2018-20330/" source="CVE"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<reference ref_id="CVE-2020-17541" ref_url="https://www.suse.com/security/cve/CVE-2020-17541/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg8-8.2.2-150400.15.9 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9092">CVE-2014-9092 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15232">CVE-2017-15232 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1152">CVE-2018-1152 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11813">CVE-2018-11813 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14498">CVE-2018-14498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19644/">CVE-2018-19644 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19644">CVE-2018-19644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19664/">CVE-2018-19664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19664">CVE-2018-19664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20330/">CVE-2018-20330 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20330">CVE-2018-20330 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2201">CVE-2019-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13790">CVE-2020-13790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17541/">CVE-2020-17541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17541">CVE-2020-17541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887754" comment="libjpeg8-8.2.2-150400.15.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205795" version="1" class="patch">
	<metadata>
		<title>libjson-c3-0.13-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c3-0.13-3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6370">CVE-2013-6370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6371">CVE-2013-6371 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664149" comment="libjson-c3-0.13-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205796" version="1" class="patch">
	<metadata>
		<title>libksba8-1.3.5-150000.4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<reference ref_id="CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515/" source="CVE"/>
		<reference ref_id="CVE-2022-47629" ref_url="https://www.suse.com/security/cve/CVE-2022-47629/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba8-1.3.5-150000.4.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9087">CVE-2014-9087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4574">CVE-2016-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4579">CVE-2016-4579 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47629/">CVE-2022-47629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009730902" comment="libksba8-1.3.5-150000.4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205797" version="1" class="patch">
	<metadata>
		<title>liblcms2-2-2.12-150400.1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<description>
These are all security issues fixed in the liblcms2-2-2.12-150400.1.10 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16435">CVE-2018-16435 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887759" comment="liblcms2-2-2.12-150400.1.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205798" version="1" class="patch">
	<metadata>
		<title>libldap-2_4-2-2.4.46-150200.14.11.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740/" source="CVE"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<reference ref_id="CVE-2020-15719" ref_url="https://www.suse.com/security/cve/CVE-2020-15719/" source="CVE"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="CVE-2020-8027" ref_url="https://www.suse.com/security/cve/CVE-2020-8027/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-2_4-2-2.4.46-150200.14.11.2 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1545">CVE-2015-1545 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1546">CVE-2015-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6908">CVE-2015-6908 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17740">CVE-2017-17740 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13057">CVE-2019-13057 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13565">CVE-2019-13565 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15719/">CVE-2020-15719 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15719">CVE-2020-15719 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25709">CVE-2020-25709 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25710">CVE-2020-25710 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36221">CVE-2020-36221 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36222">CVE-2020-36222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36223">CVE-2020-36223 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36224">CVE-2020-36224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36225">CVE-2020-36225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36226">CVE-2020-36226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36227">CVE-2020-36227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36228">CVE-2020-36228 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36229">CVE-2020-36229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36230">CVE-2020-36230 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8027/">CVE-2020-8027 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8027">CVE-2020-8027 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27212">CVE-2021-27212 at NVD</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29155">CVE-2022-29155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009893900" comment="libldap-2_4-2-2.4.46-150200.14.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893902" comment="libldap-data-2.4.46-150200.14.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205799" version="1" class="patch">
	<metadata>
		<title>libldb2-2.4.3-150400.4.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2018-1140" ref_url="https://www.suse.com/security/cve/CVE-2018-1140/" source="CVE"/>
		<reference ref_id="CVE-2019-3824" ref_url="https://www.suse.com/security/cve/CVE-2019-3824/" source="CVE"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<reference ref_id="CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730/" source="CVE"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<reference ref_id="CVE-2021-3670" ref_url="https://www.suse.com/security/cve/CVE-2021-3670/" source="CVE"/>
		<reference ref_id="CVE-2022-2031" ref_url="https://www.suse.com/security/cve/CVE-2022-2031/" source="CVE"/>
		<reference ref_id="CVE-2022-32744" ref_url="https://www.suse.com/security/cve/CVE-2022-32744/" source="CVE"/>
		<reference ref_id="CVE-2022-32745" ref_url="https://www.suse.com/security/cve/CVE-2022-32745/" source="CVE"/>
		<description>
These are all security issues fixed in the libldb2-2.4.3-150400.4.8.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3223">CVE-2015-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1140/">CVE-2018-1140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1140">CVE-2018-1140 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3824/">CVE-2019-3824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3824">CVE-2019-3824 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10700">CVE-2020-10700 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10730">CVE-2020-10730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27840">CVE-2020-27840 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20277">CVE-2021-20277 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3670/">CVE-2021-3670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3670">CVE-2021-3670 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2031/">CVE-2022-2031 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2031">CVE-2022-2031 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32744/">CVE-2022-32744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32744">CVE-2022-32744 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32745/">CVE-2022-32745 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32745">CVE-2022-32745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009703383" comment="libldb2-2.4.3-150400.4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205800" version="1" class="patch">
	<metadata>
		<title>liblua5_3-5-5.3.6-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-6706" ref_url="https://www.suse.com/security/cve/CVE-2019-6706/" source="CVE"/>
		<reference ref_id="CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370/" source="CVE"/>
		<reference ref_id="CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_3-5-5.3.6-3.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6706/">CVE-2019-6706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6706">CVE-2019-6706 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24370">CVE-2020-24370 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24371">CVE-2020-24371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494048" comment="liblua5_3-5-5.3.6-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205801" version="1" class="patch">
	<metadata>
		<title>liblz4-1-1.9.3-150400.1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-17543" ref_url="https://www.suse.com/security/cve/CVE-2019-17543/" source="CVE"/>
		<reference ref_id="CVE-2021-3520" ref_url="https://www.suse.com/security/cve/CVE-2021-3520/" source="CVE"/>
		<description>
These are all security issues fixed in the liblz4-1-1.9.3-150400.1.7 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17543/">CVE-2019-17543 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17543">CVE-2019-17543 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3520/">CVE-2021-3520 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3520">CVE-2021-3520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887768" comment="liblz4-1-1.9.3-150400.1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205802" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.10-2.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.10-2.22 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882217" comment="liblzo2-2-2.10-2.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205803" version="1" class="patch">
	<metadata>
		<title>libmicrohttpd12-0.9.57-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-7038" ref_url="https://www.suse.com/security/cve/CVE-2013-7038/" source="CVE"/>
		<reference ref_id="CVE-2013-7039" ref_url="https://www.suse.com/security/cve/CVE-2013-7039/" source="CVE"/>
		<description>
These are all security issues fixed in the libmicrohttpd12-0.9.57-1.33 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7038/">CVE-2013-7038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7038">CVE-2013-7038 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2013-7039/">CVE-2013-7039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7039">CVE-2013-7039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882223" comment="libmicrohttpd12-0.9.57-1.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205804" version="1" class="patch">
	<metadata>
		<title>libmpfr6-4.0.2-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr6-4.0.2-3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9474">CVE-2014-9474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882231" comment="libmpfr6-4.0.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205805" version="1" class="patch">
	<metadata>
		<title>libmspack0-0.6-3.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<reference ref_id="CVE-2018-18586" ref_url="https://www.suse.com/security/cve/CVE-2018-18586/" source="CVE"/>
		<reference ref_id="CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack0-0.6-3.14.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9556">CVE-2014-9556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18584">CVE-2018-18584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18585">CVE-2018-18585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18586/">CVE-2018-18586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18586">CVE-2018-18586 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010305">CVE-2019-1010305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662615" comment="libmspack0-0.6-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205806" version="1" class="patch">
	<metadata>
		<title>libncurses6-6.1-150000.5.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<reference ref_id="CVE-2019-17594" ref_url="https://www.suse.com/security/cve/CVE-2019-17594/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<reference ref_id="CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537/" source="CVE"/>
		<reference ref_id="CVE-2022-29458" ref_url="https://www.suse.com/security/cve/CVE-2022-29458/" source="CVE"/>
		<description>
These are all security issues fixed in the libncurses6-6.1-150000.5.12.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19211">CVE-2018-19211 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17594/">CVE-2019-17594 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17594">CVE-2019-17594 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17595">CVE-2019-17595 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">CVE-2021-39537 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29458/">CVE-2022-29458 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">CVE-2022-29458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701000" comment="libncurses6-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701003" comment="ncurses-utils-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701005" comment="terminfo-6.1-150000.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701006" comment="terminfo-base-6.1-150000.5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205807" version="1" class="patch">
	<metadata>
		<title>libndp0-1.6-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-3698" ref_url="https://www.suse.com/security/cve/CVE-2016-3698/" source="CVE"/>
		<description>
These are all security issues fixed in the libndp0-1.6-1.26 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3698/">CVE-2016-3698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3698">CVE-2016-3698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882882" comment="libndp0-1.6-1.26 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205808" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.20-5.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.20-5.35 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2905">CVE-2009-2905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882237" comment="libnewt0_52-0.52.20-5.35 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205809" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.40.0-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-18802" ref_url="https://www.suse.com/security/cve/CVE-2019-18802/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.40.0-6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1544">CVE-2016-1544 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18802/">CVE-2019-18802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18802">CVE-2019-18802 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887778" comment="libnghttp2-14-1.40.0-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205810" version="1" class="patch">
	<metadata>
		<title>libonig4-6.7.0-150000.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-13224" ref_url="https://www.suse.com/security/cve/CVE-2019-13224/" source="CVE"/>
		<reference ref_id="CVE-2019-16163" ref_url="https://www.suse.com/security/cve/CVE-2019-16163/" source="CVE"/>
		<reference ref_id="CVE-2019-19203" ref_url="https://www.suse.com/security/cve/CVE-2019-19203/" source="CVE"/>
		<reference ref_id="CVE-2019-19204" ref_url="https://www.suse.com/security/cve/CVE-2019-19204/" source="CVE"/>
		<reference ref_id="CVE-2019-19246" ref_url="https://www.suse.com/security/cve/CVE-2019-19246/" source="CVE"/>
		<reference ref_id="CVE-2020-26159" ref_url="https://www.suse.com/security/cve/CVE-2020-26159/" source="CVE"/>
		<description>
These are all security issues fixed in the libonig4-6.7.0-150000.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13224/">CVE-2019-13224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13224">CVE-2019-13224 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16163/">CVE-2019-16163 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16163">CVE-2019-16163 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19203/">CVE-2019-19203 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19203">CVE-2019-19203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19204/">CVE-2019-19204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19204">CVE-2019-19204 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19246/">CVE-2019-19246 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19246">CVE-2019-19246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26159/">CVE-2020-26159 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26159">CVE-2020-26159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009708026" comment="libonig4-6.7.0-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205811" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1l-150400.7.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2002-20001" ref_url="https://www.suse.com/security/cve/CVE-2002-20001/" source="CVE"/>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-0735" ref_url="https://www.suse.com/security/cve/CVE-2018-0735/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2019-1543" ref_url="https://www.suse.com/security/cve/CVE-2019-1543/" source="CVE"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1549" ref_url="https://www.suse.com/security/cve/CVE-2019-1549/" source="CVE"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967/" source="CVE"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449/" source="CVE"/>
		<reference ref_id="CVE-2021-3450" ref_url="https://www.suse.com/security/cve/CVE-2021-3450/" source="CVE"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<reference ref_id="CVE-2022-2097" ref_url="https://www.suse.com/security/cve/CVE-2022-2097/" source="CVE"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2022-4450" ref_url="https://www.suse.com/security/cve/CVE-2022-4450/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1l-150400.7.25.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2002-20001/">CVE-2002-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2002-20001">CVE-2002-20001 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3569">CVE-2014-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1793">CVE-2015-1793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1794">CVE-2015-1794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3193">CVE-2015-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3196">CVE-2015-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0701">CVE-2016-0701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0798">CVE-2016-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2176">CVE-2016-2176 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7052">CVE-2016-7052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7055">CVE-2016-7055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3732">CVE-2017-3732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3738">CVE-2017-3738 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0735/">CVE-2018-0735 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0735">CVE-2018-0735 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1543/">CVE-2019-1543 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1543">CVE-2019-1543 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1549/">CVE-2019-1549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1549">CVE-2019-1549 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1967">CVE-2020-1967 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3449">CVE-2021-3449 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3450/">CVE-2021-3450 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3450">CVE-2021-3450 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2097/">CVE-2022-2097 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2097">CVE-2022-2097 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4450/">CVE-2022-4450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904942" comment="libopenssl-1_1-devel-1.1.1l-150400.7.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904943" comment="libopenssl1_1-1.1.1l-150400.7.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904944" comment="libopenssl1_1-hmac-1.1.1l-150400.7.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904945" comment="openssl-1_1-1.1.1l-150400.7.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205812" version="1" class="patch">
	<metadata>
		<title>libopus0-1.3.1-150000.3.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<description>
These are all security issues fixed in the libopus0-1.3.1-150000.3.8.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0381">CVE-2017-0381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893929" comment="libopus0-1.3.1-150000.3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205813" version="1" class="patch">
	<metadata>
		<title>libosinfo-1.7.1-150400.8.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-13313" ref_url="https://www.suse.com/security/cve/CVE-2019-13313/" source="CVE"/>
		<description>
These are all security issues fixed in the libosinfo-1.7.1-150400.8.6 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13313/">CVE-2019-13313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13313">CVE-2019-13313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887799" comment="libosinfo-1.7.1-150400.8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887800" comment="libosinfo-1_0-0-1.7.1-150400.8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893111" comment="typelib-1_0-Libosinfo-1_0-1.7.1-150400.8.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205814" version="1" class="patch">
	<metadata>
		<title>libp11-kit0-0.23.22-150400.1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<reference ref_id="CVE-2020-29362" ref_url="https://www.suse.com/security/cve/CVE-2020-29362/" source="CVE"/>
		<reference ref_id="CVE-2020-29363" ref_url="https://www.suse.com/security/cve/CVE-2020-29363/" source="CVE"/>
		<description>
These are all security issues fixed in the libp11-kit0-0.23.22-150400.1.10 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29361">CVE-2020-29361 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29362/">CVE-2020-29362 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29362">CVE-2020-29362 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29363/">CVE-2020-29363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29363">CVE-2020-29363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887802" comment="libp11-kit0-0.23.22-150400.1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887804" comment="p11-kit-0.23.22-150400.1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887808" comment="p11-kit-tools-0.23.22-150400.1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205815" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.50.4-150400.1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-15120" ref_url="https://www.suse.com/security/cve/CVE-2018-15120/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.50.4-150400.1.5 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15120/">CVE-2018-15120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15120">CVE-2018-15120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887813" comment="libpango-1_0-0-1.50.4-150400.1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887815" comment="typelib-1_0-Pango-1_0-1.50.4-150400.1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205816" version="1" class="patch">
	<metadata>
		<title>libpcap1-1.10.1-150400.1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15161" ref_url="https://www.suse.com/security/cve/CVE-2019-15161/" source="CVE"/>
		<reference ref_id="CVE-2019-15162" ref_url="https://www.suse.com/security/cve/CVE-2019-15162/" source="CVE"/>
		<reference ref_id="CVE-2019-15163" ref_url="https://www.suse.com/security/cve/CVE-2019-15163/" source="CVE"/>
		<reference ref_id="CVE-2019-15164" ref_url="https://www.suse.com/security/cve/CVE-2019-15164/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcap1-1.10.1-150400.1.7 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16301">CVE-2018-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15161/">CVE-2019-15161 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15161">CVE-2019-15161 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15162/">CVE-2019-15162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15162">CVE-2019-15162 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15163/">CVE-2019-15163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15163">CVE-2019-15163 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15164/">CVE-2019-15164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15164">CVE-2019-15164 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15165">CVE-2019-15165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887817" comment="libpcap1-1.10.1-150400.1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205817" version="1" class="patch">
	<metadata>
		<title>libpcre1-8.45-150000.20.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<reference ref_id="CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246/" source="CVE"/>
		<reference ref_id="CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838/" source="CVE"/>
		<reference ref_id="CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155/" source="CVE"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre1-8.45-150000.20.13.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8964">CVE-2014-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2326">CVE-2015-2326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3217">CVE-2015-3217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1283">CVE-2016-1283 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3191">CVE-2016-3191 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6004">CVE-2017-6004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7244">CVE-2017-7244 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7245">CVE-2017-7245 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7246">CVE-2017-7246 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009684361" comment="libpcre1-8.45-150000.20.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205818" version="1" class="patch">
	<metadata>
		<title>libpcre2-8-0-10.39-150400.4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-8786" ref_url="https://www.suse.com/security/cve/CVE-2017-8786/" source="CVE"/>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<reference ref_id="CVE-2022-1587" ref_url="https://www.suse.com/security/cve/CVE-2022-1587/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre2-8-0-10.39-150400.4.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8964">CVE-2014-8964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2326">CVE-2015-2326 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3191">CVE-2016-3191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8786/">CVE-2017-8786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8786">CVE-2017-8786 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1587/">CVE-2022-1587 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">CVE-2022-1587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701284" comment="libpcre2-8-0-10.39-150400.4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205819" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.9.4-150400.1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.9.4-150400.1.9 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10109">CVE-2016-10109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887825" comment="libpcsclite1-1.9.4-150400.1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887827" comment="pcsc-lite-1.9.4-150400.1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205820" version="1" class="patch">
	<metadata>
		<title>libpixman-1-0-0.40.0-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638/" source="CVE"/>
		<description>
These are all security issues fixed in the libpixman-1-0-0.40.0-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44638">CVE-2022-44638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009724800" comment="libpixman-1-0-0.40.0-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205821" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.34-3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="CVE-2016-5735" ref_url="https://www.suse.com/security/cve/CVE-2016-5735/" source="CVE"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.34-3.9.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10087">CVE-2016-10087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5735/">CVE-2016-5735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5735">CVE-2016-5735 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009490148" comment="libpng16-16-1.6.34-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205822" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.116-3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<reference ref_id="CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116/" source="CVE"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="CVE-2021-4115" ref_url="https://www.suse.com/security/cve/CVE-2021-4115/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.116-3.9.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3218">CVE-2015-3218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3255">CVE-2015-3255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3256">CVE-2015-3256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4625">CVE-2015-4625 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1116">CVE-2018-1116 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19788">CVE-2018-19788 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4115/">CVE-2021-4115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4115">CVE-2021-4115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668273" comment="libpolkit0-0.116-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668274" comment="polkit-0.116-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205823" version="1" class="patch">
	<metadata>
		<title>libprocps7-3.3.15-150000.7.28.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>
These are all security issues fixed in the libprocps7-3.3.15-150000.7.28.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904946" comment="libprocps7-3.3.15-150000.7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904947" comment="procps-3.3.15-150000.7.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205824" version="1" class="patch">
	<metadata>
		<title>libprotobuf-lite20-3.9.2-150200.4.19.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-22569" ref_url="https://www.suse.com/security/cve/CVE-2021-22569/" source="CVE"/>
		<reference ref_id="CVE-2021-22570" ref_url="https://www.suse.com/security/cve/CVE-2021-22570/" source="CVE"/>
		<reference ref_id="CVE-2022-1941" ref_url="https://www.suse.com/security/cve/CVE-2022-1941/" source="CVE"/>
		<reference ref_id="CVE-2022-3171" ref_url="https://www.suse.com/security/cve/CVE-2022-3171/" source="CVE"/>
		<description>
These are all security issues fixed in the libprotobuf-lite20-3.9.2-150200.4.19.2 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22569/">CVE-2021-22569 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22569">CVE-2021-22569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22570/">CVE-2021-22570 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22570">CVE-2021-22570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1941/">CVE-2022-1941 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1941">CVE-2022-1941 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3171/">CVE-2022-3171 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3171">CVE-2022-3171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721519" comment="libprotobuf-lite20-3.9.2-150200.4.19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205825" version="1" class="patch">
	<metadata>
		<title>libproxy1-0.4.17-150400.1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy1-0.4.17-150400.1.8 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25219">CVE-2020-25219 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26154">CVE-2020-26154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887843" comment="libproxy1-0.4.17-150400.1.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205826" version="1" class="patch">
	<metadata>
		<title>libpython3_6m1_0-3.6.15-150300.10.40.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_6m1_0-3.6.15-150300.10.40.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20406">CVE-2018-20406 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009742090" comment="libpython3_6m1_0-3.6.15-150300.10.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742092" comment="python3-3.6.15-150300.10.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742093" comment="python3-base-3.6.15-150300.10.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205827" version="1" class="patch">
	<metadata>
		<title>librados2-16.2.9.536+g41a9f9a5573-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-16818" ref_url="https://www.suse.com/security/cve/CVE-2017-16818/" source="CVE"/>
		<reference ref_id="CVE-2018-10861" ref_url="https://www.suse.com/security/cve/CVE-2018-10861/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889/" source="CVE"/>
		<reference ref_id="CVE-2019-10222" ref_url="https://www.suse.com/security/cve/CVE-2019-10222/" source="CVE"/>
		<reference ref_id="CVE-2019-3821" ref_url="https://www.suse.com/security/cve/CVE-2019-3821/" source="CVE"/>
		<reference ref_id="CVE-2020-10736" ref_url="https://www.suse.com/security/cve/CVE-2020-10736/" source="CVE"/>
		<reference ref_id="CVE-2020-1759" ref_url="https://www.suse.com/security/cve/CVE-2020-1759/" source="CVE"/>
		<reference ref_id="CVE-2020-1760" ref_url="https://www.suse.com/security/cve/CVE-2020-1760/" source="CVE"/>
		<reference ref_id="CVE-2020-25660" ref_url="https://www.suse.com/security/cve/CVE-2020-25660/" source="CVE"/>
		<reference ref_id="CVE-2020-25678" ref_url="https://www.suse.com/security/cve/CVE-2020-25678/" source="CVE"/>
		<reference ref_id="CVE-2020-27781" ref_url="https://www.suse.com/security/cve/CVE-2020-27781/" source="CVE"/>
		<reference ref_id="CVE-2020-27839" ref_url="https://www.suse.com/security/cve/CVE-2020-27839/" source="CVE"/>
		<reference ref_id="CVE-2021-20288" ref_url="https://www.suse.com/security/cve/CVE-2021-20288/" source="CVE"/>
		<reference ref_id="CVE-2021-3509" ref_url="https://www.suse.com/security/cve/CVE-2021-3509/" source="CVE"/>
		<reference ref_id="CVE-2021-3524" ref_url="https://www.suse.com/security/cve/CVE-2021-3524/" source="CVE"/>
		<reference ref_id="CVE-2021-3531" ref_url="https://www.suse.com/security/cve/CVE-2021-3531/" source="CVE"/>
		<reference ref_id="CVE-2021-3979" ref_url="https://www.suse.com/security/cve/CVE-2021-3979/" source="CVE"/>
		<description>
These are all security issues fixed in the librados2-16.2.9.536+g41a9f9a5573-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16818/">CVE-2017-16818 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16818">CVE-2017-16818 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10861/">CVE-2018-10861 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10861">CVE-2018-10861 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1128">CVE-2018-1128 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1129">CVE-2018-1129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16889">CVE-2018-16889 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10222/">CVE-2019-10222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10222">CVE-2019-10222 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3821/">CVE-2019-3821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3821">CVE-2019-3821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10736/">CVE-2020-10736 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10736">CVE-2020-10736 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-1759/">CVE-2020-1759 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1759">CVE-2020-1759 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1760/">CVE-2020-1760 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1760">CVE-2020-1760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25660/">CVE-2020-25660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25660">CVE-2020-25660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25678/">CVE-2020-25678 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25678">CVE-2020-25678 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-27781/">CVE-2020-27781 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27781">CVE-2020-27781 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27839/">CVE-2020-27839 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27839">CVE-2020-27839 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20288/">CVE-2021-20288 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20288">CVE-2021-20288 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3509/">CVE-2021-3509 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3509">CVE-2021-3509 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3524/">CVE-2021-3524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3524">CVE-2021-3524 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3531/">CVE-2021-3531 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3531">CVE-2021-3531 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3979/">CVE-2021-3979 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3979">CVE-2021-3979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009701035" comment="librados2-16.2.9.536+g41a9f9a5573-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009701038" comment="librbd1-16.2.9.536+g41a9f9a5573-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205828" version="1" class="patch">
	<metadata>
		<title>libseccomp2-2.5.3-150400.2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<description>
These are all security issues fixed in the libseccomp2-2.5.3-150400.2.4 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887870" comment="libseccomp2-2.5.3-150400.2.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205829" version="1" class="patch">
	<metadata>
		<title>libsepol2-3.4-150400.1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-36085" ref_url="https://www.suse.com/security/cve/CVE-2021-36085/" source="CVE"/>
		<reference ref_id="CVE-2021-36086" ref_url="https://www.suse.com/security/cve/CVE-2021-36086/" source="CVE"/>
		<reference ref_id="CVE-2021-36087" ref_url="https://www.suse.com/security/cve/CVE-2021-36087/" source="CVE"/>
		<description>
These are all security issues fixed in the libsepol2-3.4-150400.1.11 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36085/">CVE-2021-36085 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36085">CVE-2021-36085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36086/">CVE-2021-36086 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36086">CVE-2021-36086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36087/">CVE-2021-36087 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36087">CVE-2021-36087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904948" comment="libsepol2-3.4-150400.1.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205830" version="1" class="patch">
	<metadata>
		<title>libslirp0-4.3.1-150300.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<description>
These are all security issues fixed in the libslirp0-4.3.1-150300.11.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707677" comment="libslirp0-4.3.1-150300.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205831" version="1" class="patch">
	<metadata>
		<title>libsnmp40-5.9.3-150300.15.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="CVE-2022-24805" ref_url="https://www.suse.com/security/cve/CVE-2022-24805/" source="CVE"/>
		<reference ref_id="CVE-2022-24806" ref_url="https://www.suse.com/security/cve/CVE-2022-24806/" source="CVE"/>
		<reference ref_id="CVE-2022-24807" ref_url="https://www.suse.com/security/cve/CVE-2022-24807/" source="CVE"/>
		<reference ref_id="CVE-2022-24808" ref_url="https://www.suse.com/security/cve/CVE-2022-24808/" source="CVE"/>
		<reference ref_id="CVE-2022-24809" ref_url="https://www.suse.com/security/cve/CVE-2022-24809/" source="CVE"/>
		<reference ref_id="CVE-2022-24810" ref_url="https://www.suse.com/security/cve/CVE-2022-24810/" source="CVE"/>
		<reference ref_id="CVE-2022-44792" ref_url="https://www.suse.com/security/cve/CVE-2022-44792/" source="CVE"/>
		<reference ref_id="CVE-2022-44793" ref_url="https://www.suse.com/security/cve/CVE-2022-44793/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp40-5.9.3-150300.15.8.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621">CVE-2015-5621 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18065">CVE-2018-18065 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15862">CVE-2020-15862 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24805/">CVE-2022-24805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24805">CVE-2022-24805 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24806/">CVE-2022-24806 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24806">CVE-2022-24806 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24807/">CVE-2022-24807 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24807">CVE-2022-24807 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24808/">CVE-2022-24808 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24808">CVE-2022-24808 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24809/">CVE-2022-24809 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24809">CVE-2022-24809 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24810/">CVE-2022-24810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24810">CVE-2022-24810 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44792/">CVE-2022-44792 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44792">CVE-2022-44792 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44793/">CVE-2022-44793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44793">CVE-2022-44793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009731169" comment="libsnmp40-5.9.3-150300.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009731176" comment="snmp-mibs-5.9.3-150300.15.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205832" version="1" class="patch">
	<metadata>
		<title>libsolv-tools-0.7.22-150400.1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
These are all security issues fixed in the libsolv-tools-0.7.22-150400.1.5 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887877" comment="libsolv-tools-0.7.22-150400.1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205833" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.74.2-150400.1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.74.2-150400.1.6 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2885">CVE-2017-2885 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12910">CVE-2018-12910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887880" comment="libsoup-2_4-1-2.74.2-150400.1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205834" version="1" class="patch">
	<metadata>
		<title>libspice-server1-0.15.0-150400.2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282/" source="CVE"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server1-0.15.0-150400.2.8 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4282">CVE-2013-4282 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3247">CVE-2015-3247 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5260">CVE-2015-5260 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5261">CVE-2015-5261 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0749">CVE-2016-0749 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2150">CVE-2016-2150 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9577">CVE-2016-9577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9578">CVE-2016-9578 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10873">CVE-2018-10873 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10893">CVE-2018-10893 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3813">CVE-2019-3813 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893113" comment="libspice-server1-0.15.0-150400.2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205835" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.39.3-150000.3.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244/" source="CVE"/>
		<reference ref_id="CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317/" source="CVE"/>
		<reference ref_id="CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603/" source="CVE"/>
		<reference ref_id="CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645/" source="CVE"/>
		<reference ref_id="CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959/" source="CVE"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="CVE-2019-9936" ref_url="https://www.suse.com/security/cve/CVE-2019-9936/" source="CVE"/>
		<reference ref_id="CVE-2019-9937" ref_url="https://www.suse.com/security/cve/CVE-2019-9937/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358/" source="CVE"/>
		<reference ref_id="CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327/" source="CVE"/>
		<reference ref_id="CVE-2021-36690" ref_url="https://www.suse.com/security/cve/CVE-2021-36690/" source="CVE"/>
		<reference ref_id="CVE-2022-35737" ref_url="https://www.suse.com/security/cve/CVE-2022-35737/" source="CVE"/>
		<reference ref_id="CVE-2022-46908" ref_url="https://www.suse.com/security/cve/CVE-2022-46908/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.39.3-150000.3.20.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19244">CVE-2019-19244 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19317">CVE-2019-19317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19603">CVE-2019-19603 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19645">CVE-2019-19645 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19646">CVE-2019-19646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19880">CVE-2019-19880 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19923">CVE-2019-19923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19924">CVE-2019-19924 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19925">CVE-2019-19925 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19926">CVE-2019-19926 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19959">CVE-2019-19959 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20218">CVE-2019-20218 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9936/">CVE-2019-9936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9936">CVE-2019-9936 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9937/">CVE-2019-9937 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9937">CVE-2019-9937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15358">CVE-2020-15358 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9327">CVE-2020-9327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36690/">CVE-2021-36690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36690">CVE-2021-36690 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35737/">CVE-2022-35737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35737">CVE-2022-35737 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-46908/">CVE-2022-46908 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46908">CVE-2022-46908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009729556" comment="libsqlite3-0-3.39.3-150000.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009729561" comment="sqlite3-tcl-3.39.3-150000.3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205836" version="1" class="patch">
	<metadata>
		<title>libssh-config-0.9.6-150400.1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132/" source="CVE"/>
		<reference ref_id="CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146/" source="CVE"/>
		<reference ref_id="CVE-2018-10933" ref_url="https://www.suse.com/security/cve/CVE-2018-10933/" source="CVE"/>
		<reference ref_id="CVE-2019-14889" ref_url="https://www.suse.com/security/cve/CVE-2019-14889/" source="CVE"/>
		<reference ref_id="CVE-2020-16135" ref_url="https://www.suse.com/security/cve/CVE-2020-16135/" source="CVE"/>
		<reference ref_id="CVE-2020-1730" ref_url="https://www.suse.com/security/cve/CVE-2020-1730/" source="CVE"/>
		<reference ref_id="CVE-2021-3634" ref_url="https://www.suse.com/security/cve/CVE-2021-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh-config-0.9.6-150400.1.5 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8132">CVE-2014-8132 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3146">CVE-2015-3146 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10933/">CVE-2018-10933 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10933">CVE-2018-10933 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14889/">CVE-2019-14889 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14889">CVE-2019-14889 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16135/">CVE-2020-16135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16135">CVE-2020-16135 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-1730/">CVE-2020-1730 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1730">CVE-2020-1730 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3634/">CVE-2021-3634 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3634">CVE-2021-3634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887892" comment="libssh-config-0.9.6-150400.1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887894" comment="libssh4-0.9.6-150400.1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205837" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.9.0-4.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.9.0-4.13.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1782">CVE-2015-1782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0787">CVE-2016-0787 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3858">CVE-2019-3858 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3861">CVE-2019-3861 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3862">CVE-2019-3862 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205838" version="1" class="patch">
	<metadata>
		<title>libsss_certmap0-2.5.2-150400.4.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173/" source="CVE"/>
		<reference ref_id="CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852/" source="CVE"/>
		<reference ref_id="CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838/" source="CVE"/>
		<reference ref_id="CVE-2019-3811" ref_url="https://www.suse.com/security/cve/CVE-2019-3811/" source="CVE"/>
		<reference ref_id="CVE-2021-3621" ref_url="https://www.suse.com/security/cve/CVE-2021-3621/" source="CVE"/>
		<description>
These are all security issues fixed in the libsss_certmap0-2.5.2-150400.4.11.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12173">CVE-2017-12173 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10852">CVE-2018-10852 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16838">CVE-2018-16838 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3811/">CVE-2019-3811 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3811">CVE-2019-3811 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3621/">CVE-2021-3621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3621">CVE-2021-3621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904949" comment="libsss_certmap0-2.5.2-150400.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904950" comment="libsss_idmap0-2.5.2-150400.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904951" comment="libsss_nss_idmap0-2.5.2-150400.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904952" comment="sssd-2.5.2-150400.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904953" comment="sssd-common-2.5.2-150400.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904954" comment="sssd-krb5-common-2.5.2-150400.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904955" comment="sssd-ldap-2.5.2-150400.4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205839" version="1" class="patch">
	<metadata>
		<title>libsystemd0-249.15-150400.8.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-7510" ref_url="https://www.suse.com/security/cve/CVE-2015-7510/" source="CVE"/>
		<reference ref_id="CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156/" source="CVE"/>
		<reference ref_id="CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908/" source="CVE"/>
		<reference ref_id="CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078/" source="CVE"/>
		<reference ref_id="CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445/" source="CVE"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15687" ref_url="https://www.suse.com/security/cve/CVE-2018-15687/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-21029" ref_url="https://www.suse.com/security/cve/CVE-2018-21029/" source="CVE"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-20386" ref_url="https://www.suse.com/security/cve/CVE-2019-20386/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-3843" ref_url="https://www.suse.com/security/cve/CVE-2019-3843/" source="CVE"/>
		<reference ref_id="CVE-2019-3844" ref_url="https://www.suse.com/security/cve/CVE-2019-3844/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="CVE-2020-13529" ref_url="https://www.suse.com/security/cve/CVE-2020-13529/" source="CVE"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="CVE-2021-3997" ref_url="https://www.suse.com/security/cve/CVE-2021-3997/" source="CVE"/>
		<reference ref_id="CVE-2022-3821" ref_url="https://www.suse.com/security/cve/CVE-2022-3821/" source="CVE"/>
		<reference ref_id="CVE-2022-4415" ref_url="https://www.suse.com/security/cve/CVE-2022-4415/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-249.15-150400.8.22.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7510/">CVE-2015-7510 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7510">CVE-2015-7510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10156">CVE-2016-10156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15908">CVE-2017-15908 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18078">CVE-2017-18078 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9445">CVE-2017-9445 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15686">CVE-2018-15686 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15687/">CVE-2018-15687 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15687">CVE-2018-15687 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16864">CVE-2018-16864 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16865">CVE-2018-16865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-21029/">CVE-2018-21029 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21029">CVE-2018-21029 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6954">CVE-2018-6954 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20386/">CVE-2019-20386 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">CVE-2019-20386 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3842">CVE-2019-3842 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3843/">CVE-2019-3843 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">CVE-2019-3843 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3844/">CVE-2019-3844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">CVE-2019-3844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6454">CVE-2019-6454 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13529/">CVE-2020-13529 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">CVE-2020-1712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3997/">CVE-2021-3997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3997">CVE-2021-3997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3821/">CVE-2022-3821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3821">CVE-2022-3821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4415/">CVE-2022-4415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4415">CVE-2022-4415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904956" comment="libsystemd0-249.15-150400.8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904957" comment="libudev1-249.15-150400.8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904958" comment="systemd-249.15-150400.8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904959" comment="systemd-container-249.15-150400.8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904960" comment="systemd-journal-remote-249.15-150400.8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904961" comment="systemd-sysvinit-249.15-150400.8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904962" comment="udev-249.15-150400.8.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205840" version="1" class="patch">
	<metadata>
		<title>libtasn1-4.13-150000.4.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<reference ref_id="CVE-2018-6003" ref_url="https://www.suse.com/security/cve/CVE-2018-6003/" source="CVE"/>
		<reference ref_id="CVE-2021-46848" ref_url="https://www.suse.com/security/cve/CVE-2021-46848/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-4.13-150000.4.8.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3622">CVE-2015-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4008">CVE-2016-4008 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000654">CVE-2018-1000654 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6003/">CVE-2018-6003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6003">CVE-2018-6003 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46848/">CVE-2021-46848 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46848">CVE-2021-46848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009721368" comment="libtasn1-4.13-150000.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009721369" comment="libtasn1-6-4.13-150000.4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205841" version="1" class="patch">
	<metadata>
		<title>libtiff5-4.0.9-150000.45.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-6223" ref_url="https://www.suse.com/security/cve/CVE-2016-6223/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9538" ref_url="https://www.suse.com/security/cve/CVE-2016-9538/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944/" source="CVE"/>
		<reference ref_id="CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232/" source="CVE"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403/" source="CVE"/>
		<reference ref_id="CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2017-9936" ref_url="https://www.suse.com/security/cve/CVE-2017-9936/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17000" ref_url="https://www.suse.com/security/cve/CVE-2018-17000/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="CVE-2018-19210" ref_url="https://www.suse.com/security/cve/CVE-2018-19210/" source="CVE"/>
		<reference ref_id="CVE-2018-5784" ref_url="https://www.suse.com/security/cve/CVE-2018-5784/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="CVE-2019-7663" ref_url="https://www.suse.com/security/cve/CVE-2019-7663/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561/" source="CVE"/>
		<reference ref_id="CVE-2022-0562" ref_url="https://www.suse.com/security/cve/CVE-2022-0562/" source="CVE"/>
		<reference ref_id="CVE-2022-0865" ref_url="https://www.suse.com/security/cve/CVE-2022-0865/" source="CVE"/>
		<reference ref_id="CVE-2022-0891" ref_url="https://www.suse.com/security/cve/CVE-2022-0891/" source="CVE"/>
		<reference ref_id="CVE-2022-0908" ref_url="https://www.suse.com/security/cve/CVE-2022-0908/" source="CVE"/>
		<reference ref_id="CVE-2022-0909" ref_url="https://www.suse.com/security/cve/CVE-2022-0909/" source="CVE"/>
		<reference ref_id="CVE-2022-0924" ref_url="https://www.suse.com/security/cve/CVE-2022-0924/" source="CVE"/>
		<reference ref_id="CVE-2022-1056" ref_url="https://www.suse.com/security/cve/CVE-2022-1056/" source="CVE"/>
		<reference ref_id="CVE-2022-2056" ref_url="https://www.suse.com/security/cve/CVE-2022-2056/" source="CVE"/>
		<reference ref_id="CVE-2022-2057" ref_url="https://www.suse.com/security/cve/CVE-2022-2057/" source="CVE"/>
		<reference ref_id="CVE-2022-2058" ref_url="https://www.suse.com/security/cve/CVE-2022-2058/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="CVE-2022-2519" ref_url="https://www.suse.com/security/cve/CVE-2022-2519/" source="CVE"/>
		<reference ref_id="CVE-2022-2520" ref_url="https://www.suse.com/security/cve/CVE-2022-2520/" source="CVE"/>
		<reference ref_id="CVE-2022-2521" ref_url="https://www.suse.com/security/cve/CVE-2022-2521/" source="CVE"/>
		<reference ref_id="CVE-2022-2867" ref_url="https://www.suse.com/security/cve/CVE-2022-2867/" source="CVE"/>
		<reference ref_id="CVE-2022-2868" ref_url="https://www.suse.com/security/cve/CVE-2022-2868/" source="CVE"/>
		<reference ref_id="CVE-2022-2869" ref_url="https://www.suse.com/security/cve/CVE-2022-2869/" source="CVE"/>
		<reference ref_id="CVE-2022-34266" ref_url="https://www.suse.com/security/cve/CVE-2022-34266/" source="CVE"/>
		<reference ref_id="CVE-2022-34526" ref_url="https://www.suse.com/security/cve/CVE-2022-34526/" source="CVE"/>
		<reference ref_id="CVE-2022-3570" ref_url="https://www.suse.com/security/cve/CVE-2022-3570/" source="CVE"/>
		<reference ref_id="CVE-2022-3597" ref_url="https://www.suse.com/security/cve/CVE-2022-3597/" source="CVE"/>
		<reference ref_id="CVE-2022-3598" ref_url="https://www.suse.com/security/cve/CVE-2022-3598/" source="CVE"/>
		<reference ref_id="CVE-2022-3599" ref_url="https://www.suse.com/security/cve/CVE-2022-3599/" source="CVE"/>
		<reference ref_id="CVE-2022-3626" ref_url="https://www.suse.com/security/cve/CVE-2022-3626/" source="CVE"/>
		<reference ref_id="CVE-2022-3627" ref_url="https://www.suse.com/security/cve/CVE-2022-3627/" source="CVE"/>
		<reference ref_id="CVE-2022-3970" ref_url="https://www.suse.com/security/cve/CVE-2022-3970/" source="CVE"/>
		<reference ref_id="CVE-2022-48281" ref_url="https://www.suse.com/security/cve/CVE-2022-48281/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff5-4.0.9-150000.45.25.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4564">CVE-2012-4564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1960">CVE-2013-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1961">CVE-2013-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4231">CVE-2013-4231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4232">CVE-2013-4232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4243">CVE-2013-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4244">CVE-2013-4244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8127">CVE-2014-8127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8128">CVE-2014-8128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8129">CVE-2014-8129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8130">CVE-2014-8130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9655">CVE-2014-9655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1547">CVE-2015-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8665">CVE-2015-8665 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8683">CVE-2015-8683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8781">CVE-2015-8781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8782">CVE-2015-8782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8783">CVE-2015-8783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10092">CVE-2016-10092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10093">CVE-2016-10093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10094">CVE-2016-10094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10095">CVE-2016-10095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10266">CVE-2016-10266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10267">CVE-2016-10267 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10268">CVE-2016-10268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10269">CVE-2016-10269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10270">CVE-2016-10270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10271">CVE-2016-10271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10272">CVE-2016-10272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10371">CVE-2016-10371 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3186">CVE-2016-3186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3622">CVE-2016-3622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3623">CVE-2016-3623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3658">CVE-2016-3658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3990">CVE-2016-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3991">CVE-2016-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5314">CVE-2016-5314 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5316">CVE-2016-5316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5317">CVE-2016-5317 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5318">CVE-2016-5318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5320">CVE-2016-5320 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5321">CVE-2016-5321 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5323">CVE-2016-5323 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5652">CVE-2016-5652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5875">CVE-2016-5875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6223/">CVE-2016-6223 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6223">CVE-2016-6223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9273">CVE-2016-9273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9297">CVE-2016-9297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9448">CVE-2016-9448 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9453">CVE-2016-9453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9538/">CVE-2016-9538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9538">CVE-2016-9538 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11613">CVE-2017-11613 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12944">CVE-2017-12944 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16232">CVE-2017-16232 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18013">CVE-2017-18013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5225">CVE-2017-5225 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7592">CVE-2017-7592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7593">CVE-2017-7593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7594">CVE-2017-7594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7595">CVE-2017-7595 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7596">CVE-2017-7596 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7597">CVE-2017-7597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7598">CVE-2017-7598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7599">CVE-2017-7599 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7600">CVE-2017-7600 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7601">CVE-2017-7601 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7602">CVE-2017-7602 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9403">CVE-2017-9403 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9404">CVE-2017-9404 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9935">CVE-2017-9935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9936/">CVE-2017-9936 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9936">CVE-2017-9936 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10779">CVE-2018-10779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10963">CVE-2018-10963 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12900">CVE-2018-12900 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16335">CVE-2018-16335 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17000/">CVE-2018-17000 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17000">CVE-2018-17000 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17100">CVE-2018-17100 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17101">CVE-2018-17101 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17795">CVE-2018-17795 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18557">CVE-2018-18557 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18661">CVE-2018-18661 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19210/">CVE-2018-19210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19210">CVE-2018-19210 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5784/">CVE-2018-5784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5784">CVE-2018-5784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7456">CVE-2018-7456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8905">CVE-2018-8905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14973">CVE-2019-14973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6128">CVE-2019-6128 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7663/">CVE-2019-7663 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7663">CVE-2019-7663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19131">CVE-2020-19131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">CVE-2022-0561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0562/">CVE-2022-0562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0562">CVE-2022-0562 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0865/">CVE-2022-0865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0865">CVE-2022-0865 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0891/">CVE-2022-0891 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0891">CVE-2022-0891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0908/">CVE-2022-0908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0908">CVE-2022-0908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0909/">CVE-2022-0909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0909">CVE-2022-0909 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0924/">CVE-2022-0924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924">CVE-2022-0924 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1056/">CVE-2022-1056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1056">CVE-2022-1056 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2056/">CVE-2022-2056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2056">CVE-2022-2056 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2057/">CVE-2022-2057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2057">CVE-2022-2057 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2058/">CVE-2022-2058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2058">CVE-2022-2058 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2519/">CVE-2022-2519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2519">CVE-2022-2519 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2520/">CVE-2022-2520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2520">CVE-2022-2520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2521/">CVE-2022-2521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2521">CVE-2022-2521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2867/">CVE-2022-2867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2867">CVE-2022-2867 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2868/">CVE-2022-2868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2868">CVE-2022-2868 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2869/">CVE-2022-2869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2869">CVE-2022-2869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34266/">CVE-2022-34266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34266">CVE-2022-34266 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34526/">CVE-2022-34526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34526">CVE-2022-34526 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3570/">CVE-2022-3570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3570">CVE-2022-3570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3597/">CVE-2022-3597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3597">CVE-2022-3597 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3598/">CVE-2022-3598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3598">CVE-2022-3598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3599/">CVE-2022-3599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3599">CVE-2022-3599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3626/">CVE-2022-3626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3626">CVE-2022-3626 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3627/">CVE-2022-3627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3627">CVE-2022-3627 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3970/">CVE-2022-3970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3970">CVE-2022-3970 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48281/">CVE-2022-48281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48281">CVE-2022-48281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009735257" comment="libtiff5-4.0.9-150000.45.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205842" version="1" class="patch">
	<metadata>
		<title>libtirpc-netconfig-1.2.6-150300.3.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2021-46828" ref_url="https://www.suse.com/security/cve/CVE-2021-46828/" source="CVE"/>
		<description>
These are all security issues fixed in the libtirpc-netconfig-1.2.6-150300.3.17.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4429">CVE-2016-4429 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46828/">CVE-2021-46828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46828">CVE-2021-46828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009894008" comment="libtirpc-netconfig-1.2.6-150300.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894009" comment="libtirpc3-1.2.6-150300.3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205843" version="1" class="patch">
	<metadata>
		<title>libtpms0-0.8.2-150300.3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-3446" ref_url="https://www.suse.com/security/cve/CVE-2021-3446/" source="CVE"/>
		<reference ref_id="CVE-2021-3505" ref_url="https://www.suse.com/security/cve/CVE-2021-3505/" source="CVE"/>
		<reference ref_id="CVE-2021-3623" ref_url="https://www.suse.com/security/cve/CVE-2021-3623/" source="CVE"/>
		<reference ref_id="CVE-2021-3746" ref_url="https://www.suse.com/security/cve/CVE-2021-3746/" source="CVE"/>
		<description>
These are all security issues fixed in the libtpms0-0.8.2-150300.3.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3446/">CVE-2021-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3446">CVE-2021-3446 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3505/">CVE-2021-3505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3505">CVE-2021-3505 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3623/">CVE-2021-3623 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3623">CVE-2021-3623 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3746/">CVE-2021-3746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3746">CVE-2021-3746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009727178" comment="libtpms0-0.8.2-150300.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205844" version="1" class="patch">
	<metadata>
		<title>libtss2-esys0-3.1.0-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-24455" ref_url="https://www.suse.com/security/cve/CVE-2020-24455/" source="CVE"/>
		<reference ref_id="CVE-2023-22745" ref_url="https://www.suse.com/security/cve/CVE-2023-22745/" source="CVE"/>
		<description>
These are all security issues fixed in the libtss2-esys0-3.1.0-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24455/">CVE-2020-24455 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24455">CVE-2020-24455 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22745/">CVE-2023-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22745">CVE-2023-22745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009734646" comment="libtss2-esys0-3.1.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734648" comment="libtss2-fapi1-3.1.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734650" comment="libtss2-mu0-3.1.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734652" comment="libtss2-rc0-3.1.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734654" comment="libtss2-sys1-3.1.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734658" comment="libtss2-tcti-device0-3.1.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734665" comment="libtss2-tctildr0-3.1.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009734667" comment="tpm2-0-tss-3.1.0-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205845" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.9.2-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-17336" ref_url="https://www.suse.com/security/cve/CVE-2018-17336/" source="CVE"/>
		<reference ref_id="CVE-2021-3802" ref_url="https://www.suse.com/security/cve/CVE-2021-3802/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.9.2-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17336/">CVE-2018-17336 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17336">CVE-2018-17336 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3802/">CVE-2021-3802 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3802">CVE-2021-3802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009691895" comment="libudisks2-0-2.9.2-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697795" comment="libudisks2-0_btrfs-2.9.2-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009697797" comment="libudisks2-0_lvm2-2.9.2-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009691898" comment="udisks2-2.9.2-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205846" version="1" class="patch">
	<metadata>
		<title>libunwind-1.5.0-4.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<description>
These are all security issues fixed in the libunwind-1.5.0-4.5.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3239">CVE-2015-3239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887073" comment="libunwind-1.5.0-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205847" version="1" class="patch">
	<metadata>
		<title>libvirglrenderer1-0.9.1-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214/" source="CVE"/>
		<reference ref_id="CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937/" source="CVE"/>
		<reference ref_id="CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957/" source="CVE"/>
		<reference ref_id="CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993/" source="CVE"/>
		<reference ref_id="CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994/" source="CVE"/>
		<reference ref_id="CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386/" source="CVE"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<reference ref_id="CVE-2019-18392" ref_url="https://www.suse.com/security/cve/CVE-2019-18392/" source="CVE"/>
		<reference ref_id="CVE-2020-8002" ref_url="https://www.suse.com/security/cve/CVE-2020-8002/" source="CVE"/>
		<reference ref_id="CVE-2020-8003" ref_url="https://www.suse.com/security/cve/CVE-2020-8003/" source="CVE"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="CVE-2022-0175" ref_url="https://www.suse.com/security/cve/CVE-2022-0175/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirglrenderer1-0.9.1-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10214">CVE-2016-10214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5937">CVE-2017-5937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5957">CVE-2017-5957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5993">CVE-2017-5993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5994">CVE-2017-5994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6386">CVE-2017-6386 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18388">CVE-2019-18388 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18389">CVE-2019-18389 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18390">CVE-2019-18390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18391">CVE-2019-18391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18392/">CVE-2019-18392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18392">CVE-2019-18392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8002/">CVE-2020-8002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8002">CVE-2020-8002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8003/">CVE-2020-8003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8003">CVE-2020-8003 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0135">CVE-2022-0135 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0175/">CVE-2022-0175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0175">CVE-2022-0175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009692273" comment="libvirglrenderer1-0.9.1-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205848" version="1" class="patch">
	<metadata>
		<title>libvirt-client-8.0.0-150400.7.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256/" source="CVE"/>
		<reference ref_id="CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="CVE-2019-10132" ref_url="https://www.suse.com/security/cve/CVE-2019-10132/" source="CVE"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="CVE-2020-10701" ref_url="https://www.suse.com/security/cve/CVE-2020-10701/" source="CVE"/>
		<reference ref_id="CVE-2020-12430" ref_url="https://www.suse.com/security/cve/CVE-2020-12430/" source="CVE"/>
		<reference ref_id="CVE-2020-14339" ref_url="https://www.suse.com/security/cve/CVE-2020-14339/" source="CVE"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="CVE-2021-3631" ref_url="https://www.suse.com/security/cve/CVE-2021-3631/" source="CVE"/>
		<reference ref_id="CVE-2021-3667" ref_url="https://www.suse.com/security/cve/CVE-2021-3667/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="CVE-2022-0897" ref_url="https://www.suse.com/security/cve/CVE-2022-0897/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-client-8.0.0-150400.7.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7823">CVE-2014-7823 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8131">CVE-2014-8131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0236">CVE-2015-0236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5247">CVE-2015-5247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5313">CVE-2015-5313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000256">CVE-2017-1000256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2635">CVE-2017-2635 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1064">CVE-2018-1064 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5748">CVE-2018-5748 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10132/">CVE-2019-10132 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10132">CVE-2019-10132 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10166">CVE-2019-10166 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10168">CVE-2019-10168 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3886">CVE-2019-3886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10701/">CVE-2020-10701 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10701">CVE-2020-10701 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12430/">CVE-2020-12430 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12430">CVE-2020-12430 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14339/">CVE-2020-14339 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14339">CVE-2020-14339 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15708">CVE-2020-15708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3631/">CVE-2021-3631 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3631">CVE-2021-3631 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3667/">CVE-2021-3667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3667">CVE-2021-3667 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4147">CVE-2021-4147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0897/">CVE-2022-0897 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0897">CVE-2022-0897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904963" comment="libvirt-client-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904964" comment="libvirt-daemon-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904965" comment="libvirt-daemon-driver-interface-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904966" comment="libvirt-daemon-driver-network-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904967" comment="libvirt-daemon-driver-nodedev-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904968" comment="libvirt-daemon-driver-nwfilter-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904969" comment="libvirt-daemon-driver-qemu-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904970" comment="libvirt-daemon-driver-secret-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904971" comment="libvirt-daemon-driver-storage-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904972" comment="libvirt-daemon-driver-storage-core-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904973" comment="libvirt-daemon-driver-storage-disk-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904974" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904975" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904976" comment="libvirt-daemon-driver-storage-logical-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904977" comment="libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904978" comment="libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904979" comment="libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904980" comment="libvirt-daemon-qemu-8.0.0-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904981" comment="libvirt-libs-8.0.0-150400.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205849" version="1" class="patch">
	<metadata>
		<title>libvmtools0-12.1.0-150300.21.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<reference ref_id="CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools0-12.1.0-150300.21.2 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5191">CVE-2015-5191 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904982" comment="libvmtools0-12.1.0-150300.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904983" comment="open-vm-tools-12.1.0-150300.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205850" version="1" class="patch">
	<metadata>
		<title>libvorbis0-1.3.6-150000.4.5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis0-1.3.6-150000.4.5.2 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14160">CVE-2017-14160 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14632">CVE-2017-14632 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14633">CVE-2017-14633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10392">CVE-2018-10392 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10393">CVE-2018-10393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009894028" comment="libvorbis0-1.3.6-150000.4.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894029" comment="libvorbisenc2-1.3.6-150000.4.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205851" version="1" class="patch">
	<metadata>
		<title>libxkbcommon0-1.3.0-150400.1.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853/" source="CVE"/>
		<reference ref_id="CVE-2018-15854" ref_url="https://www.suse.com/security/cve/CVE-2018-15854/" source="CVE"/>
		<reference ref_id="CVE-2018-15855" ref_url="https://www.suse.com/security/cve/CVE-2018-15855/" source="CVE"/>
		<reference ref_id="CVE-2018-15856" ref_url="https://www.suse.com/security/cve/CVE-2018-15856/" source="CVE"/>
		<reference ref_id="CVE-2018-15857" ref_url="https://www.suse.com/security/cve/CVE-2018-15857/" source="CVE"/>
		<reference ref_id="CVE-2018-15858" ref_url="https://www.suse.com/security/cve/CVE-2018-15858/" source="CVE"/>
		<reference ref_id="CVE-2018-15859" ref_url="https://www.suse.com/security/cve/CVE-2018-15859/" source="CVE"/>
		<reference ref_id="CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861/" source="CVE"/>
		<reference ref_id="CVE-2018-15862" ref_url="https://www.suse.com/security/cve/CVE-2018-15862/" source="CVE"/>
		<reference ref_id="CVE-2018-15863" ref_url="https://www.suse.com/security/cve/CVE-2018-15863/" source="CVE"/>
		<reference ref_id="CVE-2018-15864" ref_url="https://www.suse.com/security/cve/CVE-2018-15864/" source="CVE"/>
		<description>
These are all security issues fixed in the libxkbcommon0-1.3.0-150400.1.13 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15853">CVE-2018-15853 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15854/">CVE-2018-15854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15854">CVE-2018-15854 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15855/">CVE-2018-15855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15855">CVE-2018-15855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15856/">CVE-2018-15856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15856">CVE-2018-15856 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15857/">CVE-2018-15857 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15857">CVE-2018-15857 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15858/">CVE-2018-15858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15858">CVE-2018-15858 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15859/">CVE-2018-15859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15859">CVE-2018-15859 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15861">CVE-2018-15861 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15862/">CVE-2018-15862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15862">CVE-2018-15862 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15863/">CVE-2018-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15863">CVE-2018-15863 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15864/">CVE-2018-15864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15864">CVE-2018-15864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887954" comment="libxkbcommon0-1.3.0-150400.1.13 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205852" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.14-150400.5.13.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567/" source="CVE"/>
		<reference ref_id="CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<reference ref_id="CVE-2022-40303" ref_url="https://www.suse.com/security/cve/CVE-2022-40303/" source="CVE"/>
		<reference ref_id="CVE-2022-40304" ref_url="https://www.suse.com/security/cve/CVE-2022-40304/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.14-150400.5.13.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3660">CVE-2014-3660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1836">CVE-2016-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4483">CVE-2016-4483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0663">CVE-2017-0663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5969">CVE-2017-5969 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9047">CVE-2017-9047 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9048">CVE-2017-9048 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9049">CVE-2017-9049 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14567">CVE-2018-14567 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9251">CVE-2018-9251 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40303/">CVE-2022-40303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40304/">CVE-2022-40304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904984" comment="libxml2-2-2.9.14-150400.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904985" comment="libxml2-tools-2.9.14-150400.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904986" comment="python3-libxml2-2.9.14-150400.5.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205853" version="1" class="patch">
	<metadata>
		<title>libxslt1-1.1.34-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<reference ref_id="CVE-2021-30560" ref_url="https://www.suse.com/security/cve/CVE-2021-30560/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt1-1.1.34-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9019">CVE-2015-9019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13117">CVE-2019-13117 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13118">CVE-2019-13118 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30560/">CVE-2021-30560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742087" comment="libxslt1-1.1.34-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205854" version="1" class="patch">
	<metadata>
		<title>libyajl2-2.1.0-150000.4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2022-24795" ref_url="https://www.suse.com/security/cve/CVE-2022-24795/" source="CVE"/>
		<description>
These are all security issues fixed in the libyajl2-2.1.0-150000.4.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24795/">CVE-2022-24795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24795">CVE-2022-24795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009706239" comment="libyajl2-2.1.0-150000.4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205855" version="1" class="patch">
	<metadata>
		<title>libyaml-cpp0_6-0.6.3-150400.4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-5950" ref_url="https://www.suse.com/security/cve/CVE-2017-5950/" source="CVE"/>
		<reference ref_id="CVE-2018-20573" ref_url="https://www.suse.com/security/cve/CVE-2018-20573/" source="CVE"/>
		<reference ref_id="CVE-2018-20574" ref_url="https://www.suse.com/security/cve/CVE-2018-20574/" source="CVE"/>
		<reference ref_id="CVE-2019-6285" ref_url="https://www.suse.com/security/cve/CVE-2019-6285/" source="CVE"/>
		<reference ref_id="CVE-2019-6292" ref_url="https://www.suse.com/security/cve/CVE-2019-6292/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-cpp0_6-0.6.3-150400.4.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5950/">CVE-2017-5950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5950">CVE-2017-5950 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20573/">CVE-2018-20573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20573">CVE-2018-20573 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20574/">CVE-2018-20574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20574">CVE-2018-20574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6285/">CVE-2019-6285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6285">CVE-2019-6285 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6292/">CVE-2019-6292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6292">CVE-2019-6292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894036" comment="libyaml-cpp0_6-0.6.3-150400.4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205856" version="1" class="patch">
	<metadata>
		<title>libz1-1.2.11-150000.3.39.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
These are all security issues fixed in the libz1-1.2.11-150000.3.39.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904987" comment="libz1-1.2.11-150000.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904988" comment="zlib-devel-1.2.11-150000.3.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205857" version="1" class="patch">
	<metadata>
		<title>libzmq5-4.2.3-3.15.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-7202" ref_url="https://www.suse.com/security/cve/CVE-2014-7202/" source="CVE"/>
		<reference ref_id="CVE-2014-7203" ref_url="https://www.suse.com/security/cve/CVE-2014-7203/" source="CVE"/>
		<reference ref_id="CVE-2014-9721" ref_url="https://www.suse.com/security/cve/CVE-2014-9721/" source="CVE"/>
		<reference ref_id="CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132/" source="CVE"/>
		<reference ref_id="CVE-2019-6250" ref_url="https://www.suse.com/security/cve/CVE-2019-6250/" source="CVE"/>
		<reference ref_id="CVE-2020-15166" ref_url="https://www.suse.com/security/cve/CVE-2020-15166/" source="CVE"/>
		<description>
These are all security issues fixed in the libzmq5-4.2.3-3.15.4 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7202/">CVE-2014-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7202">CVE-2014-7202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7203/">CVE-2014-7203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7203">CVE-2014-7203 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-9721/">CVE-2014-9721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9721">CVE-2014-9721 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13132">CVE-2019-13132 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6250/">CVE-2019-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6250">CVE-2019-6250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15166/">CVE-2020-15166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15166">CVE-2020-15166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492790" comment="libzmq5-4.2.3-3.15.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205858" version="1" class="patch">
	<metadata>
		<title>libzstd1-1.5.0-150400.1.71 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-11922" ref_url="https://www.suse.com/security/cve/CVE-2019-11922/" source="CVE"/>
		<description>
These are all security issues fixed in the libzstd1-1.5.0-150400.1.71 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11922/">CVE-2019-11922 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11922">CVE-2019-11922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009887964" comment="libzstd1-1.5.0-150400.1.71 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887966" comment="zstd-1.5.0-150400.1.71 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205859" version="1" class="patch">
	<metadata>
		<title>libzypp-17.31.2-150400.3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435/" source="CVE"/>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2017-9271" ref_url="https://www.suse.com/security/cve/CVE-2017-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<description>
These are all security issues fixed in the libzypp-17.31.2-150400.3.9.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7435">CVE-2017-7435 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7436">CVE-2017-7436 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9269">CVE-2017-9269 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9271/">CVE-2017-9271 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9271">CVE-2017-9271 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7685">CVE-2018-7685 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18900">CVE-2019-18900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904989" comment="libzypp-17.31.2-150400.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205860" version="1" class="patch">
	<metadata>
		<title>login_defs-4.8.1-150400.1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169/" source="CVE"/>
		<description>
These are all security issues fixed in the login_defs-4.8.1-150400.1.7 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7169">CVE-2018-7169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904990" comment="login_defs-4.8.1-150400.1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904991" comment="shadow-4.8.1-150400.1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205861" version="1" class="patch">
	<metadata>
		<title>logrotate-3.18.1-150400.3.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-3864" ref_url="https://www.suse.com/security/cve/CVE-2021-3864/" source="CVE"/>
		<reference ref_id="CVE-2022-1348" ref_url="https://www.suse.com/security/cve/CVE-2022-1348/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.18.1-150400.3.7.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3864/">CVE-2021-3864 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3864">CVE-2021-3864 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1348/">CVE-2022-1348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1348">CVE-2022-1348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009698915" comment="logrotate-3.18.1-150400.3.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205862" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-4.34.1-150000.3.26.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-4.34.1-150000.3.26.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894039" comment="mozilla-nspr-4.34.1-150000.3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205863" version="1" class="patch">
	<metadata>
		<title>nfs-client-2.1.1-150100.10.27.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<description>
These are all security issues fixed in the nfs-client-2.1.1-150100.10.27.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3689">CVE-2019-3689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904992" comment="nfs-client-2.1.1-150100.10.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904993" comment="nfs-kernel-server-2.1.1-150100.10.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205864" version="1" class="patch">
	<metadata>
		<title>opensc-0.22.0-150400.1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16420" ref_url="https://www.suse.com/security/cve/CVE-2018-16420/" source="CVE"/>
		<reference ref_id="CVE-2018-16421" ref_url="https://www.suse.com/security/cve/CVE-2018-16421/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16424" ref_url="https://www.suse.com/security/cve/CVE-2018-16424/" source="CVE"/>
		<reference ref_id="CVE-2018-16425" ref_url="https://www.suse.com/security/cve/CVE-2018-16425/" source="CVE"/>
		<reference ref_id="CVE-2018-16426" ref_url="https://www.suse.com/security/cve/CVE-2018-16426/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<reference ref_id="CVE-2019-15945" ref_url="https://www.suse.com/security/cve/CVE-2019-15945/" source="CVE"/>
		<reference ref_id="CVE-2019-15946" ref_url="https://www.suse.com/security/cve/CVE-2019-15946/" source="CVE"/>
		<reference ref_id="CVE-2019-19479" ref_url="https://www.suse.com/security/cve/CVE-2019-19479/" source="CVE"/>
		<reference ref_id="CVE-2019-19480" ref_url="https://www.suse.com/security/cve/CVE-2019-19480/" source="CVE"/>
		<reference ref_id="CVE-2019-20792" ref_url="https://www.suse.com/security/cve/CVE-2019-20792/" source="CVE"/>
		<reference ref_id="CVE-2019-6502" ref_url="https://www.suse.com/security/cve/CVE-2019-6502/" source="CVE"/>
		<reference ref_id="CVE-2020-26570" ref_url="https://www.suse.com/security/cve/CVE-2020-26570/" source="CVE"/>
		<reference ref_id="CVE-2020-26571" ref_url="https://www.suse.com/security/cve/CVE-2020-26571/" source="CVE"/>
		<reference ref_id="CVE-2020-26572" ref_url="https://www.suse.com/security/cve/CVE-2020-26572/" source="CVE"/>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.22.0-150400.1.7 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16391">CVE-2018-16391 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16392">CVE-2018-16392 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16393">CVE-2018-16393 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16418">CVE-2018-16418 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16419">CVE-2018-16419 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16420/">CVE-2018-16420 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16420">CVE-2018-16420 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16421/">CVE-2018-16421 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16421">CVE-2018-16421 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16422">CVE-2018-16422 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16423">CVE-2018-16423 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16424/">CVE-2018-16424 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16424">CVE-2018-16424 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16425/">CVE-2018-16425 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16425">CVE-2018-16425 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16426/">CVE-2018-16426 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16426">CVE-2018-16426 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16427">CVE-2018-16427 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15945/">CVE-2019-15945 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15945">CVE-2019-15945 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15946/">CVE-2019-15946 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15946">CVE-2019-15946 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19479/">CVE-2019-19479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19479">CVE-2019-19479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19480/">CVE-2019-19480 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19480">CVE-2019-19480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20792/">CVE-2019-20792 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20792">CVE-2019-20792 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6502/">CVE-2019-6502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6502">CVE-2019-6502 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26570/">CVE-2020-26570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26570">CVE-2020-26570 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26571/">CVE-2020-26571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26571">CVE-2020-26571 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26572/">CVE-2020-26572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26572">CVE-2020-26572 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42779">CVE-2021-42779 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42780">CVE-2021-42780 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42781">CVE-2021-42781 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42782">CVE-2021-42782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887977" comment="opensc-0.22.0-150400.1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205865" version="1" class="patch">
	<metadata>
		<title>openslp-2.0.0-6.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-2.0.0-6.15.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4912">CVE-2016-4912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7567">CVE-2016-7567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887097" comment="openslp-2.0.0-6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205866" version="1" class="patch">
	<metadata>
		<title>openssh-8.4p1-150300.3.15.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="CVE-2021-28041" ref_url="https://www.suse.com/security/cve/CVE-2021-28041/" source="CVE"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-8.4p1-150300.3.15.4 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0777">CVE-2016-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0778">CVE-2016-0778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10009">CVE-2016-10009 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10010">CVE-2016-10010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10011">CVE-2016-10011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10012">CVE-2016-10012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8858">CVE-2016-8858 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6110">CVE-2019-6110 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28041/">CVE-2021-28041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28041">CVE-2021-28041 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904994" comment="openssh-8.4p1-150300.3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904995" comment="openssh-clients-8.4p1-150300.3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904996" comment="openssh-common-8.4p1-150300.3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904997" comment="openssh-fips-8.4p1-150300.3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904998" comment="openssh-server-8.4p1-150300.3.15.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205867" version="1" class="patch">
	<metadata>
		<title>openssl-1.1.1l-150400.1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<description>
These are all security issues fixed in the openssl-1.1.1l-150400.1.5 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3569">CVE-2014-3569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1793">CVE-2015-1793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1794">CVE-2015-1794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3193">CVE-2015-3193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3196">CVE-2015-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0701">CVE-2016-0701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0798">CVE-2016-0798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2176">CVE-2016-2176 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7052">CVE-2016-7052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7055">CVE-2016-7055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3732">CVE-2017-3732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887798" comment="openssl-1.1.1l-150400.1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205868" version="1" class="patch">
	<metadata>
		<title>pam-1.3.0-150000.6.61.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<reference ref_id="CVE-2018-17953" ref_url="https://www.suse.com/security/cve/CVE-2018-17953/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.3.0-150000.6.61.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3238">CVE-2015-3238 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17953/">CVE-2018-17953 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17953">CVE-2018-17953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894415" comment="pam-1.3.0-150000.6.61.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205869" version="1" class="patch">
	<metadata>
		<title>pam_u2f-1.2.0-150400.2.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-12209" ref_url="https://www.suse.com/security/cve/CVE-2019-12209/" source="CVE"/>
		<reference ref_id="CVE-2019-12210" ref_url="https://www.suse.com/security/cve/CVE-2019-12210/" source="CVE"/>
		<reference ref_id="CVE-2021-31924" ref_url="https://www.suse.com/security/cve/CVE-2021-31924/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_u2f-1.2.0-150400.2.4 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12209/">CVE-2019-12209 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12209">CVE-2019-12209 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12210/">CVE-2019-12210 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12210">CVE-2019-12210 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31924/">CVE-2021-31924 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31924">CVE-2021-31924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887981" comment="pam_u2f-1.2.0-150400.2.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205870" version="1" class="patch">
	<metadata>
		<title>perl-5.26.1-150300.17.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837/" source="CVE"/>
		<reference ref_id="CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883/" source="CVE"/>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="CVE-2018-18312" ref_url="https://www.suse.com/security/cve/CVE-2018-18312/" source="CVE"/>
		<reference ref_id="CVE-2018-18313" ref_url="https://www.suse.com/security/cve/CVE-2018-18313/" source="CVE"/>
		<reference ref_id="CVE-2018-18314" ref_url="https://www.suse.com/security/cve/CVE-2018-18314/" source="CVE"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-5.26.1-150300.17.11.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12837">CVE-2017-12837 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12883">CVE-2017-12883 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6512">CVE-2017-6512 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12015">CVE-2018-12015 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18312/">CVE-2018-18312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18312">CVE-2018-18312 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18313/">CVE-2018-18313 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18313">CVE-2018-18313 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18314/">CVE-2018-18314 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18314">CVE-2018-18314 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009710215" comment="perl-5.26.1-150300.17.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009710216" comment="perl-base-5.26.1-150300.17.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205871" version="1" class="patch">
	<metadata>
		<title>perl-ExtUtils-MakeMaker-7.62-150400.1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-ExtUtils-MakeMaker-7.62-150400.1.5 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887202" comment="perl-ExtUtils-MakeMaker-7.62-150400.1.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205872" version="1" class="patch">
	<metadata>
		<title>permissions-20201225-150400.5.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-3687" ref_url="https://www.suse.com/security/cve/CVE-2019-3687/" source="CVE"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<reference ref_id="CVE-2020-8025" ref_url="https://www.suse.com/security/cve/CVE-2020-8025/" source="CVE"/>
		<reference ref_id="CVE-2022-31252" ref_url="https://www.suse.com/security/cve/CVE-2022-31252/" source="CVE"/>
		<description>
These are all security issues fixed in the permissions-20201225-150400.5.16.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3687/">CVE-2019-3687 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3687">CVE-2019-3687 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3688">CVE-2019-3688 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8025/">CVE-2020-8025 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8025">CVE-2020-8025 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31252/">CVE-2022-31252 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31252">CVE-2022-31252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894555" comment="permissions-20201225-150400.5.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205873" version="1" class="patch">
	<metadata>
		<title>podman-4.3.1-150400.4.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-10856" ref_url="https://www.suse.com/security/cve/CVE-2018-10856/" source="CVE"/>
		<reference ref_id="CVE-2019-10152" ref_url="https://www.suse.com/security/cve/CVE-2019-10152/" source="CVE"/>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<reference ref_id="CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370/" source="CVE"/>
		<reference ref_id="CVE-2020-1726" ref_url="https://www.suse.com/security/cve/CVE-2020-1726/" source="CVE"/>
		<reference ref_id="CVE-2021-20199" ref_url="https://www.suse.com/security/cve/CVE-2021-20199/" source="CVE"/>
		<reference ref_id="CVE-2021-20206" ref_url="https://www.suse.com/security/cve/CVE-2021-20206/" source="CVE"/>
		<reference ref_id="CVE-2021-4024" ref_url="https://www.suse.com/security/cve/CVE-2021-4024/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<reference ref_id="CVE-2022-1227" ref_url="https://www.suse.com/security/cve/CVE-2022-1227/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-27649" ref_url="https://www.suse.com/security/cve/CVE-2022-27649/" source="CVE"/>
		<reference ref_id="CVE-2022-2989" ref_url="https://www.suse.com/security/cve/CVE-2022-2989/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-4.3.1-150400.4.11.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10856/">CVE-2018-10856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10856">CVE-2018-10856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10152/">CVE-2019-10152 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10152">CVE-2019-10152 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10214">CVE-2019-10214 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14370">CVE-2020-14370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1726/">CVE-2020-1726 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1726">CVE-2020-1726 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20199/">CVE-2021-20199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20199">CVE-2021-20199 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20206/">CVE-2021-20206 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20206">CVE-2021-20206 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4024/">CVE-2021-4024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4024">CVE-2021-4024 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1227/">CVE-2022-1227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1227">CVE-2022-1227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27649/">CVE-2022-27649 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27649">CVE-2022-27649 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2989/">CVE-2022-2989 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2989">CVE-2022-2989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009730195" comment="podman-4.3.1-150400.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904999" comment="podman-cni-config-4.3.1-150400.4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205874" version="1" class="patch">
	<metadata>
		<title>policycoreutils-3.4-150400.1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<description>
These are all security issues fixed in the policycoreutils-3.4-150400.1.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7545">CVE-2016-7545 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1063">CVE-2018-1063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905000" comment="policycoreutils-3.4-150400.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905001" comment="policycoreutils-devel-3.4-150400.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905002" comment="policycoreutils-python-utils-3.4-150400.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905003" comment="python3-policycoreutils-3.4-150400.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205875" version="1" class="patch">
	<metadata>
		<title>powerpc-utils-1.3.10-150400.19.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040/" source="CVE"/>
		<description>
These are all security issues fixed in the powerpc-utils-1.3.10-150400.19.9.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4040">CVE-2014-4040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905004" comment="powerpc-utils-1.3.10-150400.19.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205876" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.7-150000.5.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.7-150000.5.8.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3310">CVE-2015-3310 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905005" comment="ppp-2.4.7-150000.5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205877" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-2.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-2.34 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3618">CVE-2014-3618 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16844">CVE-2017-16844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882450" comment="procmail-3.22-2.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205878" version="1" class="patch">
	<metadata>
		<title>python3-Babel-2.8.0-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-Babel-2.8.0-3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42771">CVE-2021-42771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887995" comment="python3-Babel-2.8.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205879" version="1" class="patch">
	<metadata>
		<title>python3-Jinja2-2.10.1-3.10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745/" source="CVE"/>
		<reference ref_id="CVE-2019-10906" ref_url="https://www.suse.com/security/cve/CVE-2019-10906/" source="CVE"/>
		<reference ref_id="CVE-2019-8341" ref_url="https://www.suse.com/security/cve/CVE-2019-8341/" source="CVE"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-Jinja2-2.10.1-3.10.2 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10745">CVE-2016-10745 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-10906/">CVE-2019-10906 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10906">CVE-2019-10906 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8341/">CVE-2019-8341 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8341">CVE-2019-8341 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882454" comment="python3-Jinja2-2.10.1-3.10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205880" version="1" class="patch">
	<metadata>
		<title>python3-M2Crypto-0.38.0-150400.3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-25657" ref_url="https://www.suse.com/security/cve/CVE-2020-25657/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-M2Crypto-0.38.0-150400.3.6.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25657/">CVE-2020-25657 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25657">CVE-2020-25657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009704357" comment="python3-M2Crypto-0.38.0-150400.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205881" version="1" class="patch">
	<metadata>
		<title>python3-PyYAML-5.4.1-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342/" source="CVE"/>
		<reference ref_id="CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-PyYAML-5.4.1-1.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">CVE-2017-18342 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882455" comment="python3-PyYAML-5.4.1-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205882" version="1" class="patch">
	<metadata>
		<title>python3-certifi-2018.1.18-150000.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2022-23491" ref_url="https://www.suse.com/security/cve/CVE-2022-23491/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-certifi-2018.1.18-150000.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23491/">CVE-2022-23491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23491">CVE-2022-23491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894054" comment="python3-certifi-2018.1.18-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205883" version="1" class="patch">
	<metadata>
		<title>python3-cryptography-3.3.2-150400.16.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-cryptography-3.3.2-150400.16.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009699740" comment="python3-cryptography-3.3.2-150400.16.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205884" version="1" class="patch">
	<metadata>
		<title>python3-future-0.18.2-150300.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2022-40899" ref_url="https://www.suse.com/security/cve/CVE-2022-40899/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-future-0.18.2-150300.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40899/">CVE-2022-40899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40899">CVE-2022-40899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894055" comment="python3-future-0.18.2-150300.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205885" version="1" class="patch">
	<metadata>
		<title>python3-lxml-4.7.1-150200.3.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="CVE-2022-2309" ref_url="https://www.suse.com/security/cve/CVE-2022-2309/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-lxml-4.7.1-150200.3.10.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19787">CVE-2018-19787 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27783">CVE-2020-27783 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43818">CVE-2021-43818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2309/">CVE-2022-2309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009707544" comment="python3-lxml-4.7.1-150200.3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205886" version="1" class="patch">
	<metadata>
		<title>python3-py-1.10.0-150100.5.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<reference ref_id="CVE-2022-42969" ref_url="https://www.suse.com/security/cve/CVE-2022-42969/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-py-1.10.0-150100.5.12.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29651">CVE-2020-29651 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42969/">CVE-2022-42969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42969">CVE-2022-42969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894059" comment="python3-py-1.10.0-150100.5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205887" version="1" class="patch">
	<metadata>
		<title>python3-requests-2.24.0-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-requests-2.24.0-1.24 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882466" comment="python3-requests-2.24.0-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205888" version="1" class="patch">
	<metadata>
		<title>python3-rsa-3.4.2-150000.3.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757/" source="CVE"/>
		<reference ref_id="CVE-2020-25658" ref_url="https://www.suse.com/security/cve/CVE-2020-25658/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-rsa-3.4.2-150000.3.7.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13757">CVE-2020-13757 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25658/">CVE-2020-25658 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25658">CVE-2020-25658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894060" comment="python3-rsa-3.4.2-150000.3.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205889" version="1" class="patch">
	<metadata>
		<title>python3-salt-3004-150400.8.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-1866" ref_url="https://www.suse.com/security/cve/CVE-2016-1866/" source="CVE"/>
		<reference ref_id="CVE-2016-9639" ref_url="https://www.suse.com/security/cve/CVE-2016-9639/" source="CVE"/>
		<reference ref_id="CVE-2017-12791" ref_url="https://www.suse.com/security/cve/CVE-2017-12791/" source="CVE"/>
		<reference ref_id="CVE-2017-14695" ref_url="https://www.suse.com/security/cve/CVE-2017-14695/" source="CVE"/>
		<reference ref_id="CVE-2017-14696" ref_url="https://www.suse.com/security/cve/CVE-2017-14696/" source="CVE"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="CVE-2019-17361" ref_url="https://www.suse.com/security/cve/CVE-2019-17361/" source="CVE"/>
		<reference ref_id="CVE-2019-18897" ref_url="https://www.suse.com/security/cve/CVE-2019-18897/" source="CVE"/>
		<reference ref_id="CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651/" source="CVE"/>
		<reference ref_id="CVE-2020-11652" ref_url="https://www.suse.com/security/cve/CVE-2020-11652/" source="CVE"/>
		<reference ref_id="CVE-2020-16846" ref_url="https://www.suse.com/security/cve/CVE-2020-16846/" source="CVE"/>
		<reference ref_id="CVE-2020-17490" ref_url="https://www.suse.com/security/cve/CVE-2020-17490/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="CVE-2020-28243" ref_url="https://www.suse.com/security/cve/CVE-2020-28243/" source="CVE"/>
		<reference ref_id="CVE-2020-28972" ref_url="https://www.suse.com/security/cve/CVE-2020-28972/" source="CVE"/>
		<reference ref_id="CVE-2020-35662" ref_url="https://www.suse.com/security/cve/CVE-2020-35662/" source="CVE"/>
		<reference ref_id="CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996/" source="CVE"/>
		<reference ref_id="CVE-2021-25281" ref_url="https://www.suse.com/security/cve/CVE-2021-25281/" source="CVE"/>
		<reference ref_id="CVE-2021-25282" ref_url="https://www.suse.com/security/cve/CVE-2021-25282/" source="CVE"/>
		<reference ref_id="CVE-2021-25283" ref_url="https://www.suse.com/security/cve/CVE-2021-25283/" source="CVE"/>
		<reference ref_id="CVE-2021-25284" ref_url="https://www.suse.com/security/cve/CVE-2021-25284/" source="CVE"/>
		<reference ref_id="CVE-2021-25315" ref_url="https://www.suse.com/security/cve/CVE-2021-25315/" source="CVE"/>
		<reference ref_id="CVE-2021-3144" ref_url="https://www.suse.com/security/cve/CVE-2021-3144/" source="CVE"/>
		<reference ref_id="CVE-2021-3148" ref_url="https://www.suse.com/security/cve/CVE-2021-3148/" source="CVE"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<reference ref_id="CVE-2021-3197" ref_url="https://www.suse.com/security/cve/CVE-2021-3197/" source="CVE"/>
		<reference ref_id="CVE-2022-22934" ref_url="https://www.suse.com/security/cve/CVE-2022-22934/" source="CVE"/>
		<reference ref_id="CVE-2022-22935" ref_url="https://www.suse.com/security/cve/CVE-2022-22935/" source="CVE"/>
		<reference ref_id="CVE-2022-22936" ref_url="https://www.suse.com/security/cve/CVE-2022-22936/" source="CVE"/>
		<reference ref_id="CVE-2022-22941" ref_url="https://www.suse.com/security/cve/CVE-2022-22941/" source="CVE"/>
		<reference ref_id="CVE-2022-22967" ref_url="https://www.suse.com/security/cve/CVE-2022-22967/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-salt-3004-150400.8.20.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1866/">CVE-2016-1866 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1866">CVE-2016-1866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9639/">CVE-2016-9639 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9639">CVE-2016-9639 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12791/">CVE-2017-12791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12791">CVE-2017-12791 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14695/">CVE-2017-14695 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14695">CVE-2017-14695 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14696/">CVE-2017-14696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14696">CVE-2017-14696 at NVD</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15750">CVE-2018-15750 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15751">CVE-2018-15751 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17361/">CVE-2019-17361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17361">CVE-2019-17361 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18897/">CVE-2019-18897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18897">CVE-2019-18897 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11651">CVE-2020-11651 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11652/">CVE-2020-11652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11652">CVE-2020-11652 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16846/">CVE-2020-16846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16846">CVE-2020-16846 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17490/">CVE-2020-17490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17490">CVE-2020-17490 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25592">CVE-2020-25592 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28243/">CVE-2020-28243 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28243">CVE-2020-28243 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28972/">CVE-2020-28972 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28972">CVE-2020-28972 at NVD</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-35662/">CVE-2020-35662 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35662">CVE-2020-35662 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21996">CVE-2021-21996 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25281/">CVE-2021-25281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25281">CVE-2021-25281 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25282/">CVE-2021-25282 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25282">CVE-2021-25282 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25283/">CVE-2021-25283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25283">CVE-2021-25283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25284/">CVE-2021-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25284">CVE-2021-25284 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25315/">CVE-2021-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25315">CVE-2021-25315 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3144/">CVE-2021-3144 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3144">CVE-2021-3144 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3148/">CVE-2021-3148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3148">CVE-2021-3148 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31607">CVE-2021-31607 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3197/">CVE-2021-3197 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3197">CVE-2021-3197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22934/">CVE-2022-22934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22934">CVE-2022-22934 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22935/">CVE-2022-22935 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22935">CVE-2022-22935 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22936/">CVE-2022-22936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22936">CVE-2022-22936 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22941/">CVE-2022-22941 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22941">CVE-2022-22941 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22967/">CVE-2022-22967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22967">CVE-2022-22967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905006" comment="python3-salt-3004-150400.8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905007" comment="salt-3004-150400.8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905008" comment="salt-minion-3004-150400.8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905009" comment="salt-transactional-update-3004-150400.8.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205890" version="1" class="patch">
	<metadata>
		<title>python3-setuptools-44.1.1-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-setuptools-44.1.1-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905010" comment="python3-setuptools-44.1.1-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205891" version="1" class="patch">
	<metadata>
		<title>python3-urllib3-1.25.10-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-urllib3-1.25.10-4.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33503">CVE-2021-33503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009888020" comment="python3-urllib3-1.25.10-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205892" version="1" class="patch">
	<metadata>
		<title>qemu-6.2.0-150400.37.8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845/" source="CVE"/>
		<reference ref_id="CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9923" ref_url="https://www.suse.com/security/cve/CVE-2016-9923/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15118" ref_url="https://www.suse.com/security/cve/CVE-2017-15118/" source="CVE"/>
		<reference ref_id="CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987/" source="CVE"/>
		<reference ref_id="CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-16847" ref_url="https://www.suse.com/security/cve/CVE-2018-16847/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-20123" ref_url="https://www.suse.com/security/cve/CVE-2018-20123/" source="CVE"/>
		<reference ref_id="CVE-2018-20124" ref_url="https://www.suse.com/security/cve/CVE-2018-20124/" source="CVE"/>
		<reference ref_id="CVE-2018-20125" ref_url="https://www.suse.com/security/cve/CVE-2018-20125/" source="CVE"/>
		<reference ref_id="CVE-2018-20126" ref_url="https://www.suse.com/security/cve/CVE-2018-20126/" source="CVE"/>
		<reference ref_id="CVE-2018-20191" ref_url="https://www.suse.com/security/cve/CVE-2018-20191/" source="CVE"/>
		<reference ref_id="CVE-2018-20216" ref_url="https://www.suse.com/security/cve/CVE-2018-20216/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-5008" ref_url="https://www.suse.com/security/cve/CVE-2019-5008/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="CVE-2020-10702" ref_url="https://www.suse.com/security/cve/CVE-2020-10702/" source="CVE"/>
		<reference ref_id="CVE-2020-10717" ref_url="https://www.suse.com/security/cve/CVE-2020-10717/" source="CVE"/>
		<reference ref_id="CVE-2020-10761" ref_url="https://www.suse.com/security/cve/CVE-2020-10761/" source="CVE"/>
		<reference ref_id="CVE-2020-11102" ref_url="https://www.suse.com/security/cve/CVE-2020-11102/" source="CVE"/>
		<reference ref_id="CVE-2020-11869" ref_url="https://www.suse.com/security/cve/CVE-2020-11869/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13800" ref_url="https://www.suse.com/security/cve/CVE-2020-13800/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-17380" ref_url="https://www.suse.com/security/cve/CVE-2020-17380/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-24352" ref_url="https://www.suse.com/security/cve/CVE-2020-24352/" source="CVE"/>
		<reference ref_id="CVE-2020-25085" ref_url="https://www.suse.com/security/cve/CVE-2020-25085/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27821" ref_url="https://www.suse.com/security/cve/CVE-2020-27821/" source="CVE"/>
		<reference ref_id="CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-20263" ref_url="https://www.suse.com/security/cve/CVE-2021-20263/" source="CVE"/>
		<reference ref_id="CVE-2021-3409" ref_url="https://www.suse.com/security/cve/CVE-2021-3409/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3544" ref_url="https://www.suse.com/security/cve/CVE-2021-3544/" source="CVE"/>
		<reference ref_id="CVE-2021-3545" ref_url="https://www.suse.com/security/cve/CVE-2021-3545/" source="CVE"/>
		<reference ref_id="CVE-2021-3546" ref_url="https://www.suse.com/security/cve/CVE-2021-3546/" source="CVE"/>
		<reference ref_id="CVE-2021-3582" ref_url="https://www.suse.com/security/cve/CVE-2021-3582/" source="CVE"/>
		<reference ref_id="CVE-2021-3607" ref_url="https://www.suse.com/security/cve/CVE-2021-3607/" source="CVE"/>
		<reference ref_id="CVE-2021-3608" ref_url="https://www.suse.com/security/cve/CVE-2021-3608/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<reference ref_id="CVE-2021-3929" ref_url="https://www.suse.com/security/cve/CVE-2021-3929/" source="CVE"/>
		<reference ref_id="CVE-2021-4158" ref_url="https://www.suse.com/security/cve/CVE-2021-4158/" source="CVE"/>
		<reference ref_id="CVE-2021-4206" ref_url="https://www.suse.com/security/cve/CVE-2021-4206/" source="CVE"/>
		<reference ref_id="CVE-2021-4207" ref_url="https://www.suse.com/security/cve/CVE-2021-4207/" source="CVE"/>
		<reference ref_id="CVE-2022-0216" ref_url="https://www.suse.com/security/cve/CVE-2022-0216/" source="CVE"/>
		<reference ref_id="CVE-2022-0358" ref_url="https://www.suse.com/security/cve/CVE-2022-0358/" source="CVE"/>
		<reference ref_id="CVE-2022-26353" ref_url="https://www.suse.com/security/cve/CVE-2022-26353/" source="CVE"/>
		<reference ref_id="CVE-2022-26354" ref_url="https://www.suse.com/security/cve/CVE-2022-26354/" source="CVE"/>
		<reference ref_id="CVE-2022-35414" ref_url="https://www.suse.com/security/cve/CVE-2022-35414/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-6.2.0-150400.37.8.2 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0223">CVE-2014-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3461">CVE-2014-3461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7840">CVE-2014-7840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5225">CVE-2015-5225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5279">CVE-2015-5279 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5745">CVE-2015-5745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7295">CVE-2015-7295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7549">CVE-2015-7549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8567">CVE-2015-8567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8568">CVE-2015-8568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8613">CVE-2015-8613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8619">CVE-2015-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8744">CVE-2015-8744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8745">CVE-2015-8745 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10028">CVE-2016-10028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10155">CVE-2016-10155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1922">CVE-2016-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2198">CVE-2016-2198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4020">CVE-2016-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4453">CVE-2016-4453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4454">CVE-2016-4454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4952">CVE-2016-4952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4964">CVE-2016-4964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5105">CVE-2016-5105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5106">CVE-2016-5106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5107">CVE-2016-5107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5126">CVE-2016-5126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5337">CVE-2016-5337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6490">CVE-2016-6490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6833">CVE-2016-6833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6836">CVE-2016-6836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6888">CVE-2016-6888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7116">CVE-2016-7116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7155">CVE-2016-7155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7156">CVE-2016-7156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7157">CVE-2016-7157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7161">CVE-2016-7161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7170">CVE-2016-7170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7421">CVE-2016-7421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7422">CVE-2016-7422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7423">CVE-2016-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7466">CVE-2016-7466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7907">CVE-2016-7907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7994">CVE-2016-7994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7995">CVE-2016-7995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8576">CVE-2016-8576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8577">CVE-2016-8577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8578">CVE-2016-8578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8668">CVE-2016-8668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8909">CVE-2016-8909 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9101">CVE-2016-9101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9102">CVE-2016-9102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9103">CVE-2016-9103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9104">CVE-2016-9104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9105">CVE-2016-9105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9106">CVE-2016-9106 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9602">CVE-2016-9602 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9776">CVE-2016-9776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9845">CVE-2016-9845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9846">CVE-2016-9846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9907">CVE-2016-9907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9908">CVE-2016-9908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9911">CVE-2016-9911 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9912">CVE-2016-9912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9913">CVE-2016-9913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9923/">CVE-2016-9923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9923">CVE-2016-9923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10806">CVE-2017-10806 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11334">CVE-2017-11334 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13673">CVE-2017-13673 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13711">CVE-2017-13711 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14167">CVE-2017-14167 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15038">CVE-2017-15038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15118/">CVE-2017-15118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15118">CVE-2017-15118 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15119">CVE-2017-15119 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15268">CVE-2017-15268 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2630">CVE-2017-2630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2633">CVE-2017-2633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5525">CVE-2017-5525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5526">CVE-2017-5526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5552">CVE-2017-5552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5578">CVE-2017-5578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5579">CVE-2017-5579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5667">CVE-2017-5667 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5856">CVE-2017-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5857">CVE-2017-5857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5931">CVE-2017-5931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5973">CVE-2017-5973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5987">CVE-2017-5987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6058">CVE-2017-6058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7471">CVE-2017-7471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7493">CVE-2017-7493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8112">CVE-2017-8112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8379">CVE-2017-8379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8380">CVE-2017-8380 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9503">CVE-2017-9503 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9524">CVE-2017-9524 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10839">CVE-2018-10839 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12617">CVE-2018-12617 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15746">CVE-2018-15746 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16847/">CVE-2018-16847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16847">CVE-2018-16847 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16872">CVE-2018-16872 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17958">CVE-2018-17958 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17962">CVE-2018-17962 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20123/">CVE-2018-20123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20123">CVE-2018-20123 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20124/">CVE-2018-20124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20124">CVE-2018-20124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20125/">CVE-2018-20125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20125">CVE-2018-20125 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20126/">CVE-2018-20126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20126">CVE-2018-20126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20191/">CVE-2018-20191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20191">CVE-2018-20191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20216/">CVE-2018-20216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20216">CVE-2018-20216 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7858">CVE-2018-7858 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13164">CVE-2019-13164 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5008/">CVE-2019-5008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5008">CVE-2019-5008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8934">CVE-2019-8934 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10702/">CVE-2020-10702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10702">CVE-2020-10702 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10717/">CVE-2020-10717 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10717">CVE-2020-10717 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10761/">CVE-2020-10761 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10761">CVE-2020-10761 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11102/">CVE-2020-11102 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11102">CVE-2020-11102 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11869/">CVE-2020-11869 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11869">CVE-2020-11869 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13659">CVE-2020-13659 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13800/">CVE-2020-13800 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13800">CVE-2020-13800 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1711">CVE-2020-1711 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-17380/">CVE-2020-17380 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17380">CVE-2020-17380 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24352/">CVE-2020-24352 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24352">CVE-2020-24352 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25085/">CVE-2020-25085 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25085">CVE-2020-25085 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27821/">CVE-2020-27821 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27821">CVE-2020-27821 at NVD</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29129">CVE-2020-29129 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35503">CVE-2020-35503 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20263/">CVE-2021-20263 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20263">CVE-2021-20263 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3409/">CVE-2021-3409 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3409">CVE-2021-3409 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3527">CVE-2021-3527 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3544/">CVE-2021-3544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3544">CVE-2021-3544 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3545/">CVE-2021-3545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3545">CVE-2021-3545 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3546/">CVE-2021-3546 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3546">CVE-2021-3546 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3582/">CVE-2021-3582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3582">CVE-2021-3582 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3607/">CVE-2021-3607 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3607">CVE-2021-3607 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3608/">CVE-2021-3608 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3608">CVE-2021-3608 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3682">CVE-2021-3682 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3748">CVE-2021-3748 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3929/">CVE-2021-3929 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3929">CVE-2021-3929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4158/">CVE-2021-4158 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4158">CVE-2021-4158 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4206/">CVE-2021-4206 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4206">CVE-2021-4206 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4207/">CVE-2021-4207 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4207">CVE-2021-4207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0216/">CVE-2022-0216 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0216">CVE-2022-0216 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0358/">CVE-2022-0358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0358">CVE-2022-0358 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26353/">CVE-2022-26353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26353">CVE-2022-26353 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-26354/">CVE-2022-26354 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26354">CVE-2022-26354 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35414/">CVE-2022-35414 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35414">CVE-2022-35414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717082" comment="qemu-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905011" comment="qemu-SLOF-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717438" comment="qemu-accel-tcg-x86-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717439" comment="qemu-arm-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717443" comment="qemu-audio-spice-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717447" comment="qemu-chardev-spice-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717095" comment="qemu-guest-agent-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717449" comment="qemu-hw-display-qxl-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717450" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717452" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717454" comment="qemu-hw-usb-redirect-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905012" comment="qemu-ipxe-1.0.0+-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717459" comment="qemu-ppc-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717460" comment="qemu-s390x-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905013" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905014" comment="qemu-sgabios-8-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717081" comment="qemu-tools-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717463" comment="qemu-ui-opengl-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717465" comment="qemu-ui-spice-core-6.2.0-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905015" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717467" comment="qemu-x86-6.2.0-150400.37.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205893" version="1" class="patch">
	<metadata>
		<title>qemu-ovmf-x86_64-202202-150400.5.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-5731" ref_url="https://www.suse.com/security/cve/CVE-2017-5731/" source="CVE"/>
		<reference ref_id="CVE-2017-5732" ref_url="https://www.suse.com/security/cve/CVE-2017-5732/" source="CVE"/>
		<reference ref_id="CVE-2017-5733" ref_url="https://www.suse.com/security/cve/CVE-2017-5733/" source="CVE"/>
		<reference ref_id="CVE-2017-5734" ref_url="https://www.suse.com/security/cve/CVE-2017-5734/" source="CVE"/>
		<reference ref_id="CVE-2017-5735" ref_url="https://www.suse.com/security/cve/CVE-2017-5735/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2018-12178" ref_url="https://www.suse.com/security/cve/CVE-2018-12178/" source="CVE"/>
		<reference ref_id="CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180/" source="CVE"/>
		<reference ref_id="CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181/" source="CVE"/>
		<reference ref_id="CVE-2018-3613" ref_url="https://www.suse.com/security/cve/CVE-2018-3613/" source="CVE"/>
		<reference ref_id="CVE-2018-3630" ref_url="https://www.suse.com/security/cve/CVE-2018-3630/" source="CVE"/>
		<reference ref_id="CVE-2019-0160" ref_url="https://www.suse.com/security/cve/CVE-2019-0160/" source="CVE"/>
		<reference ref_id="CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161/" source="CVE"/>
		<reference ref_id="CVE-2019-14553" ref_url="https://www.suse.com/security/cve/CVE-2019-14553/" source="CVE"/>
		<reference ref_id="CVE-2019-14558" ref_url="https://www.suse.com/security/cve/CVE-2019-14558/" source="CVE"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562/" source="CVE"/>
		<reference ref_id="CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563/" source="CVE"/>
		<reference ref_id="CVE-2019-14575" ref_url="https://www.suse.com/security/cve/CVE-2019-14575/" source="CVE"/>
		<reference ref_id="CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584/" source="CVE"/>
		<reference ref_id="CVE-2019-14586" ref_url="https://www.suse.com/security/cve/CVE-2019-14586/" source="CVE"/>
		<reference ref_id="CVE-2019-14587" ref_url="https://www.suse.com/security/cve/CVE-2019-14587/" source="CVE"/>
		<reference ref_id="CVE-2021-28210" ref_url="https://www.suse.com/security/cve/CVE-2021-28210/" source="CVE"/>
		<reference ref_id="CVE-2021-28211" ref_url="https://www.suse.com/security/cve/CVE-2021-28211/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-ovmf-x86_64-202202-150400.5.5.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5731/">CVE-2017-5731 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5731">CVE-2017-5731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5732/">CVE-2017-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5732">CVE-2017-5732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5733/">CVE-2017-5733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5733">CVE-2017-5733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5734/">CVE-2017-5734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5734">CVE-2017-5734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5735/">CVE-2017-5735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5735">CVE-2017-5735 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12178/">CVE-2018-12178 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12178">CVE-2018-12178 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12180">CVE-2018-12180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12181">CVE-2018-12181 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3613/">CVE-2018-3613 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3613">CVE-2018-3613 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3630/">CVE-2018-3630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-3630">CVE-2018-3630 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0160/">CVE-2019-0160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0160">CVE-2019-0160 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0161">CVE-2019-0161 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14553/">CVE-2019-14553 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14553">CVE-2019-14553 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14558/">CVE-2019-14558 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14558">CVE-2019-14558 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14559">CVE-2019-14559 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14562">CVE-2019-14562 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14563">CVE-2019-14563 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14575/">CVE-2019-14575 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14575">CVE-2019-14575 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14584">CVE-2019-14584 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14586/">CVE-2019-14586 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14586">CVE-2019-14586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14587/">CVE-2019-14587 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14587">CVE-2019-14587 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-28210/">CVE-2021-28210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28210">CVE-2021-28210 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28211/">CVE-2021-28211 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28211">CVE-2021-28211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905016" comment="qemu-ovmf-x86_64-202202-150400.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905017" comment="qemu-uefi-aarch64-202202-150400.5.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205894" version="1" class="patch">
	<metadata>
		<title>rpcbind-0.2.3-5.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-0.2.3-5.9.2 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7236">CVE-2015-7236 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887076" comment="rpcbind-0.2.3-5.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205895" version="1" class="patch">
	<metadata>
		<title>rpm-4.14.3-150300.52.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<reference ref_id="CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266/" source="CVE"/>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<description>
These are all security issues fixed in the rpm-4.14.3-150300.52.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7500">CVE-2017-7500 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20266">CVE-2021-20266 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3421">CVE-2021-3421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905018" comment="rpm-4.14.3-150300.52.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205896" version="1" class="patch">
	<metadata>
		<title>rsync-3.2.3-150400.3.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<reference ref_id="CVE-2020-14387" ref_url="https://www.suse.com/security/cve/CVE-2020-14387/" source="CVE"/>
		<reference ref_id="CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.2.3-150400.3.8.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8242">CVE-2014-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9512">CVE-2014-9512 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16548">CVE-2017-16548 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5764">CVE-2018-5764 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14387/">CVE-2020-14387 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14387">CVE-2020-14387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894386" comment="rsync-3.2.3-150400.3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205897" version="1" class="patch">
	<metadata>
		<title>runc-1.1.4-150000.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2019-16884" ref_url="https://www.suse.com/security/cve/CVE-2019-16884/" source="CVE"/>
		<reference ref_id="CVE-2019-19921" ref_url="https://www.suse.com/security/cve/CVE-2019-19921/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<reference ref_id="CVE-2021-43784" ref_url="https://www.suse.com/security/cve/CVE-2021-43784/" source="CVE"/>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<description>
These are all security issues fixed in the runc-1.1.4-150000.36.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16884/">CVE-2019-16884 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16884">CVE-2019-16884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19921/">CVE-2019-19921 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19921">CVE-2019-19921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43784/">CVE-2021-43784 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43784">CVE-2021-43784 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905019" comment="runc-1.1.4-150000.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205898" version="1" class="patch">
	<metadata>
		<title>samba-client-libs-4.15.13+git.591.ab36624310c-150400.3.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="CVE-2017-11103" ref_url="https://www.suse.com/security/cve/CVE-2017-11103/" source="CVE"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="CVE-2018-1057" ref_url="https://www.suse.com/security/cve/CVE-2018-1057/" source="CVE"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="CVE-2018-10918" ref_url="https://www.suse.com/security/cve/CVE-2018-10918/" source="CVE"/>
		<reference ref_id="CVE-2018-10919" ref_url="https://www.suse.com/security/cve/CVE-2018-10919/" source="CVE"/>
		<reference ref_id="CVE-2018-1139" ref_url="https://www.suse.com/security/cve/CVE-2018-1139/" source="CVE"/>
		<reference ref_id="CVE-2018-1140" ref_url="https://www.suse.com/security/cve/CVE-2018-1140/" source="CVE"/>
		<reference ref_id="CVE-2018-14629" ref_url="https://www.suse.com/security/cve/CVE-2018-14629/" source="CVE"/>
		<reference ref_id="CVE-2018-16841" ref_url="https://www.suse.com/security/cve/CVE-2018-16841/" source="CVE"/>
		<reference ref_id="CVE-2018-16851" ref_url="https://www.suse.com/security/cve/CVE-2018-16851/" source="CVE"/>
		<reference ref_id="CVE-2018-16852" ref_url="https://www.suse.com/security/cve/CVE-2018-16852/" source="CVE"/>
		<reference ref_id="CVE-2018-16853" ref_url="https://www.suse.com/security/cve/CVE-2018-16853/" source="CVE"/>
		<reference ref_id="CVE-2018-16857" ref_url="https://www.suse.com/security/cve/CVE-2018-16857/" source="CVE"/>
		<reference ref_id="CVE-2018-16860" ref_url="https://www.suse.com/security/cve/CVE-2018-16860/" source="CVE"/>
		<reference ref_id="CVE-2019-10197" ref_url="https://www.suse.com/security/cve/CVE-2019-10197/" source="CVE"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="CVE-2019-12435" ref_url="https://www.suse.com/security/cve/CVE-2019-12435/" source="CVE"/>
		<reference ref_id="CVE-2019-12436" ref_url="https://www.suse.com/security/cve/CVE-2019-12436/" source="CVE"/>
		<reference ref_id="CVE-2019-14833" ref_url="https://www.suse.com/security/cve/CVE-2019-14833/" source="CVE"/>
		<reference ref_id="CVE-2019-14847" ref_url="https://www.suse.com/security/cve/CVE-2019-14847/" source="CVE"/>
		<reference ref_id="CVE-2019-14861" ref_url="https://www.suse.com/security/cve/CVE-2019-14861/" source="CVE"/>
		<reference ref_id="CVE-2019-14870" ref_url="https://www.suse.com/security/cve/CVE-2019-14870/" source="CVE"/>
		<reference ref_id="CVE-2019-14902" ref_url="https://www.suse.com/security/cve/CVE-2019-14902/" source="CVE"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<reference ref_id="CVE-2019-19344" ref_url="https://www.suse.com/security/cve/CVE-2019-19344/" source="CVE"/>
		<reference ref_id="CVE-2019-3824" ref_url="https://www.suse.com/security/cve/CVE-2019-3824/" source="CVE"/>
		<reference ref_id="CVE-2019-3870" ref_url="https://www.suse.com/security/cve/CVE-2019-3870/" source="CVE"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<reference ref_id="CVE-2020-10704" ref_url="https://www.suse.com/security/cve/CVE-2020-10704/" source="CVE"/>
		<reference ref_id="CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730/" source="CVE"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="CVE-2020-10760" ref_url="https://www.suse.com/security/cve/CVE-2020-10760/" source="CVE"/>
		<reference ref_id="CVE-2020-14303" ref_url="https://www.suse.com/security/cve/CVE-2020-14303/" source="CVE"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="CVE-2020-17049" ref_url="https://www.suse.com/security/cve/CVE-2020-17049/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="CVE-2020-25718" ref_url="https://www.suse.com/security/cve/CVE-2020-25718/" source="CVE"/>
		<reference ref_id="CVE-2020-25719" ref_url="https://www.suse.com/security/cve/CVE-2020-25719/" source="CVE"/>
		<reference ref_id="CVE-2020-25721" ref_url="https://www.suse.com/security/cve/CVE-2020-25721/" source="CVE"/>
		<reference ref_id="CVE-2020-25722" ref_url="https://www.suse.com/security/cve/CVE-2020-25722/" source="CVE"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20251" ref_url="https://www.suse.com/security/cve/CVE-2021-20251/" source="CVE"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<reference ref_id="CVE-2021-23192" ref_url="https://www.suse.com/security/cve/CVE-2021-23192/" source="CVE"/>
		<reference ref_id="CVE-2021-3738" ref_url="https://www.suse.com/security/cve/CVE-2021-3738/" source="CVE"/>
		<reference ref_id="CVE-2021-44141" ref_url="https://www.suse.com/security/cve/CVE-2021-44141/" source="CVE"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="CVE-2022-0336" ref_url="https://www.suse.com/security/cve/CVE-2022-0336/" source="CVE"/>
		<reference ref_id="CVE-2022-1615" ref_url="https://www.suse.com/security/cve/CVE-2022-1615/" source="CVE"/>
		<reference ref_id="CVE-2022-2031" ref_url="https://www.suse.com/security/cve/CVE-2022-2031/" source="CVE"/>
		<reference ref_id="CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742/" source="CVE"/>
		<reference ref_id="CVE-2022-32743" ref_url="https://www.suse.com/security/cve/CVE-2022-32743/" source="CVE"/>
		<reference ref_id="CVE-2022-32744" ref_url="https://www.suse.com/security/cve/CVE-2022-32744/" source="CVE"/>
		<reference ref_id="CVE-2022-32745" ref_url="https://www.suse.com/security/cve/CVE-2022-32745/" source="CVE"/>
		<reference ref_id="CVE-2022-32746" ref_url="https://www.suse.com/security/cve/CVE-2022-32746/" source="CVE"/>
		<reference ref_id="CVE-2022-3437" ref_url="https://www.suse.com/security/cve/CVE-2022-3437/" source="CVE"/>
		<reference ref_id="CVE-2022-37966" ref_url="https://www.suse.com/security/cve/CVE-2022-37966/" source="CVE"/>
		<reference ref_id="CVE-2022-37967" ref_url="https://www.suse.com/security/cve/CVE-2022-37967/" source="CVE"/>
		<reference ref_id="CVE-2022-38023" ref_url="https://www.suse.com/security/cve/CVE-2022-38023/" source="CVE"/>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<description>
These are all security issues fixed in the samba-client-libs-4.15.13+git.591.ab36624310c-150400.3.19.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8143">CVE-2014-8143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0240">CVE-2015-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3223">CVE-2015-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5252">CVE-2015-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5296">CVE-2015-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5299">CVE-2015-5299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5370">CVE-2015-5370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7560">CVE-2015-7560 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8467">CVE-2015-8467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0771">CVE-2016-0771 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2110">CVE-2016-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2111">CVE-2016-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2112">CVE-2016-2112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2113">CVE-2016-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2115">CVE-2016-2115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2118">CVE-2016-2118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2119">CVE-2016-2119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2123">CVE-2016-2123 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2125">CVE-2016-2125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2126">CVE-2016-2126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11103/">CVE-2017-11103 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11103">CVE-2017-11103 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12150">CVE-2017-12150 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12151">CVE-2017-12151 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12163">CVE-2017-12163 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14746">CVE-2017-14746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15275">CVE-2017-15275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2619">CVE-2017-2619 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7494">CVE-2017-7494 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1050">CVE-2018-1050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1057/">CVE-2018-1057 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1057">CVE-2018-1057 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10858">CVE-2018-10858 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10918/">CVE-2018-10918 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10918">CVE-2018-10918 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10919/">CVE-2018-10919 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10919">CVE-2018-10919 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1139/">CVE-2018-1139 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1139">CVE-2018-1139 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1140/">CVE-2018-1140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1140">CVE-2018-1140 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14629/">CVE-2018-14629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14629">CVE-2018-14629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16841/">CVE-2018-16841 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16841">CVE-2018-16841 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16851/">CVE-2018-16851 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16851">CVE-2018-16851 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16852/">CVE-2018-16852 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16852">CVE-2018-16852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16853/">CVE-2018-16853 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16853">CVE-2018-16853 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16857/">CVE-2018-16857 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16857">CVE-2018-16857 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16860/">CVE-2018-16860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16860">CVE-2018-16860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10197/">CVE-2019-10197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10197">CVE-2019-10197 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12435/">CVE-2019-12435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12435">CVE-2019-12435 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12436/">CVE-2019-12436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12436">CVE-2019-12436 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14833/">CVE-2019-14833 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14833">CVE-2019-14833 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14847/">CVE-2019-14847 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14847">CVE-2019-14847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14861/">CVE-2019-14861 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14861">CVE-2019-14861 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14870/">CVE-2019-14870 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14870">CVE-2019-14870 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14902/">CVE-2019-14902 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14902">CVE-2019-14902 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19344/">CVE-2019-19344 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19344">CVE-2019-19344 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3824/">CVE-2019-3824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3824">CVE-2019-3824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3870/">CVE-2019-3870 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3870">CVE-2019-3870 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10700">CVE-2020-10700 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10704/">CVE-2020-10704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10704">CVE-2020-10704 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10730">CVE-2020-10730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10745">CVE-2020-10745 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10760/">CVE-2020-10760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10760">CVE-2020-10760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14303/">CVE-2020-14303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14303">CVE-2020-14303 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14383">CVE-2020-14383 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-17049/">CVE-2020-17049 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17049">CVE-2020-17049 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25718/">CVE-2020-25718 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25718">CVE-2020-25718 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25719/">CVE-2020-25719 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25719">CVE-2020-25719 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25721/">CVE-2020-25721 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25721">CVE-2020-25721 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25722/">CVE-2020-25722 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25722">CVE-2020-25722 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27840">CVE-2020-27840 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20251/">CVE-2021-20251 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20251">CVE-2021-20251 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20277">CVE-2021-20277 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23192/">CVE-2021-23192 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23192">CVE-2021-23192 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3738/">CVE-2021-3738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3738">CVE-2021-3738 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44141/">CVE-2021-44141 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44141">CVE-2021-44141 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0336/">CVE-2022-0336 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0336">CVE-2022-0336 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1615/">CVE-2022-1615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1615">CVE-2022-1615 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2031/">CVE-2022-2031 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2031">CVE-2022-2031 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32742">CVE-2022-32742 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32743/">CVE-2022-32743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32743">CVE-2022-32743 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32744/">CVE-2022-32744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32744">CVE-2022-32744 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-32745/">CVE-2022-32745 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32745">CVE-2022-32745 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32746/">CVE-2022-32746 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32746">CVE-2022-32746 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-3437/">CVE-2022-3437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3437">CVE-2022-3437 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37966/">CVE-2022-37966 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37966">CVE-2022-37966 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37967/">CVE-2022-37967 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37967">CVE-2022-37967 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38023/">CVE-2022-38023 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38023">CVE-2022-38023 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009732650" comment="samba-client-libs-4.15.13+git.591.ab36624310c-150400.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009732658" comment="samba-libs-4.15.13+git.591.ab36624310c-150400.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205899" version="1" class="patch">
	<metadata>
		<title>shim-15.4-4.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<reference ref_id="CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-15.4-4.7.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3675">CVE-2014-3675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3676">CVE-2014-3676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3677">CVE-2014-3677 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14584">CVE-2019-14584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009893364" comment="shim-15.4-4.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205900" version="1" class="patch">
	<metadata>
		<title>slirp4netns-0.4.7-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<description>
These are all security issues fixed in the slirp4netns-0.4.7-3.15.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672521" comment="slirp4netns-0.4.7-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205901" version="1" class="patch">
	<metadata>
		<title>socat-1.7.3.2-4.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.3.2-4.10 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3571">CVE-2013-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0019">CVE-2014-0019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009882489" comment="socat-1.7.3.2-4.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205902" version="1" class="patch">
	<metadata>
		<title>squashfs-4.4-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-4645" ref_url="https://www.suse.com/security/cve/CVE-2015-4645/" source="CVE"/>
		<reference ref_id="CVE-2015-4646" ref_url="https://www.suse.com/security/cve/CVE-2015-4646/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.4-1.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4645/">CVE-2015-4645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4645">CVE-2015-4645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4646/">CVE-2015-4646 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4646">CVE-2015-4646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813337" comment="squashfs-4.4-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205903" version="1" class="patch">
	<metadata>
		<title>sudo-1.9.9-150400.4.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="CVE-2022-43995" ref_url="https://www.suse.com/security/cve/CVE-2022-43995/" source="CVE"/>
		<reference ref_id="CVE-2023-22809" ref_url="https://www.suse.com/security/cve/CVE-2023-22809/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.9.9-150400.4.12.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9680">CVE-2014-9680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7032">CVE-2016-7032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7076">CVE-2016-7076 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000367">CVE-2017-1000367 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000368">CVE-2017-1000368 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23240">CVE-2021-23240 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-43995/">CVE-2022-43995 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43995">CVE-2022-43995 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22809/">CVE-2023-22809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009733681" comment="sudo-1.9.9-150400.4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205904" version="1" class="patch">
	<metadata>
		<title>supportutils-3.1.21-150300.7.35.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<description>
These are all security issues fixed in the supportutils-3.1.21-150300.7.35.15.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19637">CVE-2018-19637 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19638">CVE-2018-19638 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19639">CVE-2018-19639 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19640">CVE-2018-19640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894536" comment="supportutils-3.1.21-150300.7.35.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205905" version="1" class="patch">
	<metadata>
		<title>swtpm-0.5.3-150300.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2020-28407" ref_url="https://www.suse.com/security/cve/CVE-2020-28407/" source="CVE"/>
		<reference ref_id="CVE-2022-23645" ref_url="https://www.suse.com/security/cve/CVE-2022-23645/" source="CVE"/>
		<description>
These are all security issues fixed in the swtpm-0.5.3-150300.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-28407/">CVE-2020-28407 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28407">CVE-2020-28407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23645/">CVE-2022-23645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23645">CVE-2022-23645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669983" comment="swtpm-0.5.3-150300.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205906" version="1" class="patch">
	<metadata>
		<title>sysstat-12.0.2-3.33.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-19416" ref_url="https://www.suse.com/security/cve/CVE-2018-19416/" source="CVE"/>
		<reference ref_id="CVE-2018-19517" ref_url="https://www.suse.com/security/cve/CVE-2018-19517/" source="CVE"/>
		<reference ref_id="CVE-2019-16167" ref_url="https://www.suse.com/security/cve/CVE-2019-16167/" source="CVE"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-12.0.2-3.33.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19416/">CVE-2018-19416 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19416">CVE-2018-19416 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19517/">CVE-2018-19517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19517">CVE-2018-19517 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16167/">CVE-2019-16167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16167">CVE-2019-16167 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19725">CVE-2019-19725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904720" comment="sysstat-12.0.2-3.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205907" version="1" class="patch">
	<metadata>
		<title>tar-1.34-150000.3.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<reference ref_id="CVE-2022-48303" ref_url="https://www.suse.com/security/cve/CVE-2022-48303/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.34-150000.3.31.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6321">CVE-2016-6321 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20482">CVE-2018-20482 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9923">CVE-2019-9923 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20193">CVE-2021-20193 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48303/">CVE-2022-48303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009739928" comment="tar-1.34-150000.3.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205908" version="1" class="patch">
	<metadata>
		<title>tpm2.0-tools-5.2-150400.4.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-7524" ref_url="https://www.suse.com/security/cve/CVE-2017-7524/" source="CVE"/>
		<reference ref_id="CVE-2021-3565" ref_url="https://www.suse.com/security/cve/CVE-2021-3565/" source="CVE"/>
		<description>
These are all security issues fixed in the tpm2.0-tools-5.2-150400.4.6 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7524/">CVE-2017-7524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7524">CVE-2017-7524 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3565/">CVE-2021-3565 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3565">CVE-2021-3565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009888041" comment="tpm2.0-tools-5.2-150400.4.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205909" version="1" class="patch">
	<metadata>
		<title>trousers-0.3.15-150400.1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-18898" ref_url="https://www.suse.com/security/cve/CVE-2019-18898/" source="CVE"/>
		<reference ref_id="CVE-2020-24330" ref_url="https://www.suse.com/security/cve/CVE-2020-24330/" source="CVE"/>
		<reference ref_id="CVE-2020-24331" ref_url="https://www.suse.com/security/cve/CVE-2020-24331/" source="CVE"/>
		<reference ref_id="CVE-2020-24332" ref_url="https://www.suse.com/security/cve/CVE-2020-24332/" source="CVE"/>
		<description>
These are all security issues fixed in the trousers-0.3.15-150400.1.10 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18898/">CVE-2019-18898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18898">CVE-2019-18898 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24330/">CVE-2020-24330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24330">CVE-2020-24330 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24331/">CVE-2020-24331 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24331">CVE-2020-24331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24332/">CVE-2020-24332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24332">CVE-2020-24332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009887915" comment="trousers-0.3.15-150400.1.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205910" version="1" class="patch">
	<metadata>
		<title>u-boot-rpiarm64-2021.10-150400.4.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2018-18439" ref_url="https://www.suse.com/security/cve/CVE-2018-18439/" source="CVE"/>
		<reference ref_id="CVE-2018-18440" ref_url="https://www.suse.com/security/cve/CVE-2018-18440/" source="CVE"/>
		<reference ref_id="CVE-2020-10648" ref_url="https://www.suse.com/security/cve/CVE-2020-10648/" source="CVE"/>
		<reference ref_id="CVE-2020-8432" ref_url="https://www.suse.com/security/cve/CVE-2020-8432/" source="CVE"/>
		<reference ref_id="CVE-2022-30552" ref_url="https://www.suse.com/security/cve/CVE-2022-30552/" source="CVE"/>
		<reference ref_id="CVE-2022-30767" ref_url="https://www.suse.com/security/cve/CVE-2022-30767/" source="CVE"/>
		<reference ref_id="CVE-2022-30790" ref_url="https://www.suse.com/security/cve/CVE-2022-30790/" source="CVE"/>
		<reference ref_id="CVE-2022-33103" ref_url="https://www.suse.com/security/cve/CVE-2022-33103/" source="CVE"/>
		<reference ref_id="CVE-2022-33967" ref_url="https://www.suse.com/security/cve/CVE-2022-33967/" source="CVE"/>
		<reference ref_id="CVE-2022-34835" ref_url="https://www.suse.com/security/cve/CVE-2022-34835/" source="CVE"/>
		<description>
These are all security issues fixed in the u-boot-rpiarm64-2021.10-150400.4.11.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18439/">CVE-2018-18439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18439">CVE-2018-18439 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18440/">CVE-2018-18440 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18440">CVE-2018-18440 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10648/">CVE-2020-10648 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10648">CVE-2020-10648 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8432/">CVE-2020-8432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8432">CVE-2020-8432 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-30552/">CVE-2022-30552 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30552">CVE-2022-30552 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30767/">CVE-2022-30767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30767">CVE-2022-30767 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30790/">CVE-2022-30790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30790">CVE-2022-30790 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33103/">CVE-2022-33103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33103">CVE-2022-33103 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-33967/">CVE-2022-33967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33967">CVE-2022-33967 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34835/">CVE-2022-34835 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34835">CVE-2022-34835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894085" comment="u-boot-rpiarm64-2021.10-150400.4.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205911" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20230214-150200.21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151/" source="CVE"/>
		<reference ref_id="CVE-2022-21216" ref_url="https://www.suse.com/security/cve/CVE-2022-21216/" source="CVE"/>
		<reference ref_id="CVE-2022-21233" ref_url="https://www.suse.com/security/cve/CVE-2022-21233/" source="CVE"/>
		<reference ref_id="CVE-2022-33196" ref_url="https://www.suse.com/security/cve/CVE-2022-33196/" source="CVE"/>
		<reference ref_id="CVE-2022-38090" ref_url="https://www.suse.com/security/cve/CVE-2022-38090/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20230214-150200.21.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0145">CVE-2021-0145 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33120">CVE-2021-33120 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21216/">CVE-2022-21216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21233/">CVE-2022-21233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21233">CVE-2022-21233 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-33196/">CVE-2022-33196 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-38090/">CVE-2022-38090 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38090">CVE-2022-38090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009894507" comment="ucode-intel-20230214-150200.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205912" version="1" class="patch">
	<metadata>
		<title>update-alternatives-1.19.0.4-150000.4.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840/" source="CVE"/>
		<description>
These are all security issues fixed in the update-alternatives-1.19.0.4-150000.4.4.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0840">CVE-2015-0840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009723003" comment="update-alternatives-1.19.0.4-150000.4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205913" version="1" class="patch">
	<metadata>
		<title>vim-data-common-9.0.1234-150000.5.34.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<reference ref_id="CVE-2017-1000382" ref_url="https://www.suse.com/security/cve/CVE-2017-1000382/" source="CVE"/>
		<reference ref_id="CVE-2017-17087" ref_url="https://www.suse.com/security/cve/CVE-2017-17087/" source="CVE"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3875" ref_url="https://www.suse.com/security/cve/CVE-2021-3875/" source="CVE"/>
		<reference ref_id="CVE-2021-3903" ref_url="https://www.suse.com/security/cve/CVE-2021-3903/" source="CVE"/>
		<reference ref_id="CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927/" source="CVE"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2021-3968" ref_url="https://www.suse.com/security/cve/CVE-2021-3968/" source="CVE"/>
		<reference ref_id="CVE-2021-3973" ref_url="https://www.suse.com/security/cve/CVE-2021-3973/" source="CVE"/>
		<reference ref_id="CVE-2021-3974" ref_url="https://www.suse.com/security/cve/CVE-2021-3974/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4069" ref_url="https://www.suse.com/security/cve/CVE-2021-4069/" source="CVE"/>
		<reference ref_id="CVE-2021-4136" ref_url="https://www.suse.com/security/cve/CVE-2021-4136/" source="CVE"/>
		<reference ref_id="CVE-2021-4166" ref_url="https://www.suse.com/security/cve/CVE-2021-4166/" source="CVE"/>
		<reference ref_id="CVE-2021-4192" ref_url="https://www.suse.com/security/cve/CVE-2021-4192/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0128" ref_url="https://www.suse.com/security/cve/CVE-2022-0128/" source="CVE"/>
		<reference ref_id="CVE-2022-0213" ref_url="https://www.suse.com/security/cve/CVE-2022-0213/" source="CVE"/>
		<reference ref_id="CVE-2022-0261" ref_url="https://www.suse.com/security/cve/CVE-2022-0261/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0359" ref_url="https://www.suse.com/security/cve/CVE-2022-0359/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0392" ref_url="https://www.suse.com/security/cve/CVE-2022-0392/" source="CVE"/>
		<reference ref_id="CVE-2022-0407" ref_url="https://www.suse.com/security/cve/CVE-2022-0407/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="CVE-2022-0696" ref_url="https://www.suse.com/security/cve/CVE-2022-0696/" source="CVE"/>
		<reference ref_id="CVE-2022-1381" ref_url="https://www.suse.com/security/cve/CVE-2022-1381/" source="CVE"/>
		<reference ref_id="CVE-2022-1420" ref_url="https://www.suse.com/security/cve/CVE-2022-1420/" source="CVE"/>
		<reference ref_id="CVE-2022-1616" ref_url="https://www.suse.com/security/cve/CVE-2022-1616/" source="CVE"/>
		<reference ref_id="CVE-2022-1619" ref_url="https://www.suse.com/security/cve/CVE-2022-1619/" source="CVE"/>
		<reference ref_id="CVE-2022-1620" ref_url="https://www.suse.com/security/cve/CVE-2022-1620/" source="CVE"/>
		<reference ref_id="CVE-2022-1720" ref_url="https://www.suse.com/security/cve/CVE-2022-1720/" source="CVE"/>
		<reference ref_id="CVE-2022-1733" ref_url="https://www.suse.com/security/cve/CVE-2022-1733/" source="CVE"/>
		<reference ref_id="CVE-2022-1735" ref_url="https://www.suse.com/security/cve/CVE-2022-1735/" source="CVE"/>
		<reference ref_id="CVE-2022-1771" ref_url="https://www.suse.com/security/cve/CVE-2022-1771/" source="CVE"/>
		<reference ref_id="CVE-2022-1785" ref_url="https://www.suse.com/security/cve/CVE-2022-1785/" source="CVE"/>
		<reference ref_id="CVE-2022-1796" ref_url="https://www.suse.com/security/cve/CVE-2022-1796/" source="CVE"/>
		<reference ref_id="CVE-2022-1851" ref_url="https://www.suse.com/security/cve/CVE-2022-1851/" source="CVE"/>
		<reference ref_id="CVE-2022-1897" ref_url="https://www.suse.com/security/cve/CVE-2022-1897/" source="CVE"/>
		<reference ref_id="CVE-2022-1898" ref_url="https://www.suse.com/security/cve/CVE-2022-1898/" source="CVE"/>
		<reference ref_id="CVE-2022-1927" ref_url="https://www.suse.com/security/cve/CVE-2022-1927/" source="CVE"/>
		<reference ref_id="CVE-2022-1968" ref_url="https://www.suse.com/security/cve/CVE-2022-1968/" source="CVE"/>
		<reference ref_id="CVE-2022-2124" ref_url="https://www.suse.com/security/cve/CVE-2022-2124/" source="CVE"/>
		<reference ref_id="CVE-2022-2125" ref_url="https://www.suse.com/security/cve/CVE-2022-2125/" source="CVE"/>
		<reference ref_id="CVE-2022-2126" ref_url="https://www.suse.com/security/cve/CVE-2022-2126/" source="CVE"/>
		<reference ref_id="CVE-2022-2129" ref_url="https://www.suse.com/security/cve/CVE-2022-2129/" source="CVE"/>
		<reference ref_id="CVE-2022-2175" ref_url="https://www.suse.com/security/cve/CVE-2022-2175/" source="CVE"/>
		<reference ref_id="CVE-2022-2182" ref_url="https://www.suse.com/security/cve/CVE-2022-2182/" source="CVE"/>
		<reference ref_id="CVE-2022-2183" ref_url="https://www.suse.com/security/cve/CVE-2022-2183/" source="CVE"/>
		<reference ref_id="CVE-2022-2206" ref_url="https://www.suse.com/security/cve/CVE-2022-2206/" source="CVE"/>
		<reference ref_id="CVE-2022-2207" ref_url="https://www.suse.com/security/cve/CVE-2022-2207/" source="CVE"/>
		<reference ref_id="CVE-2022-2208" ref_url="https://www.suse.com/security/cve/CVE-2022-2208/" source="CVE"/>
		<reference ref_id="CVE-2022-2210" ref_url="https://www.suse.com/security/cve/CVE-2022-2210/" source="CVE"/>
		<reference ref_id="CVE-2022-2231" ref_url="https://www.suse.com/security/cve/CVE-2022-2231/" source="CVE"/>
		<reference ref_id="CVE-2022-2257" ref_url="https://www.suse.com/security/cve/CVE-2022-2257/" source="CVE"/>
		<reference ref_id="CVE-2022-2264" ref_url="https://www.suse.com/security/cve/CVE-2022-2264/" source="CVE"/>
		<reference ref_id="CVE-2022-2284" ref_url="https://www.suse.com/security/cve/CVE-2022-2284/" source="CVE"/>
		<reference ref_id="CVE-2022-2285" ref_url="https://www.suse.com/security/cve/CVE-2022-2285/" source="CVE"/>
		<reference ref_id="CVE-2022-2286" ref_url="https://www.suse.com/security/cve/CVE-2022-2286/" source="CVE"/>
		<reference ref_id="CVE-2022-2287" ref_url="https://www.suse.com/security/cve/CVE-2022-2287/" source="CVE"/>
		<reference ref_id="CVE-2022-2304" ref_url="https://www.suse.com/security/cve/CVE-2022-2304/" source="CVE"/>
		<reference ref_id="CVE-2022-2343" ref_url="https://www.suse.com/security/cve/CVE-2022-2343/" source="CVE"/>
		<reference ref_id="CVE-2022-2344" ref_url="https://www.suse.com/security/cve/CVE-2022-2344/" source="CVE"/>
		<reference ref_id="CVE-2022-2345" ref_url="https://www.suse.com/security/cve/CVE-2022-2345/" source="CVE"/>
		<reference ref_id="CVE-2022-2522" ref_url="https://www.suse.com/security/cve/CVE-2022-2522/" source="CVE"/>
		<reference ref_id="CVE-2022-2571" ref_url="https://www.suse.com/security/cve/CVE-2022-2571/" source="CVE"/>
		<reference ref_id="CVE-2022-2580" ref_url="https://www.suse.com/security/cve/CVE-2022-2580/" source="CVE"/>
		<reference ref_id="CVE-2022-2581" ref_url="https://www.suse.com/security/cve/CVE-2022-2581/" source="CVE"/>
		<reference ref_id="CVE-2022-2598" ref_url="https://www.suse.com/security/cve/CVE-2022-2598/" source="CVE"/>
		<reference ref_id="CVE-2022-2816" ref_url="https://www.suse.com/security/cve/CVE-2022-2816/" source="CVE"/>
		<reference ref_id="CVE-2022-2817" ref_url="https://www.suse.com/security/cve/CVE-2022-2817/" source="CVE"/>
		<reference ref_id="CVE-2022-2819" ref_url="https://www.suse.com/security/cve/CVE-2022-2819/" source="CVE"/>
		<reference ref_id="CVE-2022-2845" ref_url="https://www.suse.com/security/cve/CVE-2022-2845/" source="CVE"/>
		<reference ref_id="CVE-2022-2849" ref_url="https://www.suse.com/security/cve/CVE-2022-2849/" source="CVE"/>
		<reference ref_id="CVE-2022-2862" ref_url="https://www.suse.com/security/cve/CVE-2022-2862/" source="CVE"/>
		<reference ref_id="CVE-2022-2874" ref_url="https://www.suse.com/security/cve/CVE-2022-2874/" source="CVE"/>
		<reference ref_id="CVE-2022-2889" ref_url="https://www.suse.com/security/cve/CVE-2022-2889/" source="CVE"/>
		<reference ref_id="CVE-2022-2923" ref_url="https://www.suse.com/security/cve/CVE-2022-2923/" source="CVE"/>
		<reference ref_id="CVE-2022-2946" ref_url="https://www.suse.com/security/cve/CVE-2022-2946/" source="CVE"/>
		<reference ref_id="CVE-2022-2980" ref_url="https://www.suse.com/security/cve/CVE-2022-2980/" source="CVE"/>
		<reference ref_id="CVE-2022-2982" ref_url="https://www.suse.com/security/cve/CVE-2022-2982/" source="CVE"/>
		<reference ref_id="CVE-2022-3016" ref_url="https://www.suse.com/security/cve/CVE-2022-3016/" source="CVE"/>
		<reference ref_id="CVE-2022-3037" ref_url="https://www.suse.com/security/cve/CVE-2022-3037/" source="CVE"/>
		<reference ref_id="CVE-2022-3099" ref_url="https://www.suse.com/security/cve/CVE-2022-3099/" source="CVE"/>
		<reference ref_id="CVE-2022-3134" ref_url="https://www.suse.com/security/cve/CVE-2022-3134/" source="CVE"/>
		<reference ref_id="CVE-2022-3153" ref_url="https://www.suse.com/security/cve/CVE-2022-3153/" source="CVE"/>
		<reference ref_id="CVE-2022-3234" ref_url="https://www.suse.com/security/cve/CVE-2022-3234/" source="CVE"/>
		<reference ref_id="CVE-2022-3235" ref_url="https://www.suse.com/security/cve/CVE-2022-3235/" source="CVE"/>
		<reference ref_id="CVE-2022-3278" ref_url="https://www.suse.com/security/cve/CVE-2022-3278/" source="CVE"/>
		<reference ref_id="CVE-2022-3296" ref_url="https://www.suse.com/security/cve/CVE-2022-3296/" source="CVE"/>
		<reference ref_id="CVE-2022-3297" ref_url="https://www.suse.com/security/cve/CVE-2022-3297/" source="CVE"/>
		<reference ref_id="CVE-2022-3324" ref_url="https://www.suse.com/security/cve/CVE-2022-3324/" source="CVE"/>
		<reference ref_id="CVE-2022-3352" ref_url="https://www.suse.com/security/cve/CVE-2022-3352/" source="CVE"/>
		<reference ref_id="CVE-2022-3491" ref_url="https://www.suse.com/security/cve/CVE-2022-3491/" source="CVE"/>
		<reference ref_id="CVE-2022-3520" ref_url="https://www.suse.com/security/cve/CVE-2022-3520/" source="CVE"/>
		<reference ref_id="CVE-2022-3591" ref_url="https://www.suse.com/security/cve/CVE-2022-3591/" source="CVE"/>
		<reference ref_id="CVE-2022-3705" ref_url="https://www.suse.com/security/cve/CVE-2022-3705/" source="CVE"/>
		<reference ref_id="CVE-2022-4141" ref_url="https://www.suse.com/security/cve/CVE-2022-4141/" source="CVE"/>
		<reference ref_id="CVE-2022-4292" ref_url="https://www.suse.com/security/cve/CVE-2022-4292/" source="CVE"/>
		<reference ref_id="CVE-2022-4293" ref_url="https://www.suse.com/security/cve/CVE-2022-4293/" source="CVE"/>
		<reference ref_id="CVE-2023-0049" ref_url="https://www.suse.com/security/cve/CVE-2023-0049/" source="CVE"/>
		<reference ref_id="CVE-2023-0051" ref_url="https://www.suse.com/security/cve/CVE-2023-0051/" source="CVE"/>
		<reference ref_id="CVE-2023-0054" ref_url="https://www.suse.com/security/cve/CVE-2023-0054/" source="CVE"/>
		<reference ref_id="CVE-2023-0288" ref_url="https://www.suse.com/security/cve/CVE-2023-0288/" source="CVE"/>
		<reference ref_id="CVE-2023-0433" ref_url="https://www.suse.com/security/cve/CVE-2023-0433/" source="CVE"/>
		<description>
These are all security issues fixed in the vim-data-common-9.0.1234-150000.5.34.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0316">CVE-2009-0316 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000382/">CVE-2017-1000382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000382">CVE-2017-1000382 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17087/">CVE-2017-17087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17087">CVE-2017-17087 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953">CVE-2017-5953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6349">CVE-2017-6349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6350">CVE-2017-6350 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3778">CVE-2021-3778 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3796">CVE-2021-3796 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3872">CVE-2021-3872 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3875/">CVE-2021-3875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3875">CVE-2021-3875 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3903/">CVE-2021-3903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3903">CVE-2021-3903 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3927">CVE-2021-3927 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3928">CVE-2021-3928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3968/">CVE-2021-3968 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3968">CVE-2021-3968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3973/">CVE-2021-3973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">CVE-2021-3973 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3974/">CVE-2021-3974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3974">CVE-2021-3974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3984">CVE-2021-3984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4019">CVE-2021-4019 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4069/">CVE-2021-4069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4069">CVE-2021-4069 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4136/">CVE-2021-4136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4136">CVE-2021-4136 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4166/">CVE-2021-4166 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4166">CVE-2021-4166 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4192/">CVE-2021-4192 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">CVE-2021-4192 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">CVE-2021-4193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46059">CVE-2021-46059 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0128/">CVE-2022-0128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0128">CVE-2022-0128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0213/">CVE-2022-0213 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0213">CVE-2022-0213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0261/">CVE-2022-0261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">CVE-2022-0261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">CVE-2022-0318 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0319">CVE-2022-0319 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0351">CVE-2022-0351 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0359/">CVE-2022-0359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">CVE-2022-0359 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">CVE-2022-0361 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0392/">CVE-2022-0392 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">CVE-2022-0392 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0407/">CVE-2022-0407 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0407">CVE-2022-0407 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">CVE-2022-0413 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0696/">CVE-2022-0696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0696">CVE-2022-0696 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1381/">CVE-2022-1381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1381">CVE-2022-1381 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1420/">CVE-2022-1420 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">CVE-2022-1420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1616/">CVE-2022-1616 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616">CVE-2022-1616 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1619/">CVE-2022-1619 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">CVE-2022-1619 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1620/">CVE-2022-1620 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620">CVE-2022-1620 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1720/">CVE-2022-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1720">CVE-2022-1720 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1733/">CVE-2022-1733 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">CVE-2022-1733 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1735/">CVE-2022-1735 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735">CVE-2022-1735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1771/">CVE-2022-1771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1771">CVE-2022-1771 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1785/">CVE-2022-1785 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">CVE-2022-1785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1796/">CVE-2022-1796 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796">CVE-2022-1796 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1851/">CVE-2022-1851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">CVE-2022-1851 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1897/">CVE-2022-1897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897">CVE-2022-1897 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1898/">CVE-2022-1898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898">CVE-2022-1898 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1927/">CVE-2022-1927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1968/">CVE-2022-1968 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1968">CVE-2022-1968 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2124/">CVE-2022-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2124">CVE-2022-2124 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2125/">CVE-2022-2125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2125">CVE-2022-2125 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2126/">CVE-2022-2126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2126">CVE-2022-2126 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2129/">CVE-2022-2129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2129">CVE-2022-2129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2175/">CVE-2022-2175 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2175">CVE-2022-2175 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2182/">CVE-2022-2182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2182">CVE-2022-2182 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2183/">CVE-2022-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2183">CVE-2022-2183 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2206/">CVE-2022-2206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2206">CVE-2022-2206 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2207/">CVE-2022-2207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2207">CVE-2022-2207 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2208/">CVE-2022-2208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2208">CVE-2022-2208 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2210/">CVE-2022-2210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2210">CVE-2022-2210 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2231/">CVE-2022-2231 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2231">CVE-2022-2231 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2257/">CVE-2022-2257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2257">CVE-2022-2257 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2264/">CVE-2022-2264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2264">CVE-2022-2264 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2284/">CVE-2022-2284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2284">CVE-2022-2284 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2285/">CVE-2022-2285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2285">CVE-2022-2285 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2286/">CVE-2022-2286 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2286">CVE-2022-2286 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2287/">CVE-2022-2287 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2287">CVE-2022-2287 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2304/">CVE-2022-2304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2304">CVE-2022-2304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2343/">CVE-2022-2343 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2343">CVE-2022-2343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2344/">CVE-2022-2344 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2344">CVE-2022-2344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2345/">CVE-2022-2345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2345">CVE-2022-2345 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2522/">CVE-2022-2522 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2522">CVE-2022-2522 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2571/">CVE-2022-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2571">CVE-2022-2571 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2580/">CVE-2022-2580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2580">CVE-2022-2580 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2581/">CVE-2022-2581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2581">CVE-2022-2581 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2598/">CVE-2022-2598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2598">CVE-2022-2598 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2816/">CVE-2022-2816 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2816">CVE-2022-2816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2817/">CVE-2022-2817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2817">CVE-2022-2817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2819/">CVE-2022-2819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2819">CVE-2022-2819 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2845/">CVE-2022-2845 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2845">CVE-2022-2845 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2849/">CVE-2022-2849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2849">CVE-2022-2849 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2862/">CVE-2022-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2862">CVE-2022-2862 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2874/">CVE-2022-2874 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2874">CVE-2022-2874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2889/">CVE-2022-2889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2889">CVE-2022-2889 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2923/">CVE-2022-2923 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2923">CVE-2022-2923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-2946/">CVE-2022-2946 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2946">CVE-2022-2946 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2980/">CVE-2022-2980 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2980">CVE-2022-2980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2982/">CVE-2022-2982 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2982">CVE-2022-2982 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3016/">CVE-2022-3016 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3016">CVE-2022-3016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3037/">CVE-2022-3037 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3037">CVE-2022-3037 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3099/">CVE-2022-3099 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3099">CVE-2022-3099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3134/">CVE-2022-3134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3134">CVE-2022-3134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3153/">CVE-2022-3153 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3153">CVE-2022-3153 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3234/">CVE-2022-3234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3234">CVE-2022-3234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3235/">CVE-2022-3235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3235">CVE-2022-3235 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3278/">CVE-2022-3278 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3278">CVE-2022-3278 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3296/">CVE-2022-3296 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3296">CVE-2022-3296 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3297/">CVE-2022-3297 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3297">CVE-2022-3297 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3324/">CVE-2022-3324 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3324">CVE-2022-3324 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3352/">CVE-2022-3352 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3352">CVE-2022-3352 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3491/">CVE-2022-3491 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3491">CVE-2022-3491 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3520/">CVE-2022-3520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3520">CVE-2022-3520 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3591/">CVE-2022-3591 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3591">CVE-2022-3591 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-3705/">CVE-2022-3705 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3705">CVE-2022-3705 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4141/">CVE-2022-4141 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4141">CVE-2022-4141 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4292/">CVE-2022-4292 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4292">CVE-2022-4292 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4293/">CVE-2022-4293 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4293">CVE-2022-4293 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0049/">CVE-2023-0049 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0049">CVE-2023-0049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0051/">CVE-2023-0051 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0051">CVE-2023-0051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0054/">CVE-2023-0054 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0054">CVE-2023-0054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0288/">CVE-2023-0288 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0288">CVE-2023-0288 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0433/">CVE-2023-0433 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0433">CVE-2023-0433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905020" comment="vim-data-common-9.0.1234-150000.5.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009735254" comment="vim-small-9.0.1234-150000.5.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205914" version="1" class="patch">
	<metadata>
		<title>virt-install-4.0.0-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-10183" ref_url="https://www.suse.com/security/cve/CVE-2019-10183/" source="CVE"/>
		<description>
These are all security issues fixed in the virt-install-4.0.0-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10183/">CVE-2019-10183 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10183">CVE-2019-10183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009904846" comment="virt-install-4.0.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904847" comment="virt-manager-common-4.0.0-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205915" version="1" class="patch">
	<metadata>
		<title>wicked-0.6.70-150400.3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-18902" ref_url="https://www.suse.com/security/cve/CVE-2019-18902/" source="CVE"/>
		<reference ref_id="CVE-2019-18903" ref_url="https://www.suse.com/security/cve/CVE-2019-18903/" source="CVE"/>
		<reference ref_id="CVE-2020-7216" ref_url="https://www.suse.com/security/cve/CVE-2020-7216/" source="CVE"/>
		<reference ref_id="CVE-2020-7217" ref_url="https://www.suse.com/security/cve/CVE-2020-7217/" source="CVE"/>
		<description>
These are all security issues fixed in the wicked-0.6.70-150400.3.3.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18902/">CVE-2019-18902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18902">CVE-2019-18902 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18903/">CVE-2019-18903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18903">CVE-2019-18903 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7216/">CVE-2020-7216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7216">CVE-2020-7216 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7217/">CVE-2020-7217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7217">CVE-2020-7217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905021" comment="wicked-0.6.70-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905022" comment="wicked-service-0.6.70-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205916" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.9-150000.4.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-4144" ref_url="https://www.suse.com/security/cve/CVE-2015-4144/" source="CVE"/>
		<reference ref_id="CVE-2015-4145" ref_url="https://www.suse.com/security/cve/CVE-2015-4145/" source="CVE"/>
		<reference ref_id="CVE-2015-4146" ref_url="https://www.suse.com/security/cve/CVE-2015-4146/" source="CVE"/>
		<reference ref_id="CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310/" source="CVE"/>
		<reference ref_id="CVE-2015-5315" ref_url="https://www.suse.com/security/cve/CVE-2015-5315/" source="CVE"/>
		<reference ref_id="CVE-2015-5316" ref_url="https://www.suse.com/security/cve/CVE-2015-5316/" source="CVE"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2016-4476" ref_url="https://www.suse.com/security/cve/CVE-2016-4476/" source="CVE"/>
		<reference ref_id="CVE-2016-4477" ref_url="https://www.suse.com/security/cve/CVE-2016-4477/" source="CVE"/>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555/" source="CVE"/>
		<reference ref_id="CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377/" source="CVE"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="CVE-2021-30004" ref_url="https://www.suse.com/security/cve/CVE-2021-30004/" source="CVE"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.9-150000.4.36.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3686">CVE-2014-3686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1863">CVE-2015-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4141">CVE-2015-4141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4142">CVE-2015-4142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4143">CVE-2015-4143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4144/">CVE-2015-4144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4144">CVE-2015-4144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4145/">CVE-2015-4145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4145">CVE-2015-4145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4146/">CVE-2015-4146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4146">CVE-2015-4146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5310">CVE-2015-5310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5315/">CVE-2015-5315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5315">CVE-2015-5315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5316/">CVE-2015-5316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5316">CVE-2015-5316 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8041">CVE-2015-8041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4476/">CVE-2016-4476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4476">CVE-2016-4476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4477/">CVE-2016-4477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4477">CVE-2016-4477 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11555">CVE-2019-11555 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13377">CVE-2019-13377 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9494">CVE-2019-9494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9495">CVE-2019-9495 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9497">CVE-2019-9497 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9498">CVE-2019-9498 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9499">CVE-2019-9499 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0326">CVE-2021-0326 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30004/">CVE-2021-30004 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30004">CVE-2021-30004 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23303">CVE-2022-23303 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23304">CVE-2022-23304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009904848" comment="wpa_supplicant-2.9-150000.4.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205917" version="1" class="patch">
	<metadata>
		<title>xen-libs-4.16.3_02-150400.4.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377/" source="CVE"/>
		<reference ref_id="CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-15469" ref_url="https://www.suse.com/security/cve/CVE-2018-15469/" source="CVE"/>
		<reference ref_id="CVE-2018-15470" ref_url="https://www.suse.com/security/cve/CVE-2018-15470/" source="CVE"/>
		<reference ref_id="CVE-2018-18883" ref_url="https://www.suse.com/security/cve/CVE-2018-18883/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19963" ref_url="https://www.suse.com/security/cve/CVE-2018-19963/" source="CVE"/>
		<reference ref_id="CVE-2018-19964" ref_url="https://www.suse.com/security/cve/CVE-2018-19964/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5244" ref_url="https://www.suse.com/security/cve/CVE-2018-5244/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="CVE-2018-7542" ref_url="https://www.suse.com/security/cve/CVE-2018-7542/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-17349" ref_url="https://www.suse.com/security/cve/CVE-2019-17349/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-11743" ref_url="https://www.suse.com/security/cve/CVE-2020-11743/" source="CVE"/>
		<reference ref_id="CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15566" ref_url="https://www.suse.com/security/cve/CVE-2020-15566/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25598" ref_url="https://www.suse.com/security/cve/CVE-2020-25598/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25602" ref_url="https://www.suse.com/security/cve/CVE-2020-25602/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="CVE-2020-29040" ref_url="https://www.suse.com/security/cve/CVE-2020-29040/" source="CVE"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29567" ref_url="https://www.suse.com/security/cve/CVE-2020-29567/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2021-28687" ref_url="https://www.suse.com/security/cve/CVE-2021-28687/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28693" ref_url="https://www.suse.com/security/cve/CVE-2021-28693/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699/" source="CVE"/>
		<reference ref_id="CVE-2021-28700" ref_url="https://www.suse.com/security/cve/CVE-2021-28700/" source="CVE"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-23033" ref_url="https://www.suse.com/security/cve/CVE-2022-23033/" source="CVE"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816/" source="CVE"/>
		<reference ref_id="CVE-2022-23824" ref_url="https://www.suse.com/security/cve/CVE-2022-23824/" source="CVE"/>
		<reference ref_id="CVE-2022-23825" ref_url="https://www.suse.com/security/cve/CVE-2022-23825/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="CVE-2022-26362" ref_url="https://www.suse.com/security/cve/CVE-2022-26362/" source="CVE"/>
		<reference ref_id="CVE-2022-26363" ref_url="https://www.suse.com/security/cve/CVE-2022-26363/" source="CVE"/>
		<reference ref_id="CVE-2022-26364" ref_url="https://www.suse.com/security/cve/CVE-2022-26364/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-33745" ref_url="https://www.suse.com/security/cve/CVE-2022-33745/" source="CVE"/>
		<reference ref_id="CVE-2022-33746" ref_url="https://www.suse.com/security/cve/CVE-2022-33746/" source="CVE"/>
		<reference ref_id="CVE-2022-33747" ref_url="https://www.suse.com/security/cve/CVE-2022-33747/" source="CVE"/>
		<reference ref_id="CVE-2022-33748" ref_url="https://www.suse.com/security/cve/CVE-2022-33748/" source="CVE"/>
		<reference ref_id="CVE-2022-42309" ref_url="https://www.suse.com/security/cve/CVE-2022-42309/" source="CVE"/>
		<reference ref_id="CVE-2022-42310" ref_url="https://www.suse.com/security/cve/CVE-2022-42310/" source="CVE"/>
		<reference ref_id="CVE-2022-42311" ref_url="https://www.suse.com/security/cve/CVE-2022-42311/" source="CVE"/>
		<reference ref_id="CVE-2022-42312" ref_url="https://www.suse.com/security/cve/CVE-2022-42312/" source="CVE"/>
		<reference ref_id="CVE-2022-42313" ref_url="https://www.suse.com/security/cve/CVE-2022-42313/" source="CVE"/>
		<reference ref_id="CVE-2022-42314" ref_url="https://www.suse.com/security/cve/CVE-2022-42314/" source="CVE"/>
		<reference ref_id="CVE-2022-42315" ref_url="https://www.suse.com/security/cve/CVE-2022-42315/" source="CVE"/>
		<reference ref_id="CVE-2022-42316" ref_url="https://www.suse.com/security/cve/CVE-2022-42316/" source="CVE"/>
		<reference ref_id="CVE-2022-42317" ref_url="https://www.suse.com/security/cve/CVE-2022-42317/" source="CVE"/>
		<reference ref_id="CVE-2022-42318" ref_url="https://www.suse.com/security/cve/CVE-2022-42318/" source="CVE"/>
		<reference ref_id="CVE-2022-42319" ref_url="https://www.suse.com/security/cve/CVE-2022-42319/" source="CVE"/>
		<reference ref_id="CVE-2022-42320" ref_url="https://www.suse.com/security/cve/CVE-2022-42320/" source="CVE"/>
		<reference ref_id="CVE-2022-42321" ref_url="https://www.suse.com/security/cve/CVE-2022-42321/" source="CVE"/>
		<reference ref_id="CVE-2022-42322" ref_url="https://www.suse.com/security/cve/CVE-2022-42322/" source="CVE"/>
		<reference ref_id="CVE-2022-42323" ref_url="https://www.suse.com/security/cve/CVE-2022-42323/" source="CVE"/>
		<reference ref_id="CVE-2022-42325" ref_url="https://www.suse.com/security/cve/CVE-2022-42325/" source="CVE"/>
		<reference ref_id="CVE-2022-42326" ref_url="https://www.suse.com/security/cve/CVE-2022-42326/" source="CVE"/>
		<reference ref_id="CVE-2022-42327" ref_url="https://www.suse.com/security/cve/CVE-2022-42327/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-libs-4.16.3_02-150400.4.19.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3495">CVE-2013-3495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4540">CVE-2013-4540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3672">CVE-2014-3672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3259">CVE-2015-3259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3340">CVE-2015-3340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4103">CVE-2015-4103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4104">CVE-2015-4104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4105">CVE-2015-4105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4106">CVE-2015-4106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7311">CVE-2015-7311 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7504">CVE-2015-7504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7549">CVE-2015-7549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7835">CVE-2015-7835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7970">CVE-2015-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7972">CVE-2015-7972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8339">CVE-2015-8339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8340">CVE-2015-8340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8341">CVE-2015-8341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8554">CVE-2015-8554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8555">CVE-2015-8555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8567">CVE-2015-8567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8568">CVE-2015-8568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8613">CVE-2015-8613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8615">CVE-2015-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8619">CVE-2015-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8744">CVE-2015-8744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8745">CVE-2015-8745 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10013">CVE-2016-10013 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10024">CVE-2016-10024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10025">CVE-2016-10025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1570">CVE-2016-1570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1571">CVE-2016-1571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1922">CVE-2016-1922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2198">CVE-2016-2198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2270">CVE-2016-2270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2271">CVE-2016-2271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2392">CVE-2016-2392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2538">CVE-2016-2538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6258">CVE-2016-6258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6259">CVE-2016-6259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7092">CVE-2016-7092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7093">CVE-2016-7093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7094">CVE-2016-7094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7777">CVE-2016-7777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9377">CVE-2016-9377 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9378">CVE-2016-9378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9379">CVE-2016-9379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9380">CVE-2016-9380 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9382">CVE-2016-9382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9383">CVE-2016-9383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9384">CVE-2016-9384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9385">CVE-2016-9385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9386">CVE-2016-9386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9637">CVE-2016-9637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9932">CVE-2016-9932 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12135">CVE-2017-12135 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12136">CVE-2017-12136 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12137">CVE-2017-12137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9330">CVE-2017-9330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10471">CVE-2018-10471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10472">CVE-2018-10472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10981">CVE-2018-10981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10982">CVE-2018-10982 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12891">CVE-2018-12891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12892">CVE-2018-12892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12893">CVE-2018-12893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15468">CVE-2018-15468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15469/">CVE-2018-15469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15469">CVE-2018-15469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15470/">CVE-2018-15470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15470">CVE-2018-15470 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18883/">CVE-2018-18883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18883">CVE-2018-18883 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19961">CVE-2018-19961 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19962">CVE-2018-19962 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19963/">CVE-2018-19963 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19963">CVE-2018-19963 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19964/">CVE-2018-19964 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19964">CVE-2018-19964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19965">CVE-2018-19965 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19966">CVE-2018-19966 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19967">CVE-2018-19967 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5244/">CVE-2018-5244 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5244">CVE-2018-5244 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7540">CVE-2018-7540 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7541">CVE-2018-7541 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7542/">CVE-2018-7542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7542">CVE-2018-7542 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17349/">CVE-2019-17349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17349">CVE-2019-17349 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11739">CVE-2020-11739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11743/">CVE-2020-11743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11743">CVE-2020-11743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15563">CVE-2020-15563 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15566/">CVE-2020-15566 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15566">CVE-2020-15566 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25597">CVE-2020-25597 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25598/">CVE-2020-25598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25598">CVE-2020-25598 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25599">CVE-2020-25599 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25600">CVE-2020-25600 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25601">CVE-2020-25601 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25602/">CVE-2020-25602 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25602">CVE-2020-25602 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25603">CVE-2020-25603 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27671">CVE-2020-27671 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-29040/">CVE-2020-29040 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29040">CVE-2020-29040 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29567/">CVE-2020-29567 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29567">CVE-2020-29567 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29570">CVE-2020-29570 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29571">CVE-2020-29571 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0089">CVE-2021-0089 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28687/">CVE-2021-28687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28687">CVE-2021-28687 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28690">CVE-2021-28690 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28692">CVE-2021-28692 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28693/">CVE-2021-28693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28693">CVE-2021-28693 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28694">CVE-2021-28694 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28695">CVE-2021-28695 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28696">CVE-2021-28696 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28697">CVE-2021-28697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28698">CVE-2021-28698 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28699">CVE-2021-28699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28700/">CVE-2021-28700 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28700">CVE-2021-28700 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28701">CVE-2021-28701 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23033/">CVE-2022-23033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23033">CVE-2022-23033 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23034">CVE-2022-23034 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23035">CVE-2022-23035 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23824/">CVE-2022-23824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23824">CVE-2022-23824 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23825/">CVE-2022-23825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26356">CVE-2022-26356 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26357">CVE-2022-26357 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26358">CVE-2022-26358 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26359">CVE-2022-26359 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26360">CVE-2022-26360 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26361">CVE-2022-26361 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26362/">CVE-2022-26362 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26362">CVE-2022-26362 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26363/">CVE-2022-26363 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26363">CVE-2022-26363 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26364/">CVE-2022-26364 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26364">CVE-2022-26364 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33745/">CVE-2022-33745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33745">CVE-2022-33745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33746/">CVE-2022-33746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33746">CVE-2022-33746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-33747/">CVE-2022-33747 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33747">CVE-2022-33747 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33748/">CVE-2022-33748 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33748">CVE-2022-33748 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42309/">CVE-2022-42309 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42309">CVE-2022-42309 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42310/">CVE-2022-42310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42310">CVE-2022-42310 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42311/">CVE-2022-42311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42311">CVE-2022-42311 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42312/">CVE-2022-42312 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42312">CVE-2022-42312 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42313/">CVE-2022-42313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42313">CVE-2022-42313 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42314/">CVE-2022-42314 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42314">CVE-2022-42314 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42315/">CVE-2022-42315 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42315">CVE-2022-42315 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42316/">CVE-2022-42316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42316">CVE-2022-42316 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42317/">CVE-2022-42317 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42317">CVE-2022-42317 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42318/">CVE-2022-42318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42318">CVE-2022-42318 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42319/">CVE-2022-42319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42319">CVE-2022-42319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42320/">CVE-2022-42320 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42320">CVE-2022-42320 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42321/">CVE-2022-42321 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42321">CVE-2022-42321 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42322/">CVE-2022-42322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42322">CVE-2022-42322 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42323/">CVE-2022-42323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42323">CVE-2022-42323 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42325/">CVE-2022-42325 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42325">CVE-2022-42325 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42326/">CVE-2022-42326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42326">CVE-2022-42326 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42327/">CVE-2022-42327 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42327">CVE-2022-42327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905023" comment="xen-libs-4.16.3_02-150400.4.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205918" version="1" class="patch">
	<metadata>
		<title>zypper-1.14.57-150400.3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<description>
These are all security issues fixed in the zypper-1.14.57-150400.3.9.1 package on the GA media of SUSE Linux Enterprise Micro 5.4.		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2023-05-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7436">CVE-2017-7436 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9269">CVE-2017-9269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009905024" comment="zypper-1.14.57-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009905025" comment="zypper-needs-restarting-1.14.57-150400.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205919" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1187748" ref_url="https://bugzilla.suse.com/1187748" source="BUGZILLA"/>
		<reference ref_id="1188911" ref_url="https://bugzilla.suse.com/1188911" source="BUGZILLA"/>
		<reference ref_id="1192838" ref_url="https://bugzilla.suse.com/1192838" source="BUGZILLA"/>
		<reference ref_id="1192840" ref_url="https://bugzilla.suse.com/1192840" source="BUGZILLA"/>
		<reference ref_id="1196046" ref_url="https://bugzilla.suse.com/1196046" source="BUGZILLA"/>
		<reference ref_id="1199183" ref_url="https://bugzilla.suse.com/1199183" source="BUGZILLA"/>
		<reference ref_id="1200262" ref_url="https://bugzilla.suse.com/1200262" source="BUGZILLA"/>
		<reference ref_id="1200317" ref_url="https://bugzilla.suse.com/1200317" source="BUGZILLA"/>
		<reference ref_id="1200501" ref_url="https://bugzilla.suse.com/1200501" source="BUGZILLA"/>
		<reference ref_id="1200978" ref_url="https://bugzilla.suse.com/1200978" source="BUGZILLA"/>
		<reference ref_id="1201604" ref_url="https://bugzilla.suse.com/1201604" source="BUGZILLA"/>
		<reference ref_id="1201797" ref_url="https://bugzilla.suse.com/1201797" source="BUGZILLA"/>
		<reference ref_id="1201837" ref_url="https://bugzilla.suse.com/1201837" source="BUGZILLA"/>
		<reference ref_id="1201976" ref_url="https://bugzilla.suse.com/1201976" source="BUGZILLA"/>
		<reference ref_id="1202077" ref_url="https://bugzilla.suse.com/1202077" source="BUGZILLA"/>
		<reference ref_id="1202292" ref_url="https://bugzilla.suse.com/1202292" source="BUGZILLA"/>
		<reference ref_id="1203375" ref_url="https://bugzilla.suse.com/1203375" source="BUGZILLA"/>
		<reference ref_id="1204430" ref_url="https://bugzilla.suse.com/1204430" source="BUGZILLA"/>
		<reference ref_id="1205025" ref_url="https://bugzilla.suse.com/1205025" source="BUGZILLA"/>
		<reference ref_id="1205436" ref_url="https://bugzilla.suse.com/1205436" source="BUGZILLA"/>
		<reference ref_id="1206158" ref_url="https://bugzilla.suse.com/1206158" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0670" ref_url="https://www.suse.com/security/cve/CVE-2022-0670/" source="CVE"/>
		<reference ref_id="CVE-2022-3650" ref_url="https://www.suse.com/security/cve/CVE-2022-3650/" source="CVE"/>
		<reference ref_id="CVE-2022-3854" ref_url="https://www.suse.com/security/cve/CVE-2022-3854/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1581-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029144.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

Security issues fixed:

- CVE-2022-0670: Fixed user/tenant read/write access to an entire file system (bsc#1201837).
- CVE-2022-3650: Fixed Python script that allowed privilege escalation from ceph to root (bsc#1204430).
- CVE-2022-3854: Fixed possible DoS issue in ceph URL processing on RGW backends (bsc#1205025).

Bug fixes:

- osd, tools, kv: non-aggressive, on-line trimming of accumulated dups (bsc#1199183).
- ceph-volume: fix fast device alloc size on mulitple device  (bsc#1200262).
- cephadm: update monitoring container images (bsc#1200501).
- mgr/dashboard: prevent alert redirect (bsc#1200978).
- mgr/volumes: Add subvolumegroup resize cmd (bsc#1201797).
- monitoring/ceph-mixin: add RGW host to label info (bsc#1201976).
- mgr/dashboard: enable addition of custom Prometheus alerts (bsc#1202077).
- python-common: Add 'KB' to supported suffixes in SizeMatcher (bsc#1203375).
- mgr/dashboard: fix rgw connect when using ssl (bsc#1205436).
- ceph.spec.in: Add -DFMT_DEPRECATED_OSTREAM to CXXFLAGS (bsc#1202292).
- cephfs-shell: move source to separate subdirectory (bsc#1201604).

Fix in previous release:

- mgr/cephadm: try to get FQDN for configuration files (bsc#1196046).
- When an RBD is mapped, it is attempted to be deployed as an OSD. (bsc#1187748).
- OSD marked down causes wrong backfill_toofull (bsc#1188911).
- cephadm: Fix iscsi client caps (allow mgr &lt;service status&gt; calls) (bsc#1192838).
- mgr/cephadm: fix and improve osd draining (bsc#1200317).
- add iscsi and nfs to upgrade process (bsc#1206158).
- mgr/mgr_module.py: CLICommand: Fix parsing of kwargs arguments (bsc#1192840).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-02"/>
	<updated date="2023-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187748">SUSE bug 1187748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188911">SUSE bug 1188911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192838">SUSE bug 1192838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192840">SUSE bug 1192840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196046">SUSE bug 1196046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199183">SUSE bug 1199183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200262">SUSE bug 1200262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200317">SUSE bug 1200317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200501">SUSE bug 1200501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200978">SUSE bug 1200978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201604">SUSE bug 1201604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201797">SUSE bug 1201797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201837">SUSE bug 1201837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201976">SUSE bug 1201976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202077">SUSE bug 1202077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202292">SUSE bug 1202292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203375">SUSE bug 1203375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204430">SUSE bug 1204430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205025">SUSE bug 1205025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205436">SUSE bug 1205436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206158">SUSE bug 1206158</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0670/">CVE-2022-0670 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0670">CVE-2022-0670 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3650/">CVE-2022-3650 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3650">CVE-2022-3650 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3854/">CVE-2022-3854 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3854">CVE-2022-3854 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009750864" comment="librados2-16.2.11.58+g38d6afd3b78-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750865" comment="librbd1-16.2.11.58+g38d6afd3b78-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205920" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1197534" ref_url="https://bugzilla.suse.com/1197534" source="BUGZILLA"/>
		<reference ref_id="1197617" ref_url="https://bugzilla.suse.com/1197617" source="BUGZILLA"/>
		<reference ref_id="1198438" ref_url="https://bugzilla.suse.com/1198438" source="BUGZILLA"/>
		<reference ref_id="1200054" ref_url="https://bugzilla.suse.com/1200054" source="BUGZILLA"/>
		<reference ref_id="1202353" ref_url="https://bugzilla.suse.com/1202353" source="BUGZILLA"/>
		<reference ref_id="1202633" ref_url="https://bugzilla.suse.com/1202633" source="BUGZILLA"/>
		<reference ref_id="1203200" ref_url="https://bugzilla.suse.com/1203200" source="BUGZILLA"/>
		<reference ref_id="1203331" ref_url="https://bugzilla.suse.com/1203331" source="BUGZILLA"/>
		<reference ref_id="1204363" ref_url="https://bugzilla.suse.com/1204363" source="BUGZILLA"/>
		<reference ref_id="1204993" ref_url="https://bugzilla.suse.com/1204993" source="BUGZILLA"/>
		<reference ref_id="1205544" ref_url="https://bugzilla.suse.com/1205544" source="BUGZILLA"/>
		<reference ref_id="1205846" ref_url="https://bugzilla.suse.com/1205846" source="BUGZILLA"/>
		<reference ref_id="1206103" ref_url="https://bugzilla.suse.com/1206103" source="BUGZILLA"/>
		<reference ref_id="1206232" ref_url="https://bugzilla.suse.com/1206232" source="BUGZILLA"/>
		<reference ref_id="1206492" ref_url="https://bugzilla.suse.com/1206492" source="BUGZILLA"/>
		<reference ref_id="1206493" ref_url="https://bugzilla.suse.com/1206493" source="BUGZILLA"/>
		<reference ref_id="1206824" ref_url="https://bugzilla.suse.com/1206824" source="BUGZILLA"/>
		<reference ref_id="1206935" ref_url="https://bugzilla.suse.com/1206935" source="BUGZILLA"/>
		<reference ref_id="1207051" ref_url="https://bugzilla.suse.com/1207051" source="BUGZILLA"/>
		<reference ref_id="1207270" ref_url="https://bugzilla.suse.com/1207270" source="BUGZILLA"/>
		<reference ref_id="1207529" ref_url="https://bugzilla.suse.com/1207529" source="BUGZILLA"/>
		<reference ref_id="1207560" ref_url="https://bugzilla.suse.com/1207560" source="BUGZILLA"/>
		<reference ref_id="1207845" ref_url="https://bugzilla.suse.com/1207845" source="BUGZILLA"/>
		<reference ref_id="1207846" ref_url="https://bugzilla.suse.com/1207846" source="BUGZILLA"/>
		<reference ref_id="1208179" ref_url="https://bugzilla.suse.com/1208179" source="BUGZILLA"/>
		<reference ref_id="1208212" ref_url="https://bugzilla.suse.com/1208212" source="BUGZILLA"/>
		<reference ref_id="1208420" ref_url="https://bugzilla.suse.com/1208420" source="BUGZILLA"/>
		<reference ref_id="1208449" ref_url="https://bugzilla.suse.com/1208449" source="BUGZILLA"/>
		<reference ref_id="1208534" ref_url="https://bugzilla.suse.com/1208534" source="BUGZILLA"/>
		<reference ref_id="1208541" ref_url="https://bugzilla.suse.com/1208541" source="BUGZILLA"/>
		<reference ref_id="1208542" ref_url="https://bugzilla.suse.com/1208542" source="BUGZILLA"/>
		<reference ref_id="1208570" ref_url="https://bugzilla.suse.com/1208570" source="BUGZILLA"/>
		<reference ref_id="1208598" ref_url="https://bugzilla.suse.com/1208598" source="BUGZILLA"/>
		<reference ref_id="1208599" ref_url="https://bugzilla.suse.com/1208599" source="BUGZILLA"/>
		<reference ref_id="1208601" ref_url="https://bugzilla.suse.com/1208601" source="BUGZILLA"/>
		<reference ref_id="1208605" ref_url="https://bugzilla.suse.com/1208605" source="BUGZILLA"/>
		<reference ref_id="1208607" ref_url="https://bugzilla.suse.com/1208607" source="BUGZILLA"/>
		<reference ref_id="1208628" ref_url="https://bugzilla.suse.com/1208628" source="BUGZILLA"/>
		<reference ref_id="1208700" ref_url="https://bugzilla.suse.com/1208700" source="BUGZILLA"/>
		<reference ref_id="1208741" ref_url="https://bugzilla.suse.com/1208741" source="BUGZILLA"/>
		<reference ref_id="1208759" ref_url="https://bugzilla.suse.com/1208759" source="BUGZILLA"/>
		<reference ref_id="1208776" ref_url="https://bugzilla.suse.com/1208776" source="BUGZILLA"/>
		<reference ref_id="1208777" ref_url="https://bugzilla.suse.com/1208777" source="BUGZILLA"/>
		<reference ref_id="1208784" ref_url="https://bugzilla.suse.com/1208784" source="BUGZILLA"/>
		<reference ref_id="1208787" ref_url="https://bugzilla.suse.com/1208787" source="BUGZILLA"/>
		<reference ref_id="1208816" ref_url="https://bugzilla.suse.com/1208816" source="BUGZILLA"/>
		<reference ref_id="1208837" ref_url="https://bugzilla.suse.com/1208837" source="BUGZILLA"/>
		<reference ref_id="1208843" ref_url="https://bugzilla.suse.com/1208843" source="BUGZILLA"/>
		<reference ref_id="1208848" ref_url="https://bugzilla.suse.com/1208848" source="BUGZILLA"/>
		<reference ref_id="1209008" ref_url="https://bugzilla.suse.com/1209008" source="BUGZILLA"/>
		<reference ref_id="1209159" ref_url="https://bugzilla.suse.com/1209159" source="BUGZILLA"/>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<reference ref_id="1209256" ref_url="https://bugzilla.suse.com/1209256" source="BUGZILLA"/>
		<reference ref_id="1209258" ref_url="https://bugzilla.suse.com/1209258" source="BUGZILLA"/>
		<reference ref_id="1209262" ref_url="https://bugzilla.suse.com/1209262" source="BUGZILLA"/>
		<reference ref_id="1209291" ref_url="https://bugzilla.suse.com/1209291" source="BUGZILLA"/>
		<reference ref_id="1209436" ref_url="https://bugzilla.suse.com/1209436" source="BUGZILLA"/>
		<reference ref_id="1209457" ref_url="https://bugzilla.suse.com/1209457" source="BUGZILLA"/>
		<reference ref_id="1209504" ref_url="https://bugzilla.suse.com/1209504" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3523" ref_url="https://www.suse.com/security/cve/CVE-2022-3523/" source="CVE"/>
		<reference ref_id="CVE-2022-38096" ref_url="https://www.suse.com/security/cve/CVE-2022-38096/" source="CVE"/>
		<reference ref_id="CVE-2023-0461" ref_url="https://www.suse.com/security/cve/CVE-2023-0461/" source="CVE"/>
		<reference ref_id="CVE-2023-0597" ref_url="https://www.suse.com/security/cve/CVE-2023-0597/" source="CVE"/>
		<reference ref_id="CVE-2023-1075" ref_url="https://www.suse.com/security/cve/CVE-2023-1075/" source="CVE"/>
		<reference ref_id="CVE-2023-1076" ref_url="https://www.suse.com/security/cve/CVE-2023-1076/" source="CVE"/>
		<reference ref_id="CVE-2023-1078" ref_url="https://www.suse.com/security/cve/CVE-2023-1078/" source="CVE"/>
		<reference ref_id="CVE-2023-1095" ref_url="https://www.suse.com/security/cve/CVE-2023-1095/" source="CVE"/>
		<reference ref_id="CVE-2023-1118" ref_url="https://www.suse.com/security/cve/CVE-2023-1118/" source="CVE"/>
		<reference ref_id="CVE-2023-22995" ref_url="https://www.suse.com/security/cve/CVE-2023-22995/" source="CVE"/>
		<reference ref_id="CVE-2023-22998" ref_url="https://www.suse.com/security/cve/CVE-2023-22998/" source="CVE"/>
		<reference ref_id="CVE-2023-23000" ref_url="https://www.suse.com/security/cve/CVE-2023-23000/" source="CVE"/>
		<reference ref_id="CVE-2023-23004" ref_url="https://www.suse.com/security/cve/CVE-2023-23004/" source="CVE"/>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<reference ref_id="CVE-2023-25012" ref_url="https://www.suse.com/security/cve/CVE-2023-25012/" source="CVE"/>
		<reference ref_id="CVE-2023-26545" ref_url="https://www.suse.com/security/cve/CVE-2023-26545/" source="CVE"/>
		<reference ref_id="CVE-2023-28328" ref_url="https://www.suse.com/security/cve/CVE-2023-28328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.

- CVE-2022-3523: Fixed use after free related to device private page handling (bsc#1204363).
- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-0597: Fixed lack of randomization of  per-cpu entry area in x86/mm (bsc#1207845).
- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-22995: Fixed lacks of certain platform_device_put and kfree in drivers/usb/dwc3/dwc3-qcom.c (bsc#1208741).
- CVE-2023-22998: Fixed misinterpretation of the irtio_gpu_object_shmem_init() return value (bsc#1208776).
- CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function phy/tegra (bsc#1208816).
- CVE-2023-23004: Fixed misinterpretation of the get_sg_table return value in arm/malidp_planes.c (bsc#1208843).
- CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).
- CVE-2023-25012: Fixed a use-After-Free in bigben_set_led() in hid (bsc#1207560).
- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).

The following non-security bugs were fixed:

- [xen] fix 'direction' argument of iov_iter_kvec() (git-fixes).
- acpi: Do not build ACPICA with '-Os' (git-fixes).
- acpi: NFIT: fix a potential deadlock during NFIT teardown (git-fixes).
- acpi: battery: Fix missing NUL-termination with large strings (git-fixes).
- acpi: resource: Add helper function acpi_dev_get_memory_resources() (git-fixes).
- acpi: video: Fix Lenovo Ideapad Z570 DMI match (git-fixes).
- acpica: Drop port I/O validation for some regions (git-fixes).
- acpica: nsrepair: handle cases without a return value correctly (git-fixes).
- alsa: hda/ca0132: minor fix for allocation size (git-fixes).
- alsa: hda/conexant: add a new hda codec SN6180 (git-fixes).
- alsa: hda/realtek - fixed wrong gpio assigned (git-fixes).
- alsa: hda/realtek: Add quirk for HP EliteDesk 800 G6 Tower PC (git-fixes).
- alsa: hda: Do not unset preset when cleaning up codec (git-fixes).
- alsa: hda: Match only Intel devices with CONTROLLER_IN_GPU() (git-fixes).
- alsa: ice1712: Delete unreachable code in aureon_add_controls() (git-fixes).
- alsa: ice1712: Do not left ice-&gt;gpio_mutex locked in aureon_add_controls() (git-fixes).
- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).
- arm64: Treat ESR_ELx as a 64-bit register (git-fixes)
- arm64: atomics: remove LL/SC trampolines (git-fixes)
- arm64: cacheinfo: Fix incorrect assignment of signed error value to (git-fixes)
- arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes)
- arm64: dts: amlogic: meson-axg: fix SCPI clock dvfs node name (git-fixes).
- arm64: dts: amlogic: meson-gx-libretech-pc: fix update button name (git-fixes).
- arm64: dts: amlogic: meson-gx: add missing SCPI sensors compatible (git-fixes).
- arm64: dts: amlogic: meson-gx: add missing unit address to rng node name (git-fixes).
- arm64: dts: amlogic: meson-gx: fix SCPI clock dvfs node name (git-fixes).
- arm64: dts: amlogic: meson-gxbb-kii-pro: fix led node name (git-fixes).
- arm64: dts: amlogic: meson-gxl-s905d-phicomm-n1: fix led node name (git-fixes).
- arm64: dts: amlogic: meson-gxl-s905d-sml5442tw: drop invalid clock-names property (git-fixes).
- arm64: dts: amlogic: meson-gxl: add missing unit address to eth-phy-mux node name (git-fixes).
- arm64: dts: amlogic: meson-sm1-bananapi-m5: fix adc keys node names (git-fixes).
- arm64: dts: amlogic: meson-sm1-odroid-hc4: fix active fan thermal trip (git-fixes).
- arm64: dts: arm: drop unused interrupt-names in MHU (git-fixes)
- arm64: dts: imx8m: Align SoC unique ID node unit address (git-fixes).
- arm64: dts: juno: Add missing MHU secure-irq (git-fixes)
- arm64: dts: mediatek: mt7622: Add missing pwm-cells to pwm node (git-fixes).
- arm64: dts: mediatek: mt8183: Fix systimer 13 MHz clock description (git-fixes).
- arm64: dts: meson-g12a: Fix internal Ethernet PHY unit name (git-fixes).
- arm64: dts: meson-gx: Fix Ethernet MAC address unit name (git-fixes).
- arm64: dts: meson-gx: Fix the SCPI DVFS node name and unit address (git-fixes).
- arm64: dts: meson: bananapi-m5: switch VDDIO_C pin to OPEN_DRAIN (git-fixes).
- arm64: dts: meson: remove CPU opps below 1GHz for G12A boards (git-fixes).
- arm64: dts: mt8192: Fix CPU map for single-cluster SoC (git-fixes).
- arm64: dts: qcom: Fix IPQ8074 PCIe PHY nodes (git-fixes).
- arm64: dts: qcom: ipq8074: correct Gen2 PCIe ranges (git-fixes).
- arm64: dts: qcom: ipq8074: correct PCIe QMP PHY output clock names (git-fixes).
- arm64: dts: qcom: ipq8074: correct USB3 QMP PHY-s clock output names (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen2 PCIe QMP PHY (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen3 PCIe QMP PHY (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen3 PCIe node (git-fixes).
- arm64: dts: qcom: ipq8074: fix PCIe PHY serdes size (git-fixes).
- arm64: dts: qcom: pmk8350: Specify PBS register for PON (git-fixes).
- arm64: dts: qcom: pmk8350: Use the correct PON compatible (git-fixes).
- arm64: dts: qcom: qcs404: use symbol names for PCIe resets (git-fixes).
- arm64: dts: qcom: sc7180: correct SPMI bus address cells (git-fixes).
- arm64: dts: qcom: sc7280: correct SPMI bus address cells (git-fixes).
- arm64: dts: qcom: sdm845-db845c: fix audio codec interrupt pin name (git-fixes).
- arm64: dts: qcom: sm8150-kumano: Panel framebuffer is 2.5k instead of 4k (git-fixes).
- arm64: dts: renesas: beacon-renesom: Fix gpio expander reference (git-fixes).
- arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc (git-fixes).
- arm64: dts: ti: k3-j7200: Fix wakeup pinmux range (git-fixes).
- arm64: efi: Make efi_rt_lock a raw_spinlock (git-fixes).
- arm64: make is_ttbrX_addr() noinstr-safe (git-fixes)
- arm64: mm: kfence: only handle translation faults (git-fixes)
- arm: OMAP1: call platform_device_put() in error case in omap1_dm_timer_init() (git-fixes).
- arm: OMAP2+: Fix memory leak in realtime_counter_init() (git-fixes).
- arm: bcm2835_defconfig: Enable the framebuffer (git-fixes).
- arm: dts: am5748: keep usb4_tm disabled (git-fixes)
- arm: dts: exynos: Use Exynos5420 compatible for the MIPI video phy (git-fixes).
- arm: dts: exynos: correct HDMI phy compatible in Exynos4 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos4 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos4210 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos5250 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid HC1 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid XU (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid XU3 family (git-fixes).
- arm: dts: exynos: correct wr-active property in Exynos3250 Rinato (git-fixes).
- arm: dts: imx7-colibri-eval-v3: correct can controller comment (git-fixes)
- arm: dts: imx7s: correct iomuxc gpr mux controller cells (git-fixes).
- arm: dts: qcom: msm8974: add required ranges to OCMEM (git-fixes)
- arm: dts: qcom: sdx55: Add Qcom SMMU-500 as the fallback for IOMMU node (git-fixes).
- arm: dts: rockchip: add power-domains property to dp node on rk3288 (git-fixes).
- arm: dts: spear320-hmi: correct STMPE GPIO compatible (git-fixes).
- arm: dts: stm32: add missing usbh clock and fix clk order on (git-fixes)
- arm: dts: stm32: use usbphyc ck_usbo_48m as USBH OHCI clock on (git-fixes)
- arm: dts: sun8i: nanopi-duo2: Fix regulator GPIO reference (git-fixes).
- arm: imx: Call ida_simple_remove() for ida_simple_get (git-fixes).
- arm: imx: rename DEBUG_IMX21_IMX27_UART to DEBUG_IMX27_UART (git-fixes)
- arm: omap: remove debug-leds driver (git-fixes)
- arm: remove some dead code (git-fixes)
- arm: renumber bits related to _TIF_WORK_MASK (git-fixes)
- arm: s3c: fix s3c64xx_set_timer_source prototype (git-fixes).
- arm: shmobile: rcar-gen2: Add missing of_node_put() (git-fixes)
- arm: zynq: Fix refcount leak in zynq_early_slcr_init (git-fixes).
- ascpi / x86: Add support for LPS0 callback handler (git-fixes).
- asoc: Intel: sof_cs42l42: always set dpcm_capture for amplifiers (git-fixes).
- asoc: Intel: sof_rt5682: always set dpcm_capture for amplifiers (git-fixes).
- asoc: adau7118: do not disable regulators on device unbind (git-fixes).
- asoc: codecs: Change bulk clock voting to optional voting in digital codecs (git-fixes).
- asoc: codecs: lpass: fix incorrect mclk rate (git-fixes).
- asoc: codecs: rx-macro: move clk provider to managed variants (git-fixes).
- asoc: codecs: rx-macro: move to individual clks from bulk (git-fixes).
- asoc: codecs: tx-macro: move clk provider to managed variants (git-fixes).
- asoc: codecs: tx-macro: move to individual clks from bulk (git-fixes).
- asoc: cs42l56: fix DT probe (git-fixes).
- asoc: dt-bindings: meson: fix gx-card codec node regex (git-fixes).
- asoc: fsl_sai: Update to modern clocking terminology (git-fixes).
- asoc: kirkwood: Iterate over array indexes instead of using pointer math (git-fixes).
- asoc: mchp-spdifrx: Fix uninitialized use of mr in mchp_spdifrx_hw_params() (git-fixes).
- asoc: mchp-spdifrx: disable all interrupts in mchp_spdifrx_dai_remove() (git-fixes).
- asoc: mchp-spdifrx: fix controls which rely on rsr register (git-fixes).
- asoc: rsnd: Remove unnecessary rsnd_dbg_dai_call() (git-fixes).
- asoc: rsnd: fixup #endif position (git-fixes).
- asoc: rt715-sdca: fix clock stop prepare timeout issue (git-fixes).
- asoc: soc-compress.c: fixup private_data on snd_soc_new_compress() (git-fixes).
- asoc: soc-compress: Reposition and add pcm_mutex (git-fixes).
- asoc: soc-dapm.h: fixup warning struct snd_pcm_substream not declared (git-fixes).
- asoc: tlv320adcx140: fix 'ti,gpio-config' DT property init (git-fixes).
- asoc: zl38060 add gpiolib dependency (git-fixes).
- asoc: zl38060: Remove spurious gpiolib select (git-fixes).
- ath9k: hif_usb: simplify if-if to if-else (git-fixes).
- ath9k: htc: clean up statistics macros (git-fixes).
- auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() (git-fixes).
- avoid deadlock for recursive I/O on dm-thin when used as swap (bsc#1177529).
- backlight: backlight: Fix doc for backlight_device_get_by_name (git-fixes).
- block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541).
- bluetooth: L2CAP: Fix potential user-after-free (git-fixes).
- bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes).
- bluetooth: hci_qca: get wakeup status from serdev device handle (git-fixes).
- bluetooth: hci_sock: purge socket queues in the destruct() callback (git-fixes).
- bpf, perf: Use subprog name when reporting subprog ksymbol (git fixes).
- bpf, x64: Factor out emission of REX byte in more cases (git-fixes).
- bpf: Fix extable address check (git-fixes).
- bpf: Fix extable fixup offset (git-fixes).
- ceph: update the time stamps and try to drop the suid/sgid (bsc#1209504).
- cifs: Check the lease context if we actually got a lease (bsc#1193629).
- cifs: Convert struct fealist away from 1-element array (bsc#1193629).
- cifs: Fix lost destroy smbd connection when MR allocate failed (git-fixes).
- cifs: Fix oops due to uncleared server-&gt;smbd_conn in reconnect (git-fixes).
- cifs: Fix uninitialized memory read in smb3_qfs_tcon() (bsc#1193629).
- cifs: Fix uninitialized memory reads for oparms.mode (bsc#1193629).
- cifs: Fix use-after-free in rdata-&gt;read_into_pages() (git-fixes).
- cifs: Fix warning and UAF when destroy the MR list (git-fixes).
- cifs: Get rid of unneeded conditional in the smb2_get_aead_req() (bsc#1193629).
- cifs: Replace remaining 1-element arrays (bsc#1193629).
- cifs: Replace zero-length arrays with flexible-array members (bsc#1193629).
- cifs: Use kstrtobool() instead of strtobool() (bsc#1193629).
- cifs: do not try to use rdma offload on encrypted connections (bsc#1193629).
- cifs: fix mount on old smb servers (boo#1206935).
- cifs: get rid of dns resolve worker (bsc#1193629).
- cifs: get rid of unneeded conditional in cifs_get_num_sgs() (bsc#1193629).
- cifs: improve checking of DFS links over STATUS_OBJECT_NAME_INVALID (git-fixes).
- cifs: introduce cifs_io_parms in smb2_async_writev() (bsc#1193629).
- cifs: match even the scope id for ipv6 addresses (bsc#1193629).
- cifs: prevent data race in cifs_reconnect_tcon() (bsc#1193629).
- cifs: prevent data race in smb2_reconnect() (bsc#1193629).
- cifs: print last update time for interface list (bsc#1193629).
- cifs: remove unneeded 2bytes of padding from smb2 tree connect (bsc#1193629).
- cifs: return a single-use cfid if we did not get a lease (bsc#1193629).
- cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1193629).
- cifs: split out smb3_use_rdma_offload() helper (bsc#1193629).
- cifs: update ip_addr for ses only for primary chan setup (bsc#1193629).
- cifs: use tcon allocation functions even for dummy tcon (git-fixes).
- cifs: use the least loaded channel for sending requests (bsc#1193629).
- clk: HI655X: select REGMAP instead of depending on it (git-fixes).
- clk: Honor CLK_OPS_PARENT_ENABLE in clk_core_is_enabled() (git-fixes).
- clk: imx: avoid memory leak (git-fixes).
- clk: mxl: Add option to override gate clks (git-fixes).
- clk: mxl: Fix a clk entry by adding relevant flags (git-fixes).
- clk: mxl: Remove redundant spinlocks (git-fixes).
- clk: mxl: Switch from direct readl/writel based IO to regmap based IO (git-fixes).
- clk: mxl: syscon_node_to_regmap() returns error pointers (git-fixes).
- clk: qcom: gcc-qcs404: disable gpll[04]_out_aux parents (git-fixes).
- clk: qcom: gcc-qcs404: fix names of the DSI clocks used as parents (git-fixes).
- clk: ralink: fix 'mt7621_gate_is_enabled()' function (git-fixes).
- clk: renesas: cpg-mssr: Fix use after free if cpg_mssr_common_init() failed (git-fixes).
- clk: renesas: cpg-mssr: Remove superfluous check in resume code (git-fixes).
- clocksource: Suspend the watchdog temporarily when high read latency detected (git-fixes).
- comedi: use menuconfig for main Comedi menu (git-fixes).
- crypto: arm64 - Fix unused variable compilation warnings of (git-fixes)
- crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2 (git-fixes).
- crypto: ccp - Failure on re-initialization due to duplicate sysfs filename (git-fixes).
- crypto: crypto4xx - Call dma_unmap_page when done (git-fixes).
- crypto: essiv - Handle EBUSY correctly (git-fixes).
- crypto: qat - fix out-of-bounds read (git-fixes).
- crypto: rsa-pkcs1pad - Use akcipher_request_complete (git-fixes).
- crypto: seqiv - Handle EBUSY correctly (git-fixes).
- crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes).
- crypto: xts - Handle EBUSY correctly (git-fixes).
- delete suse/drm-i915-Don-t-use-BAR-mappings-for-ring-buffers-wit Resulted in an Oops / hang at boot (bsc#1209436)
- dmaengine: dw-axi-dmac: Do not dereference NULL structure (git-fixes).
- dmaengine: dw-edma: Do not permit non-inc interleaved xfers (git-fixes).
- dmaengine: dw-edma: Drop chancnt initialization (git-fixes).
- dmaengine: dw-edma: Fix invalid interleaved xfers semantics (git-fixes).
- dmaengine: dw-edma: Fix missing src/dst address of interleaved xfers (git-fixes).
- dmaengine: dw-edma: Fix readq_ch() return value truncation (git-fixes).
- dmaengine: idxd: Set traffic class values in GRPCFG on DSA 2.0 (git-fixes).
- dmaengine: ptdma: check for null desc before calling pt_cmd_callback (git-fixes).
- dmaengine: sf-pdma: pdma_desc memory leak fix (git-fixes).
- do not sign the vanilla kernel (bsc#1209008).
- docs/scripts/gdb: add necessary make scripts_gdb step (git-fixes).
- docs: Correct missing 'd_' prefix for dentry_operations member d_weak_revalidate (git-fixes).
- docs: ftrace: fix a issue with duplicated subtitle number (git-fixes).
- docs: gdbmacros: print newest record (git-fixes).
- documentation/hw-vuln: Document the interaction between IBRS and STIBP (git-fixes).
- documentation: simplify and clarify DCO contribution example language (git-fixes).
- driver core: fix potential null-ptr-deref in device_add() (git-fixes).
- driver core: fix resource leak in device_add() (git-fixes).
- driver core: fw_devlink: Add DL_FLAG_CYCLE support to device links (git-fixes).
- drivers: base: transport_class: fix possible memory leak (git-fixes).
- drivers: base: transport_class: fix resource leak when transport_add_device() fails (git-fixes).
- drm/amd/display: Fix potential null-deref in dm_resume (git-fixes).
- drm/amd/display: Properly handle additional cases where DCN is not supported (git-fixes).
- drm/amd/display: reduce else-if to else in dcn10_blank_pixel_data() (git-fixes).
- drm/amdgpu: fix enum odm_combine_mode mismatch (git-fixes).
- drm/amdgpu: fix error checking in amdgpu_read_mm_registers for soc15 (git-fixes).
- drm/bridge: Fix returned array size name for atomic_get_input_bus_fmts kdoc (git-fixes).
- drm/bridge: lt8912b: Add hot plug detection (git-fixes).
- drm/bridge: lt9611: fix HPD reenablement (git-fixes).
- drm/bridge: lt9611: fix clock calculation (git-fixes).
- drm/bridge: lt9611: fix polarity programming (git-fixes).
- drm/bridge: lt9611: fix programming of video modes (git-fixes).
- drm/bridge: lt9611: fix sleep mode setup (git-fixes).
- drm/bridge: lt9611: pass a pointer to the of node (git-fixes).
- drm/bridge: megachips: Fix error handling in i2c_register_driver() (git-fixes).
- drm/connector: print max_requested_bpc in state debugfs (git-fixes).
- drm/edid: fix AVI infoframe aspect ratio handling (git-fixes).
- drm/fourcc: Add missing big-endian XRGB1555 and RGB565 formats (git-fixes).
- drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size (git-fixes).
- drm/hyperv: Fix an error handling path in hyperv_vmbus_probe() (git-fixes).
- drm/i915/gen11: Moving WAs to icl_gt_workarounds_init() (git-fixes).
- drm/i915/gen11: Wa_1408615072/Wa_1407596294 should be on GT list (git-fixes).
- drm/i915/quirks: Add inverted backlight quirk for HP 14-r206nv (git-fixes).
- drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).
- drm/mediatek: Clean dangling pointer on bind error path (git-fixes).
- drm/mediatek: Drop unbalanced obj unref (git-fixes).
- drm/mediatek: Use NULL instead of 0 for NULL pointer (git-fixes).
- drm/mediatek: dsi: Reduce the time of dsi from LP11 to sending cmd (git-fixes).
- drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc (git-fixes).
- drm/meson: fix 1px pink line on GXM when scaling video overlay (git-fixes).
- drm/mipi-dsi: Fix byte order of 16-bit DCS set/get brightness (git-fixes).
- drm/msm/a5xx: fix context faults during ring switch (git-fixes).
- drm/msm/a5xx: fix highest bank bit for a530 (git-fixes).
- drm/msm/a5xx: fix setting of the CP_PREEMPT_ENABLE_LOCAL register (git-fixes).
- drm/msm/a5xx: fix the emptyness check in the preempt code (git-fixes).
- drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() (git-fixes).
- drm/msm/disp/dpu: fix sc7280_pp base offset (git-fixes).
- drm/msm/dpu: Add check for cstate (git-fixes).
- drm/msm/dpu: Add check for pstates (git-fixes).
- drm/msm/dpu: Disallow unallocated resources to be returned (git-fixes).
- drm/msm/dpu: drop stale comment from struct dpu_mdp_cfg doc (git-fixes).
- drm/msm/dpu: fix len of sc7180 ctl blocks (git-fixes).
- drm/msm/dpu: set pdpu-&gt;is_rt_pipe early in dpu_plane_sspp_atomic_update() (git-fixes).
- drm/msm/dsi: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/msm/gem: Add check for kmalloc (git-fixes).
- drm/msm/hdmi: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/msm/mdp5: Add check for kzalloc (git-fixes).
- drm/msm: Fix potential invalid ptr free (git-fixes).
- drm/msm: clean event_thread-&gt;worker in case of an error (git-fixes).
- drm/msm: use strscpy instead of strncpy (git-fixes).
- drm/nouveau/devinit/tu102-: wait for GFW_BOOT_PROGRESS == COMPLETED (git-fixes).
- drm/nouveau/kms/nv50-: remove unused functions (git-fixes).
- drm/nouveau/kms/nv50: fix nv50_wndw_new_ prototype (git-fixes).
- drm/omap: dsi: Fix excessive stack usage (git-fixes).
- drm/omapdrm: Remove unused struct csc_coef_rgb2yuv (git-fixes).
- drm/panfrost: Do not sync rpm suspension after mmu flushing (git-fixes).
- drm/radeon: Fix eDP for single-display iMac11,2 (git-fixes).
- drm/radeon: free iio for atombios when driver shutdown (git-fixes).
- drm/shmem-helper: Remove another errant put in error path (git-fixes).
- drm/sun4i: fix missing component unbind on bind errors (git-fixes).
- drm/tiny: ili9486: Do not assume 8-bit only SPI controllers (git-fixes).
- drm/vc4: dpi: Add option for inverting pixel clock and output enable (git-fixes).
- drm/vc4: dpi: Fix format mapping for RGB565 (git-fixes).
- drm/vc4: hdmi: Correct interlaced timings again (git-fixes).
- drm/vc4: hvs: Fix colour order for xRGB1555 on HVS5 (git-fixes).
- drm/vc4: hvs: Set AXI panic modes (git-fixes).
- drm/vc4: vec: Use pm_runtime_resume_and_get() in vc4_vec_encoder_enable() (git-fixes).
- drm/vkms: Fix memory leak in vkms_init() (git-fixes).
- drm/vkms: Fix null-ptr-deref in vkms_release() (git-fixes).
- drm: Fix potential null-ptr-deref due to drmm_mode_config_init() (git-fixes).
- drm: amd: display: Fix memory leakage (git-fixes).
- drm: mxsfb: DRM_MXSFB should depend on ARCH_MXS || ARCH_MXC (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo IdeaPad Duet 3 10IGL5 (git-fixes).
- drm: tidss: Fix pixel format definition (git-fixes).
- dt-bindings: arm: fsl: Fix bindings for APF28Dev board (git-fixes).
- dt-bindings: hwlock: sun6i: Add missing #hwlock-cells (git-fixes).
- dt-bindings: input: iqs626a: Redefine trackpad property types (git-fixes).
- dt-bindings: msm: dsi-controller-main: Add vdd* descriptions back in (git-fixes).
- dt-bindings: net: snps,dwmac: Fix snps,reset-delays-us dependency (git-fixes).
- dt-bindings: power: supply: pm8941-coincell: Do not require charging properties (git-fixes).
- dt-bindings: usb: amlogic,meson-g12a-usb-ctrl: make G12A usb3-phy0 optional (git-fixes).
- eeprom: idt_89hpesx: Fix error handling in idt_init() (git-fixes).
- fbdev: omapfb: cleanup inconsistent indentation (git-fixes).
- firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3 (git-fixes).
- firmware: coreboot: Remove GOOGLE_COREBOOT_TABLE_ACPI/OF Kconfig entries (git-fixes).
- firmware: coreboot: framebuffer: Ignore reserved pixel color bits (git-fixes).
- firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (git-fixes).
- firmware: stratix10-svc: add missing gen_pool_destroy() in stratix10_svc_drv_probe() (git-fixes).
- firmware: xilinx: do not make a sleepable memory allocation from an atomic context (git-fixes).
- fork: allow CLONE_NEWTIME in clone3 flags (bsc#1209258).
- fuse: add inode/permission checks to fileattr_get/fileattr_set (bsc#1208759).
- gpio: tegra186: remove unneeded loop in tegra186_gpio_init_route_mapping() (git-fixes).
- gpio: vf610: connect GPIO label to dev name (git-fixes).
- gpu: host1x: Do not skip assigning syncpoints to channels (git-fixes).
- gpu: ipu-v3: common: Add of_node_put() for reference returned by of_graph_get_port_by_id() (git-fixes).
- hid: Add Mapping for System Microphone Mute (git-fixes).
- hid: asus: use spinlock to protect concurrent accesses (git-fixes).
- hid: asus: use spinlock to safely schedule workers (git-fixes).
- hid: bigben: use spinlock to protect concurrent accesses (git-fixes).
- hid: bigben: use spinlock to safely schedule workers (git-fixes).
- hid: bigben_probe(): validate report count (git-fixes).
- hid: bigben_worker() remove unneeded check on report_field (git-fixes).
- hid: core: Fix deadloop in hid_apply_multiplier (git-fixes).
- hid: elecom: add support for TrackBall 056E:011C (git-fixes).
- hid: logitech-hidpp: Do not restart communication if not necessary (git-fixes).
- hid: multitouch: Add quirks for flipped axes (git-fixes).
- hid: retain initial quirks set up when creating HID devices (git-fixes).
- hv: fix comment typo in vmbus_channel/low_latency (git-fixes).
- hv_netvsc: Allocate memory in netvsc_dma_map() with GFP_ATOMIC (git-fixes).
- hv_netvsc: Check status in SEND_RNDIS_PKT completion message (git-fixes).
- hwmon: (adm1266) Set `can_sleep` flag for GPIO chip (git-fixes).
- hwmon: (adt7475) Display smoothing attributes in correct order (git-fixes).
- hwmon: (adt7475) Fix masking of hysteresis registers (git-fixes).
- hwmon: (coretemp) Simplify platform device handling (git-fixes).
- hwmon: (ftsteutates) Fix scaling of measurements (git-fixes).
- hwmon: (ina3221) return prober error code (git-fixes).
- hwmon: (k10temp): Add support for new family 17h and 19h models (bsc#1208848).
- hwmon: (ltc2945) Handle error case in ltc2945_value_store (git-fixes).
- hwmon: (ltc2992) Set `can_sleep` flag for GPIO chip (git-fixes).
- hwmon: (mlxreg-fan) Return zero speed for broken fan (git-fixes).
- hwmon: (ucd90320) Add minimum delay between bus accesses (git-fixes).
- hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition (git-fixes).
- hwmon: tmp512: drop of_match_ptr for ID table (git-fixes).
- i2c: designware: fix i2c_dw_clk_rate() return size to be u32 (git-fixes).
- ib/hfi1: Assign npages earlier (git-fixes)
- ib/hfi1: Fix math bugs in hfi1_can_pin_pages() (git-fixes)
- ib/hfi1: Fix sdma.h tx-&gt;num_descs off-by-one errors (git-fixes)
- ib/hfi1: Update RMT size calculation (git-fixes)
- iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_config_word() (git-fixes).
- iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_status_word() (git-fixes).
- iio: light: tsl2563: Do not hardcode interrupt trigger type (git-fixes).
- input: ads7846 - always set last command to PWRDOWN (git-fixes).
- input: ads7846 - do not check penirq immediately for 7845 (git-fixes).
- input: ads7846 - do not report pressure for ads7845 (git-fixes).
- input: iqs269a - configure device with a single block write (git-fixes).
- input: iqs269a - drop unused device node references (git-fixes).
- input: iqs269a - increase interrupt handler return delay (git-fixes).
- input: iqs626a - drop unused device node references (git-fixes).
- interconnect: exynos: fix node leak in probe PM QoS error path (git-fixes).
- interconnect: fix mem leak when freeing nodes (git-fixes).
- interconnect: qcom: osm-l3: fix icc_onecell_data allocation (git-fixes).
- iommu/hyper-v: Allow hyperv irq remapping without x2apic (git-fixes).
- irqchip/gic-v3: Refactor ISB + EOIR at ack time (git-fixes)
- iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() (git-fixes)
- kABI workaround for hid quirks (git-fixes).
- kABI: pci: Reduce warnings on possible RW1C corruption (kabi).
- kABI: pci: dwc: Add dw_pcie_ops.host_deinit() callback (kabi).
- kabi fix for nfsv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes).
- kabi fix for: nfs: Further optimisations for 'ls -l' (git-fixes).
- kabi fix for: nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).
- kabi fix for: nfsv3: handle out-of-order write replies (bsc#1205544).
- kabi fix for: nfsv4.1 query for fs_location attr on a new file system (Never, kabi).
- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179). When -b is specified the script is prefixed with KMP_NEEDS_MKINITRD=1 which sets the variable for a simple command. However, the script is no longer a simple command. Export the variable instead.
- keys: asymmetric: Fix ECDSA use via keyctl uapi (git-fixes).
- kmap_local: do not assume kmap PTEs are linear arrays in memory (git-fixes) Update config/armv7hl/default too.
- leds: led-class: Add missing put_device() to led_put() (git-fixes).
- leds: led-core: Fix refcount leak in of_led_get() (git-fixes).
- lib/mpi: Fix buffer overrun when SG is too long (git-fixes).
- lib/zlib: remove redundation assignement of avail_in dfltcc_gdht() (git-fixes).
- locking/rwsem: Allow slowpath writer to ignore handoff bit if not set by first waiter (bsc#1207270).
- locking/rwsem: Always try to wake waiters in out_nolock path (bsc#1207270).
- locking/rwsem: Conditionally wake waiters in reader/writer slowpaths (bsc#1207270).
- locking/rwsem: Disable preemption in all down_read*() and up_read() code paths (bsc#1207270).
- locking/rwsem: Disable preemption in all down_write*() and up_write() code paths (bsc#1207270).
- locking/rwsem: Disable preemption while trying for rwsem lock (bsc#1207270).
- locking/rwsem: Make handoff bit handling more consistent (bsc#1207270).
- locking/rwsem: No need to check for handoff bit if wait queue empty (bsc#1207270).
- locking/rwsem: Prevent non-first waiter from spinning in down_write() slowpath (bsc#1207270).
- locking: Add missing __sched attributes (bsc#1207270).
- makefile: link with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- media: coda: Add check for dcoda_iram_alloc (git-fixes).
- media: coda: Add check for kmalloc (git-fixes).
- media: i2c: imx219: Fix binning for RAW8 capture (git-fixes).
- media: i2c: imx219: Split common registers from mode tables (git-fixes).
- media: i2c: ov7670: 0 instead of -EINVAL was returned (git-fixes).
- media: i2c: ov772x: Fix memleak in ov772x_probe() (git-fixes).
- media: imx: imx7-media-csi: fix missing clk_disable_unprepare() in imx7_csi_init() (git-fixes).
- media: ipu3-cio2: Fix PM runtime usage_count in driver unbind (git-fixes).
- media: m5mols: fix off-by-one loop termination error (git-fixes).
- media: max9286: Fix memleak in max9286_v4l2_register() (git-fixes).
- media: ov2740: Fix memleak in ov2740_init_controls() (git-fixes).
- media: ov5640: Fix analogue gain control (git-fixes).
- media: ov5675: Fix memleak in ov5675_init_controls() (git-fixes).
- media: platform: ti: Add missing check for devm_regulator_get (git-fixes).
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (git-fixes).
- media: rc: gpio-ir-recv: add remove function (git-fixes).
- media: saa7134: Use video_unregister_device for radio_dev (git-fixes).
- media: ti: cal: fix possible memory leak in cal_ctx_create() (git-fixes).
- media: usb: siano: Fix use after free bugs caused by do_submit_urb (git-fixes).
- media: uvcvideo: Add support for V4L2_CTRL_TYPE_CTRL_CLASS (git-fixes).
- media: uvcvideo: Check controls flags before accessing them (git-fixes).
- media: uvcvideo: Check for INACTIVE in uvc_ctrl_is_accessible() (git-fixes).
- media: uvcvideo: Do not check for V4L2_CTRL_WHICH_DEF_VAL (git-fixes).
- media: uvcvideo: Fix memory leak of object map on error exit path (git-fixes).
- media: uvcvideo: Fix race condition with usb_kill_urb (git-fixes).
- media: uvcvideo: Handle cameras with invalid descriptors (git-fixes).
- media: uvcvideo: Handle errors from calls to usb_string (git-fixes).
- media: uvcvideo: Quirk for autosuspend in Logitech B910 and C910 (git-fixes).
- media: uvcvideo: Remove s_ctrl and g_ctrl (git-fixes).
- media: uvcvideo: Silence memcpy() run-time false positive warnings (git-fixes).
- media: uvcvideo: Use control names from framework (git-fixes).
- media: uvcvideo: refactor __uvc_ctrl_add_mapping (git-fixes).
- media: v4l2-jpeg: correct the skip count in jpeg_parse_app14_data (git-fixes).
- media: v4l2-jpeg: ignore the unknown APP14 marker (git-fixes).
- mei: bus-fixup:upon error print return values of send and receive (git-fixes).
- mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak (git-fixes).
- mfd: cs5535: Do not build on UML (git-fixes).
- mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read() (git-fixes).
- misc/mei/hdcp: Use correct macros to initialize uuid_le (git-fixes).
- misc: enclosure: Fix doc for enclosure_find() (git-fixes).
- mm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath() (bsc#1209262).
- mmc: jz4740: Work around bug on JZ4760(B) (git-fixes).
- mmc: mmc_spi: fix error handling in mmc_spi_probe() (git-fixes).
- mmc: sdhci_am654: lower power-on failed message severity (git-fixes).
- mmc: sdio: fix possible resource leaks in some error paths (git-fixes).
- move upstreamed i915 and media fixes into sorted section
- mt76: mt7915: fix polling firmware-own status (git-fixes).
- mtd: dataflash: remove duplicate SPI ID table (git-fixes).
- mtd: rawnand: fsl_elbc: Propagate HW ECC settings to HW (git-fixes).
- mtd: rawnand: sunxi: Clean up chips after failed init (git-fixes).
- mtd: rawnand: sunxi: Fix the size of the last OOB region (git-fixes).
- mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type (git-fixes).
- mtd: spi-nor: core: fix implicit declaration warning (git-fixes).
- mtd: spi-nor: sfdp: Fix index value for SCCR dwords (git-fixes).
- mtd: spi-nor: spansion: Consider reserved bits in CFR5 register (git-fixes).
- net/rose: Fix to not accept on connected socket (git-fixes).
- net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (git-fixes).
- nfc: change order inside nfc_se_io error path (git-fixes).
- nfc: fdp: add null check of devm_kmalloc_array in fdp_nci_i2c_read_device_properties (git-fixes).
- nfc: fix memory leak of se_io context in nfc_genl_se_io (git-fixes).
- nfc: pn533: initialize struct pn533_out_arg properly (git-fixes).
- nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition (git-fixes).
- nfs4/pnfs: Always return layout stats on layout return for flexfiles (git-fixes).
- nfs4: Fix kmemleak when allocate slot failed (git-fixes).
- nfs: Always initialise fattr-&gt;label in nfs_fattr_alloc() (git-fixes).
- nfs: Avoid writeback threads getting stuck in mempool_alloc() (git-fixes).
- nfs: Create a new nfs_alloc_fattr_with_label() function (git-fixes).
- nfs: Do not allocate nfs_fattr on the stack in __nfs42_ssc_open() (git-fixes).
- nfs: Further optimisations for 'ls -l' (git-fixes).
- nfs: nfs4clinet: check the return value of kstrdup() (git-fixes).
- nfs: nfsiod should not block forever in mempool_alloc() (git-fixes).
- nfs: nfsiod should not block forever in mempool_alloc() (git-fixes).
- nfsd: COMMIT operations must not return NFS?ERR_INVAL (git-fixes).
- nfsd: De-duplicate net_generic(nf-&gt;nf_net, nfsd_net_id) (git-fixes).
- nfsd: Finish converting the NFSv2 GETACL result encoder (git-fixes).
- nfsd: Finish converting the NFSv3 GETACL result encoder (git-fixes).
- nfsd: Fix a memory leak in an error handling path (git-fixes).
- nfsd: Fix handling of oversized NFSv4 COMPOUND requests (git-fixes).
- nfsd: Fix nfsd_breaker_owns_lease() return values (git-fixes).
- nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).
- nfsd: Return nfserr_serverfault if splice_ok but buf-&gt;pages have data (git-fixes).
- nfsd: do not call nfsd_file_put from client states seqfile display (git-fixes).
- nfsd: fix use-after-free on source server when doing inter-server copy (git-fixes).
- nfsd: pass range end to vfs_fsync_range() instead of count (git-fixes).
- nfsv3: handle out-of-order write replies (bsc#1205544).
- nfsv4 expose nfs_parse_server_name function (git-fixes).
- nfsv4 handle port presence in fs_location server string (git-fixes).
- nfsv4 only print the label when its queried (git-fixes).
- nfsv4 remove zero number of fs_locations entries error check (git-fixes).
- nfsv4 store server support for fs_location attribute (git-fixes).
- nfsv4.1 query for fs_location attr on a new file system (git-fixes).
- nfsv4.1: Fix uninitialised variable in devicenotify (git-fixes).
- nfsv4.1: Handle RECLAIM_COMPLETE trunking errors (git-fixes).
- nfsv4.1: We must always send RECLAIM_COMPLETE after a reboot (git-fixes).
- nfsv4.2: Clear FATTR4_WORD2_SECURITY_LABEL when done decoding (git-fixes).
- nfsv4.2: Fix a memory stomp in decode_attr_security_label (git-fixes).
- nfsv4.2: Fixup CLONE dest file size for zero-length count (git-fixes).
- nfsv4.2: fix reference count leaks in _nfs42_proc_copy_notify() (git-fixes).
- nfsv4/pnfs: Fix a use-after-free bug in open (git-fixes).
- nfsv4: Add an fattr allocation to _nfs4_discover_trunking() (git-fixes).
- nfsv4: Do not hold the layoutget locks across multiple RPC calls (git-fixes).
- nfsv4: Fix a potential state reclaim deadlock (git-fixes).
- nfsv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes).
- nfsv4: Protect the state recovery thread against direct reclaim (git-fixes).
- nfsv4: Retry LOCK on OLD_STATEID during delegation return (git-fixes).
- nvme-auth: check chap ctrl_key once constructed (bsc#1202633).
- nvme-auth: clear sensitive info right after authentication completes (bsc#1202633).
- nvme-auth: convert dhchap_auth_list to an array (bsc#1202633).
- nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633).
- nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633).
- nvme-auth: do not override ctrl keys before validation (bsc#1202633).
- nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633).
- nvme-auth: do not use NVMe status codes (bsc#1202633).
- nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633).
- nvme-auth: fix smatch warning complaints (bsc#1202633).
- nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633).
- nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633).
- nvme-auth: mark nvme_auth_wq static (bsc#1202633).
- nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633).
- nvme-auth: remove redundant auth_work flush (bsc#1202633).
- nvme-auth: remove redundant buffer deallocations (bsc#1202633).
- nvme-auth: remove redundant deallocations (bsc#1202633).
- nvme-auth: remove redundant if statement (bsc#1202633).
- nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633).
- nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633).
- nvme-auth: rename authentication work elements (bsc#1202633).
- nvme-auth: use workqueue dedicated to authentication (bsc#1202633).
- nvme-fabrics: show well known discovery name (bsc#1200054).
- ocfs2: Fix data corruption after failed write (bsc#1208542).
- pci/ioc: Enlarge virtfn sysfs name buffer (git-fixes).
- pci/pm: Always disable PTM for all devices during suspend (git-fixes).
- pci/pm: Avoid putting Elo i2 PCIe Ports in D3cold (git-fixes).
- pci/pm: Fix bridge_d3_blacklist Elo i2 overwrite of Gigabyte X299 (git-fixes).
- pci/pm: Observe reset delay irrespective of bridge_d3 (git-fixes).
- pci/ptm: Add pci_suspend_ptm() and pci_resume_ptm() (git-fixes).
- pci: Add ACS quirk for Wangxun NICs (git-fixes).
- pci: Add SolidRun vendor ID (git-fixes).
- pci: Align extra resources for hotplug bridges properly (git-fixes).
- pci: Avoid FLR for AMD FCH AHCI adapters (git-fixes).
- pci: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() (git-fixes).
- pci: Fix dropping valid root bus resources with .end = zero (git-fixes).
- pci: Reduce warnings on possible RW1C corruption (git-fixes).
- pci: Take other bus devices into account when distributing resources (git-fixes).
- pci: Unify delay handling for reset and resume (git-fixes).
- pci: aardvark: Check return value of generic_handle_domain_irq() when processing INTx IRQ (git-fixes).
- pci: aardvark: Fix link training (git-fixes).
- pci: dwc: Add dw_pcie_ops.host_deinit() callback (git-fixes).
- pci: hotplug: Allow marking devices as disconnected during bind/unbind (git-fixes).
- pci: hv: update comment in x86 specific hv_arch_irq_unmask (git-fixes).
- pci: mediatek-gen3: Assert resets to ensure expected init state (git-fixes).
- pci: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains() (git-fixes).
- pci: qcom: Fix host-init error handling (git-fixes).
- pci: qcom: Fix pipe clock imbalance (git-fixes).
- pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes).
- pci: xgene: Revert 'PCI: xgene: Use inbound resources for setup' (git-fixes).
- perf/amd/ibs: Use interrupt regs ip for stack unwinding (git fixes).
- perf/core: Call LSM hook after copying perf_event_attr (git fixes).
- perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() (git fixes).
- perf/core: Inherit event_caps (git fixes).
- perf/x86/amd: fix potential integer overflow on shift of a int (git fixes).
- perf/x86/intel/ds: Fix precise store latency handling (git fixes).
- perf/x86/intel/lbr: Use setup_clear_cpu_cap() instead of clear_cpu_cap() (git fixes).
- perf/x86/intel/pt: Fix sampling using single range output (git fixes).
- perf/x86/intel/pt: Relax address filter validation (git fixes).
- perf/x86/intel/uncore: Add Emerald Rapids (git fixes).
- perf/x86/intel/uncore: Clear attr_update properly (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Disable I/O stacks to PMU mapping on ICX-D (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Icelake Server (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Sapphire Rapids (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Skylake Server (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Fix broken read_counter() for SNB IMC PMU (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in __uncore_imc_init_box() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in sad_cfg_iio_topology() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() (git fixes).
- perf/x86/intel/uncore: Generalize IIO topology support (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Generalize get_topology() for SKX PMUs (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Get UPI NodeID and GroupID (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Introduce UPI topology type (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Make set_mapping() procedure void (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Update sysfs-devices-mapping file (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel: Add Cooper Lake stepping to isolation_ucodes (git fixes).
- perf/x86/intel: Add Emerald Rapids (git fixes).
- perf/x86/intel: Do not extend the pseudo-encoding to GP counters (git fixes).
- perf/x86/intel: Fix PEBS data source encoding for ADL (git fixes).
- perf/x86/intel: Fix PEBS memory access info encoding for ADL (git fixes).
- perf/x86/intel: Fix event constraints for ICL (git fixes).
- perf/x86/intel: Fix pebs event constraints for ADL (git fixes).
- perf/x86/intel: Fix pebs event constraints for ICL (git fixes).
- perf/x86/intel: Fix pebs event constraints for SPR (git fixes).
- perf/x86/lbr: Enable the branch type for the Arch LBR by default (git fixes).
- perf/x86/msr: Add Emerald Rapids (git fixes).
- perf/x86/rapl: Add support for Intel AlderLake-N (git fixes).
- perf/x86/rapl: Treat Tigerlake like Icelake (git fixes).
- perf/x86/rapl: Use standard Energy Unit for SPR Dram RAPL domain (git fixes).
- perf/x86/rapl: fix AMD event handling (git fixes).
- perf/x86/uncore: Add Raptor Lake uncore support (git fixes).
- perf/x86/uncore: Add a quirk for UPI on SPR (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Add new Alder Lake and Raptor Lake support (git fixes).
- perf/x86/uncore: Add new Raptor Lake S support (git fixes).
- perf/x86/uncore: Clean up uncore_pci_ids (git fixes).
- perf/x86/uncore: Do not WARN_ON_ONCE() for a broken discovery table (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Factor out uncore_device_to_die() (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Fix potential NULL pointer in uncore_get_alias_name (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Ignore broken units in discovery table (bsc#1206824, bsc#1206493, bsc#1206492).
- perf: Always wake the parent event (git fixes).
- perf: Fix possible memleak in pmu_dev_alloc() (git fixes).
- phy: rockchip-typec: Fix unsigned comparison with less than zero (git-fixes).
- phy: rockchip-typec: fix tcphy_get_mode error case (git-fixes).
- pinctrl: at91: use devm_kasprintf() to avoid potential leaks (git-fixes).
- pinctrl: mediatek: Initialize variable *buf to zero (git-fixes).
- pinctrl: mediatek: fix coding style (git-fixes).
- pinctrl: qcom: pinctrl-msm8976: Correct function names for wcss pins (git-fixes).
- pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups (git-fixes).
- pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain (git-fixes).
- platform/x86: ISST: PUNIT device mapping with Sub-NUMA clustering (bsc#1208420).
- platform/x86: amd-pmc: Correct usage of SMU version (git-fixes).
- platform/x86: amd-pmc: Export Idlemask values based on the APU (git-fixes).
- platform/x86: amd-pmc: Fix compilation when CONFIG_DEBUGFS is disabled (git-fixes).
- platform/x86: touchscreen_dmi: Add Chuwi Vi8 (CWI501) DMI match (git-fixes).
- platform: x86: MLX_PLATFORM: select REGMAP instead of depending on it (git-fixes).
- powercap: fix possible name leak in powercap_register_zone() (git-fixes).
- powerpc/eeh: Set channel state after notifying the drivers (bsc#1208784 ltc#201612).
- printf: fix errname.c list (git-fixes).
- prlimit: do_prlimit needs to have a speculation check (bsc#1209256).
- pwm: stm32-lp: fix the check on arr and cmp registers update (git-fixes).
- qede: avoid uninitialized entries in coal_entry array (bsc#1205846).
- qede: fix interrupt coalescing configuration (bsc#1205846).
- rcu: Tighten rcu_advance_cbs_nowake() checks (bsc#1209159).
- rdma/cxgb4: Fix potential null-ptr-deref in pass_establish() (git-fixes)
- rdma/cxgb4: add null-ptr-check after ip_dev_find() (git-fixes)
- rdma/cxgb4: remove unnecessary NULL check in __c4iw_poll_cq_one() (git-fixes)
- rdma/irdma: Cap MSIX used to online CPUs + 1 (git-fixes)
- rdma/rxe: Fix missing memory barriers in rxe_queue.h (git-fixes)
- rdma/siw: Fix user page pinning accounting (git-fixes)
- refresh suse/NFSv3-handle-out-of-order-write-replies. Careless typo - might cause bsc#1209457
- refresh suse/ice-clear-stale-Tx-queue-settings-before-configuring. Fix bug introduced by broken backport (bsc#1208628).
- regulator: Flag uncontrollable regulators as always_on (git-fixes).
- regulator: core: Fix off-on-delay-us for always-on/boot-on regulators (git-fixes).
- regulator: core: Use ktime_get_boottime() to determine how long a regulator was off (git-fixes).
- regulator: max77802: Bounds check regulator id against opmode (git-fixes).
- regulator: s5m8767: Bounds check id indexing into arrays (git-fixes).
- remoteproc/mtk_scp: Move clk ops outside send_lock (git-fixes).
- remoteproc: qcom_q6v5_mss: Use a carveout to authenticate modem headers (git-fixes).
- replace mkinitrd dependency with dracut (bsc#1202353). Also update mkinitrd refrences in documentation and comments.
- require suse-kernel-rpm-scriptlets at all times. The kernel packages call scriptlets for each stage, add the dependency to make it clear to libzypp that the scriptlets are required. There is no special dependency for posttrans, these scriptlets run when transactions are resolved. The plain dependency has to be used to support posttrans.
- revert 'char: pcmcia: cm4000_cs: Replace mdelay with usleep_range in set_protocol' (git-fixes).
- revert 'crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete' (git-fixes).
- revert 'hid: logitech-hidpp: add a module parameter to keep firmware gestures' (git-fixes).
- revert 'usb: dwc3: qcom: Keep power domain on to retain controller status' (git-fixes).
- rpm/group-source-files.pl: Deal with {pre,post}fixed / in location When the source file location provided with -L is either prefixed or postfixed with forward slash, the script get stuck in a infinite loop inside calc_dirs() where $path is an empty string. user@localhost:/tmp&gt; perl '$HOME/group-source-files.pl' -D devel.files -N nondevel.files -L /usr/src/linux-5.14.21-150500.41/ ... path = /usr/src/linux-5.14.21-150500.41/Documentation/Kconfig path = /usr/src/linux-5.14.21-150500.41/Documentation path = /usr/src/linux-5.14.21-150500.41 path = /usr/src path = /usr path = path = path = ... # Stuck in an infinite loop This workarounds the issue by breaking out the loop once path is an empty string. For a proper fix we'd want something that filesystem-aware, but this workaround should be enough for the rare occation that this script is ran manually. Link: http://mailman.suse.de/mlarch/SuSE/kernel/2023/kernel.2023.03/msg00024.html
- rpm/kernel-obs-build.spec.in: Remove SLE11 cruft
- rtc: allow rtc_read_alarm without read_alarm callback (git-fixes).
- rtc: pm8xxx: fix set-alarm race (git-fixes).
- rtc: sun6i: Always export the internal oscillator (git-fixes).
- s390/dasd: Fix potential memleak in dasd_eckd_init() (git-fixes).
- s390/kexec: fix ipl report address for kdump (bsc#1207529).
- scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607).
- scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607).
- scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607).
- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607).
- scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607).
- scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607).
- scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534).
- scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607).
- scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607).
- scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607).
- scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607).
- scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607).
- scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103).
- scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570).
- scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570).
- scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570).
- scsi: qla2xxx: Fix erroneous link down (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570).
- scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570).
- scsi: qla2xxx: Fix printk() format string (bsc#1208570).
- scsi: qla2xxx: Fix stalled login (bsc#1208570).
- scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570).
- scsi: qla2xxx: Relocate/rename vp map (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (bsc#1208570).
- scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570).
- scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570).
- scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570).
- scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570).
- scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570).
- scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1208570).
- scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570).
- scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570).
- scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570).
- scsi: storvsc: Handle BlockSize change in Hyper-V VHD/VHDX file (git-fixes).
- sefltests: netdevsim: wait for devlink instance after netns removal (git-fixes).
- selftest/lkdtm: Skip stack-entropy test if lkdtm is not available (git-fixes).
- selftests/ftrace: Add check for ping command for trigger tests (bsc#1204993 ltc#200103).
- selftests/ftrace: Convert tracer tests to use 'requires' to specify program dependency (bsc#1204993 ltc#200103).
- selftests/powerpc: Account for offline cpus in perf-hwbreak test (bsc#1206232).
- selftests/powerpc: Bump up rlimit for perf-hwbreak test (bsc#1206232).
- selftests/powerpc: Move perror closer to its use (bsc#1206232).
- serial: 8250_em: Fix UART port type (git-fixes).
- serial: 8250_fsl: fix handle_irq locking (git-fixes).
- serial: fsl_lpuart: fix RS485 RTS polariy inverse issue (git-fixes).
- serial: qcom-geni: fix console shutdown hang (git-fixes).
- serial: sc16is7xx: setup GPIO controller later in probe (git-fixes).
- serial: tegra: Add missing clk_disable_unprepare() in tegra_uart_hw_init() (git-fixes).
- signal/seccomp: Refactor seccomp signal and coredump generation (git-fixes).
- signal/x86: In emulate_vsyscall force a signal instead of calling do_exit (git-fixes).
- signal: Implement force_fatal_sig (git-fixes).
- smb3: Replace smb2pdu 1-element arrays with flex-arrays (bsc#1193629).
- soundwire: cadence: Do not overflow the command FIFOs (git-fixes).
- spi: bcm63xx-hsspi: Endianness fix for ARM based SoC (git-fixes).
- spi: dw_bt1: fix MUX_MMIO dependencies (git-fixes).
- spi: synquacer: Fix timeout handling in synquacer_spi_transfer_one() (git-fixes).
- spi: tegra210-quad: Fix validate combined sequence (git-fixes).
- staging: emxx_udc: Add checks for dma_alloc_coherent() (git-fixes).
- staging: mt7621-dts: change palmbus address to lower case (git-fixes).
- struct uvc_device move flush_status new member to end (git-fixes).
- sunrpc allow for unspecified transport time in rpc_clnt_add_xprt (git-fixes).
- sunrpc: Do not leak netobj memory when gss_read_proxy_verf() fails (git-fixes).
- sunrpc: Fix null-ptr-deref when xps sysfs alloc failed (git-fixes).
- sunrpc: Fix potential race conditions in rpc_sysfs_xprt_state_change() (git-fixes).
- sunrpc: Fix socket waits for write buffer space (git-fixes).
- sunrpc: Return true/false (not 1/0) from bool functions (git-fixes).
- supported.conf: Remove duplicate entry.
- thermal/drivers/hisi: Drop second sensor hi3660 (git-fixes).
- thermal/drivers/tsens: Add compat string for the qcom,msm8960 (git-fixes).
- thermal/drivers/tsens: Drop msm8976-specific defines (git-fixes).
- thermal/drivers/tsens: Sort out msm8976 vs msm8956 data (git-fixes).
- thermal/drivers/tsens: fix slope values for msm8939 (git-fixes).
- thermal/drivers/tsens: limit num_sensors to 9 for msm8939 (git-fixes).
- thermal: intel: BXT_PMIC: select REGMAP instead of depending on it (git-fixes).
- thermal: intel: Fix unsigned comparison with less than zero (git-fixes).
- thermal: intel: intel_pch: Add support for Wellsburg PCH (git-fixes).
- thermal: intel: powerclamp: Fix cur_state for multi package system (git-fixes).
- thermal: intel: quark_dts: fix error pointer dereference (git-fixes).
- tools/iio/iio_utils:fix memory leak (git-fixes).
- tpm/eventlog: Do not abort tpm_read_log on faulty ACPI address (git-fixes).
- tty: fix out-of-bounds access in tty_driver_lookup_tty() (git-fixes).
- tty: serial: fsl_lpuart: Fix the wrong RXWATER setting for rx dma case (git-fixes).
- tty: serial: fsl_lpuart: clear LPUART Status Register in lpuart32_shutdown() (git-fixes).
- tty: serial: fsl_lpuart: disable Rx/Tx DMA in lpuart32_shutdown() (git-fixes).
- tty: serial: fsl_lpuart: disable the CTS when send break signal (git-fixes).
- tty: serial: imx: Handle RS485 DE signal active high (git-fixes).
- tty: serial: imx: disable Ageing Timer interrupt request irq (git-fixes).
- tty: serial: qcom-geni-serial: stop operations in progress at shutdown (git-fixes).
- update internal module version number for cifs.ko (bsc#1193629).
- update suse/hid-bigben_probe-validate-report-count (bsc#1208605). Added bugzilla reference to fix already applied
- usb: core: Do not hold device lock while reading the 'descriptors' sysfs file (git-fixes).
- usb: dwc3: core: Host wake up support from system suspend (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-M (git-fixes).
- usb: dwc3: qcom: Configure wakeup interrupts during suspend (git-fixes).
- usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init (git-fixes).
- usb: dwc3: qcom: Keep power domain on to retain controller status (git-fixes).
- usb: dwc3: qcom: clean up icc init (git-fixes).
- usb: dwc3: qcom: clean up suspend callbacks (git-fixes).
- usb: dwc3: qcom: fix gadget-only builds (git-fixes).
- usb: dwc3: qcom: fix peripheral and OTG suspend (git-fixes).
- usb: dwc3: qcom: fix wakeup implementation (git-fixes).
- usb: dwc3: qcom: only parse 'maximum-speed' once (git-fixes).
- usb: dwc3: qcom: suppress unused-variable warning (git-fixes).
- usb: early: xhci-dbc: Fix a potential out-of-bound memory access (git-fixes).
- usb: ene_usb6250: Allocate enough memory for full object (git-fixes).
- usb: gadget: configfs: Restrict symlink creation is UDC already binded (git-fixes).
- usb: gadget: configfs: remove using list iterator after loop body as a ptr (git-fixes).
- usb: gadget: configfs: use to_config_usb_cfg() in os_desc_link() (git-fixes).
- usb: gadget: configfs: use to_usb_function_instance() in cfg (un)link func (git-fixes).
- usb: gadget: fusb300_udc: free irq on the error path in fusb300_probe() (git-fixes).
- usb: gadget: u_serial: Add null pointer check in gserial_resume (git-fixes).
- usb: host: xhci: mvebu: Iterate over array indexes instead of using pointer math (git-fixes).
- usb: max-3421: Fix setting of I/O pins (git-fixes).
- usb: musb: Add and use inline function musb_otg_state_string (git-fixes).
- usb: musb: Add and use inline functions musb_{get,set}_state (git-fixes).
- usb: musb: mediatek: do not unregister something that wasn't registered (git-fixes).
- usb: musb: remove schedule work called after flush (git-fixes).
- usb: serial: option: add support for VW/Skoda 'Carstick LTE' (git-fixes).
- usb: typec: intel_pmc_mux: Do not leak the ACPI device reference count (git-fixes).
- usb: typec: intel_pmc_mux: Use the helper acpi_dev_get_memory_resources() (git-fixes).
- usb: uvc: Enumerate valid values for color matching (git-fixes).
- vc_screen: do not clobber return value in vcs_read (git-fixes).
- vc_screen: modify vcs_size() handling in vcs_read() (git-fixes).
- vdpa_sim: not reset state in vdpasim_queue_ready (git-fixes).
- vfio/type1: prevent underflow of locked_vm via exec() (git-fixes).
- vfio/type1: restore locked_vm (git-fixes).
- vfio/type1: track locked_vm per dma (git-fixes).
- vfs: filename_create(): fix incorrect intent (bsc#1197534).
- virt/sev-guest: Add a MODULE_ALIAS (bsc#1208449).
- virt/sev-guest: Prevent IV reuse in the SNP guest driver (bsc#1208449).
- virt/sev-guest: Remove unnecessary free in init_crypto() (bsc#1208449).
- virt: sev-guest: Pass the appropriate argument type to iounmap() (bsc#1208449).
- virt: sevguest: Change driver name to reflect generic SEV support (bsc#1208449).
- virt: sevguest: Rename the sevguest dir and files to sev-guest (bsc#1208449).
- vmci: check context-&gt;notify_page after call to get_user_pages_fast() to avoid GPF (git-fixes).
- vmxnet3: move rss code block under eop descriptor (bsc#1208212).
- watch_queue: fix IOC_WATCH_QUEUE_SET_SIZE alloc error paths (bsc#1197617).
- watchdog: Fix kmemleak in watchdog_cdev_register (git-fixes).
- watchdog: at91sam9_wdt: use devm_request_irq to avoid missing free_irq() in error path (git-fixes).
- watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git-fixes).
- watchdog: sbsa_wdog: Make sure the timeout programming is within the limits (git-fixes).
- wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup (git-fixes).
- wifi: ath11k: allow system suspend to survive ath11k (git-fixes).
- wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (git-fixes).
- wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() (git-fixes).
- wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails (git-fixes).
- wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (git-fixes).
- wifi: ath9k: use proper statements in conditionals (git-fixes).
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() (git-fixes).
- wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds (git-fixes).
- wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() (git-fixes).
- wifi: brcmfmac: unmap dma buffer in brcmf_msgbuf_alloc_pktid() (git-fixes).
- wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() (git-fixes).
- wifi: cfg80211: Fix use after free for wext (git-fixes).
- wifi: cfg80211: Partial revert 'wifi: cfg80211: Fix use after free for wext' (git-fixes).
- wifi: ipw2200: fix memory leak in ipw_wdev_init() (git-fixes).
- wifi: ipw2x00: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: iwl3945: Add missing check for create_singlethread_workqueue (git-fixes).
- wifi: iwl4965: Add missing check for create_singlethread_workqueue() (git-fixes).
- wifi: iwlegacy: common: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: cmdresp: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: fix memory leak in lbs_init_adapter() (git-fixes).
- wifi: libertas: if_usb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: main: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas_tf: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: mac80211: make rate u32 in sta_set_rate_info_rx() (git-fixes).
- wifi: mt7601u: fix an integer underflow (git-fixes).
- wifi: mt76: dma: free rx_head in mt76_dma_rx_cleanup (git-fixes).
- wifi: mwifiex: Add missing compatible string for SD8787 (git-fixes).
- wifi: mwifiex: fix loop iterator in mwifiex_update_ampdu_txwinsize() (git-fixes).
- wifi: orinoco: check return value of hermes_write_wordrec() (git-fixes).
- wifi: rsi: Fix memory leak in rsi_coex_attach() (git-fixes).
- wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU (git-fixes).
- wifi: rtl8xxxu: Use a longer retry limit of 48 (git-fixes).
- wifi: rtl8xxxu: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtl8xxxu: fixing transmisison failure for rtl8192eu (git-fixes).
- wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() (git-fixes).
- wifi: rtlwifi: rtl8188ee: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtlwifi: rtl8723be: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtlwifi: rtl8821ae: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtw89: Add missing check for alloc_workqueue (git-fixes).
- wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() (git-fixes).
- wifi: wl3501_cs: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- x86/64/mm: Map all kernel memory into trampoline_pgd (git-fixes).
- x86/amd_nb: Add AMD PCI IDs for SMN communication (bsc#1208848).
- x86/cpu: Add CPU model numbers for Meteor Lake (git fixes).
- x86/cpu: Add Raptor Lake to Intel family (git fixes).
- x86/cpu: Add new Alderlake and Raptorlake CPU model numbers (git fixes).
- x86/cpu: Add new Raptor Lake CPU model number (git fixes).
- x86/cpu: Add several Intel server CPU model numbers (git fixes).
- x86/cpu: Drop spurious underscore from RAPTOR_LAKE #define (git fixes).
- x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants (git-fixes).
- x86/perf/zhaoxin: Add stepping check for ZXC (git fixes).
- x86/perf: Avoid warning for Arch LBR without XSAVE (git fixes).
- x86/perf: Default set FREEZE_ON_SMI for all (git fixes).
- x86/sgx: Fix free page accounting (git-fixes).
- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).
- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).
- x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- xen-netfront: Fix NULL sring after live migration (git-fixes).
- xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too (git-fixes).
- xen/arm: Fix race in RB-tree based P2M accounting (git-fixes)
- xen/netback: do some code cleanup (git-fixes).
- xen/netback: fix build warning (git-fixes).
- xen/netfront: destroy queues before real_num_tx_queues is zeroed (git-fixes).
- xen/platform-pci: add missing free_irq() in error path (git-fixes).
- xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-28"/>
	<updated date="2023-03-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197534">SUSE bug 1197534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197617">SUSE bug 1197617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198438">SUSE bug 1198438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200054">SUSE bug 1200054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202353">SUSE bug 1202353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202633">SUSE bug 1202633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203200">SUSE bug 1203200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203331">SUSE bug 1203331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204363">SUSE bug 1204363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204993">SUSE bug 1204993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205544">SUSE bug 1205544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205846">SUSE bug 1205846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206103">SUSE bug 1206103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206232">SUSE bug 1206232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206492">SUSE bug 1206492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206493">SUSE bug 1206493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206824">SUSE bug 1206824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206935">SUSE bug 1206935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207270">SUSE bug 1207270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207529">SUSE bug 1207529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207560">SUSE bug 1207560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207845">SUSE bug 1207845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207846">SUSE bug 1207846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208179">SUSE bug 1208179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208212">SUSE bug 1208212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208420">SUSE bug 1208420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208449">SUSE bug 1208449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208534">SUSE bug 1208534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208541">SUSE bug 1208541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208542">SUSE bug 1208542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208570">SUSE bug 1208570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208598">SUSE bug 1208598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208599">SUSE bug 1208599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208601">SUSE bug 1208601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208605">SUSE bug 1208605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208607">SUSE bug 1208607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208628">SUSE bug 1208628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208700">SUSE bug 1208700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208741">SUSE bug 1208741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208759">SUSE bug 1208759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208776">SUSE bug 1208776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208777">SUSE bug 1208777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208784">SUSE bug 1208784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208787">SUSE bug 1208787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208816">SUSE bug 1208816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208837">SUSE bug 1208837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208843">SUSE bug 1208843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208848">SUSE bug 1208848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209008">SUSE bug 1209008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209159">SUSE bug 1209159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209256">SUSE bug 1209256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209258">SUSE bug 1209258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209262">SUSE bug 1209262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209291">SUSE bug 1209291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209436">SUSE bug 1209436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209457">SUSE bug 1209457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209504">SUSE bug 1209504</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3523/">CVE-2022-3523 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3523">CVE-2022-3523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38096/">CVE-2022-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38096">CVE-2022-38096 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0461/">CVE-2023-0461 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0461">CVE-2023-0461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0597/">CVE-2023-0597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0597">CVE-2023-0597 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1075/">CVE-2023-1075 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1075">CVE-2023-1075 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1076/">CVE-2023-1076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1078/">CVE-2023-1078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1095/">CVE-2023-1095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1095">CVE-2023-1095 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1118/">CVE-2023-1118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22995/">CVE-2023-22995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22995">CVE-2023-22995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22998/">CVE-2023-22998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23000/">CVE-2023-23000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23000">CVE-2023-23000 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23004/">CVE-2023-23004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23004">CVE-2023-23004 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25012/">CVE-2023-25012 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26545/">CVE-2023-26545 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28328/">CVE-2023-28328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28328">CVE-2023-28328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750746" comment="kernel-rt-5.14.21-150400.15.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205921" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1203201" ref_url="https://bugzilla.suse.com/1203201" source="BUGZILLA"/>
		<reference ref_id="1206483" ref_url="https://bugzilla.suse.com/1206483" source="BUGZILLA"/>
		<reference ref_id="1206772" ref_url="https://bugzilla.suse.com/1206772" source="BUGZILLA"/>
		<reference ref_id="1208595" ref_url="https://bugzilla.suse.com/1208595" source="BUGZILLA"/>
		<reference ref_id="1209361" ref_url="https://bugzilla.suse.com/1209361" source="BUGZILLA"/>
		<reference ref_id="1209362" ref_url="https://bugzilla.suse.com/1209362" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27320" ref_url="https://www.suse.com/security/cve/CVE-2023-27320/" source="CVE"/>
		<reference ref_id="CVE-2023-28486" ref_url="https://www.suse.com/security/cve/CVE-2023-28486/" source="CVE"/>
		<reference ref_id="CVE-2023-28487" ref_url="https://www.suse.com/security/cve/CVE-2023-28487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028455.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issue:

Security issues:

- CVE-2023-28486: Fixed sudo does not escape control characters in log messages. (bsc#1209362)
- CVE-2023-28487: Fixed sudo does not escape control characters in sudoreplay output. (bsc#1209361)
- CVE-2023-27320: Fixed a potential security issue with a double free with per-command chroot sudoers rules (bsc#1208595).

Bug fixes:

- Fix a situation where 'sudo -U otheruser -l' would dereference a NULL pointer (bsc#1206483)
- If NOPASSWD is specified, don't ask for password if command is not found (bsc#1206772).
- Do not re-enable the reader when flushing the buffers as part of pty_finish() (bsc#1203201).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-29"/>
	<updated date="2023-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203201">SUSE bug 1203201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206483">SUSE bug 1206483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206772">SUSE bug 1206772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208595">SUSE bug 1208595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209361">SUSE bug 1209361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209362">SUSE bug 1209362</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27320/">CVE-2023-27320 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27320">CVE-2023-27320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28486/">CVE-2023-28486 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28486">CVE-2023-28486 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28487/">CVE-2023-28487 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28487">CVE-2023-28487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009750866" comment="sudo-1.9.9-150400.4.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205922" version="1" class="patch">
	<metadata>
		<title>Security update for libmicrohttpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208745" ref_url="https://bugzilla.suse.com/1208745" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27371" ref_url="https://www.suse.com/security/cve/CVE-2023-27371/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1686-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029037.html" source="SUSE-SU"/>
		<description>
This update for libmicrohttpd fixes the following issues:

- CVE-2023-27371: Fixed a parser bug that could be used to crash servers using the MHD_PostProcessor (bsc#1208745).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208745">SUSE bug 1208745</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27371/">CVE-2023-27371 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009742931" comment="libmicrohttpd12-0.9.57-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205923" version="1" class="patch">
	<metadata>
		<title>Security update for zstd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1209533" ref_url="https://bugzilla.suse.com/1209533" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4899" ref_url="https://www.suse.com/security/cve/CVE-2022-4899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028478.html" source="SUSE-SU"/>
		<description>
This update for zstd fixes the following issues:

- CVE-2022-4899: Fixed buffer overrun in util.c (bsc#1209533).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-29"/>
	<updated date="2023-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209533">SUSE bug 1209533</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4899/">CVE-2022-4899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4899">CVE-2022-4899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009748401" comment="libzstd1-1.5.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009748402" comment="zstd-1.5.0-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205924" version="1" class="patch">
	<metadata>
		<title>Security update for ldb, samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1201490" ref_url="https://bugzilla.suse.com/1201490" source="BUGZILLA"/>
		<reference ref_id="1207416" ref_url="https://bugzilla.suse.com/1207416" source="BUGZILLA"/>
		<reference ref_id="1207723" ref_url="https://bugzilla.suse.com/1207723" source="BUGZILLA"/>
		<reference ref_id="1207996" ref_url="https://bugzilla.suse.com/1207996" source="BUGZILLA"/>
		<reference ref_id="1209481" ref_url="https://bugzilla.suse.com/1209481" source="BUGZILLA"/>
		<reference ref_id="1209483" ref_url="https://bugzilla.suse.com/1209483" source="BUGZILLA"/>
		<reference ref_id="1209485" ref_url="https://bugzilla.suse.com/1209485" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32746" ref_url="https://www.suse.com/security/cve/CVE-2022-32746/" source="CVE"/>
		<reference ref_id="CVE-2023-0225" ref_url="https://www.suse.com/security/cve/CVE-2023-0225/" source="CVE"/>
		<reference ref_id="CVE-2023-0614" ref_url="https://www.suse.com/security/cve/CVE-2023-0614/" source="CVE"/>
		<reference ref_id="CVE-2023-0922" ref_url="https://www.suse.com/security/cve/CVE-2023-0922/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014245.html" source="SUSE-SU"/>
		<description>
This update for ldb, samba fixes the following issues:

ldb: 
    
- CVE-2022-32746: Fixed an use-after-free issue in the database audit logging module (bsc#1201490).
- CVE-2023-0614: Fixed discovering of access controlled AD LDAP attributes (bso#15270) (bsc#1209485).

samba:

- CVE-2023-0922: Fixed cleartext password sending by AD DC admin tool (bso#15315) (bsc#1209481).
- CVE-2023-0225: Fixed deletion of AD DC 'dnsHostname' attribute by unprivileged authenticated users (bso#15276) (bsc#1209483).
- CVE-2023-0614: Fixed discovering of access controlled AD LDAP attributes (bso#15270) (bsc#1209485).

The following non-security bug were fixed:

- Prevent use after free of messaging_ctdb_fde_ev structs (bso#15293) (bsc#1207416).
- Ship missing samba-winbind-libs-32bit package (bsc#1207996)
- Ship missing samba-libs to SLE Micro 5.3 (bsc#1207723)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-29"/>
	<updated date="2023-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201490">SUSE bug 1201490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207416">SUSE bug 1207416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207723">SUSE bug 1207723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207996">SUSE bug 1207996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209481">SUSE bug 1209481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209483">SUSE bug 1209483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209485">SUSE bug 1209485</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32746/">CVE-2022-32746 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32746">CVE-2022-32746 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0225/">CVE-2023-0225 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0225">CVE-2023-0225 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0614/">CVE-2023-0614 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0614">CVE-2023-0614 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0922/">CVE-2023-0922 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0922">CVE-2023-0922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009752074" comment="libldb2-2.4.4-150400.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752075" comment="samba-client-libs-4.15.13+git.636.53d93c5b9d6-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752076" comment="samba-libs-4.15.13+git.636.53d93c5b9d6-150400.3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205925" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1185232" ref_url="https://bugzilla.suse.com/1185232" source="BUGZILLA"/>
		<reference ref_id="1185261" ref_url="https://bugzilla.suse.com/1185261" source="BUGZILLA"/>
		<reference ref_id="1185441" ref_url="https://bugzilla.suse.com/1185441" source="BUGZILLA"/>
		<reference ref_id="1185621" ref_url="https://bugzilla.suse.com/1185621" source="BUGZILLA"/>
		<reference ref_id="1187071" ref_url="https://bugzilla.suse.com/1187071" source="BUGZILLA"/>
		<reference ref_id="1187260" ref_url="https://bugzilla.suse.com/1187260" source="BUGZILLA"/>
		<reference ref_id="1193282" ref_url="https://bugzilla.suse.com/1193282" source="BUGZILLA"/>
		<reference ref_id="1198458" ref_url="https://bugzilla.suse.com/1198458" source="BUGZILLA"/>
		<reference ref_id="1201066" ref_url="https://bugzilla.suse.com/1201066" source="BUGZILLA"/>
		<reference ref_id="1202120" ref_url="https://bugzilla.suse.com/1202120" source="BUGZILLA"/>
		<reference ref_id="1205588" ref_url="https://bugzilla.suse.com/1205588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028509.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- Updated shim signature after shim 15.7 be signed back:
  signature-sles.x86_64.asc, signature-sles.aarch64.asc (bsc#1198458)

- Add POST_PROCESS_PE_FLAGS=-N to the build command in shim.spec to
  disable the NX compatibility flag when using post-process-pe because
  grub2 is not ready. (bsc#1205588)

- Enable the NX compatibility flag by default. (jsc#PED-127) 

Update to 15.7 (bsc#1198458) (jsc#PED-127):

- Make SBAT variable payload introspectable
- Reference MokListRT instead of MokList
- Add a link to the test plan in the readme.
- [V3] Enable TDX measurement to RTMR register
- Discard load-options that start with a NUL
- Fixed load_cert_file bugs
- Add -malign-double to IA32 compiler flags
- pe: Fix image section entry-point validation
- make-archive: Build reproducible tarball
- mok: remove MokListTrusted from PCR 7

Other fixes:

- Support enhance shim measurement to TD RTMR. (jsc#PED-1273) 

- shim-install: ensure grub.cfg created is not overwritten after installing grub related files
- Add logic to shim.spec to only set sbat policy when efivarfs is writeable.  (bsc#1201066)
- Add logic to shim.spec for detecting --set-sbat-policy option before using mokutil to set sbat policy. (bsc#1202120)
- Change the URL in SBAT section to mail:security@suse.de. (bsc#1193282)

Update to 15.6 (bsc#1198458):

- MokManager: removed Locate graphic output protocol fail error message
- shim: implement SBAT verification for the shim_lock protocol
- post-process-pe: Fix a missing return code check
- Update github actions matrix to be more useful
- post-process-pe: Fix format string warnings on 32-bit platforms
- Allow MokListTrusted to be enabled by default
- Re-add ARM AArch64 support
- Use ASCII as fallback if Unicode Box Drawing characters fail
- make: don't treat cert.S specially
- shim: use SHIM_DEVEL_VERBOSE when built in devel mode
- Break out of the inner sbat loop if we find the entry.
- Support loading additional certificates
- Add support for NX (W^X) mitigations.
- Fix preserve_sbat_uefi_variable() logic
- SBAT Policy latest should be a one-shot
- pe: Fix a buffer overflow when SizeOfRawData &gt; VirtualSize
- pe: Perform image verification earlier when loading grub
- Update advertised sbat generation number for shim
- Update SBAT generation requirements for 05/24/22
- Also avoid CVE-2022-28737 in verify_image() by @vathpela

Update to 15.5 (bsc#1198458):

- Broken ia32 relocs and an unimportant submodule change.
- mok: allocate MOK config table as BootServicesData
- Don't call QueryVariableInfo() on EFI 1.10 machines (bsc#1187260)
- Relax the check for import_mok_state()  (bsc#1185261)
- SBAT.md: trivial changes
- shim: another attempt to fix load options handling
- Add tests for our load options parsing.
- arm/aa64: fix the size of .rela* sections
- mok: fix potential buffer overrun in import_mok_state
- mok: relax the maximum variable size check
- Don't unhook ExitBootServices when EBS protection is disabled
- fallback: find_boot_option() needs to return the index for the boot entry in optnum
- httpboot: Ignore case when checking HTTP headers
- Fallback allocation errors
- shim: avoid BOOTx64.EFI in message on other architectures
- str: remove duplicate parameter check
- fallback: add compile option FALLBACK_NONINTERACTIVE
- Test mok mirror
- Modify sbat.md to help with readability.
- csv: detect end of csv file correctly
- Specify that the .sbat section is ASCII not UTF-8
- tests: add 'include-fixed' GCC directory to include directories
- pe: simplify generate_hash()
- Don't make shim abort when TPM log event fails (RHBZ #2002265)
- Fallback to default loader if parsed one does not exist
- fallback: Fix for BootOrder crash when index returned
- Better console checks
- docs: update SBAT UEFI variable name
- Don't parse load options if invoked from removable media path
- fallback: fix fallback not passing arguments of the first boot option
- shim: Don't stop forever at 'Secure Boot not enabled' notification
- Allocate mokvar table in runtime memory.
- Remove post-process-pe on 'make clean'
- pe: missing perror argument


- CVE-2022-28737: Fixed a buffer overflow when SizeOfRawData &gt; VirtualSize (bsc#1198458)

- Add mokutil command to post script for setting sbat policy to latest mode
  when the SbatPolicy-605dab50-e046-4300-abb6-3dd810dd8b23 is not created.
  (bsc#1198458)

- Updated vendor dbx binary and script (bsc#1198458)

  - Updated dbx-cert.tar.xz and vendor-dbx-sles.bin for adding
    SLES-UEFI-SIGN-Certificate-2021-05.crt to vendor dbx list.
  - Updated dbx-cert.tar.xz and vendor-dbx-opensuse.bin for adding
    openSUSE-UEFI-SIGN-Certificate-2021-05.crt to vendor dbx list.
  - Updated vendor-dbx.bin for adding SLES-UEFI-SIGN-Certificate-2021-05.crt
    and openSUSE-UEFI-SIGN-Certificate-2021-05.crt for testing environment.
  - Updated generate-vendor-dbx.sh script for generating a vendor-dbx.bin
    file which includes all .der for testing environment.

- avoid buffer overflow when copying data to the MOK config table (bsc#1185232)
- Disable exporting vendor-dbx to MokListXRT since writing a large RT variable could crash some machines (bsc#1185261)
- ignore the odd LoadOptions length (bsc#1185232)
- shim-install: reset def_shim_efi to 'shim.efi' if the given file doesn't exist
- relax the maximum variable size check for u-boot (bsc#1185621)
- handle ignore_db and user_insecure_mode correctly (bsc#1185441, bsc#1187071)

- Split the keys in vendor-dbx.bin to vendor-dbx-sles and
  vendor-dbx-opensuse for shim-sles and shim-opensuse to reduce
  the size of MokListXRT (bsc#1185261) 
  + Also update generate-vendor-dbx.sh in dbx-cert.tar.xz
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-30"/>
	<updated date="2023-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185232">SUSE bug 1185232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185261">SUSE bug 1185261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185441">SUSE bug 1185441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185621">SUSE bug 1185621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187071">SUSE bug 1187071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187260">SUSE bug 1187260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193282">SUSE bug 1193282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201066">SUSE bug 1201066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202120">SUSE bug 1202120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205588">SUSE bug 1205588</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009748298" comment="shim-15.7-150300.4.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205926" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1166486" ref_url="https://bugzilla.suse.com/1166486" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1197534" ref_url="https://bugzilla.suse.com/1197534" source="BUGZILLA"/>
		<reference ref_id="1197617" ref_url="https://bugzilla.suse.com/1197617" source="BUGZILLA"/>
		<reference ref_id="1198438" ref_url="https://bugzilla.suse.com/1198438" source="BUGZILLA"/>
		<reference ref_id="1202353" ref_url="https://bugzilla.suse.com/1202353" source="BUGZILLA"/>
		<reference ref_id="1202633" ref_url="https://bugzilla.suse.com/1202633" source="BUGZILLA"/>
		<reference ref_id="1203200" ref_url="https://bugzilla.suse.com/1203200" source="BUGZILLA"/>
		<reference ref_id="1203331" ref_url="https://bugzilla.suse.com/1203331" source="BUGZILLA"/>
		<reference ref_id="1203332" ref_url="https://bugzilla.suse.com/1203332" source="BUGZILLA"/>
		<reference ref_id="1204363" ref_url="https://bugzilla.suse.com/1204363" source="BUGZILLA"/>
		<reference ref_id="1204993" ref_url="https://bugzilla.suse.com/1204993" source="BUGZILLA"/>
		<reference ref_id="1205544" ref_url="https://bugzilla.suse.com/1205544" source="BUGZILLA"/>
		<reference ref_id="1205846" ref_url="https://bugzilla.suse.com/1205846" source="BUGZILLA"/>
		<reference ref_id="1206103" ref_url="https://bugzilla.suse.com/1206103" source="BUGZILLA"/>
		<reference ref_id="1206224" ref_url="https://bugzilla.suse.com/1206224" source="BUGZILLA"/>
		<reference ref_id="1206232" ref_url="https://bugzilla.suse.com/1206232" source="BUGZILLA"/>
		<reference ref_id="1206459" ref_url="https://bugzilla.suse.com/1206459" source="BUGZILLA"/>
		<reference ref_id="1206492" ref_url="https://bugzilla.suse.com/1206492" source="BUGZILLA"/>
		<reference ref_id="1206493" ref_url="https://bugzilla.suse.com/1206493" source="BUGZILLA"/>
		<reference ref_id="1206640" ref_url="https://bugzilla.suse.com/1206640" source="BUGZILLA"/>
		<reference ref_id="1206824" ref_url="https://bugzilla.suse.com/1206824" source="BUGZILLA"/>
		<reference ref_id="1206876" ref_url="https://bugzilla.suse.com/1206876" source="BUGZILLA"/>
		<reference ref_id="1206877" ref_url="https://bugzilla.suse.com/1206877" source="BUGZILLA"/>
		<reference ref_id="1206878" ref_url="https://bugzilla.suse.com/1206878" source="BUGZILLA"/>
		<reference ref_id="1206880" ref_url="https://bugzilla.suse.com/1206880" source="BUGZILLA"/>
		<reference ref_id="1206881" ref_url="https://bugzilla.suse.com/1206881" source="BUGZILLA"/>
		<reference ref_id="1206882" ref_url="https://bugzilla.suse.com/1206882" source="BUGZILLA"/>
		<reference ref_id="1206883" ref_url="https://bugzilla.suse.com/1206883" source="BUGZILLA"/>
		<reference ref_id="1206884" ref_url="https://bugzilla.suse.com/1206884" source="BUGZILLA"/>
		<reference ref_id="1206885" ref_url="https://bugzilla.suse.com/1206885" source="BUGZILLA"/>
		<reference ref_id="1206886" ref_url="https://bugzilla.suse.com/1206886" source="BUGZILLA"/>
		<reference ref_id="1206889" ref_url="https://bugzilla.suse.com/1206889" source="BUGZILLA"/>
		<reference ref_id="1206894" ref_url="https://bugzilla.suse.com/1206894" source="BUGZILLA"/>
		<reference ref_id="1206935" ref_url="https://bugzilla.suse.com/1206935" source="BUGZILLA"/>
		<reference ref_id="1207051" ref_url="https://bugzilla.suse.com/1207051" source="BUGZILLA"/>
		<reference ref_id="1207270" ref_url="https://bugzilla.suse.com/1207270" source="BUGZILLA"/>
		<reference ref_id="1207328" ref_url="https://bugzilla.suse.com/1207328" source="BUGZILLA"/>
		<reference ref_id="1207529" ref_url="https://bugzilla.suse.com/1207529" source="BUGZILLA"/>
		<reference ref_id="1207560" ref_url="https://bugzilla.suse.com/1207560" source="BUGZILLA"/>
		<reference ref_id="1207588" ref_url="https://bugzilla.suse.com/1207588" source="BUGZILLA"/>
		<reference ref_id="1207589" ref_url="https://bugzilla.suse.com/1207589" source="BUGZILLA"/>
		<reference ref_id="1207590" ref_url="https://bugzilla.suse.com/1207590" source="BUGZILLA"/>
		<reference ref_id="1207591" ref_url="https://bugzilla.suse.com/1207591" source="BUGZILLA"/>
		<reference ref_id="1207592" ref_url="https://bugzilla.suse.com/1207592" source="BUGZILLA"/>
		<reference ref_id="1207593" ref_url="https://bugzilla.suse.com/1207593" source="BUGZILLA"/>
		<reference ref_id="1207594" ref_url="https://bugzilla.suse.com/1207594" source="BUGZILLA"/>
		<reference ref_id="1207603" ref_url="https://bugzilla.suse.com/1207603" source="BUGZILLA"/>
		<reference ref_id="1207605" ref_url="https://bugzilla.suse.com/1207605" source="BUGZILLA"/>
		<reference ref_id="1207606" ref_url="https://bugzilla.suse.com/1207606" source="BUGZILLA"/>
		<reference ref_id="1207607" ref_url="https://bugzilla.suse.com/1207607" source="BUGZILLA"/>
		<reference ref_id="1207608" ref_url="https://bugzilla.suse.com/1207608" source="BUGZILLA"/>
		<reference ref_id="1207609" ref_url="https://bugzilla.suse.com/1207609" source="BUGZILLA"/>
		<reference ref_id="1207610" ref_url="https://bugzilla.suse.com/1207610" source="BUGZILLA"/>
		<reference ref_id="1207613" ref_url="https://bugzilla.suse.com/1207613" source="BUGZILLA"/>
		<reference ref_id="1207615" ref_url="https://bugzilla.suse.com/1207615" source="BUGZILLA"/>
		<reference ref_id="1207617" ref_url="https://bugzilla.suse.com/1207617" source="BUGZILLA"/>
		<reference ref_id="1207618" ref_url="https://bugzilla.suse.com/1207618" source="BUGZILLA"/>
		<reference ref_id="1207619" ref_url="https://bugzilla.suse.com/1207619" source="BUGZILLA"/>
		<reference ref_id="1207620" ref_url="https://bugzilla.suse.com/1207620" source="BUGZILLA"/>
		<reference ref_id="1207621" ref_url="https://bugzilla.suse.com/1207621" source="BUGZILLA"/>
		<reference ref_id="1207623" ref_url="https://bugzilla.suse.com/1207623" source="BUGZILLA"/>
		<reference ref_id="1207624" ref_url="https://bugzilla.suse.com/1207624" source="BUGZILLA"/>
		<reference ref_id="1207625" ref_url="https://bugzilla.suse.com/1207625" source="BUGZILLA"/>
		<reference ref_id="1207626" ref_url="https://bugzilla.suse.com/1207626" source="BUGZILLA"/>
		<reference ref_id="1207628" ref_url="https://bugzilla.suse.com/1207628" source="BUGZILLA"/>
		<reference ref_id="1207630" ref_url="https://bugzilla.suse.com/1207630" source="BUGZILLA"/>
		<reference ref_id="1207631" ref_url="https://bugzilla.suse.com/1207631" source="BUGZILLA"/>
		<reference ref_id="1207632" ref_url="https://bugzilla.suse.com/1207632" source="BUGZILLA"/>
		<reference ref_id="1207634" ref_url="https://bugzilla.suse.com/1207634" source="BUGZILLA"/>
		<reference ref_id="1207635" ref_url="https://bugzilla.suse.com/1207635" source="BUGZILLA"/>
		<reference ref_id="1207636" ref_url="https://bugzilla.suse.com/1207636" source="BUGZILLA"/>
		<reference ref_id="1207638" ref_url="https://bugzilla.suse.com/1207638" source="BUGZILLA"/>
		<reference ref_id="1207639" ref_url="https://bugzilla.suse.com/1207639" source="BUGZILLA"/>
		<reference ref_id="1207641" ref_url="https://bugzilla.suse.com/1207641" source="BUGZILLA"/>
		<reference ref_id="1207642" ref_url="https://bugzilla.suse.com/1207642" source="BUGZILLA"/>
		<reference ref_id="1207643" ref_url="https://bugzilla.suse.com/1207643" source="BUGZILLA"/>
		<reference ref_id="1207644" ref_url="https://bugzilla.suse.com/1207644" source="BUGZILLA"/>
		<reference ref_id="1207645" ref_url="https://bugzilla.suse.com/1207645" source="BUGZILLA"/>
		<reference ref_id="1207646" ref_url="https://bugzilla.suse.com/1207646" source="BUGZILLA"/>
		<reference ref_id="1207647" ref_url="https://bugzilla.suse.com/1207647" source="BUGZILLA"/>
		<reference ref_id="1207648" ref_url="https://bugzilla.suse.com/1207648" source="BUGZILLA"/>
		<reference ref_id="1207651" ref_url="https://bugzilla.suse.com/1207651" source="BUGZILLA"/>
		<reference ref_id="1207653" ref_url="https://bugzilla.suse.com/1207653" source="BUGZILLA"/>
		<reference ref_id="1207770" ref_url="https://bugzilla.suse.com/1207770" source="BUGZILLA"/>
		<reference ref_id="1207773" ref_url="https://bugzilla.suse.com/1207773" source="BUGZILLA"/>
		<reference ref_id="1207845" ref_url="https://bugzilla.suse.com/1207845" source="BUGZILLA"/>
		<reference ref_id="1207875" ref_url="https://bugzilla.suse.com/1207875" source="BUGZILLA"/>
		<reference ref_id="1208149" ref_url="https://bugzilla.suse.com/1208149" source="BUGZILLA"/>
		<reference ref_id="1208153" ref_url="https://bugzilla.suse.com/1208153" source="BUGZILLA"/>
		<reference ref_id="1208179" ref_url="https://bugzilla.suse.com/1208179" source="BUGZILLA"/>
		<reference ref_id="1208183" ref_url="https://bugzilla.suse.com/1208183" source="BUGZILLA"/>
		<reference ref_id="1208212" ref_url="https://bugzilla.suse.com/1208212" source="BUGZILLA"/>
		<reference ref_id="1208290" ref_url="https://bugzilla.suse.com/1208290" source="BUGZILLA"/>
		<reference ref_id="1208420" ref_url="https://bugzilla.suse.com/1208420" source="BUGZILLA"/>
		<reference ref_id="1208428" ref_url="https://bugzilla.suse.com/1208428" source="BUGZILLA"/>
		<reference ref_id="1208429" ref_url="https://bugzilla.suse.com/1208429" source="BUGZILLA"/>
		<reference ref_id="1208449" ref_url="https://bugzilla.suse.com/1208449" source="BUGZILLA"/>
		<reference ref_id="1208534" ref_url="https://bugzilla.suse.com/1208534" source="BUGZILLA"/>
		<reference ref_id="1208541" ref_url="https://bugzilla.suse.com/1208541" source="BUGZILLA"/>
		<reference ref_id="1208570" ref_url="https://bugzilla.suse.com/1208570" source="BUGZILLA"/>
		<reference ref_id="1208598" ref_url="https://bugzilla.suse.com/1208598" source="BUGZILLA"/>
		<reference ref_id="1208599" ref_url="https://bugzilla.suse.com/1208599" source="BUGZILLA"/>
		<reference ref_id="1208601" ref_url="https://bugzilla.suse.com/1208601" source="BUGZILLA"/>
		<reference ref_id="1208603" ref_url="https://bugzilla.suse.com/1208603" source="BUGZILLA"/>
		<reference ref_id="1208605" ref_url="https://bugzilla.suse.com/1208605" source="BUGZILLA"/>
		<reference ref_id="1208607" ref_url="https://bugzilla.suse.com/1208607" source="BUGZILLA"/>
		<reference ref_id="1208628" ref_url="https://bugzilla.suse.com/1208628" source="BUGZILLA"/>
		<reference ref_id="1208700" ref_url="https://bugzilla.suse.com/1208700" source="BUGZILLA"/>
		<reference ref_id="1208741" ref_url="https://bugzilla.suse.com/1208741" source="BUGZILLA"/>
		<reference ref_id="1208759" ref_url="https://bugzilla.suse.com/1208759" source="BUGZILLA"/>
		<reference ref_id="1208776" ref_url="https://bugzilla.suse.com/1208776" source="BUGZILLA"/>
		<reference ref_id="1208777" ref_url="https://bugzilla.suse.com/1208777" source="BUGZILLA"/>
		<reference ref_id="1208784" ref_url="https://bugzilla.suse.com/1208784" source="BUGZILLA"/>
		<reference ref_id="1208787" ref_url="https://bugzilla.suse.com/1208787" source="BUGZILLA"/>
		<reference ref_id="1208816" ref_url="https://bugzilla.suse.com/1208816" source="BUGZILLA"/>
		<reference ref_id="1208837" ref_url="https://bugzilla.suse.com/1208837" source="BUGZILLA"/>
		<reference ref_id="1208843" ref_url="https://bugzilla.suse.com/1208843" source="BUGZILLA"/>
		<reference ref_id="1208848" ref_url="https://bugzilla.suse.com/1208848" source="BUGZILLA"/>
		<reference ref_id="1209008" ref_url="https://bugzilla.suse.com/1209008" source="BUGZILLA"/>
		<reference ref_id="1209159" ref_url="https://bugzilla.suse.com/1209159" source="BUGZILLA"/>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<reference ref_id="1209256" ref_url="https://bugzilla.suse.com/1209256" source="BUGZILLA"/>
		<reference ref_id="1209258" ref_url="https://bugzilla.suse.com/1209258" source="BUGZILLA"/>
		<reference ref_id="1209262" ref_url="https://bugzilla.suse.com/1209262" source="BUGZILLA"/>
		<reference ref_id="1209291" ref_url="https://bugzilla.suse.com/1209291" source="BUGZILLA"/>
		<reference ref_id="1209436" ref_url="https://bugzilla.suse.com/1209436" source="BUGZILLA"/>
		<reference ref_id="1209457" ref_url="https://bugzilla.suse.com/1209457" source="BUGZILLA"/>
		<reference ref_id="1209504" ref_url="https://bugzilla.suse.com/1209504" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3523" ref_url="https://www.suse.com/security/cve/CVE-2022-3523/" source="CVE"/>
		<reference ref_id="CVE-2022-36280" ref_url="https://www.suse.com/security/cve/CVE-2022-36280/" source="CVE"/>
		<reference ref_id="CVE-2022-38096" ref_url="https://www.suse.com/security/cve/CVE-2022-38096/" source="CVE"/>
		<reference ref_id="CVE-2023-0045" ref_url="https://www.suse.com/security/cve/CVE-2023-0045/" source="CVE"/>
		<reference ref_id="CVE-2023-0461" ref_url="https://www.suse.com/security/cve/CVE-2023-0461/" source="CVE"/>
		<reference ref_id="CVE-2023-0597" ref_url="https://www.suse.com/security/cve/CVE-2023-0597/" source="CVE"/>
		<reference ref_id="CVE-2023-1075" ref_url="https://www.suse.com/security/cve/CVE-2023-1075/" source="CVE"/>
		<reference ref_id="CVE-2023-1076" ref_url="https://www.suse.com/security/cve/CVE-2023-1076/" source="CVE"/>
		<reference ref_id="CVE-2023-1078" ref_url="https://www.suse.com/security/cve/CVE-2023-1078/" source="CVE"/>
		<reference ref_id="CVE-2023-1095" ref_url="https://www.suse.com/security/cve/CVE-2023-1095/" source="CVE"/>
		<reference ref_id="CVE-2023-1118" ref_url="https://www.suse.com/security/cve/CVE-2023-1118/" source="CVE"/>
		<reference ref_id="CVE-2023-22995" ref_url="https://www.suse.com/security/cve/CVE-2023-22995/" source="CVE"/>
		<reference ref_id="CVE-2023-22998" ref_url="https://www.suse.com/security/cve/CVE-2023-22998/" source="CVE"/>
		<reference ref_id="CVE-2023-23000" ref_url="https://www.suse.com/security/cve/CVE-2023-23000/" source="CVE"/>
		<reference ref_id="CVE-2023-23004" ref_url="https://www.suse.com/security/cve/CVE-2023-23004/" source="CVE"/>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<reference ref_id="CVE-2023-25012" ref_url="https://www.suse.com/security/cve/CVE-2023-25012/" source="CVE"/>
		<reference ref_id="CVE-2023-26545" ref_url="https://www.suse.com/security/cve/CVE-2023-26545/" source="CVE"/>
		<reference ref_id="CVE-2023-28328" ref_url="https://www.suse.com/security/cve/CVE-2023-28328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.

- CVE-2022-3523: Fixed a use after free related to device private page handling (bsc#1204363).
- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).
- CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773).
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845).
- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-22995: Fixed lacks of certain platform_device_put and kfree in drivers/usb/dwc3/dwc3-qcom.c (bsc#1208741).
- CVE-2023-22998: Fixed NULL vs IS_ERR checking in virtio_gpu_object_shmem_init (bsc#1208776).
- CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function phy/tegra (bsc#1208816).
- CVE-2023-23004: Fixed misinterpretation of get_sg_table return value (bsc#1208843).
- CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).
- CVE-2023-25012: Fixed a use-after-free in bigben_set_led() (bsc#1207560).
- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).

The following non-security bugs were fixed:

- [infiniband] READ is 'data destination', not source... (git-fixes)
- [xen] fix 'direction' argument of iov_iter_kvec() (git-fixes).
- acpi/x86: Add support for LPS0 callback handler (git-fixes).
- acpi: Do not build ACPICA with '-Os' (git-fixes).
- acpi: NFIT: fix a potential deadlock during NFIT teardown (git-fixes).
- acpi: PM: s2idle: Add support for upcoming AMD uPEP HID AMDI008 (bsc#1206224).
- acpi: PM: s2idle: Use LPS0 idle if ACPI_FADT_LOW_POWER_S0 is unset (bsc#1206224).
- acpi: battery: Fix missing NUL-termination with large strings (git-fixes).
- acpi: resource: Add helper function acpi_dev_get_memory_resources() (git-fixes).
- acpi: video: Fix Lenovo Ideapad Z570 DMI match (git-fixes).
- acpi: x86: s2idle: Add a quirk for ASUS ROG Zephyrus G14 (bsc#1206224).
- acpi: x86: s2idle: Add a quirk for ASUS TUF Gaming A17 FA707RE (bsc#1206224).
- acpi: x86: s2idle: Add a quirk for ASUSTeK COMPUTER INC. ROG Flow X13 (bsc#1206224).
- acpi: x86: s2idle: Add a quirk for Lenovo Slim 7 Pro 14ARH7 (bsc#1206224).
- acpi: x86: s2idle: Add another ID to s2idle_dmi_table (bsc#1206224).
- acpi: x86: s2idle: Add module parameter to prefer Microsoft GUID (bsc#1206224).
- acpi: x86: s2idle: Fix a NULL pointer dereference (bsc#1206224).
- acpi: x86: s2idle: Force AMD GUID/_REV 2 on HP Elitebook 865 (bsc#1206224).
- acpi: x86: s2idle: If a new AMD _HID is missing assume Rembrandt (bsc#1206224).
- acpi: x86: s2idle: Move _HID handling for AMD systems into structures (bsc#1206224).
- acpi: x86: s2idle: Stop using AMD specific codepath for Rembrandt+ (bsc#1206224).
- acpica: Drop port I/O validation for some regions (git-fixes).
- acpica: nsrepair: handle cases without a return value correctly (git-fixes).
- add cherry-picked id for nouveau patch
- alsa: emux: Avoid potential array out-of-bound in snd_emux_xg_control() (git-fixes).
- alsa: hda/ca0132: minor fix for allocation size (git-fixes).
- alsa: hda/conexant: add a new hda codec SN6180 (git-fixes).
- alsa: hda/realtek - fixed wrong gpio assigned (git-fixes).
- alsa: hda/realtek: Add Positivo N14KP6-TG (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS UM3402 using CS35L41 (git-fixes).
- alsa: hda/realtek: Add quirk for HP EliteDesk 800 G6 Tower PC (git-fixes).
- alsa: hda/realtek: Enable mute/micmute LEDs on HP Elitebook, 645 G9 (git-fixes).
- alsa: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro 360 (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git-fixes).
- alsa: hda: Do not unset preset when cleaning up codec (git-fixes).
- alsa: hda: Match only Intel devices with CONTROLLER_IN_GPU() (git-fixes).
- alsa: ice1712: Delete unreachable code in aureon_add_controls() (git-fixes).
- alsa: ice1712: Do not left ice-&gt;gpio_mutex locked in aureon_add_controls() (git-fixes).
- alsa: pci: lx6464es: fix a debug loop (git-fixes).
- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).
- arm64: Treat ESR_ELx as a 64-bit register (git-fixes)
- arm64: atomics: remove LL/SC trampolines (git-fixes)
- arm64: cacheinfo: Fix incorrect assignment of signed error value to (git-fixes)
- arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes)
- arm64: dts: amlogic: meson-axg: fix SCPI clock dvfs node name (git-fixes).
- arm64: dts: amlogic: meson-gx-libretech-pc: fix update button name (git-fixes).
- arm64: dts: amlogic: meson-gx: add missing SCPI sensors compatible (git-fixes).
- arm64: dts: amlogic: meson-gx: add missing unit address to rng node name (git-fixes).
- arm64: dts: amlogic: meson-gx: fix SCPI clock dvfs node name (git-fixes).
- arm64: dts: amlogic: meson-gxbb-kii-pro: fix led node name (git-fixes).
- arm64: dts: amlogic: meson-gxl-s905d-phicomm-n1: fix led node name (git-fixes).
- arm64: dts: amlogic: meson-gxl-s905d-sml5442tw: drop invalid clock-names property (git-fixes).
- arm64: dts: amlogic: meson-gxl: add missing unit address to eth-phy-mux node name (git-fixes).
- arm64: dts: amlogic: meson-sm1-bananapi-m5: fix adc keys node names (git-fixes).
- arm64: dts: amlogic: meson-sm1-odroid-hc4: fix active fan thermal trip (git-fixes).
- arm64: dts: arm: drop unused interrupt-names in MHU (git-fixes)
- arm64: dts: imx8m: Align SoC unique ID node unit address (git-fixes).
- arm64: dts: juno: Add missing MHU secure-irq (git-fixes)
- arm64: dts: mediatek: mt7622: Add missing pwm-cells to pwm node (git-fixes).
- arm64: dts: mediatek: mt8183: Fix systimer 13 MHz clock description (git-fixes).
- arm64: dts: meson-axg: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson-g12-common: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson-g12a: Fix internal Ethernet PHY unit name (git-fixes).
- arm64: dts: meson-gx: Fix Ethernet MAC address unit name (git-fixes).
- arm64: dts: meson-gx: Fix the SCPI DVFS node name and unit address (git-fixes).
- arm64: dts: meson-gx: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson: bananapi-m5: switch VDDIO_C pin to OPEN_DRAIN (git-fixes).
- arm64: dts: meson: remove CPU opps below 1GHz for G12A boards (git-fixes).
- arm64: dts: mt8192: Fix CPU map for single-cluster SoC (git-fixes).
- arm64: dts: qcom: Fix IPQ8074 PCIe PHY nodes (git-fixes).
- arm64: dts: qcom: ipq8074: correct Gen2 PCIe ranges (git-fixes).
- arm64: dts: qcom: ipq8074: correct PCIe QMP PHY output clock names (git-fixes).
- arm64: dts: qcom: ipq8074: correct USB3 QMP PHY-s clock output names (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen2 PCIe QMP PHY (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen3 PCIe QMP PHY (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen3 PCIe node (git-fixes).
- arm64: dts: qcom: ipq8074: fix PCIe PHY serdes size (git-fixes).
- arm64: dts: qcom: pmk8350: Specify PBS register for PON (git-fixes).
- arm64: dts: qcom: pmk8350: Use the correct PON compatible (git-fixes).
- arm64: dts: qcom: qcs404: use symbol names for PCIe resets (git-fixes).
- arm64: dts: qcom: sc7180: correct SPMI bus address cells (git-fixes).
- arm64: dts: qcom: sc7280: correct SPMI bus address cells (git-fixes).
- arm64: dts: qcom: sdm845-db845c: fix audio codec interrupt pin name (git-fixes).
- arm64: dts: qcom: sm8150-kumano: Panel framebuffer is 2.5k instead of 4k (git-fixes).
- arm64: dts: renesas: beacon-renesom: Fix gpio expander reference (git-fixes).
- arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc (git-fixes).
- arm64: dts: ti: k3-j7200: Fix wakeup pinmux range (git-fixes).
- arm64: efi: Make efi_rt_lock a raw_spinlock (git-fixes).
- arm64: make is_ttbrX_addr() noinstr-safe (git-fixes)
- arm64: mm: kfence: only handle translation faults (git-fixes)
- arm: OMAP1: call platform_device_put() in error case in omap1_dm_timer_init() (git-fixes).
- arm: OMAP2+: Fix memory leak in realtime_counter_init() (git-fixes).
- arm: bcm2835_defconfig: Enable the framebuffer (git-fixes).
- arm: dts: am5748: keep usb4_tm disabled (git-fixes)
- arm: dts: exynos: Use Exynos5420 compatible for the MIPI video phy (git-fixes).
- arm: dts: exynos: correct HDMI phy compatible in Exynos4 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos4 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos4210 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos5250 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid HC1 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid XU (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid XU3 family (git-fixes).
- arm: dts: exynos: correct wr-active property in Exynos3250 Rinato (git-fixes).
- arm: dts: imx7-colibri-eval-v3: correct can controller comment (git-fixes)
- arm: dts: imx7s: correct iomuxc gpr mux controller cells (git-fixes).
- arm: dts: qcom: msm8974: add required ranges to OCMEM (git-fixes)
- arm: dts: qcom: sdx55: Add Qcom SMMU-500 as the fallback for IOMMU node (git-fixes).
- arm: dts: rockchip: add power-domains property to dp node on rk3288 (git-fixes).
- arm: dts: spear320-hmi: correct STMPE GPIO compatible (git-fixes).
- arm: dts: stm32: add missing usbh clock and fix clk order on (git-fixes)
- arm: dts: stm32: use usbphyc ck_usbo_48m as USBH OHCI clock on (git-fixes)
- arm: dts: sun8i: nanopi-duo2: Fix regulator GPIO reference (git-fixes).
- arm: imx: Call ida_simple_remove() for ida_simple_get (git-fixes).
- arm: imx: rename DEBUG_IMX21_IMX27_UART to DEBUG_IMX27_UART (git-fixes)
- arm: omap: remove debug-leds driver (git-fixes)
- arm: remove some dead code (git-fixes)
- arm: renumber bits related to _TIF_WORK_MASK (git-fixes)
- arm: s3c: fix s3c64xx_set_timer_source prototype (git-fixes).
- arm: shmobile: rcar-gen2: Add missing of_node_put() (git-fixes)
- arm: zynq: Fix refcount leak in zynq_early_slcr_init (git-fixes).
- asoc: Intel: boards: fix spelling in comments (git-fixes).
- asoc: Intel: bytcht_es8316: Drop reference count of ACPI device after use (git-fixes).
- asoc: Intel: bytcht_es8316: move comment to the right place (git-fixes).
- asoc: Intel: sof_cs42l42: always set dpcm_capture for amplifiers (git-fixes).
- asoc: Intel: sof_rt5682: always set dpcm_capture for amplifiers (git-fixes).
- asoc: adau7118: do not disable regulators on device unbind (git-fixes).
- asoc: codecs: Change bulk clock voting to optional voting in digital codecs (git-fixes).
- asoc: codecs: lpass: fix incorrect mclk rate (git-fixes).
- asoc: codecs: rx-macro: move clk provider to managed variants (git-fixes).
- asoc: codecs: rx-macro: move to individual clks from bulk (git-fixes).
- asoc: codecs: tx-macro: move clk provider to managed variants (git-fixes).
- asoc: codecs: tx-macro: move to individual clks from bulk (git-fixes).
- asoc: cs42l56: fix DT probe (git-fixes).
- asoc: dt-bindings: meson: fix gx-card codec node regex (git-fixes).
- asoc: fsl_sai: Update to modern clocking terminology (git-fixes).
- asoc: kirkwood: Iterate over array indexes instead of using pointer math (git-fixes).
- asoc: mchp-spdifrx: Fix uninitialized use of mr in mchp_spdifrx_hw_params() (git-fixes).
- asoc: mchp-spdifrx: disable all interrupts in mchp_spdifrx_dai_remove() (git-fixes).
- asoc: mchp-spdifrx: fix controls which rely on rsr register (git-fixes).
- asoc: rsnd: Remove unnecessary rsnd_dbg_dai_call() (git-fixes).
- asoc: rsnd: fixup #endif position (git-fixes).
- asoc: rt715-sdca: fix clock stop prepare timeout issue (git-fixes).
- asoc: soc-compress.c: fixup private_data on snd_soc_new_compress() (git-fixes).
- asoc: soc-compress: Reposition and add pcm_mutex (git-fixes).
- asoc: soc-dapm.h: fixup warning struct snd_pcm_substream not declared (git-fixes).
- asoc: tlv320adcx140: fix 'ti,gpio-config' DT property init (git-fixes).
- asoc: topology: Return -ENOMEM on memory allocation failure (git-fixes).
- asoc: zl38060 add gpiolib dependency (git-fixes).
- asoc: zl38060: Remove spurious gpiolib select (git-fixes).
- ath9k: hif_usb: simplify if-if to if-else (git-fixes).
- ath9k: htc: clean up statistics macros (git-fixes).
- auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() (git-fixes).
- avoid deadlock for recursive I/O on dm-thin when used as swap (bsc#1177529).
- backlight: backlight: Fix doc for backlight_device_get_by_name (git-fixes).
- blk-cgroup: fix missing pd_online_fn() while activating policy (git-fixes).
- blk-mq: fix possible memleak when register 'hctx' failed (git-fixes).
- block, bfq: fix uaf for bfqq in bic_set_bfqq() (git-fixes).
- block/bfq-iosched.c: use 'false' rather than 'BLK_RW_ASYNC' (git-fixes).
- block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541).
- block: clear -&gt;slave_dir when dropping the main slave_dir reference (git-fixes).
- block: do not allow splitting of a REQ_NOWAIT bio (git-fixes).
- block: fix and cleanup bio_check_ro (git-fixes).
- block: mq-deadline: Do not break sequential write streams to zoned HDDs (git-fixes).
- block: mq-deadline: Rename deadline_is_seq_writes() (git-fixes).
- bluetooth: L2CAP: Fix potential user-after-free (git-fixes).
- bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes).
- bluetooth: hci_qca: get wakeup status from serdev device handle (git-fixes).
- bluetooth: hci_sock: purge socket queues in the destruct() callback (git-fixes).
- bpf, perf: Use subprog name when reporting subprog ksymbol (git fixes).
- bpf, x64: Factor out emission of REX byte in more cases (git-fixes).
- bpf: Fix a possible task gone issue with bpf_send_signal[_thread]() helpers (git-fixes).
- bpf: Fix extable address check (git-fixes).
- bpf: Fix extable fixup offset (git-fixes).
- bpf: Skip task with pid=1 in send_signal_common() (git-fixes).
- can: j1939: do not wait 250 ms if the same addr was already claimed (git-fixes).
- ceph: flush cap releases when the session is flushed (bsc#1208428).
- ceph: update the time stamps and try to drop the suid/sgid (bsc#1209504).
- cifs: Check the lease context if we actually got a lease (bsc#1193629).
- cifs: Convert struct fealist away from 1-element array (bsc#1193629).
- cifs: Fix lost destroy smbd connection when MR allocate failed (git-fixes).
- cifs: Fix oops due to uncleared server-&gt;smbd_conn in reconnect (git-fixes).
- cifs: Fix uninitialized memory read in smb3_qfs_tcon() (bsc#1193629).
- cifs: Fix uninitialized memory reads for oparms.mode (bsc#1193629).
- cifs: Fix use-after-free in rdata-&gt;read_into_pages() (git-fixes).
- cifs: Fix warning and UAF when destroy the MR list (git-fixes).
- cifs: Get rid of unneeded conditional in the smb2_get_aead_req() (bsc#1193629).
- cifs: Replace remaining 1-element arrays (bsc#1193629).
- cifs: Replace zero-length arrays with flexible-array members (bsc#1193629).
- cifs: Use kstrtobool() instead of strtobool() (bsc#1193629).
- cifs: do not try to use rdma offload on encrypted connections (bsc#1193629).
- cifs: fix mount on old smb servers (boo#1206935).
- cifs: get rid of dns resolve worker (bsc#1193629).
- cifs: get rid of unneeded conditional in cifs_get_num_sgs() (bsc#1193629).
- cifs: improve checking of DFS links over STATUS_OBJECT_NAME_INVALID (git-fixes).
- cifs: introduce cifs_io_parms in smb2_async_writev() (bsc#1193629).
- cifs: match even the scope id for ipv6 addresses (bsc#1193629).
- cifs: prevent data race in cifs_reconnect_tcon() (bsc#1193629).
- cifs: prevent data race in smb2_reconnect() (bsc#1193629).
- cifs: print last update time for interface list (bsc#1193629).
- cifs: remove unneeded 2bytes of padding from smb2 tree connect (bsc#1193629).
- cifs: return a single-use cfid if we did not get a lease (bsc#1193629).
- cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1193629).
- cifs: split out smb3_use_rdma_offload() helper (bsc#1193629).
- cifs: update ip_addr for ses only for primary chan setup (bsc#1193629).
- cifs: use tcon allocation functions even for dummy tcon (git-fixes).
- cifs: use the least loaded channel for sending requests (bsc#1193629).
- clk: HI655X: select REGMAP instead of depending on it (git-fixes).
- clk: Honor CLK_OPS_PARENT_ENABLE in clk_core_is_enabled() (git-fixes).
- clk: imx: avoid memory leak (git-fixes).
- clk: mxl: Add option to override gate clks (git-fixes).
- clk: mxl: Fix a clk entry by adding relevant flags (git-fixes).
- clk: mxl: Remove redundant spinlocks (git-fixes).
- clk: mxl: Switch from direct readl/writel based IO to regmap based IO (git-fixes).
- clk: mxl: syscon_node_to_regmap() returns error pointers (git-fixes).
- clk: qcom: gcc-qcs404: disable gpll[04]_out_aux parents (git-fixes).
- clk: qcom: gcc-qcs404: fix names of the DSI clocks used as parents (git-fixes).
- clk: ralink: fix 'mt7621_gate_is_enabled()' function (git-fixes).
- clk: renesas: cpg-mssr: Fix use after free if cpg_mssr_common_init() failed (git-fixes).
- clk: renesas: cpg-mssr: Remove superfluous check in resume code (git-fixes).
- clocksource: Suspend the watchdog temporarily when high read latency detected (git-fixes).
- comedi: use menuconfig for main Comedi menu (git-fixes).
- crypto: arm64 - Fix unused variable compilation warnings of (git-fixes)
- crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2 (git-fixes).
- crypto: ccp - Failure on re-initialization due to duplicate sysfs filename (git-fixes).
- crypto: crypto4xx - Call dma_unmap_page when done (git-fixes).
- crypto: essiv - Handle EBUSY correctly (git-fixes).
- crypto: qat - fix out-of-bounds read (git-fixes).
- crypto: rsa-pkcs1pad - Use akcipher_request_complete (git-fixes).
- crypto: seqiv - Handle EBUSY correctly (git-fixes).
- crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes).
- crypto: xts - Handle EBUSY correctly (git-fixes).
- delete patches.suse/drm-i915-Don-t-use-BAR-mappings-for-ring-buffers-wit.patch Resulted in an Oops / hang at boot (bsc#1209436)
- dmaengine: dw-axi-dmac: Do not dereference NULL structure (git-fixes).
- dmaengine: dw-edma: Do not permit non-inc interleaved xfers (git-fixes).
- dmaengine: dw-edma: Drop chancnt initialization (git-fixes).
- dmaengine: dw-edma: Fix invalid interleaved xfers semantics (git-fixes).
- dmaengine: dw-edma: Fix missing src/dst address of interleaved xfers (git-fixes).
- dmaengine: dw-edma: Fix readq_ch() return value truncation (git-fixes).
- dmaengine: idxd: Set traffic class values in GRPCFG on DSA 2.0 (git-fixes).
- dmaengine: ptdma: check for null desc before calling pt_cmd_callback (git-fixes).
- dmaengine: sf-pdma: pdma_desc memory leak fix (git-fixes).
- do not sign the vanilla kernel (bsc#1209008).
- docs/scripts/gdb: add necessary make scripts_gdb step (git-fixes).
- docs: Correct missing 'd_' prefix for dentry_operations member d_weak_revalidate (git-fixes).
- docs: ftrace: fix a issue with duplicated subtitle number (git-fixes).
- docs: gdbmacros: print newest record (git-fixes).
- documentation/hw-vuln: Document the interaction between IBRS and STIBP (git-fixes).
- documentation: simplify and clarify DCO contribution example language (git-fixes).
- driver core: fix potential null-ptr-deref in device_add() (git-fixes).
- driver core: fix resource leak in device_add() (git-fixes).
- driver core: fw_devlink: Add DL_FLAG_CYCLE support to device links (git-fixes).
- drivers/md/md-bitmap: check the return value of md_bitmap_get_counter() (git-fixes).
- drivers: base: transport_class: fix possible memory leak (git-fixes).
- drivers: base: transport_class: fix resource leak when transport_add_device() fails (git-fixes).
- drm/amd/display: Fail atomic_check early on normalize_zpos error (git-fixes).
- drm/amd/display: Fix potential null-deref in dm_resume (git-fixes).
- drm/amd/display: Fix timing not changning when freesync video is enabled (git-fixes).
- drm/amd/display: Properly handle additional cases where DCN is not supported (git-fixes).
- drm/amd/display: reduce else-if to else in dcn10_blank_pixel_data() (git-fixes).
- drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini (git-fixes).
- drm/amdgpu: fix enum odm_combine_mode mismatch (git-fixes).
- drm/amdgpu: fix error checking in amdgpu_read_mm_registers for soc15 (git-fixes).
- drm/bridge: Fix returned array size name for atomic_get_input_bus_fmts kdoc (git-fixes).
- drm/bridge: lt8912b: Add hot plug detection (git-fixes).
- drm/bridge: lt9611: fix HPD reenablement (git-fixes).
- drm/bridge: lt9611: fix clock calculation (git-fixes).
- drm/bridge: lt9611: fix polarity programming (git-fixes).
- drm/bridge: lt9611: fix programming of video modes (git-fixes).
- drm/bridge: lt9611: fix sleep mode setup (git-fixes).
- drm/bridge: lt9611: pass a pointer to the of node (git-fixes).
- drm/bridge: megachips: Fix error handling in i2c_register_driver() (git-fixes).
- drm/connector: print max_requested_bpc in state debugfs (git-fixes).
- drm/edid: fix AVI infoframe aspect ratio handling (git-fixes).
- drm/fourcc: Add missing big-endian XRGB1555 and RGB565 formats (git-fixes).
- drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size (git-fixes).
- drm/hyperv: Fix an error handling path in hyperv_vmbus_probe() (git-fixes).
- drm/i915/gen11: Moving WAs to icl_gt_workarounds_init() (git-fixes).
- drm/i915/gen11: Wa_1408615072/Wa_1407596294 should be on GT list (git-fixes).
- drm/i915/quirks: Add inverted backlight quirk for HP 14-r206nv (git-fixes).
- drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).
- drm/i915: Fix VBT DSI DVO port handling (git-fixes).
- drm/i915: Initialize the obj flags for shmem objects (git-fixes).
- drm/mediatek: Clean dangling pointer on bind error path (git-fixes).
- drm/mediatek: Drop unbalanced obj unref (git-fixes).
- drm/mediatek: Use NULL instead of 0 for NULL pointer (git-fixes).
- drm/mediatek: dsi: Reduce the time of dsi from LP11 to sending cmd (git-fixes).
- drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc (git-fixes).
- drm/meson: fix 1px pink line on GXM when scaling video overlay (git-fixes).
- drm/mipi-dsi: Fix byte order of 16-bit DCS set/get brightness (git-fixes).
- drm/msm/a5xx: fix context faults during ring switch (git-fixes).
- drm/msm/a5xx: fix highest bank bit for a530 (git-fixes).
- drm/msm/a5xx: fix setting of the CP_PREEMPT_ENABLE_LOCAL register (git-fixes).
- drm/msm/a5xx: fix the emptyness check in the preempt code (git-fixes).
- drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() (git-fixes).
- drm/msm/disp/dpu: fix sc7280_pp base offset (git-fixes).
- drm/msm/dpu: Add check for cstate (git-fixes).
- drm/msm/dpu: Add check for pstates (git-fixes).
- drm/msm/dpu: Disallow unallocated resources to be returned (git-fixes).
- drm/msm/dpu: drop stale comment from struct dpu_mdp_cfg doc (git-fixes).
- drm/msm/dpu: fix len of sc7180 ctl blocks (git-fixes).
- drm/msm/dpu: set pdpu-&gt;is_rt_pipe early in dpu_plane_sspp_atomic_update() (git-fixes).
- drm/msm/dsi: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/msm/gem: Add check for kmalloc (git-fixes).
- drm/msm/hdmi: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/msm/mdp5: Add check for kzalloc (git-fixes).
- drm/msm: Fix potential invalid ptr free (git-fixes).
- drm/msm: clean event_thread-&gt;worker in case of an error (git-fixes).
- drm/msm: use strscpy instead of strncpy (git-fixes).
- drm/nouveau/devinit/tu102-: wait for GFW_BOOT_PROGRESS == COMPLETED (git-fixes).
- drm/nouveau/kms/nv50-: remove unused functions (git-fixes).
- drm/nouveau/kms/nv50: fix nv50_wndw_new_ prototype (git-fixes).
- drm/omap: dsi: Fix excessive stack usage (git-fixes).
- drm/omapdrm: Remove unused struct csc_coef_rgb2yuv (git-fixes).
- drm/panfrost: Do not sync rpm suspension after mmu flushing (git-fixes).
- drm/radeon: Fix eDP for single-display iMac11,2 (git-fixes).
- drm/radeon: free iio for atombios when driver shutdown (git-fixes).
- drm/shmem-helper: Remove another errant put in error path (git-fixes).
- drm/sun4i: fix missing component unbind on bind errors (git-fixes).
- drm/tiny: ili9486: Do not assume 8-bit only SPI controllers (git-fixes).
- drm/vc4: dpi: Add option for inverting pixel clock and output enable (git-fixes).
- drm/vc4: dpi: Fix format mapping for RGB565 (git-fixes).
- drm/vc4: hdmi: Correct interlaced timings again (git-fixes).
- drm/vc4: hvs: Fix colour order for xRGB1555 on HVS5 (git-fixes).
- drm/vc4: hvs: Set AXI panic modes (git-fixes).
- drm/vc4: vec: Use pm_runtime_resume_and_get() in vc4_vec_encoder_enable() (git-fixes).
- drm/virtio: exbuf-&gt;fence_fd unmodified on interrupted wait (git-fixes).
- drm/vkms: Fix memory leak in vkms_init() (git-fixes).
- drm/vkms: Fix null-ptr-deref in vkms_release() (git-fixes).
- drm: Fix potential null-ptr-deref due to drmm_mode_config_init() (git-fixes).
- drm: amd: display: Fix memory leakage (git-fixes).
- drm: mxsfb: DRM_MXSFB should depend on ARCH_MXS || ARCH_MXC (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo IdeaPad Duet 3 10IGL5 (git-fixes).
- drm: tidss: Fix pixel format definition (git-fixes).
- dt-bindings: arm: fsl: Fix bindings for APF28Dev board (git-fixes).
- dt-bindings: hwlock: sun6i: Add missing #hwlock-cells (git-fixes).
- dt-bindings: input: iqs626a: Redefine trackpad property types (git-fixes).
- dt-bindings: msm: dsi-controller-main: Add vdd* descriptions back in (git-fixes).
- dt-bindings: net: snps,dwmac: Fix snps,reset-delays-us dependency (git-fixes).
- dt-bindings: power: supply: pm8941-coincell: Do not require charging properties (git-fixes).
- dt-bindings: usb: amlogic,meson-g12a-usb-ctrl: make G12A usb3-phy0 optional (git-fixes).
- eeprom: idt_89hpesx: Fix error handling in idt_init() (git-fixes).
- efi: Accept version 2 of memory attributes table (git-fixes).
- exit: Add and use make_task_dead (bsc#1207328).
- exit: Allow oops_limit to be disabled (bsc#1207328).
- exit: Guarantee make_task_dead leaks the tsk when calling do_task_exit (bsc#1207328).
- exit: Move force_uaccess back into do_exit (bsc#1207328).
- exit: Move oops specific logic from do_exit into make_task_dead (bsc#1207328).
- exit: Put an upper limit on how often we can oops (bsc#1207328).
- exit: Stop poorly open coding do_task_dead in make_task_dead (bsc#1207328).
- exit: Use READ_ONCE() for all oops/warn limit reads (bsc#1207328).
- ext4,f2fs: fix readahead of verity data (bsc#1207648).
- ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode (bsc#1207619).
- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).
- ext4: add helper to check quota inums (bsc#1207618).
- ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop (bsc#1207617).
- ext4: add missing validation of fast-commit record lengths (bsc#1207626).
- ext4: allocate extended attribute value in vmalloc area (bsc#1207635).
- ext4: avoid crash when inline data creation follows DIO write (bsc#1206883).
- ext4: avoid resizing to a partial cluster size (bsc#1206880).
- ext4: avoid unaccounted block allocation when expanding inode (bsc#1207634).
- ext4: continue to expand file system when the target size does not reach (bsc#1206882).
- ext4: correct cluster len and clusters changed accounting in ext4_mb_mark_bb (bsc#1207592).
- ext4: correct max_inline_xattr_value_size computing (bsc#1206878).
- ext4: correct the misjudgment in ext4_iget_extra_inode (bsc#1206878).
- ext4: disable fast-commit of encrypted dir operations (bsc#1207623).
- ext4: do not allow journal inode to have encrypt flag (bsc#1207621).
- ext4: do not increase iversion counter for ea_inodes (bsc#1207605).
- ext4: do not run ext4lazyinit for read-only filesystems (bsc#1207603).
- ext4: do not set up encryption key during jbd2 transaction (bsc#1207624).
- ext4: drop ineligible txn start stop APIs (bsc#1207588).
- ext4: ext4_read_bh_lock() should submit IO if the buffer isn't uptodate (bsc#1207606).
- ext4: factor out ext4_fc_get_tl() (bsc#1207615).
- ext4: fast commit may miss file actions (bsc#1207591).
- ext4: fast commit may not fallback for ineligible commit (bsc#1207590).
- ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1206886).
- ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth &gt; 0 (bsc#1206881).
- ext4: fix bug_on in __es_tree_search caused by bad boot loader inode (bsc#1207620).
- ext4: fix bug_on in start_this_handle during umount filesystem (bsc#1207594).
- ext4: fix deadlock due to mbcache entry corruption (bsc#1207653).
- ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline (bsc#1207631).
- ext4: fix dir corruption when ext4_dx_add_entry() fails (bsc#1207608).
- ext4: fix error code return to user-space in ext4_get_branch() (bsc#1207630).
- ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit (bsc#1207593).
- ext4: fix extent status tree race in writeback error recovery path (bsc#1206877).
- ext4: fix inode leak in ext4_xattr_inode_create() on an error path (bsc#1207636).
- ext4: fix kernel BUG in 'ext4_write_inline_data_end()' (bsc#1206894).
- ext4: fix leaking uninitialized memory in fast-commit journal (bsc#1207625).
- ext4: fix miss release buffer head in ext4_fc_write_inode (bsc#1207609).
- ext4: fix null-ptr-deref in ext4_write_info (bsc#1206884).
- ext4: fix off-by-one errors in fast-commit block filling (bsc#1207628).
- ext4: fix potential memory leak in ext4_fc_record_modified_inode() (bsc#1207611).
- ext4: fix potential memory leak in ext4_fc_record_regions() (bsc#1207612).
- ext4: fix potential out of bound read in ext4_fc_replay_scan() (bsc#1207616).
- ext4: fix reserved cluster accounting in __es_remove_extent() (bsc#1207637).
- ext4: fix unaligned memory access in ext4_fc_reserve_space() (bsc#1207627).
- ext4: fix undefined behavior in bit shift for ext4_check_flag_values (bsc#1206890).
- ext4: fix uninititialized value in 'ext4_evict_inode' (bsc#1206893).
- ext4: fix use-after-free in ext4_ext_shift_extents (bsc#1206888).
- ext4: fix use-after-free in ext4_orphan_cleanup (bsc#1207622).
- ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878).
- ext4: fix warning in 'ext4_da_release_space' (bsc#1206887).
- ext4: goto right label 'failed_mount3a' (bsc#1207610).
- ext4: init quota for 'old.inode' in 'ext4_rename' (bsc#1207629).
- ext4: initialize quota before expanding inode in setproject ioctl (bsc#1207633).
- ext4: introduce EXT4_FC_TAG_BASE_LEN helper (bsc#1207614).
- ext4: limit the number of retries after discarding preallocations blocks (bsc#1207602).
- ext4: make ext4_lazyinit_thread freezable (bsc#1206885).
- ext4: place buffer head allocation before handle start (bsc#1207607).
- ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889).
- ext4: simplify updating of fast commit stats (bsc#1207589).
- ext4: update 'state-&gt;fc_regions_size' after successful memory allocation (bsc#1207613).
- ext4: update s_overhead_clusters in the superblock during an on-line resize (bsc#1206876).
- fbdev: omapfb: cleanup inconsistent indentation (git-fixes).
- fbdev: smscufx: fix error handling code in ufx_usb_probe (git-fixes).
- firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3 (git-fixes).
- firmware: coreboot: Remove GOOGLE_COREBOOT_TABLE_ACPI/OF Kconfig entries (git-fixes).
- firmware: coreboot: framebuffer: Ignore reserved pixel color bits (git-fixes).
- firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (git-fixes).
- firmware: stratix10-svc: add missing gen_pool_destroy() in stratix10_svc_drv_probe() (git-fixes).
- firmware: xilinx: do not make a sleepable memory allocation from an atomic context (git-fixes).
- fix page corruption caused by racy check in __free_pages (bsc#1208149).
- fork: allow CLONE_NEWTIME in clone3 flags (bsc#1209258).
- fs: ext4: initialize fsdata in pagecache_write() (bsc#1207632).
- fscache_cookie_enabled: check cookie is valid before accessing it (bsc#1208429).
- fuse: add inode/permission checks to fileattr_get/fileattr_set (bsc#1208759).
- genirq: Provide new interfaces for affinity hints (bsc#1208153).
- gpio: tegra186: remove unneeded loop in tegra186_gpio_init_route_mapping() (git-fixes).
- gpio: vf610: connect GPIO label to dev name (git-fixes).
- gpu: host1x: Do not skip assigning syncpoints to channels (git-fixes).
- gpu: ipu-v3: common: Add of_node_put() for reference returned by of_graph_get_port_by_id() (git-fixes).
- hid: Add Mapping for System Microphone Mute (git-fixes).
- hid: asus: use spinlock to protect concurrent accesses (git-fixes).
- hid: asus: use spinlock to safely schedule workers (git-fixes).
- hid: bigben: use spinlock to protect concurrent accesses (git-fixes).
- hid: bigben: use spinlock to safely schedule workers (git-fixes).
- hid: bigben_probe(): validate report count (git-fixes).
- hid: bigben_worker() remove unneeded check on report_field (git-fixes).
- hid: core: Fix deadloop in hid_apply_multiplier (git-fixes).
- hid: elecom: add support for TrackBall 056E:011C (git-fixes).
- hid: logitech-hidpp: Do not restart communication if not necessary (git-fixes).
- hid: multitouch: Add quirks for flipped axes (git-fixes).
- hid: retain initial quirks set up when creating HID devices (git-fixes).
- hv: fix comment typo in vmbus_channel/low_latency (git-fixes).
- hv_netvsc: Allocate memory in netvsc_dma_map() with GFP_ATOMIC (git-fixes).
- hv_netvsc: Check status in SEND_RNDIS_PKT completion message (git-fixes).
- hwmon: (adm1266) Set `can_sleep` flag for GPIO chip (git-fixes).
- hwmon: (adt7475) Display smoothing attributes in correct order (git-fixes).
- hwmon: (adt7475) Fix masking of hysteresis registers (git-fixes).
- hwmon: (coretemp) Simplify platform device handling (git-fixes).
- hwmon: (ftsteutates) Fix scaling of measurements (git-fixes).
- hwmon: (ina3221) return prober error code (git-fixes).
- hwmon: (k10temp): Add support for new family 17h and 19h models (bsc#1208848).
- hwmon: (ltc2945) Handle error case in ltc2945_value_store (git-fixes).
- hwmon: (ltc2992) Set `can_sleep` flag for GPIO chip (git-fixes).
- hwmon: (mlxreg-fan) Return zero speed for broken fan (git-fixes).
- hwmon: (ucd90320) Add minimum delay between bus accesses (git-fixes).
- hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition (git-fixes).
- hwmon: tmp512: drop of_match_ptr for ID table (git-fixes).
- i2c: designware-pci: Add new PCI IDs for AMD NAVI GPU (git-fixes).
- i2c: designware: fix i2c_dw_clk_rate() return size to be u32 (git-fixes).
- i2c: mxs: suppress probe-deferral error message (git-fixes).
- i2c: rk3x: fix a bunch of kernel-doc warnings (git-fixes).
- ib/hfi1: Assign npages earlier (git-fixes)
- ib/hfi1: Fix math bugs in hfi1_can_pin_pages() (git-fixes)
- ib/hfi1: Fix sdma.h tx-&gt;num_descs off-by-one errors (git-fixes)
- ib/hfi1: Restore allocated resources on failed copyout (git-fixes)
- ib/hfi1: Update RMT size calculation (git-fixes)
- ib/ipoib: Fix legacy IPoIB due to wrong number of queues (git-fixes)
- iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_config_word() (git-fixes).
- iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_status_word() (git-fixes).
- iio: light: tsl2563: Do not hardcode interrupt trigger type (git-fixes).
- input: ads7846 - always set last command to PWRDOWN (git-fixes).
- input: ads7846 - do not check penirq immediately for 7845 (git-fixes).
- input: ads7846 - do not report pressure for ads7845 (git-fixes).
- input: iqs269a - configure device with a single block write (git-fixes).
- input: iqs269a - drop unused device node references (git-fixes).
- input: iqs269a - increase interrupt handler return delay (git-fixes).
- input: iqs626a - drop unused device node references (git-fixes).
- interconnect: exynos: fix node leak in probe PM QoS error path (git-fixes).
- interconnect: fix mem leak when freeing nodes (git-fixes).
- interconnect: qcom: osm-l3: fix icc_onecell_data allocation (git-fixes).
- iommu/hyper-v: Allow hyperv irq remapping without x2apic (git-fixes).
- ipmi:ssif: Add a timer between request retries (bsc#1206459).
- ipmi:ssif: Remove rtc_us_timer (bsc#1206459).
- ipmi:ssif: resend_msg() cannot fail (bsc#1206459).
- ipmi_ssif: Rename idle state and check (bsc#1206459).
- irqchip/gic-v3: Refactor ISB + EOIR at ack time (git-fixes)
- iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() (git-fixes)
- jbd2: Fix up kABI of ext4 fast commit interface (bsc#1207590).
- jbd2: add miss release buffer head in fc_do_one_pass() (bsc#1207646).
- jbd2: fix a potential race while discarding reserved buffers after an abort (bsc#1207641).
- jbd2: fix potential buffer head reference count leak (bsc#1207644).
- jbd2: fix potential use-after-free in jbd2_fc_wait_bufs (bsc#1207645).
- jbd2: wake up journal waiters in FIFO order, not LIFO (bsc#1207643).
- kABI workaround for hid quirks (git-fixes).
- kABI: pci: Reduce warnings on possible RW1C corruption (kabi).
- kABI: pci: dwc: Add dw_pcie_ops.host_deinit() callback (kabi).
- kabi fix for nfsv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes).
- kabi fix for: NFSv3: handle out-of-order write replies (bsc#1205544).
- kabi fix for: nfs: Further optimisations for 'ls -l' (git-fixes).
- kabi fix for: nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).
- kabi fix for: nfsv4.1 query for fs_location attr on a new file system (Never, kabi).
- kasan: no need to unset panic_on_warn in end_report() (bsc#1207328).
- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179). When -b is specified the script is prefixed with KMP_NEEDS_MKINITRD=1 which sets the variable for a simple command. However, the script is no longer a simple command. Export the variable instead.
- keys: asymmetric: Fix ECDSA use via keyctl uapi (git-fixes).
- leds: led-class: Add missing put_device() to led_put() (git-fixes).
- leds: led-core: Fix refcount leak in of_led_get() (git-fixes).
- lib/mpi: Fix buffer overrun when SG is too long (git-fixes).
- lib/zlib: remove redundation assignement of avail_in dfltcc_gdht() (git-fixes).
- locking/rwsem: Allow slowpath writer to ignore handoff bit if not set by first waiter (bsc#1207270).
- locking/rwsem: Always try to wake waiters in out_nolock path (bsc#1207270).
- locking/rwsem: Conditionally wake waiters in reader/writer slowpaths (bsc#1207270).
- locking/rwsem: Disable preemption in all down_read*() and up_read() code paths (bsc#1207270).
- locking/rwsem: Disable preemption in all down_write*() and up_write() code paths (bsc#1207270).
- locking/rwsem: Disable preemption while trying for rwsem lock (bsc#1207270).
- locking/rwsem: Make handoff bit handling more consistent (bsc#1207270).
- locking/rwsem: No need to check for handoff bit if wait queue empty (bsc#1207270).
- locking/rwsem: Prevent non-first waiter from spinning in down_write() slowpath (bsc#1207270).
- locking: Add missing __sched attributes (bsc#1207270).
- makefile: link with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- mbcache: Avoid nesting of cache-&gt;c_list_lock under bit locks (bsc#1207647).
- mbcache: Fixup kABI of mb_cache_entry (bsc#1207653).
- md/bitmap: Fix bitmap chunk size overflow issues (git-fixes).
- md/raid1: stop mdx_raid1 thread when raid1 array run failed (git-fixes).
- md: fix a crash in mempool_free (git-fixes).
- media: coda: Add check for dcoda_iram_alloc (git-fixes).
- media: coda: Add check for kmalloc (git-fixes).
- media: i2c: imx219: Fix binning for RAW8 capture (git-fixes).
- media: i2c: imx219: Split common registers from mode tables (git-fixes).
- media: i2c: ov7670: 0 instead of -EINVAL was returned (git-fixes).
- media: i2c: ov772x: Fix memleak in ov772x_probe() (git-fixes).
- media: imx: imx7-media-csi: fix missing clk_disable_unprepare() in imx7_csi_init() (git-fixes).
- media: ipu3-cio2: Fix PM runtime usage_count in driver unbind (git-fixes).
- media: m5mols: fix off-by-one loop termination error (git-fixes).
- media: max9286: Fix memleak in max9286_v4l2_register() (git-fixes).
- media: ov2740: Fix memleak in ov2740_init_controls() (git-fixes).
- media: ov5640: Fix analogue gain control (git-fixes).
- media: ov5675: Fix memleak in ov5675_init_controls() (git-fixes).
- media: platform: ti: Add missing check for devm_regulator_get (git-fixes).
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (git-fixes).
- media: rc: gpio-ir-recv: add remove function (git-fixes).
- media: saa7134: Use video_unregister_device for radio_dev (git-fixes).
- media: ti: cal: fix possible memory leak in cal_ctx_create() (git-fixes).
- media: usb: siano: Fix use after free bugs caused by do_submit_urb (git-fixes).
- media: uvcvideo: Add support for V4L2_CTRL_TYPE_CTRL_CLASS (git-fixes).
- media: uvcvideo: Check controls flags before accessing them (git-fixes).
- media: uvcvideo: Check for INACTIVE in uvc_ctrl_is_accessible() (git-fixes).
- media: uvcvideo: Do not check for V4L2_CTRL_WHICH_DEF_VAL (git-fixes).
- media: uvcvideo: Fix memory leak of object map on error exit path (git-fixes).
- media: uvcvideo: Fix race condition with usb_kill_urb (git-fixes).
- media: uvcvideo: Handle cameras with invalid descriptors (git-fixes).
- media: uvcvideo: Handle errors from calls to usb_string (git-fixes).
- media: uvcvideo: Quirk for autosuspend in Logitech B910 and C910 (git-fixes).
- media: uvcvideo: Remove s_ctrl and g_ctrl (git-fixes).
- media: uvcvideo: Silence memcpy() run-time false positive warnings (git-fixes).
- media: uvcvideo: Use control names from framework (git-fixes).
- media: uvcvideo: refactor __uvc_ctrl_add_mapping (git-fixes).
- media: v4l2-jpeg: correct the skip count in jpeg_parse_app14_data (git-fixes).
- media: v4l2-jpeg: ignore the unknown APP14 marker (git-fixes).
- mei: bus-fixup:upon error print return values of send and receive (git-fixes).
- mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak (git-fixes).
- mfd: cs5535: Do not build on UML (git-fixes).
- mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read() (git-fixes).
- misc/mei/hdcp: Use correct macros to initialize uuid_le (git-fixes).
- misc: enclosure: Fix doc for enclosure_find() (git-fixes).
- mm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath() (bsc#1209262).
- mmc: jz4740: Work around bug on JZ4760(B) (git-fixes).
- mmc: mmc_spi: fix error handling in mmc_spi_probe() (git-fixes).
- mmc: sdhci_am654: lower power-on failed message severity (git-fixes).
- mmc: sdio: fix possible resource leaks in some error paths (git-fixes).
- move upstreamed i915 and media fixes into sorted section
- mt76: mt7915: fix polling firmware-own status (git-fixes).
- mtd: dataflash: remove duplicate SPI ID table (git-fixes).
- mtd: rawnand: fsl_elbc: Propagate HW ECC settings to HW (git-fixes).
- mtd: rawnand: sunxi: Clean up chips after failed init (git-fixes).
- mtd: rawnand: sunxi: Fix the size of the last OOB region (git-fixes).
- mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type (git-fixes).
- mtd: spi-nor: core: fix implicit declaration warning (git-fixes).
- mtd: spi-nor: sfdp: Fix index value for SCCR dwords (git-fixes).
- mtd: spi-nor: spansion: Consider reserved bits in CFR5 register (git-fixes).
- net/rose: Fix to not accept on connected socket (git-fixes).
- net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (git-fixes).
- net/usb: kalmia: Do not pass act_len in usb_bulk_msg error path (git-fixes).
- net/x25: Fix to not accept on connected socket (git-fixes).
- net: USB: Fix wrong-direction WARNING in plusb.c (git-fixes).
- net: mana: Assign interrupts to CPUs based on NUMA nodes (bsc#1208153).
- net: mana: Fix IRQ name - add PCI and queue number (bsc#1207875).
- net: mana: Fix accessing freed irq affinity_hint (bsc#1208153).
- net: openvswitch: fix possible memory leak in ovs_meter_cmd_set() (git-fixes).
- net: phy: meson-gxl: use MMD access dummy stubs for GXL, internal PHY (git-fixes).
- nfc: change order inside nfc_se_io error path (git-fixes).
- nfc: fdp: add null check of devm_kmalloc_array in fdp_nci_i2c_read_device_properties (git-fixes).
- nfc: fix memory leak of se_io context in nfc_genl_se_io (git-fixes).
- nfc: pn533: initialize struct pn533_out_arg properly (git-fixes).
- nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition (git-fixes).
- nfcv3: handle out-of-order write replies (bsc#1205544).
- nfs4: Fix kmemleak when allocate slot failed (git-fixes).
- nfs: Always initialise fattr-&gt;label in nfs_fattr_alloc() (git-fixes).
- nfs: Avoid writeback threads getting stuck in mempool_alloc() (git-fixes).
- nfs: Create a new nfs_alloc_fattr_with_label() function (git-fixes).
- nfs: Do not allocate nfs_fattr on the stack in __nfs42_ssc_open() (git-fixes).
- nfs: Further optimisations for 'ls -l' (git-fixes).
- nfs: nfs4clinet: check the return value of kstrdup() (git-fixes).
- nfs: nfsiod should not block forever in mempool_alloc() (git-fixes).
- nfs: nfsiod should not block forever in mempool_alloc() (git-fixes).
- nfsd: COMMIT operations must not return NFS?ERR_INVAL (git-fixes).
- nfsd: De-duplicate net_generic(nf-&gt;nf_net, nfsd_net_id) (git-fixes).
- nfsd: Finish converting the NFSv2 GETACL result encoder (git-fixes).
- nfsd: Finish converting the NFSv3 GETACL result encoder (git-fixes).
- nfsd: Fix a memory leak in an error handling path (git-fixes).
- nfsd: Fix handling of oversized nfsv4 COMPOUND requests (git-fixes).
- nfsd: Fix nfsd_breaker_owns_lease() return values (git-fixes).
- nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).
- nfsd: Return nfserr_serverfault if splice_ok but buf-&gt;pages have data (git-fixes).
- nfsd: do not call nfsd_file_put from client states seqfile display (git-fixes).
- nfsd: fix use-after-free on source server when doing inter-server copy (git-fixes).
- nfsd: pass range end to vfs_fsync_range() instead of count (git-fixes).
- nfsv4 expose nfs_parse_server_name function (git-fixes).
- nfsv4 handle port presence in fs_location server string (git-fixes).
- nfsv4 only print the label when its queried (git-fixes).
- nfsv4 remove zero number of fs_locations entries error check (git-fixes).
- nfsv4 store server support for fs_location attribute (git-fixes).
- nfsv4.1 query for fs_location attr on a new file system (git-fixes).
- nfsv4.1: Fix uninitialised variable in devicenotify (git-fixes).
- nfsv4.1: Handle RECLAIM_COMPLETE trunking errors (git-fixes).
- nfsv4.1: We must always send RECLAIM_COMPLETE after a reboot (git-fixes).
- nfsv4.2: Clear FATTR4_WORD2_SECURITY_LABEL when done decoding (git-fixes).
- nfsv4.2: Fix a memory stomp in decode_attr_security_label (git-fixes).
- nfsv4.2: Fixup CLONE dest file size for zero-length count (git-fixes).
- nfsv4.2: fix reference count leaks in _nfs42_proc_copy_notify() (git-fixes).
- nfsv4/pnfs: Always return layout stats on layout return for flexfiles (git-fixes).
- nfsv4/pnfs: Fix a use-after-free bug in open (git-fixes).
- nfsv4: Add an fattr allocation to _nfs4_discover_trunking() (git-fixes).
- nfsv4: Do not hold the layoutget locks across multiple RPC calls (git-fixes).
- nfsv4: Fix a potential state reclaim deadlock (git-fixes).
- nfsv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes).
- nfsv4: Protect the state recovery thread against direct reclaim (git-fixes).
- nfsv4: Retry LOCK on OLD_STATEID during delegation return (git-fixes).
- nvdimm: disable namespace on error (bsc#1166486).
- nvme-auth: check chap ctrl_key once constructed (bsc#1202633).
- nvme-auth: clear sensitive info right after authentication completes (bsc#1202633).
- nvme-auth: convert dhchap_auth_list to an array (bsc#1202633).
- nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633).
- nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633).
- nvme-auth: do not override ctrl keys before validation (bsc#1202633).
- nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633).
- nvme-auth: do not use NVMe status codes (bsc#1202633).
- nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633).
- nvme-auth: fix smatch warning complaints (bsc#1202633).
- nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633).
- nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633).
- nvme-auth: mark nvme_auth_wq static (bsc#1202633).
- nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633).
- nvme-auth: remove redundant auth_work flush (bsc#1202633).
- nvme-auth: remove redundant buffer deallocations (bsc#1202633).
- nvme-auth: remove redundant deallocations (bsc#1202633).
- nvme-auth: remove redundant if statement (bsc#1202633).
- nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633).
- nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633).
- nvme-auth: rename authentication work elements (bsc#1202633).
- nvme-auth: use workqueue dedicated to authentication (bsc#1202633).
- nvme-fabrics: show well known discovery name (bsc#1200054).
- objtool: Add a missing comma to avoid string concatenation (bsc#1207328).
- ocfs2: Fix data corruption after failed write (bsc#1208542).
- ocfs2: clear dinode links count in case of error (bsc#1207650).
- ocfs2: fix BUG when iput after ocfs2_mknod fails (bsc#1207649).
- ocfs2: fix crash when mount with quota enabled (bsc#1207640).
- ocfs2: fix memory leak in ocfs2_mount_volume() (bsc#1207652).
- ocfs2: fix memory leak in ocfs2_stack_glue_init() (bsc#1207651).
- ocfs2: ocfs2_mount_volume does cleanup job before return error (bsc#1207770).
- ocfs2: quota_local: fix possible uninitialized-variable access in ocfs2_local_read_info() (bsc#1207768).
- ocfs2: rewrite error handling of ocfs2_fill_super (bsc#1207771).
- panic: Consolidate open-coded panic_on_warn checks (bsc#1207328).
- panic: Introduce warn_limit (bsc#1207328).
- panic: unset panic_on_warn inside panic() (bsc#1207328).
- pci/iov: Enlarge virtfn sysfs name buffer (git-fixes).
- pci/pm: Always disable PTM for all devices during suspend (git-fixes).
- pci/pm: Avoid putting Elo i2 PCIe Ports in D3cold (git-fixes).
- pci/pm: Fix bridge_d3_blacklist Elo i2 overwrite of Gigabyte X299 (git-fixes).
- pci/pm: Observe reset delay irrespective of bridge_d3 (git-fixes).
- pci/ptm: Add pci_suspend_ptm() and pci_resume_ptm() (git-fixes).
- pci: Add ACS quirk for Wangxun NICs (git-fixes).
- pci: Add SolidRun vendor ID (git-fixes).
- pci: Align extra resources for hotplug bridges properly (git-fixes).
- pci: Avoid FLR for AMD FCH AHCI adapters (git-fixes).
- pci: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() (git-fixes).
- pci: Fix dropping valid root bus resources with .end = zero (git-fixes).
- pci: Reduce warnings on possible RW1C corruption (git-fixes).
- pci: Take other bus devices into account when distributing resources (git-fixes).
- pci: Unify delay handling for reset and resume (git-fixes).
- pci: aardvark: Check return value of generic_handle_domain_irq() when processing INTx IRQ (git-fixes).
- pci: aardvark: Fix link training (git-fixes).
- pci: dwc: Add dw_pcie_ops.host_deinit() callback (git-fixes).
- pci: hotplug: Allow marking devices as disconnected during bind/unbind (git-fixes).
- pci: mediatek-gen3: Assert resets to ensure expected init state (git-fixes).
- pci: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains() (git-fixes).
- pci: qcom: Fix host-init error handling (git-fixes).
- pci: qcom: Fix pipe clock imbalance (git-fixes).
- pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes).
- pci: xgene: Revert 'PCI: xgene: Use inbound resources for setup' (git-fixes).
- perf/amd/ibs: Use interrupt regs ip for stack unwinding (git fixes).
- perf/core: Call LSM hook after copying perf_event_attr (git fixes).
- perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() (git fixes).
- perf/core: Inherit event_caps (git fixes).
- perf/x86/amd: fix potential integer overflow on shift of a int (git fixes).
- perf/x86/intel/ds: Fix precise store latency handling (git fixes).
- perf/x86/intel/lbr: Use setup_clear_cpu_cap() instead of clear_cpu_cap() (git fixes).
- perf/x86/intel/pt: Fix sampling using single range output (git fixes).
- perf/x86/intel/pt: Relax address filter validation (git fixes).
- perf/x86/intel/uncore: Add Emerald Rapids (git fixes).
- perf/x86/intel/uncore: Clear attr_update properly (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Disable I/O stacks to PMU mapping on ICX-D (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Icelake Server (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Sapphire Rapids (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Skylake Server (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Fix broken read_counter() for SNB IMC PMU (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in __uncore_imc_init_box() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in sad_cfg_iio_topology() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() (git fixes).
- perf/x86/intel/uncore: Generalize IIO topology support (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Generalize get_topology() for SKX PMUs (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Get UPI NodeID and GroupID (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Introduce UPI topology type (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Make set_mapping() procedure void (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Update sysfs-devices-mapping file (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel: Add Cooper Lake stepping to isolation_ucodes (git fixes).
- perf/x86/intel: Add Emerald Rapids (git fixes).
- perf/x86/intel: Do not extend the pseudo-encoding to GP counters (git fixes).
- perf/x86/intel: Fix PEBS data source encoding for ADL (git fixes).
- perf/x86/intel: Fix PEBS memory access info encoding for ADL (git fixes).
- perf/x86/intel: Fix event constraints for ICL (git fixes).
- perf/x86/intel: Fix pebs event constraints for ADL (git fixes).
- perf/x86/intel: Fix pebs event constraints for ICL (git fixes).
- perf/x86/intel: Fix pebs event constraints for SPR (git fixes).
- perf/x86/lbr: Enable the branch type for the Arch LBR by default (git fixes).
- perf/x86/msr: Add Emerald Rapids (git fixes).
- perf/x86/rapl: Add support for Intel AlderLake-N (git fixes).
- perf/x86/rapl: Treat Tigerlake like Icelake (git fixes).
- perf/x86/rapl: Use standard Energy Unit for SPR Dram RAPL domain (git fixes).
- perf/x86/rapl: fix AMD event handling (git fixes).
- perf/x86/uncore: Add Raptor Lake uncore support (git fixes).
- perf/x86/uncore: Add a quirk for UPI on SPR (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Add new Alder Lake and Raptor Lake support (git fixes).
- perf/x86/uncore: Add new Raptor Lake S support (git fixes).
- perf/x86/uncore: Clean up uncore_pci_ids (git fixes).
- perf/x86/uncore: Do not WARN_ON_ONCE() for a broken discovery table (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Factor out uncore_device_to_die() (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Fix potential NULL pointer in uncore_get_alias_name (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Ignore broken units in discovery table (bsc#1206824, bsc#1206493, bsc#1206492).
- perf: Always wake the parent event (git fixes).
- perf: Fix possible memleak in pmu_dev_alloc() (git fixes).
- phy: rockchip-typec: Fix unsigned comparison with less than zero (git-fixes).
- phy: rockchip-typec: fix tcphy_get_mode error case (git-fixes).
- pinctrl: aspeed: Fix confusing types in return value (git-fixes).
- pinctrl: at91: use devm_kasprintf() to avoid potential leaks (git-fixes).
- pinctrl: intel: Restore the pins that used to be in Direct IRQ mode (git-fixes).
- pinctrl: mediatek: Fix the drive register definition of some Pins (git-fixes).
- pinctrl: mediatek: Initialize variable *buf to zero (git-fixes).
- pinctrl: mediatek: fix coding style (git-fixes).
- pinctrl: qcom: pinctrl-msm8976: Correct function names for wcss pins (git-fixes).
- pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups (git-fixes).
- pinctrl: single: fix potential NULL dereference (git-fixes).
- pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain (git-fixes).
- platform/x86: ISST: PUNIT device mapping with Sub-NUMA clustering (bsc#1208420).
- platform/x86: amd-pmc: Correct usage of SMU version (git-fixes).
- platform/x86: amd-pmc: Export Idlemask values based on the APU (git-fixes).
- platform/x86: amd-pmc: Fix compilation when CONFIG_DEBUGFS is disabled (git-fixes).
- platform/x86: dell-wmi: Add a keymap for KEY_MUTE in type 0x0010 table (git-fixes).
- platform/x86: gigabyte-wmi: add support for B450M DS3H WIFI-CF (git-fixes).
- platform/x86: touchscreen_dmi: Add Chuwi Vi8 (CWI501) DMI match (git-fixes).
- platform: x86: MLX_PLATFORM: select REGMAP instead of depending on it (git-fixes).
- powercap: fix possible name leak in powercap_register_zone() (git-fixes).
- powerpc/eeh: Set channel state after notifying the drivers (bsc#1208784 ltc#201612).
- printf: fix errname.c list (git-fixes).
- prlimit: do_prlimit needs to have a speculation check (bsc#1209256).
- pwm: stm32-lp: fix the check on arr and cmp registers update (git-fixes).
- qede: avoid uninitialized entries in coal_entry array (bsc#1205846).
- qede: fix interrupt coalescing configuration (bsc#1205846).
- quota: Check next/prev free block number after reading from quota file (bsc#1206640).
- quota: Prevent memory allocation recursion while holding dq_lock (bsc#1207639).
- rcu: Tighten rcu_advance_cbs_nowake() checks (bsc#1209159).
- rdma/cxgb4: Fix potential null-ptr-deref in pass_establish() (git-fixes)
- rdma/cxgb4: add null-ptr-check after ip_dev_find() (git-fixes)
- rdma/cxgb4: remove unnecessary NULL check in __c4iw_poll_cq_one() (git-fixes)
- rdma/irdma: Cap MSIX used to online CPUs + 1 (git-fixes)
- rdma/irdma: Fix potential NULL-ptr-dereference (git-fixes)
- rdma/rxe: Fix missing memory barriers in rxe_queue.h (git-fixes)
- rdma/siw: Fix user page pinning accounting (git-fixes)
- rdma/usnic: use iommu_map_atomic() under spin_lock() (git-fixes)
- refresh patches.suse/NFSv3-handle-out-of-order-write-replies  (bsc#1209457).
- regulator: Flag uncontrollable regulators as always_on (git-fixes).
- regulator: core: Fix off-on-delay-us for always-on/boot-on regulators (git-fixes).
- regulator: core: Use ktime_get_boottime() to determine how long a regulator was off (git-fixes).
- regulator: max77802: Bounds check regulator id against opmode (git-fixes).
- regulator: s5m8767: Bounds check id indexing into arrays (git-fixes).
- remoteproc/mtk_scp: Move clk ops outside send_lock (git-fixes).
- remoteproc: qcom_q6v5_mss: Use a carveout to authenticate modem headers (git-fixes).
- replace mkinitrd dependency with dracut (bsc#1202353). Also update mkinitrd refrences in documentation and comments.
- require suse-kernel-rpm-scriptlets at all times. The kernel packages call scriptlets for each stage, add the dependency to make it clear to libzypp that the scriptlets are required. There is no special dependency for posttrans, these scriptlets run when transactions are resolved. The plain dependency has to be used to support posttrans.
- revert 'HID: logitech-hidpp: add a module parameter to keep firmware gestures' (git-fixes).
- revert 'char: pcmcia: cm4000_cs: Replace mdelay with usleep_range in set_protocol' (git-fixes).
- revert 'crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete' (git-fixes).
- revert 'usb: dwc3: qcom: Keep power domain on to retain controller status' (git-fixes).
- rpm/group-source-files.pl: Deal with {pre,post}fixed / in location When the source file location provided with -L is either prefixed or postfixed with forward slash, the script get stuck in a infinite loop inside calc_dirs() where $path is an empty string. user@localhost:/tmp&gt; perl '$HOME/group-source-files.pl' -D devel.files -N nondevel.files -L /usr/src/linux-5.14.21-150500.41/ ... path = /usr/src/linux-5.14.21-150500.41/Documentation/Kconfig path = /usr/src/linux-5.14.21-150500.41/Documentation path = /usr/src/linux-5.14.21-150500.41 path = /usr/src path = /usr path = path = path = ... # Stuck in an infinite loop This workarounds the issue by breaking out the loop once path is an empty string. For a proper fix we'd want something that filesystem-aware, but this workaround should be enough for the rare occation that this script is ran manually. Link: http://mailman.suse.de/mlarch/SuSE/kernel/2023/kernel.2023.03/msg00024.html
- rpm/group-source-files.pl: Fix output difference when / is in location While previous attempt to fix group-source-files.pl in 6d651362c38 'rpm/group-source-files.pl: Deal with {pre,post}fixed / in location' breaks the infinite loop, it does not properly address the issue. Having prefixed and/or postfixed forward slash still result in different output. This commit changes the script to use the Perl core module File::Spec for proper path manipulation to give consistent output.
- rpm/kernel-obs-build.spec.in: Remove SLE11 cruft
- rtc: allow rtc_read_alarm without read_alarm callback (git-fixes).
- rtc: pm8xxx: fix set-alarm race (git-fixes).
- rtc: sun6i: Always export the internal oscillator (git-fixes).
- runrpc allow for unspecified transport time in rpc_clnt_add_xprt (git-fixes).
- s390/dasd: Fix potential memleak in dasd_eckd_init() (git-fixes).
- s390/kexec: fix ipl report address for kdump (bsc#1207529).
- scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607).
- scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607).
- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607).
- scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607).
- scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607).
- scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534).
- scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607).
- scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607).
- scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607).
- scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607).
- scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607).
- scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103).
- scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570).
- scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570).
- scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570).
- scsi: qla2xxx: Fix erroneous link down (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570).
- scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570).
- scsi: qla2xxx: Fix printk() format string (bsc#1208570).
- scsi: qla2xxx: Fix stalled login (bsc#1208570).
- scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570).
- scsi: qla2xxx: Relocate/rename vp map (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (bsc#1208570).
- scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570).
- scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570).
- scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570).
- scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570).
- scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570).
- scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1208570).
- scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570).
- scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570).
- scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570).
- scsi: storvsc: Handle BlockSize change in Hyper-V VHD/VHDX file (git-fixes).
- sefltests: netdevsim: wait for devlink instance after netns removal (git-fixes).
- selftest/lkdtm: Skip stack-entropy test if lkdtm is not available (git-fixes).
- selftests/ftrace: Add check for ping command for trigger tests (bsc#1204993 ltc#200103).
- selftests/ftrace: Convert tracer tests to use 'requires' to specify program dependency (bsc#1204993 ltc#200103).
- selftests/powerpc: Account for offline cpus in perf-hwbreak test (bsc#1206232).
- selftests/powerpc: Bump up rlimit for perf-hwbreak test (bsc#1206232).
- selftests/powerpc: Move perror closer to its use (bsc#1206232).
- selftests: forwarding: lib: quote the sysctl values (git-fixes).
- selftests: net: udpgso_bench: Fix racing bug between the rx/tx programs (git-fixes).
- selftests: net: udpgso_bench_rx/tx: Stop when wrong CLI args are provided (git-fixes).
- selftests: net: udpgso_bench_rx: Fix 'used uninitialized' compiler warning (git-fixes).
- selftests: net: udpgso_bench_tx: Cater for pending datagrams zerocopy benchmarking (git-fixes).
- serial: 8250_em: Fix UART port type (git-fixes).
- serial: 8250_fsl: fix handle_irq locking (git-fixes).
- serial: fsl_lpuart: fix RS485 RTS polariy inverse issue (git-fixes).
- serial: qcom-geni: fix console shutdown hang (git-fixes).
- serial: sc16is7xx: setup GPIO controller later in probe (git-fixes).
- serial: tegra: Add missing clk_disable_unprepare() in tegra_uart_hw_init() (git-fixes).
- signal/seccomp: Refactor seccomp signal and coredump generation (git-fixes).
- signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved (git-fixes).
- signal/x86: In emulate_vsyscall force a signal instead of calling do_exit (git-fixes).
- signal: Implement force_fatal_sig (git-fixes).
- smb3: Replace smb2pdu 1-element arrays with flex-arrays (bsc#1193629).
- soundwire: cadence: Do not overflow the command FIFOs (git-fixes).
- spi: bcm63xx-hsspi: Endianness fix for ARM based SoC (git-fixes).
- spi: dw: Fix wrong FIFO level setting for long xfers (git-fixes).
- spi: dw_bt1: fix MUX_MMIO dependencies (git-fixes).
- spi: synquacer: Fix timeout handling in synquacer_spi_transfer_one() (git-fixes).
- spi: tegra210-quad: Fix validate combined sequence (git-fixes).
- staging: emxx_udc: Add checks for dma_alloc_coherent() (git-fixes).
- staging: mt7621-dts: change palmbus address to lower case (git-fixes).
- struct uvc_device move flush_status new member to end (git-fixes).
- sunrpc: Do not leak netobj memory when gss_read_proxy_verf() fails (git-fixes).
- sunrpc: Fix null-ptr-deref when xps sysfs alloc failed (git-fixes).
- sunrpc: Fix potential race conditions in rpc_sysfs_xprt_state_change() (git-fixes).
- sunrpc: Fix socket waits for write buffer space (git-fixes).
- sunrpc: Return true/false (not 1/0) from bool functions (git-fixes).
- supported.conf: Remove duplicate entry.
- sysctl: add a new register_sysctl_init() interface (bsc#1207328).
- thermal/drivers/hisi: Drop second sensor hi3660 (git-fixes).
- thermal/drivers/tsens: Add compat string for the qcom,msm8960 (git-fixes).
- thermal/drivers/tsens: Drop msm8976-specific defines (git-fixes).
- thermal/drivers/tsens: Sort out msm8976 vs msm8956 data (git-fixes).
- thermal/drivers/tsens: fix slope values for msm8939 (git-fixes).
- thermal/drivers/tsens: limit num_sensors to 9 for msm8939 (git-fixes).
- thermal: intel: BXT_PMIC: select REGMAP instead of depending on it (git-fixes).
- thermal: intel: Fix unsigned comparison with less than zero (git-fixes).
- thermal: intel: intel_pch: Add support for Wellsburg PCH (git-fixes).
- thermal: intel: powerclamp: Fix cur_state for multi package system (git-fixes).
- thermal: intel: quark_dts: fix error pointer dereference (git-fixes).
- tools/iio/iio_utils:fix memory leak (git-fixes).
- tpm/eventlog: Do not abort tpm_read_log on faulty ACPI address (git-fixes).
- trace_events_hist: add check for return value of 'create_hist_field' (git-fixes).
- tracing: Fix poll() and select() do not work on per_cpu trace_pipe and trace_pipe_raw (git-fixes).
- tracing: Make sure trace_printk() can output as soon as it can be used (git-fixes).
- tty: fix out-of-bounds access in tty_driver_lookup_tty() (git-fixes).
- tty: serial: fsl_lpuart: Fix the wrong RXWATER setting for rx dma case (git-fixes).
- tty: serial: fsl_lpuart: clear LPUART Status Register in lpuart32_shutdown() (git-fixes).
- tty: serial: fsl_lpuart: disable Rx/Tx DMA in lpuart32_shutdown() (git-fixes).
- tty: serial: fsl_lpuart: disable the CTS when send break signal (git-fixes).
- tty: serial: imx: Handle RS485 DE signal active high (git-fixes).
- tty: serial: imx: disable Ageing Timer interrupt request irq (git-fixes).
- tty: serial: qcom-geni-serial: stop operations in progress at shutdown (git-fixes).
- ubsan: no need to unset panic_on_warn in ubsan_epilogue() (bsc#1207328).
- update internal module version number for cifs.ko (bsc#1193629).
- update suse/hid-bigben_probe-validate-report-count (bsc#1208605).
- usb: core: Do not hold device lock while reading the 'descriptors' sysfs file (git-fixes).
- usb: core: add quirk for Alcor Link AK9563 smartcard reader (git-fixes).
- usb: dwc3: core: Host wake up support from system suspend (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-M (git-fixes).
- usb: dwc3: qcom: Configure wakeup interrupts during suspend (git-fixes).
- usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init (git-fixes).
- usb: dwc3: qcom: Keep power domain on to retain controller status (git-fixes).
- usb: dwc3: qcom: clean up icc init (git-fixes).
- usb: dwc3: qcom: clean up suspend callbacks (git-fixes).
- usb: dwc3: qcom: fix gadget-only builds (git-fixes).
- usb: dwc3: qcom: fix peripheral and OTG suspend (git-fixes).
- usb: dwc3: qcom: fix wakeup implementation (git-fixes).
- usb: dwc3: qcom: only parse 'maximum-speed' once (git-fixes).
- usb: dwc3: qcom: suppress unused-variable warning (git-fixes).
- usb: early: xhci-dbc: Fix a potential out-of-bound memory access (git-fixes).
- usb: ene_usb6250: Allocate enough memory for full object (git-fixes).
- usb: gadget: configfs: Restrict symlink creation is UDC already binded (git-fixes).
- usb: gadget: configfs: remove using list iterator after loop body as a ptr (git-fixes).
- usb: gadget: configfs: use to_config_usb_cfg() in os_desc_link() (git-fixes).
- usb: gadget: configfs: use to_usb_function_instance() in cfg (un)link func (git-fixes).
- usb: gadget: fusb300_udc: free irq on the error path in fusb300_probe() (git-fixes).
- usb: gadget: u_serial: Add null pointer check in gserial_resume (git-fixes).
- usb: host: xhci: mvebu: Iterate over array indexes instead of using pointer math (git-fixes).
- usb: max-3421: Fix setting of I/O pins (git-fixes).
- usb: musb: Add and use inline function musb_otg_state_string (git-fixes).
- usb: musb: Add and use inline functions musb_{get,set}_state (git-fixes).
- usb: musb: mediatek: do not unregister something that wasn't registered (git-fixes).
- usb: musb: remove schedule work called after flush (git-fixes).
- usb: serial: option: add support for VW/Skoda 'Carstick LTE' (git-fixes).
- usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes).
- usb: typec: intel_pmc_mux: Do not leak the ACPI device reference count (git-fixes).
- usb: typec: intel_pmc_mux: Use the helper acpi_dev_get_memory_resources() (git-fixes).
- usb: uvc: Enumerate valid values for color matching (git-fixes).
- vc_screen: do not clobber return value in vcs_read (git-fixes).
- vc_screen: modify vcs_size() handling in vcs_read() (git-fixes).
- vdpa_sim: not reset state in vdpasim_queue_ready (git-fixes).
- vfio/type1: prevent underflow of locked_vm via exec() (git-fixes).
- vfio/type1: restore locked_vm (git-fixes).
- vfio/type1: track locked_vm per dma (git-fixes).
- vfs: Check the truncate maximum size in inode_newsize_ok() (bsc#1207642).
- vfs: filename_create(): fix incorrect intent (bsc#1197534).
- virt/sev-guest: Add a MODULE_ALIAS (bsc#1208449).
- virt/sev-guest: Prevent IV reuse in the SNP guest driver (bsc#1208449).
- virt/sev-guest: Remove unnecessary free in init_crypto() (bsc#1208449).
- virt: sev-guest: Pass the appropriate argument type to iounmap() (bsc#1208449).
- virt: sevguest: Change driver name to reflect generic SEV support (bsc#1208449).
- virt: sevguest: Rename the sevguest dir and files to sev-guest (bsc#1208449).
- vmci: check context-&gt;notify_page after call to get_user_pages_fast() to avoid GPF (git-fixes).
- vmxnet3: move rss code block under eop descriptor (bsc#1208212).
- watch_queue: fix IOC_WATCH_QUEUE_SET_SIZE alloc error paths (bsc#1197617).
- watchdog/hpwdt: Enable HP_WATCHDOG for ARM64 systems. (jsc#PED-3210) Also enable module in aarch64 default configuration.
- watchdog: Fix kmemleak in watchdog_cdev_register (git-fixes).
- watchdog: at91sam9_wdt: use devm_request_irq to avoid missing free_irq() in error path (git-fixes).
- watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git-fixes).
- watchdog: sbsa_wdog: Make sure the timeout programming is within the limits (git-fixes).
- wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup (git-fixes).
- wifi: ath11k: allow system suspend to survive ath11k (git-fixes).
- wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (git-fixes).
- wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() (git-fixes).
- wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails (git-fixes).
- wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (git-fixes).
- wifi: ath9k: use proper statements in conditionals (git-fixes).
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() (git-fixes).
- wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds (git-fixes).
- wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() (git-fixes).
- wifi: brcmfmac: unmap dma buffer in brcmf_msgbuf_alloc_pktid() (git-fixes).
- wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() (git-fixes).
- wifi: cfg80211: Fix use after free for wext (git-fixes).
- wifi: cfg80211: Partial revert 'wifi: cfg80211: Fix use after free for wext' (git-fixes).
- wifi: ipw2200: fix memory leak in ipw_wdev_init() (git-fixes).
- wifi: ipw2x00: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: iwl3945: Add missing check for create_singlethread_workqueue (git-fixes).
- wifi: iwl4965: Add missing check for create_singlethread_workqueue() (git-fixes).
- wifi: iwlegacy: common: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: cmdresp: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: fix memory leak in lbs_init_adapter() (git-fixes).
- wifi: libertas: if_usb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: main: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas_tf: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: mac80211: make rate u32 in sta_set_rate_info_rx() (git-fixes).
- wifi: mt7601u: fix an integer underflow (git-fixes).
- wifi: mt76: dma: free rx_head in mt76_dma_rx_cleanup (git-fixes).
- wifi: mwifiex: Add missing compatible string for SD8787 (git-fixes).
- wifi: mwifiex: fix loop iterator in mwifiex_update_ampdu_txwinsize() (git-fixes).
- wifi: orinoco: check return value of hermes_write_wordrec() (git-fixes).
- wifi: rsi: Fix memory leak in rsi_coex_attach() (git-fixes).
- wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU (git-fixes).
- wifi: rtl8xxxu: Use a longer retry limit of 48 (git-fixes).
- wifi: rtl8xxxu: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtl8xxxu: fixing transmisison failure for rtl8192eu (git-fixes).
- wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() (git-fixes).
- wifi: rtlwifi: rtl8188ee: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtlwifi: rtl8723be: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtlwifi: rtl8821ae: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtw89: Add missing check for alloc_workqueue (git-fixes).
- wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() (git-fixes).
- wifi: wl3501_cs: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- writeback: avoid use-after-free after removing device (bsc#1207638).
- x86/64/mm: Map all kernel memory into trampoline_pgd (git-fixes).
- x86/MCE/AMD: Clear DFR errors found in THR handler (git-fixes).
- x86/amd_nb: Add AMD PCI IDs for SMN communication (bsc#1208848).
- x86/asm: Fix an assembler warning with current binutils (git-fixes).
- x86/boot: Avoid using Intel mnemonics in AT&amp;T syntax asm (git-fixes).
- x86/cpu: Add CPU model numbers for Meteor Lake (git fixes).
- x86/cpu: Add Raptor Lake to Intel family (git fixes).
- x86/cpu: Add new Alderlake and Raptorlake CPU model numbers (git fixes).
- x86/cpu: Add new Raptor Lake CPU model number (git fixes).
- x86/cpu: Add several Intel server CPU model numbers (git fixes).
- x86/cpu: Drop spurious underscore from RAPTOR_LAKE #define (git fixes).
- x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants (git-fixes).
- x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git-fixes).
- x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git-fixes).
- x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init() (git-fixes).
- x86/microcode/intel: Do not retry microcode reloading on the APs (git-fixes).
- x86/perf/zhaoxin: Add stepping check for ZXC (git fixes).
- x86/perf: Avoid warning for Arch LBR without XSAVE (git fixes).
- x86/perf: Default set FREEZE_ON_SMI for all (git fixes).
- x86/sgx: Fix free page accounting (git-fixes).
- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).
- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).
- x86: acpi: cstate: Optimize C3 entry on AMD CPUs (git-fixes).
- x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- xen-netfront: Fix NULL sring after live migration (git-fixes).
- xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too (git-fixes).
- xen/arm: Fix race in RB-tree based P2M accounting (git-fixes)
- xen/netback: do some code cleanup (git-fixes).
- xen/netback: fix build warning (git-fixes).
- xen/netfront: destroy queues before real_num_tx_queues is zeroed (git-fixes).
- xen/platform-pci: add missing free_irq() in error path (git-fixes).
- xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() (git-fixes).
- xfs: estimate post-merge refcounts correctly (bsc#1208183).
- xfs: hoist refcount record merge predicates (bsc#1208183).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-03-31"/>
	<updated date="2023-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166486">SUSE bug 1166486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197534">SUSE bug 1197534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197617">SUSE bug 1197617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198438">SUSE bug 1198438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202353">SUSE bug 1202353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202633">SUSE bug 1202633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203200">SUSE bug 1203200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203331">SUSE bug 1203331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203332">SUSE bug 1203332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204363">SUSE bug 1204363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204993">SUSE bug 1204993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205544">SUSE bug 1205544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205846">SUSE bug 1205846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206103">SUSE bug 1206103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206224">SUSE bug 1206224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206232">SUSE bug 1206232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206459">SUSE bug 1206459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206492">SUSE bug 1206492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206493">SUSE bug 1206493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206640">SUSE bug 1206640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206824">SUSE bug 1206824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206876">SUSE bug 1206876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206877">SUSE bug 1206877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206878">SUSE bug 1206878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206880">SUSE bug 1206880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206881">SUSE bug 1206881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206882">SUSE bug 1206882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206883">SUSE bug 1206883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206884">SUSE bug 1206884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206885">SUSE bug 1206885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206886">SUSE bug 1206886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206889">SUSE bug 1206889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206894">SUSE bug 1206894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206935">SUSE bug 1206935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207270">SUSE bug 1207270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207328">SUSE bug 1207328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207529">SUSE bug 1207529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207560">SUSE bug 1207560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207588">SUSE bug 1207588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207589">SUSE bug 1207589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207590">SUSE bug 1207590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207591">SUSE bug 1207591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207592">SUSE bug 1207592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207593">SUSE bug 1207593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207594">SUSE bug 1207594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207603">SUSE bug 1207603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207605">SUSE bug 1207605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207606">SUSE bug 1207606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207607">SUSE bug 1207607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207608">SUSE bug 1207608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207609">SUSE bug 1207609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207610">SUSE bug 1207610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207613">SUSE bug 1207613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207615">SUSE bug 1207615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207617">SUSE bug 1207617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207618">SUSE bug 1207618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207619">SUSE bug 1207619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207620">SUSE bug 1207620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207621">SUSE bug 1207621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207623">SUSE bug 1207623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207624">SUSE bug 1207624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207625">SUSE bug 1207625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207626">SUSE bug 1207626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207628">SUSE bug 1207628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207630">SUSE bug 1207630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207631">SUSE bug 1207631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207632">SUSE bug 1207632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207634">SUSE bug 1207634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207635">SUSE bug 1207635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207636">SUSE bug 1207636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207638">SUSE bug 1207638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207639">SUSE bug 1207639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207641">SUSE bug 1207641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207642">SUSE bug 1207642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207643">SUSE bug 1207643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207644">SUSE bug 1207644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207645">SUSE bug 1207645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207646">SUSE bug 1207646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207647">SUSE bug 1207647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207648">SUSE bug 1207648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207651">SUSE bug 1207651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207653">SUSE bug 1207653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207770">SUSE bug 1207770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207773">SUSE bug 1207773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207845">SUSE bug 1207845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207875">SUSE bug 1207875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208149">SUSE bug 1208149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208153">SUSE bug 1208153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208179">SUSE bug 1208179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208183">SUSE bug 1208183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208212">SUSE bug 1208212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208290">SUSE bug 1208290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208420">SUSE bug 1208420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208428">SUSE bug 1208428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208429">SUSE bug 1208429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208449">SUSE bug 1208449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208534">SUSE bug 1208534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208541">SUSE bug 1208541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208570">SUSE bug 1208570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208598">SUSE bug 1208598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208599">SUSE bug 1208599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208601">SUSE bug 1208601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208603">SUSE bug 1208603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208605">SUSE bug 1208605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208607">SUSE bug 1208607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208628">SUSE bug 1208628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208700">SUSE bug 1208700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208741">SUSE bug 1208741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208759">SUSE bug 1208759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208776">SUSE bug 1208776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208777">SUSE bug 1208777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208784">SUSE bug 1208784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208787">SUSE bug 1208787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208816">SUSE bug 1208816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208837">SUSE bug 1208837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208843">SUSE bug 1208843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208848">SUSE bug 1208848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209008">SUSE bug 1209008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209159">SUSE bug 1209159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209256">SUSE bug 1209256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209258">SUSE bug 1209258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209262">SUSE bug 1209262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209291">SUSE bug 1209291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209436">SUSE bug 1209436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209457">SUSE bug 1209457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209504">SUSE bug 1209504</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3523/">CVE-2022-3523 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3523">CVE-2022-3523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36280/">CVE-2022-36280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38096/">CVE-2022-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38096">CVE-2022-38096 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0045/">CVE-2023-0045 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0045">CVE-2023-0045 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0461/">CVE-2023-0461 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0461">CVE-2023-0461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0597/">CVE-2023-0597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0597">CVE-2023-0597 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1075/">CVE-2023-1075 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1075">CVE-2023-1075 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1076/">CVE-2023-1076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1078/">CVE-2023-1078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1095/">CVE-2023-1095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1095">CVE-2023-1095 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1118/">CVE-2023-1118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22995/">CVE-2023-22995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22995">CVE-2023-22995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22998/">CVE-2023-22998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23000/">CVE-2023-23000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23000">CVE-2023-23000 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23004/">CVE-2023-23004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23004">CVE-2023-23004 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25012/">CVE-2023-25012 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26545/">CVE-2023-26545 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28328/">CVE-2023-28328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28328">CVE-2023-28328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009751439" comment="kernel-default-5.14.21-150400.24.55.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751440" comment="kernel-default-base-5.14.21-150400.24.55.3.150400.24.22.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205927" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1207571" ref_url="https://bugzilla.suse.com/1207571" source="BUGZILLA"/>
		<reference ref_id="1207957" ref_url="https://bugzilla.suse.com/1207957" source="BUGZILLA"/>
		<reference ref_id="1207975" ref_url="https://bugzilla.suse.com/1207975" source="BUGZILLA"/>
		<reference ref_id="1208358" ref_url="https://bugzilla.suse.com/1208358" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0687" ref_url="https://www.suse.com/security/cve/CVE-2023-0687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1718-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029036.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2023-0687: Fix allocated buffer overflow in gmon (bsc#1207975)

Other issues fixed:

- Fix avx2 strncmp offset compare condition check (bsc#1208358)
- elf: Allow dlopen of filter object to work (bsc#1207571)
- powerpc: Fix unrecognized instruction errors with recent GCC
- x86: Cache computation for AMD architecture (bsc#1207957)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207571">SUSE bug 1207571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207957">SUSE bug 1207957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207975">SUSE bug 1207975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208358">SUSE bug 1208358</bugzilla>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0687/">CVE-2023-0687 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0687">CVE-2023-0687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743773" comment="glibc-2.31-150300.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743774" comment="glibc-devel-2.31-150300.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743775" comment="glibc-locale-2.31-150300.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743776" comment="glibc-locale-base-2.31-150300.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205928" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1209624" ref_url="https://bugzilla.suse.com/1209624" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1745-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028609.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-0464: Fixed excessive Resource Usage Verifying X.509 Policy Constraints (bsc#1209624).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-04"/>
	<updated date="2023-04-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209624">SUSE bug 1209624</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009751441" comment="libopenssl-1_1-devel-1.1.1l-150400.7.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751442" comment="libopenssl1_1-1.1.1l-150400.7.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751443" comment="libopenssl1_1-hmac-1.1.1l-150400.7.31.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009751444" comment="openssl-1_1-1.1.1l-150400.7.31.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205929" version="1" class="patch">
	<metadata>
		<title>Security update for conmon (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1209307" ref_url="https://bugzilla.suse.com/1209307" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:1796-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029041.html" source="SUSE-SU"/>
		<description>
This update for conmon fixes the following issues:

- rebuild against supported go 1.19 (bsc#1209307)
- no functional changes.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209307">SUSE bug 1209307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747156" comment="conmon-2.1.5-150400.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205930" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1197093" ref_url="https://bugzilla.suse.com/1197093" source="BUGZILLA"/>
		<reference ref_id="1208364" ref_url="https://bugzilla.suse.com/1208364" source="BUGZILLA"/>
		<reference ref_id="1208510" ref_url="https://bugzilla.suse.com/1208510" source="BUGZILLA"/>
		<reference ref_id="1209495" ref_url="https://bugzilla.suse.com/1209495" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0778" ref_url="https://www.suse.com/security/cve/CVE-2023-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014735.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

Update to version 4.4.4:

  * libpod: always use direct mapping
  * macos pkginstaller: do not fail when podman-mac-helper fails
  * podman-mac-helper: install: do not error if already installed

- podman.spec: Bump required version for libcontainers-common (bsc#1209495)

Update to version 4.4.3:

  * compat: /auth: parse server address correctly
  * vendor github.com/containers/common@v0.51.1
  * pkginstaller: bump Qemu to version 7.2.0
  * podman machine: Adjust Chrony makestep config
  * [v4.4] fix --health-on-failure=restart in transient unit
  * podman logs passthrough driver support --cgroups=split
  * journald logs: simplify entry parsing
  * podman logs: read journald with passthrough
  * journald: remove initializeJournal()
  * netavark: only use aardvark ip as nameserver
  * compat API: network create return 409 for duplicate
  * fix 'podman logs --since --follow' flake
  * system service --log-level=trace: support hijack
  * podman-mac-helper: exit 1 on error
  * bump golang.org/x/net to v0.8.0
  * Fix package restore
  * Quadlet - use the default runtime

Update to version 4.4.2:

  * Revert 'CI: Temporarily disable all AWS EC2-based tasks'
  * kube play: only enforce passthrough in Quadlet
  * Emergency fix for man pages: check for broken includes
  * CI: Temporarily disable all AWS EC2-based tasks
  * quadlet system tests: add useful defaults, logging
  * volume,container: chroot to source before exporting content
  * install sigproxy before start/attach
  * Update to c/image 5.24.1
  * events + container inspect test: RHEL fixes

- podman.spec: add `crun` requirement for quadlet
- podman.spec: set PREFIX at build stage (bsc#1208510)

- CVE-2023-0778: Fixed symlink exchange attack in podman export volume  (bsc#1208364)

Update to version 4.4.1:

  * kube play: do not teardown unconditionally on error
  * Resolve symlink path for qemu directory if possible
  * events: document journald identifiers
  * Quadlet: exit 0 when there are no files to process
  * Cleanup podman-systemd.unit file
  * Install podman-systemd.unit  man page, make quadlet discoverable
  * Add missing return after errors
  * oci: bind mount /sys with --userns=(auto|pod:)
  * docs: specify order preference for FROM
  * Cirrus: Fix &amp; remove GraphQL API tests
  * test: adapt test to work on cgroupv1
  * make hack/markdown-preprocess parallel-safe
  * Fix default handling of pids-limit
  * system tests: fix volume exec/noexec test

Update to version 4.4.0:

  * Emergency fix for RHEL8 gating tests
  * Do not mount /dev/tty into rootless containers
  * Fixes port collision issue on use of --publish-all
  * Fix usage of absolute windows paths with --image-path
  * fix #17244: use /etc/timezone where `timedatectl` is missing on Linux
  * podman-events: document verbose create events
  * Making gvproxy.exe optional for building Windows installer
  * Add gvproxy to Windows packages
  * Match VT device paths to be blocked from mounting exactly
  * Clean up more language for inclusiveness
  * Set runAsNonRoot=true in gen kube
  * quadlet: Add device support for .volume files
  * fix: running check error when podman is default in wsl
  * fix: don't output 'ago' when container is currently up and running
  * journald: podman logs only show logs for current user
  * journald: podman events only show events for current user
  * Add (podman {image,manifest} push --sign-by-sigstore=param-file.yaml)
  * DB: make loading container states optional
  * ps: do not sync container
  * Allow --device-cgroup-rule to be passed in by docker API
  * Create release notes for v4.4.0
  * Cirrus: Update operating branch
  * fix APIv2 python attach test flake
  * ps: query health check in batch mode
  * make example volume import, not import volume
  * Correct output when inspecting containers created with --ipc
  * Vendor containers/(storage, image, common, buildah)
  * Get correct username in pod when using --userns=keep-id
  * ps: get network data in batch mode
  * build(deps): bump github.com/onsi/gomega from 1.25.0 to 1.26.0
  * add hack/perf for comparing two container engines
  * systems: retrofit dns options test to honor other search domains
  * ps: do not create copy of container config
  * libpod: set search domain independently of nameservers
  * libpod,netavark: correctly populate /etc/resolv.conf with custom dns server
  * podman: relay custom DNS servers to network stack
  * (fix) mount_program is in storage.options.overlay
  * Change example target to default in doc
  * network create: do not allow `default` as name
  * kube-play: add support for HostPID in podSpec
  * build(deps): bump github.com/docker/docker
  * Let's see if #14653 is fixed or not
  * Add support for podman build --group-add
  * vendor in latests containers/(storage, common, build, image)
  * unskip network update test
  * do not install swagger by default
  * pasta: skip 'Local forwarder, IPv4' test
  * add testbindings Makefile target
  * update CI images to include pasta
  * [CI:DOCS] Add CNI deprecation notices to documentation
  * Cirrus: preserve podman-server logs
  * waitPidStop: reduce sleep time to 10ms
  * StopContainer: return if cleanup process changed state
  * StopSignal: add a comment
  * StopContainer: small refactor
  * waitPidStop: simplify code
  * e2e tests: reenable long-skipped build test
  * Add openssh-clients to podmanimage
  * Reworks Windows smoke test to tunnel through interactive session.
  * fix bud-multiple-platform-with-base-as-default-arg flake
  * Remove ReservedAnnotations from kube generate specification
  * e2e: update test/README.md
  * e2e: use isRootless() instead of rootless.IsRootless()
  * Cleanup documentation on --userns=auto
  * Vendor in latest c/common
  * sig-proxy system test: bump timeout
  * build(deps): bump github.com/containernetworking/plugins
  * rootless: rename auth-scripts to preexec-hooks
  * Docs: version-check updates
  * commit: use libimage code to parse changes
  * [CI:DOCS] Remove experimental mac tutorial
  * man: Document the interaction between --systemd and --privileged
  * Make rootless privileged containers share the same tty devices as rootfull ones
  * container kill: handle stopped/exited container
  * Vendor in latest containers/(image,ocicrypt)
  * add a comment to container removal
  * Vendor in latest containers/storage
  * Cirrus: Run machine tests on PR merge
  * fix flake in kube system test
  * kube play: complete container spec
  * E2E Tests: Use inspect instead of actual data to avoid UDP flake
  * Use containers/storage/pkg/regexp in place of regexp
  * Vendor in latest containers/storage
  * Cirrus: Support using updated/latest NV/AV in PRs
  * Limit replica count to 1 when deploying from kubernetes YAML
  * Set StoppedByUser earlier in the process of stopping
  * podman-play system test: refactor
  * network: add support for podman network update and --network-dns-server
  * service container: less verbose error logs
  * Quadlet Kube - add support for PublishPort key
  * e2e: fix systemd_activate_test
  * Compile regex on demand not in init
  * [docker compat] Don't overwrite the NetworkMode if containers.conf overrides netns.
  * E2E Test: Play Kube set deadline to connection to avoid hangs
  * Only prevent VTs to be mounted inside privileged systemd containers
  * e2e: fix play_kube_test
  * Updated error message for supported VolumeSource types
  * Introduce pkg retry logic in win installer task
  * logformatter: include base SHA, with history link
  * Network tests: ping redhat.com, not podman.io
  * cobra: move engine shutdown to Execute
  * Updated options for QEMU on Windows hosts
  * Update Mac installer to use gvproxy v0.5.0
  * podman: podman rm -f doesn't leave processes
  * oci: check for valid PID before kill(pid, 0)
  * linux: add /sys/fs/cgroup if /sys is a bind mount
  * Quadlet: Add support for ConfigMap key in Kube section
  * remove service container _after_ pods
  * Kube Play - allow setting and overriding published host ports
  * oci: terminate all container processes on cleanup
  * Update win-sshproxy to 0.5.0 gvisor tag
  * Vendor in latest containers/common
  * Fix a potential defer logic error around locking
  * logformatter: nicer formatting for bats failures
  * logformatter: refactor verbose line-print
  * e2e tests: stop using UBI images
  * k8s-file: podman logs --until --follow exit after time
  * journald: podman logs --until --follow exit after time
  * journald: seek to time when --since is used
  * podman logs: journald fix --since and --follow
  * Preprocess files in UTF-8 mode
  * Vendor in latest containers/(common, image, storage)
  * Switch to C based msi hooks for win installer
  * hack/bats: improve usage message
  * hack/bats: add --remote option
  * hack/bats: fix root/rootless logic
  * Describe copy volume options
  * Support sig-proxy for podman-remote attach and start
  * libpod: fix race condition rm'ing stopping containers
  * e2e: fix run_volume_test
  * Add support for Windows ARM64
  * Add shared --compress to man pages
  * Add container error message to ContainerState
  * Man page checker: require canonical name in SEE ALSO
  * system df: improve json output code
  * kube play: fix the error logic with --quiet
  * System tests: quadlet network test
  * Fix: List container with volume filter
  * adding -dryrun flag
  * Quadlet Container: Add support for EnvironmentFile and EnvironmentHost
  * Kube Play: use passthrough as the default log-driver if service-container is set
  * System tests: add missing cleanup
  * System tests: fix unquoted question marks
  * Build and use a newer systemd image
  * Quadlet Network - Fix the name of the required network service
  * System Test Quadlet - Volume dependency test did not test the dependency
  * fix `podman system connection - tcp` flake
  * vendor: bump c/storage to a747b27
  * Fix instructions about setting storage driver on command-line
  * Test README - point users to hack/bats
  * System test: quadlet kube basic test
  * Fixed `podman update --pids-limit`
  * podman-remote,bindings: trim context path correctly when its emptydir
  * Quadlet Doc: Add section for .kube files
  * e2e: fix containers_conf_test
  * Allow '/' to prefix container names to match Docker
  * Remove references to qcow2
  * Fix typos in man page regarding transient storage mode.
  * make: Use PYTHON var for .install.pre-commit
  * Add containers.conf read-only flag support
  * Explain that relabeling/chowning of volumes can take along time
  * events: support 'die' filter
  * infra/abi: refactor ContainerRm
  * When in transient store mode, use rundir for bundlepath
  * quadlet: Support Type=oneshot container files
  * hacks/bats: keep QUADLET env var in test env
  * New system tests for conflicting options
  * Vendor in latest containers/(buildah, image, common)
  * Output Size and Reclaimable in human form for json output
  * podman service: close duplicated /dev/null fd
  * ginkgo tests: apply ginkgolinter fixes
  * Add support for hostPath and configMap subpath usage
  * export: use io.Writer instead of file
  * rootless: always create userns with euid != 0
  * rootless: inhibit copy mapping for euid != 0
  * pkg/domain/infra/abi: introduce `type containerWrapper`
  * vendor: bump to buildah ca578b290144 and use new cache API
  * quadlet: Handle booleans that have defaults better
  * quadlet: Rename parser.LookupBoolean to LookupBooleanWithDefault
  * Add podman-clean-transient.service service
  * Stop recording annotations set to false
  * Unify --noheading and -n to be consistent on all commands
  * pkg/domain/infra/abi: add `getContainers`
  * Update vendor of containters/(common, image)
  * specfile: Drop user-add depedency from quadlet subpackage.
  * quadlet: Default BINDIR to /usr/bin if tag not specified
  * Quadlet: add network support
  * Add comment for jsonMarshal command
  * Always allow pushing from containers-storage
  * libpod: move NetNS into state db instead of extra bucket
  * Add initial system tests for quadlets
  * quadlet: Add --user option
  * libpod: remove CNI word were no longer applicable
  * libpod: fix header length in http attach with logs
  * podman-kube@ template: use `podman kube`
  * build(deps): bump github.com/docker/docker
  * wait: add --ignore option
  * qudlet: Respect $PODMAN env var for podman binary
  * e2e: Add assert-key-is-regex check to quadlet e2e testsuite
  * e2e: Add some assert to quadlet test to make sure testcases are sane
  * remove unmapped ports from inspect port bindings
  * update podman-network-create for clarity
  * Vendor in latest containers/common with default capabilities
  * pkg/rootless: Change error text ...
  * rootless: add cli validator
  * rootless: define LIBEXECPODMAN
  * doc: fix documentation for idmapped mounts
  * bump golangci-lint to v1.50.1
  * build(deps): bump github.com/onsi/gomega from 1.24.1 to 1.24.2
  * [CI:DOCS] podman-mount: s/umount/unmount/
  * create/pull --help: list pull policies
  * Network Create: Add --ignore flag to support idempotent script
  * Make qemu security model none
  * libpod: use OCI idmappings for mounts
  * stop reporting errors removing containers that don't exist
  * test: added test from wait endpoint with to long label
  * quadlet: Default VolatileTmp to off
  * build(deps): bump github.com/ulikunitz/xz from 0.5.10 to 0.5.11
  * docs/options/ipc: fix list syntax
  * Docs: Add dedicated DOWNLOAD doc w/ links to bins
  * Make a consistently-named windows installer
  * checkpoint restore: fix --ignore-static-ip/mac
  * add support for subpath in play kube for named volumes
  * build(deps): bump golang.org/x/net from 0.2.0 to 0.4.0
  * golangci-lint: remove three deprecated linters
  * parse-localbenchmarks: separate standard deviation
  * build(deps): bump golang.org/x/term from 0.2.0 to 0.3.0
  * podman play kube support container startup probe
  * Add podman buildx version support
  * Cirrus: Collect benchmarks on machine instances
  * Cirrus: Remove escape codes from log files
  * [CI:DOCS] Clarify secret target behavior
  * Fix typo on network docs
  * podman-remote build add --volume support
  * remote: allow --http-proxy for remote clients
  * Cleanup kube play workloads if error happens
  * health check: ignore dependencies of transient systemd units/timers
  * fix: event read from syslog
  * Fixes secret (un)marshaling for kube play.
  * Remove 'you' from man pages
  * build(deps): bump golang.org/x/tools from 0.3.0 to 0.4.0 in /test/tools
  * [CI:DOCS] test/README.md: run tests with podman-remote
  * e2e: keeps the http_proxy value
  * Makefile: Add podman-mac-helper to darwin client zip
  * test/e2e: enable 'podman run with ipam none driver' for nv
  * [skip-ci] GHA/Cirrus-cron: Fix execution order
  * kube sdnotify: run proxies for the lifespan of the service
  * Update containers common package
  * podman manpage: Use man-page links instead of file names
  * e2e: fix e2e tests in proxy environment
  * Fix test
  * disable healthchecks automatically on non systemd systems
  * Quadlet Kube: Add support for userns flag
  * [CI:DOCS] Add warning about --opts,o with mount's -o
  * Add podman system prune --external
  * Add some tests for transient store
  * runtime: In transient_store mode, move bolt_state.db to rundir
  * runtime: Handle the transient store options
  * libpod: Move the creation of TmpDir to an earlier time
  * network create: support '-o parent=XXX' for ipvlan
  * compat API: allow MacAddress on container config
  * Quadlet Kube: Add support for relative path for YAML file
  * notify k8s system test: move sending message into exec
  * runtime: do not chown idmapped volumes
  * quadlet: Drop ExecStartPre=rm %t/%N.cid
  * Quadlet Kube: Set SyslogIdentifier if was not set
  * Add a FreeBSD cross build to the cirrus alt build task
  * Add completion for --init-ctr
  * Fix handling of readonly containers when defined in kube.yaml
  * Build cross-compilation fixes
  * libpod: Track healthcheck API changes in healthcheck_unsupported.go
  * quadlet: Use same default capability set as podman run
  * quadlet: Drop --pull=never
  * quadlet: Change default of ReadOnly to no
  * quadlet: Change RunInit default to no
  * quadlet: Change NoNewPrivileges default to false
  * test: podman run with checkpoint image
  * Enable 'podman run' for checkpoint images
  * test: Add tests for checkpoint images
  * CI setup: simplify environment passthrough code
  * Init containers should not be restarted
  * Update c/storage after https://github.com/containers/storage/pull/1436
  * Set the latest release explicitly
  * add friendly comment
  * fix an overriding logic and load config problem
  * Update the issue templates
  * Update vendor of containers/(image, buildah)
  * [CI:DOCS] Skip windows-smoke when not useful
  * [CI:DOCS] Remove broken gate-container docs
  * OWNERS: add Jason T. Greene
  * hack/podmansnoop: print arguments
  * Improve atomicity of VM state persistence on Windows
  * [CI:BUILD] copr: enable podman-restart.service on rpm installation
  * macos: pkg: Use -arm64 suffix instead of -aarch64
  * linux: Add -linux suffix to podman-remote-static binaries
  * linux: Build amd64 and arm64 podman-remote-static binaries
  * container create: add inspect data to event
  * Allow manual override of install location
  * Run codespell on code
  * Add missing parameters for checkpoint/restore endpoint
  * Add support for startup healthchecks
  * Add information on metrics to the `network create` docs
  * Introduce podman machine os commands
  * Document that ignoreRootFS depends on export/import
  * Document ignoreVolumes in checkpoint/restore endpoint
  * Remove leaveRunning from swagger restore endpoint
  * libpod: Add checks to avoid nil pointer dereference if network setup fails
  * Address golangci-lint issues
  * Documenting Hyper-V QEMU acceleration settings
  * Kube Play: fix the handling of the optional field of SecretVolumeSource
  * Update Vendor of containers/(common, image, buildah)
  * Fix swapped NetInput/-Output stats
  * libpod: Use O_CLOEXEC for descriptors returned by (*Container).openDirectory
  * chore: Fix MD for Troubleshooting Guide link in GitHub Issue Template
  * test/tools: rebuild when files are changed
  * ginkgo tests: apply ginkgolinter fixes
  * ginkgo: restructure install work flow
  * Fix manpage emphasis
  * specgen: support CDI devices from containers.conf
  * vendor: update containers/common
  * pkg/trust: Take the default policy path from c/common/pkg/config
  * Add validate-in-container target
  * Adding encryption decryption feature
  * container restart: clean up healthcheck state
  * Add support for podman-remote manifest annotate
  * Quadlet: Add support for .kube files
  * Update vendor of containers/(buildah, common, storage, image)
  * specgen: honor user namespace value
  * [CI:DOCS] Migrate OSX Cross to M1
  * quadlet: Rework uid/gid remapping
  * GHA: Fix cirrus re-run workflow for other repos.
  * ssh system test: skip until it becomes a test
  * shell completion: fix hard coded network drivers
  * libpod: Report network setup errors properly on FreeBSD
  * E2E Tests: change the registry for the search test to avoid authentication
  * pkginstaller: install podman-mac-helper by default
  * Fix language. Mostly spelling a -&gt; an
  * podman machine: Propagate SSL_CERT_FILE and SSL_CERT_DIR to systemd environment.
  * [CI:DOCS] Fix spelling and typos
  * Modify man page of '--pids-limit' option to correct a default value.
  * Update docs/source/markdown/podman-remote.1.md
  * Update pkg/bindings/connection.go
  * Add more documentation on UID/GID Mappings with --userns=keep-id
  * support podman-remote to connect tcpURL with proxy
  * Removing the RawInput from the API output
  * fix port issues for CONTAINER_HOST
  * CI: Package versions: run in the 'main' step
  * build(deps): bump github.com/rootless-containers/rootlesskit
  * pkg/domain: Make checkExecPreserveFDs platform-specific
  * e2e tests: fix restart race
  * Fix podman --noout to suppress all output
  * remove pod if creation has failed
  * pkg/rootless: Implement rootless.IsFdInherited on FreeBSD
  * Fix more podman-logs flakes
  * healthcheck system tests: try to fix flake
  * libpod: treat ESRCH from /proc/PID/cgroup as ENOENT
  * GHA: Configure workflows for reuse
  * compat,build: handle docker's preconfigured cacheTo,cacheFrom
  * docs: deprecate pasta network name
  * utils: Enable cgroup utils for FreeBSD
  * pkg/specgen: Disable kube play tests on FreeBSD
  * libpod/lock: Fix build and tests for SHM locks on FreeBSD
  * podman cp: fix copying with '.' suffix
  * pkginstaller: bump Qemu to version 7.1.0
  * specgen,wasm: switch to crun-wasm wherever applicable
  * vendor: bump c/common to v0.50.2-0.20221111184705-791b83e1cdf1
  * libpod: Make unit test for statToPercent Linux only
  * Update vendor of containers/storage
  * fix connection usage with containers.conf
  * Add --quiet and --no-info flags to podman machine start
  * Add hidden podman manifest inspect -v option
  * Add podman volume create -d short option for driver
  * Vendor in latest containers/(common,image,storage)
  * Add podman system events alias to podman events
  * Fix search_test to return correct version of alpine
  * GHA: Fix undefined secret env. var.
  * Release notes for 4.3.1
  * GHA: Fix make_email-body script reference
  * Add release keys to README
  * GHA: Fix typo setting output parameter
  * GHA: Fix typo.
  * New tool, docs/version-check
  * Formalize our compare-against-docker mechanism
  * Add restart-sec for container service files
  * test/tools: bump module to go 1.17
  * contrib/cirrus/check_go_changes.sh: ignore test/tools/vendor
  * build(deps): bump golang.org/x/tools from 0.1.12 to 0.2.0 in /test/tools
  * libpod: Add FreeBSD support in packageVersion
  * Allow podman manigest push --purge|-p as alias for --rm
  * [CI:DOCS] Add performance tutorial
  * [CI:DOCS] Fix build targets in build_osx.md.
  * fix --format {{json .}} output to match docker
  * remote: fix manifest add --annotation
  * Skip test if `--events-backend` is necessary with podman-remote
  * kube play: update the handling of PersistentVolumeClaim
  * system tests: fix a system test in proxy environment
  * Use single unqualified search registry on Windows
  * test/system: Add, use tcp_port_probe() to check for listeners rather than binds
  * test/system: Add tests for pasta(1) connectivity
  * test/system: Move network-related helpers to helpers.network.bash
  * test/system: Use procfs to find bound ports, with optional address and protocol
  * test/system: Use port_is_free() from wait_for_port()
  * libpod: Add pasta networking mode
  * More log-flake work
  * Fix test flakes caused by improper podman-logs
  * fix incorrect systemd booted check
  * Cirrus: Add tests for GHA scripts
  * GHA: Update scripts to pass shellcheck
  * Cirrus: Shellcheck github-action scripts
  * Cirrus: shellcheck support for github-action scripts
  * GHA: Fix cirrus-cron scripts
  * Makefile: don't install to tmpfiles.d on FreeBSD
  * Make sure we can build and read each line of docker py's api client
  * Docker compat build api - make sure only one line appears per flush
  * Run codespell on code
  * Update vendor of containers/(image, storage, common)
  * Allow namespace path network option for pods.
  * Cirrus: Never skip running Windows Cross task
  * GHA: Auto. re-run failed cirrus-cron builds once
  * GHA: Migrate inline script to file
  * GHA: Simplify script reference
  * test/e2e: do not use apk in builds
  * remove container/pod id file along with container/pod
  * Cirrus: Synchronize windows image
  * Add --insecure,--tls-verify,--verbose flags to podman manifest inspect
  * runtime: add check for valid pod systemd cgroup
  * CI: set and verify DESIRED_NETWORK (netavark, cni)
  * [CI:DOCS] troubleshooting: document keep-id options
  * Man pages: refactor common options: --security-opt
  * Cirrus: Guarantee CNI testing w/o nv/av present
  * Cirrus: temp. disable all Ubuntu testing
  * Cirrus: Update to F37beta
  * buildah bud tests: better handling of remote
  * quadlet: Warn in generator if using short names
  * Add Windows Smoke Testing
  * Add podman kube apply command
  * docs: offer advice on installing test dependencies
  * Fix documentation on read-only-tmpfs
  * version bump to 4.4.0-dev
  * deps: bump go-criu to v6
  * Makefile: Add cross build targets for freebsd
  * pkg/machine: Make this build on FreeBSD/arm64
  * pkg/rctl: Remove unused cgo dependency
  * man pages: assorted underscore fixes
  * Upgrade GitHub actions packages from v2 to v3
  * vendor github.com/godbus/dbus/v5@4b691ce
  * [CI:DOCS] fix --tmpdir typos
  * Do not report that /usr/share/containers/storage.conf has been edited.
  * Eval symlinks on XDG_RUNTIME_DIR
  * hack/podmansnoop
  * rootless: support keep-id with one mapping
  * rootless: add argument to GetConfiguredMappings
  * Update vendor containers/(common,storage,buildah,image)
  * Fix deadlock between 'podman ps' and 'container inspect' commands
  * Add information about where the libpod/boltdb database lives
  * Consolidate the dependencies for the IsTerminal() API
  * Ensure that StartAndAttach locks while sending signals
  * ginkgo testing: fix podman usernamespace join
  * Test runners: nuke podman from $PATH before tests
  * volumes: Fix idmap not working for volumes
  * FIXME: Temporary workaround for ubi8 CI breakage
  * System tests: teardown: clean up volumes
  * update api versions on docs.podman.io
  * system tests: runlabel: use podman-under-test
  * system tests: podman network create: use random port
  * sig-proxy test: bump timeout
  * play kube: Allow the user to import the contents of a tar file into a volume
  * Clarify the docs on DropCapability
  * quadlet tests: Disable kmsg logging while testing
  * quadlet: Support multiple Network=
  * quadlet: Add support for Network=...
  * Fix manpage for podman run --network option
  * quadlet: Add support for AddDevice=
  * quadlet: Add support for setting seccomp profile
  * quadlet: Allow multiple elements on each Add/DropCaps line
  * quadlet: Embed the correct binary name in the generated comment
  * quadlet: Drop the SocketActivated key
  * quadlet: Switch log-driver to passthrough
  * quadlet: Change ReadOnly to default to enabled
  * quadlet tests: Run the tests even for (exected) failed tests
  * quadlet tests: Fix handling of stderr checks
  * Remove unused script file
  * notifyproxy: fix container watcher
  * container/pod id file: truncate instead of throwing an error
  * quadlet: Use the new podman create volume --ignore
  * Add podman volume create --ignore
  * logcollector: include aardvark-dns
  * build(deps): bump github.com/stretchr/testify from 1.8.0 to 1.8.1
  * build(deps): bump github.com/BurntSushi/toml from 1.2.0 to 1.2.1
  * docs: generate systemd: point to kube template
  * docs: kube play: mention restart policy
  * Fixes: 15858 (podman system reset --force destroy machine)
  * fix search flake
  * use cached containers.conf
  * adding regex support to the ancestor ps filter function
  * Fix `system df` issues with `-f` and `-v`
  * markdown-preprocess: cross-reference where opts are used
  * Default qemu flags for Windows amd64
  * build(deps): bump golang.org/x/text from 0.3.8 to 0.4.0
  * Update main to reflect v4.3.0 release
  * build(deps): bump github.com/docker/docker
  * move quadlet packages into pkg/systemd
  * system df: fix image-size calculations
  * Add man page for quadlet
  * Fix small typo
  * testimage: add iproute2 &amp; socat, for pasta networking
  * Set up minikube for k8s testing
  * Makefile: don't install systemd generator binaries on FreeBSD
  * [CI:BUILD] copr: podman rpm should depend on containers-common-extra
  * Podman image: Set default_sysctls to empty for rootless containers
  * Don't use  github.com/docker/distribution
  * libpod: Add support for 'podman top' on FreeBSD
  * libpod: Factor out jail name construction from stats_freebsd.go
  * pkg/util: Add pid information descriptors for FreeBSD
  * Initial quadlet version integrated in golang
  * bump golangci-lint to v1.49.0
  * Update vendor containers/(common,image,storage)
  * Allow volume mount dups, iff source and dest dirs
  * rootless: fix return value handling
  * Change to correct break statements
  * vendor containers/psgo@v1.8.0
  * Clarify that MacOSX docs are client specific
  * libpod: Factor out the call to PidFdOpen from (*Container).WaitForExit
  * Add swagger install + allow version updates in CI
  * Cirrus: Fix windows clone race
  * build(deps): bump github.com/docker/docker
  * kill: wait for the container
  * generate systemd: set --stop-timeout for stopping containers
  * hack/tree_status.sh: print diff at the end
  * Fix markdown header typo
  * markdown-preprocess: add generic include mechanism
  * markdown-preprocess: almost complete OO rewrite
  * Update tests for changed error messages
  * Update c/image after https://github.com/containers/image/pull/1299
  * Man pages: refactor common options (misc)
  * Man pages: Refactor common options: --detach-keys
  * vendor containers/storage@main
  * Man pages: refactor common options: --attach
  * build(deps): bump github.com/fsnotify/fsnotify from 1.5.4 to 1.6.0
  * KillContainer: improve error message
  * docs: add missing options
  * Man pages: refactor common options: --annotation (manifest)
  * build(deps): bump github.com/spf13/cobra from 1.5.0 to 1.6.0
  * system tests: health-on-failure: fix broken logic
  * build(deps): bump golang.org/x/text from 0.3.7 to 0.3.8
  * build(deps): bump github.com/onsi/gomega from 1.20.2 to 1.22.1
  * ContainerEngine.SetupRootless(): Avoid calling container.Config()
  * Container filters: Avoid use of ctr.Config()
  * Avoid unnecessary calls to Container.Spec()
  * Add and use Container.LinuxResource() helper
  * play kube: notifyproxy: listen before starting the pod
  * play kube: add support for configmap binaryData
  * Add and use libpod/Container.Terminal() helper
  * Revert 'Add checkpoint image tests'
  * Revert 'cmd/podman: add support for checkpoint images'
  * healthcheck: fix --on-failure=stop
  * Man pages: Add mention of behavior due to XDG_CONFIG_HOME
  * build(deps): bump github.com/containers/ocicrypt from 1.1.5 to 1.1.6
  * Avoid unnecessary timeout of 250msec when waiting on container shutdown
  * health checks: make on-failure action retry aware
  * libpod: Remove 100msec delay during shutdown
  * libpod: Add support for 'podman pod' on FreeBSD
  * libpod: Factor out cgroup validation from (*Runtime).NewPod
  * libpod: Move runtime_pod_linux.go to runtime_pod_common.go
  * specgen/generate: Avoid a nil dereference in MakePod
  * libpod: Factor out cgroups handling from (*Pod).refresh
  * Adds a link to OSX docs in CONTRIBUTING.md
  * Man pages: refactor common options: --os-version
  * Create full path to a directory when DirectoryOrCreate is used with play kube
  * Return error in podman system service if URI scheme is not unix/tcp
  * Man pages: refactor common options: --time
  * man pages: document some --format options: images
  * Clean up when stopping pods
  * Update vendor of containers/buildah v1.28.0
  * Proof of concept: nightly dependency treadmill

- Make the priority for picking the storage driver configurable (bsc#1197093)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-11"/>
	<updated date="2023-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197093">SUSE bug 1197093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208364">SUSE bug 1208364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208510">SUSE bug 1208510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209495">SUSE bug 1209495</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0778/">CVE-2023-0778 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0778">CVE-2023-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009752891" comment="podman-4.4.4-150400.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752640" comment="podman-cni-config-4.4.4-150400.4.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205931" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208423" ref_url="https://bugzilla.suse.com/1208423" source="BUGZILLA"/>
		<reference ref_id="1208426" ref_url="https://bugzilla.suse.com/1208426" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25153" ref_url="https://www.suse.com/security/cve/CVE-2023-25153/" source="CVE"/>
		<reference ref_id="CVE-2023-25173" ref_url="https://www.suse.com/security/cve/CVE-2023-25173/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014726.html" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

Update to containerd v1.6.19:

Security fixes:
    
- CVE-2023-25153: Fixed OCI image importer memory exhaustion (bnc#1208423).
- CVE-2023-25173: Fixed supplementary groups not set up properly (bnc#1208426).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-13"/>
	<updated date="2023-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208423">SUSE bug 1208423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208426">SUSE bug 1208426</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25153/">CVE-2023-25153 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25153">CVE-2023-25153 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25173/">CVE-2023-25173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752239" comment="containerd-1.6.19-150000.87.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205932" version="1" class="patch">
	<metadata>
		<title>Security update for harfbuzz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1207922" ref_url="https://bugzilla.suse.com/1207922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028815.html" source="SUSE-SU"/>
		<description>
This update for harfbuzz fixes the following issues:

- CVE-2023-25193: Fixed vulnerability that allowed attackers to trigger O(n^2) growth via consecutive marks (bsc#1207922).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-14"/>
	<updated date="2023-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207922">SUSE bug 1207922</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753479" comment="libharfbuzz-gobject0-3.4.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753480" comment="libharfbuzz0-3.4.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753481" comment="typelib-1_0-HarfBuzz-0_0-3.4.0-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205933" version="1" class="patch">
	<metadata>
		<title>Security update for wayland (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1190486" ref_url="https://bugzilla.suse.com/1190486" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3782" ref_url="https://www.suse.com/security/cve/CVE-2021-3782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014454.html" source="SUSE-SU"/>
		<description>
This update for wayland fixes the following issues:

- CVE-2021-3782: Fixed a reference-count overflow in libwayland-server SHM handling. (bsc#1190486)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-14"/>
	<updated date="2023-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190486">SUSE bug 1190486</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3782/">CVE-2021-3782 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3782">CVE-2021-3782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009754594" comment="libwayland-client0-1.19.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754595" comment="libwayland-cursor0-1.19.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754596" comment="libwayland-egl1-99~1.19.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754597" comment="libwayland-server0-1.19.0-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205934" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1109158" ref_url="https://bugzilla.suse.com/1109158" source="BUGZILLA"/>
		<reference ref_id="1189998" ref_url="https://bugzilla.suse.com/1189998" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1203200" ref_url="https://bugzilla.suse.com/1203200" source="BUGZILLA"/>
		<reference ref_id="1206552" ref_url="https://bugzilla.suse.com/1206552" source="BUGZILLA"/>
		<reference ref_id="1207168" ref_url="https://bugzilla.suse.com/1207168" source="BUGZILLA"/>
		<reference ref_id="1207185" ref_url="https://bugzilla.suse.com/1207185" source="BUGZILLA"/>
		<reference ref_id="1207574" ref_url="https://bugzilla.suse.com/1207574" source="BUGZILLA"/>
		<reference ref_id="1208602" ref_url="https://bugzilla.suse.com/1208602" source="BUGZILLA"/>
		<reference ref_id="1208815" ref_url="https://bugzilla.suse.com/1208815" source="BUGZILLA"/>
		<reference ref_id="1208829" ref_url="https://bugzilla.suse.com/1208829" source="BUGZILLA"/>
		<reference ref_id="1208902" ref_url="https://bugzilla.suse.com/1208902" source="BUGZILLA"/>
		<reference ref_id="1209052" ref_url="https://bugzilla.suse.com/1209052" source="BUGZILLA"/>
		<reference ref_id="1209118" ref_url="https://bugzilla.suse.com/1209118" source="BUGZILLA"/>
		<reference ref_id="1209256" ref_url="https://bugzilla.suse.com/1209256" source="BUGZILLA"/>
		<reference ref_id="1209290" ref_url="https://bugzilla.suse.com/1209290" source="BUGZILLA"/>
		<reference ref_id="1209292" ref_url="https://bugzilla.suse.com/1209292" source="BUGZILLA"/>
		<reference ref_id="1209366" ref_url="https://bugzilla.suse.com/1209366" source="BUGZILLA"/>
		<reference ref_id="1209532" ref_url="https://bugzilla.suse.com/1209532" source="BUGZILLA"/>
		<reference ref_id="1209547" ref_url="https://bugzilla.suse.com/1209547" source="BUGZILLA"/>
		<reference ref_id="1209556" ref_url="https://bugzilla.suse.com/1209556" source="BUGZILLA"/>
		<reference ref_id="1209572" ref_url="https://bugzilla.suse.com/1209572" source="BUGZILLA"/>
		<reference ref_id="1209600" ref_url="https://bugzilla.suse.com/1209600" source="BUGZILLA"/>
		<reference ref_id="1209634" ref_url="https://bugzilla.suse.com/1209634" source="BUGZILLA"/>
		<reference ref_id="1209635" ref_url="https://bugzilla.suse.com/1209635" source="BUGZILLA"/>
		<reference ref_id="1209636" ref_url="https://bugzilla.suse.com/1209636" source="BUGZILLA"/>
		<reference ref_id="1209681" ref_url="https://bugzilla.suse.com/1209681" source="BUGZILLA"/>
		<reference ref_id="1209684" ref_url="https://bugzilla.suse.com/1209684" source="BUGZILLA"/>
		<reference ref_id="1209687" ref_url="https://bugzilla.suse.com/1209687" source="BUGZILLA"/>
		<reference ref_id="1209779" ref_url="https://bugzilla.suse.com/1209779" source="BUGZILLA"/>
		<reference ref_id="1209788" ref_url="https://bugzilla.suse.com/1209788" source="BUGZILLA"/>
		<reference ref_id="1209798" ref_url="https://bugzilla.suse.com/1209798" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1209804" ref_url="https://bugzilla.suse.com/1209804" source="BUGZILLA"/>
		<reference ref_id="1209805" ref_url="https://bugzilla.suse.com/1209805" source="BUGZILLA"/>
		<reference ref_id="1210050" ref_url="https://bugzilla.suse.com/1210050" source="BUGZILLA"/>
		<reference ref_id="1210203" ref_url="https://bugzilla.suse.com/1210203" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744/" source="CVE"/>
		<reference ref_id="CVE-2023-0394" ref_url="https://www.suse.com/security/cve/CVE-2023-0394/" source="CVE"/>
		<reference ref_id="CVE-2023-1281" ref_url="https://www.suse.com/security/cve/CVE-2023-1281/" source="CVE"/>
		<reference ref_id="CVE-2023-1513" ref_url="https://www.suse.com/security/cve/CVE-2023-1513/" source="CVE"/>
		<reference ref_id="CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582/" source="CVE"/>
		<reference ref_id="CVE-2023-1611" ref_url="https://www.suse.com/security/cve/CVE-2023-1611/" source="CVE"/>
		<reference ref_id="CVE-2023-1637" ref_url="https://www.suse.com/security/cve/CVE-2023-1637/" source="CVE"/>
		<reference ref_id="CVE-2023-1652" ref_url="https://www.suse.com/security/cve/CVE-2023-1652/" source="CVE"/>
		<reference ref_id="CVE-2023-1838" ref_url="https://www.suse.com/security/cve/CVE-2023-1838/" source="CVE"/>
		<reference ref_id="CVE-2023-23001" ref_url="https://www.suse.com/security/cve/CVE-2023-23001/" source="CVE"/>
		<reference ref_id="CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327/" source="CVE"/>
		<reference ref_id="CVE-2023-28464" ref_url="https://www.suse.com/security/cve/CVE-2023-28464/" source="CVE"/>
		<reference ref_id="CVE-2023-28466" ref_url="https://www.suse.com/security/cve/CVE-2023-28466/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).
- CVE-2023-0394: Fixed a null pointer dereference in the network subcomponent. This flaw could cause system crashes (bsc#1207168).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).
- CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779).
- CVE-2023-1652: Fixed use-after-free that could lead to DoS and information leak in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (bsc#1209788).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).
- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).
- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).
- CVE-2023-23001: Fixed misinterpretation of regulator_get return value in drivers/scsi/ufs/ufs-mediatek.c (bsc#1208829).

The following non-security bugs were fixed:

- ACPI: x86: utils: Add Cezanne to the list for forcing StorageD3Enable (git-fixes).
- alarmtimer: Prevent starvation by small intervals and SIG_IGN (git-fixes)
- ALSA: asihpi: check pao in control_message() (git-fixes).
- ALSA: hda: intel-dsp-config: add MTL PCI id (git-fixes).
- ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() (git-fixes).
- ALSA: hda/conexant: Partial revert of a quirk for Lenovo (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X370SNW (git-fixes).
- ALSA: hda/realtek: Add quirk for Lenovo ZhaoYang CF4620Z (git-fixes).
- ALSA: hda/realtek: Add quirks for some Clevo laptops (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda/realtek: Fix support for Dell Precision 3260 (git-fixes).
- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro (git-fixes).
- ALSA: usb-audio: Fix recursive locking at XRUN during syncing (git-fixes).
- ALSA: usb-audio: Fix regression on detection of Roland VS-100 (git-fixes).
- ALSA: ymfpci: Fix BUG_ON in probe function (git-fixes).
- arch: fix broken BuildID for arm64 and riscv (bsc#1209798).
- ARM: dts: imx6sl: tolino-shine2hd: fix usbotg1 pinctrl (git-fixes).
- ARM: dts: imx6sll: e60k02: fix usbotg1 pinctrl (git-fixes).
- arm64: dts: freescale: Fix pca954x i2c-mux node names (git-fixes)
- arm64: dts: imx8mm-nitrogen-r2: fix WM8960 clock name (git-fixes).
- arm64: dts: imx8mn: specify #sound-dai-cells for SAI nodes (git-fixes).
- arm64: dts: imx8mp-phycore-som: Remove invalid PMIC property (git-fixes)
- arm64: dts: imx8mp: correct usb clocks (git-fixes)
- arm64: dts: imx8mq: add mipi csi phy and csi bridge descriptions (git-fixes)
- arm64: dts: imx8mq: fix mipi_csi bidirectional port numbers (git-fixes)
- arm64: dts: qcom: sm8350: Mark UFS controller as cache coherent (git-fixes).
- arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)
- ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds (git-fixes).
- atm: idt77252: fix kmemleak when rmmod idt77252 (git-fixes).
- Bluetooth: btqcomsmd: Fix command timeout after setting BD address (git-fixes).
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (git-fixes).
- Bluetooth: L2CAP: Fix responding with wrong PDU type (git-fixes).
- ca8210: fix mac_len negative array access (git-fixes).
- ca8210: Fix unsigned mac_len comparison with zero in ca8210_skb_tx() (git-fixes).
- can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write (git-fixes).
- can: isotp: isotp_ops: fix poll() to not report false EPOLLOUT events (git-fixes).
- can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access (git-fixes).
- cifs: append path to open_enter trace event (bsc#1193629).
- cifs: avoid race conditions with parallel reconnects (bsc#1193629).
- cifs: avoid races in parallel reconnects in smb1 (bsc#1193629).
- cifs: check only tcon status on tcon related functions (bsc#1193629).
- cifs: do not poll server interfaces too regularly (bsc#1193629).
- cifs: double lock in cifs_reconnect_tcon() (git-fixes).
- cifs: dump pending mids for all channels in DebugData (bsc#1193629).
- cifs: empty interface list when server does not support query interfaces (bsc#1193629).
- cifs: fix dentry lookups in directory handle cache (bsc#1193629).
- cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL (bsc#1193629).
- cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1193629).
- cifs: Fix smb2_set_path_size() (git-fixes).
- cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1193629).
- cifs: generate signkey for the channel that's reconnecting (bsc#1193629).
- cifs: get rid of dead check in smb2_reconnect() (bsc#1193629).
- cifs: lock chan_lock outside match_session (bsc#1193629).
- cifs: Move the in_send statistic to __smb_send_rqst() (git-fixes).
- cifs: prevent infinite recursion in CIFSGetDFSRefer() (bsc#1193629).
- cifs: print session id while listing open files (bsc#1193629).
- cifs: return DFS root session id in DebugData (bsc#1193629).
- cifs: set DFS root session in cifs_get_smb_ses() (bsc#1193629).
- cifs: use DFS root session instead of tcon ses (bsc#1193629).
- clocksource/drivers/mediatek: Optimize systimer irq clear flow on shutdown (git-fixes).
- debugfs: add debugfs_lookup_and_remove() (git-fixes).
- drivers/base: Fix unsigned comparison to -1 in CPUMAP_FILE_MAX_BYTES (bsc#1208815).
- drivers/base: fix userspace break from using bin_attributes for cpumap and cpulist (bsc#1208815).
- drm/amd/display: Add DSC Support for Synaptics Cascaded MST Hub (git-fixes).
- drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes (git-fixes).
- drm/amdkfd: Fix an illegal memory access (git-fixes).
- drm/bridge: lt8912b: return EPROBE_DEFER if bridge is not found (git-fixes).
- drm/etnaviv: fix reference leak when mmaping imported buffer (git-fixes).
- drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).
- drm/i915: Do not use stolen memory for ring buffers with LLC (git-fixes).
- drm/i915: Preserve crtc_state-&gt;inherited during state clearing (git-fixes).
- drm/i915: Remove unused bits of i915_vma/active api (git-fixes).
- drm/i915/active: Fix missing debug object activation (git-fixes).
- drm/i915/active: Fix misuse of non-idle barriers as fence trackers (git-fixes).
- drm/i915/display: clean up comments (git-fixes).
- drm/i915/display: Workaround cursor left overs with PSR2 selective fetch enabled (git-fixes).
- drm/i915/display/psr: Handle plane and pipe restrictions at every page flip (git-fixes).
- drm/i915/display/psr: Use drm damage helpers to calculate plane damaged area (git-fixes).
- drm/i915/gt: perform uc late init after probe error injection (git-fixes).
- drm/i915/psr: Use calculated io and fast wake lines (git-fixes).
- drm/i915/tc: Fix the ICL PHY ownership check in TC-cold state (git-fixes).
- drm/panfrost: Fix the panfrost_mmu_map_fault_addr() error path (git-fixes).
- dt-bindings: serial: renesas,scif: Fix 4th IRQ for 4-IRQ SCIFs (git-fixes).
- efi: sysfb_efi: Fix DMI quirks not working for simpledrm (git-fixes).
- fbdev: au1200fb: Fix potential divide by zero (git-fixes).
- fbdev: intelfb: Fix potential divide by zero (git-fixes).
- fbdev: lxfb: Fix potential divide by zero (git-fixes).
- fbdev: nvidia: Fix potential divide by zero (git-fixes).
- fbdev: stifb: Provide valid pixelclock and add fb_check_var() checks (git-fixes).
- fbdev: tgafb: Fix potential divide by zero (git-fixes).
- firmware: arm_scmi: Fix device node validation for mailbox transport (git-fixes).
- fotg210-udc: Add missing completion handler (git-fixes).
- ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).
- ftrace: Fix issue that 'direct-&gt;addr' not restored in modify_ftrace_direct() (git-fixes).
- ftrace: Mark get_lock_parent_ip() __always_inline (git-fixes).
- gpio: davinci: Add irq chip flag to skip set wake (git-fixes).
- gpio: GPIO_REGMAP: select REGMAP instead of depending on it (git-fixes).
- HID: cp2112: Fix driver not registering GPIO IRQ chip as threaded (git-fixes).
- HID: intel-ish-hid: ipc: Fix potential use-after-free in work function (git-fixes).
- hwmon: fix potential sensor registration fail if of_node is missing (git-fixes).
- i2c: hisi: Only use the completion interrupt to finish the transfer (git-fixes).
- i2c: imx-lpi2c: check only for enabled interrupt flags (git-fixes).
- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (git-fixes).
- iio: adc: ad7791: fix IRQ flags (git-fixes).
- iio: adc: ti-ads7950: Set `can_sleep` flag for GPIO chip (git-fixes).
- iio: adis16480: select CONFIG_CRC32 (git-fixes).
- iio: dac: cio-dac: Fix max DAC write value check for 12-bit (git-fixes).
- iio: light: cm32181: Unregister second I2C client if present (git-fixes).
- Input: alps - fix compatibility with -funsigned-char (bsc#1209805).
- Input: focaltech - use explicitly signed char type (git-fixes).
- Input: goodix - add Lenovo Yoga Book X90F to nine_bytes_report DMI table (git-fixes).
- KABI FIX FOR: NFSv4: keep state manager thread active if swap is enabled (Never, kabi).
- kABI workaround for xhci (git-fixes).
- kABI: x86/msr: Remove .fixup usage (kabi).
- kconfig: Update config changed flag before calling callback (git-fixes).
- keys: Do not cache key in task struct if key is requested from kernel thread (git-fixes).
- KVM: x86: fix sending PV IPI (git-fixes).
- KVM: x86: fix sending PV IPI (git-fixes).
- lan78xx: Add missing return code checks (git-fixes).
- lan78xx: Fix exception on link speed change (git-fixes).
- lan78xx: Fix memory allocation bug (git-fixes).
- lan78xx: Fix partial packet errors on suspend/resume (git-fixes).
- lan78xx: Fix race condition in disconnect handling (git-fixes).
- lan78xx: Fix race conditions in suspend/resume handling (git-fixes).
- lan78xx: Fix white space and style issues (git-fixes).
- lan78xx: Remove unused pause frame queue (git-fixes).
- lan78xx: Remove unused timer (git-fixes).
- lan78xx: Set flow control threshold to prevent packet loss (git-fixes).
- lockd: set file_lock start and end when decoding nlm4 testargs (git-fixes).
- locking/rwbase: Mitigate indefinite writer starvation (bsc#1189998 (PREEMPT_RT prerequisite backports), bsc#1206552).
- mm: memcg: fix swapcached stat accounting (bsc#1209804).
- mm: mmap: remove newline at the end of the trace (git-fixes).
- mmc: atmel-mci: fix race between stop command and start of next command (git-fixes).
- mtd: rawnand: meson: fix bitmask for length in command word (git-fixes).
- mtd: rawnand: meson: invalidate cache on polling ECC bit (git-fixes).
- mtd: rawnand: stm32_fmc2: remove unsupported EDO mode (git-fixes).
- mtd: rawnand: stm32_fmc2: use timings.mode instead of checking tRC_min (git-fixes).
- mtdblock: tolerate corrected bit-flips (git-fixes).
- net: asix: fix modprobe 'sysfs: cannot create duplicate filename' (git-fixes).
- net: mdio: thunder: Add missing fwnode_handle_put() (git-fixes).
- net: phy: dp83869: fix default value for tx-/rx-internal-delay (git-fixes).
- net: phy: Ensure state transitions are processed from phy_stop() (git-fixes).
- net: phy: nxp-c45-tja11xx: fix MII_BASIC_CONFIG_REV bit (git-fixes).
- net: phy: smsc: bail out in lan87xx_read_status if genphy_read_status fails (git-fixes).
- net: qcom/emac: Fix use after free bug in emac_remove due to race condition (git-fixes).
- net: usb: asix: remove redundant assignment to variable reg (git-fixes).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FE990 (git-fixes).
- net: usb: lan78xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes).
- net: usb: smsc75xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).
- net: usb: smsc95xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: use eth_hw_addr_set() (git-fixes).
- NFS: Fix an Oops in nfs_d_automount() (git-fixes).
- NFS: fix disabling of swap (git-fixes).
- NFS4trace: fix state manager flag printing (git-fixes).
- NFSD: fix handling of readdir in v4root vs. mount upcall timeout (git-fixes).
- NFSD: fix leaked reference count of nfsd4_ssc_umount_item (git-fixes).
- NFSD: fix problems with cleanup on errors in nfsd4_copy (git-fixes).
- NFSD: fix race to check ls_layouts (git-fixes).
- NFSD: fix use-after-free in nfsd4_ssc_setup_dul() (git-fixes).
- NFSD: Protect against filesystem freezing (git-fixes).
- NFSD: shut down the NFSv4 state objects before the filecache (git-fixes).
- NFSD: under NFSv4.1, fix double svc_xprt_put on rpc_create failure (git-fixes).
- NFSD: zero out pointers after putting nfsd_files on COPY setup error (git-fixes).
- NFSv4: Fix a credential leak in _nfs4_discover_trunking() (git-fixes).
- NFSv4: Fix a deadlock between nfs4_open_recover_helper() and delegreturn (git-fixes).
- NFSv4: Fix hangs when recovering open state after a server reboot (git-fixes).
- NFSv4: keep state manager thread active if swap is enabled (git-fixes).
- NFSv4: provide mount option to toggle trunking discovery (git-fixes).
- NFSv4: Fix initialisation of struct nfs4_label (git-fixes).
- NFSv4: Fail client initialisation if state manager thread can't run (git-fixes).
- nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() (git-fixes).
- nilfs2: fix sysfs interface lifetime (git-fixes).
- nvme-tcp: always fail a request when sending it failed (bsc#1208902).
- PCI: hv: Add a per-bus mutex state_lock (bsc#1207185).
- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207185).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).
- PCI: hv: Use async probing to reduce boot time (bsc#1207185).
- PCI/DPC: Await readiness of secondary bus after reset (git-fixes).
- pinctrl: amd: Disable and mask interrupts on resume (git-fixes).
- pinctrl: at91-pio4: fix domain name assignment (git-fixes).
- pinctrl: ocelot: Fix alt mode for ocelot (git-fixes).
- platform/chrome: cros_ec_chardev: fix kernel data leak from ioctl (git-fixes).
- platform/x86: think-lmi: add debug_cmd (bsc#1210050).
- platform/x86: think-lmi: add missing type attribute (git-fixes).
- platform/x86: think-lmi: Add possible_values for ThinkStation (git-fixes).
- platform/x86: think-lmi: Certificate authentication support (bsc#1210050).
- platform/x86: think-lmi: certificate support clean ups (bsc#1210050).
- platform/x86: think-lmi: Clean up display of current_value on Thinkstation (git-fixes).
- platform/x86: think-lmi: Fix memory leak when showing current settings (git-fixes).
- platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings (git-fixes).
- platform/x86: think-lmi: Move kobject_init() call into tlmi_create_auth() (bsc#1210050).
- platform/x86: think-lmi: only display possible_values if available (git-fixes).
- platform/x86: think-lmi: Opcode support (bsc#1210050).
- platform/x86: think-lmi: Prevent underflow in index_store() (bsc#1210050).
- platform/x86: think-lmi: Simplify tlmi_analyze() error handling a bit (bsc#1210050).
- platform/x86: think-lmi: use correct possible_values delimiters (git-fixes).
- platform/x86: think-lmi: Use min_t() for comparison and assignment (bsc#1210050).
- platform/x86: thinkpad_acpi: Accept ibm_init_struct.init() returning -ENODEV (bsc#1210050).
- platform/x86: thinkpad_acpi: Add a s2idle resume quirk for a number of laptops (bsc#1210050).
- platform/x86: thinkpad_acpi: Add dual fan probe (bsc#1210050).
- platform/x86: thinkpad_acpi: Add dual-fan quirk for T15g (2nd gen) (bsc#1210050).
- platform/x86: thinkpad_acpi: Add hotkey_notify_extended_hotkey() helper (bsc#1210050).
- platform/x86: thinkpad_acpi: Add LED_RETAIN_AT_SHUTDOWN to led_class_devs (bsc#1210050).
- platform/x86: thinkpad_acpi: Add lid_logo_dot to the list of safe LEDs (bsc#1210050).
- platform/x86: thinkpad_acpi: Add PSC mode support (bsc#1210050).
- platform/x86: thinkpad_acpi: Add quirk for ThinkPads without a fan (bsc#1210050).
- platform/x86: thinkpad_acpi: clean up dytc profile convert (bsc#1210050).
- platform/x86: thinkpad_acpi: Cleanup dytc_profile_available (bsc#1210050).
- platform/x86: thinkpad_acpi: consistently check fan_get_status return (bsc#1210050).
- platform/x86: thinkpad_acpi: Convert btusb DMI list to quirks (bsc#1210050).
- platform/x86: thinkpad_acpi: Convert platform driver to use dev_groups (bsc#1210050).
- platform/x86: thinkpad_acpi: Correct dual fan probe (bsc#1210050).
- platform/x86: thinkpad_acpi: do not use PSC mode on Intel platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: Do not use test_bit on an integer (bsc#1210050).
- platform/x86: thinkpad_acpi: Enable s2idle quirk for 21A1 machine type (bsc#1210050).
- platform/x86: thinkpad_acpi: Explicitly set to balanced mode on startup (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix a memory leak of EFCH MMIO resource (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix coccinelle warnings (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix compiler warning about uninitialized err variable (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix incorrect use of platform profile on AMD platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix max_brightness of thinklight (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix profile mode display in AMT mode (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix profile modes on Intel platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix reporting a non present second fan on some models (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix the hwmon sysfs-attr showing up in the wrong place (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix thermal_temp_input_attr sorting (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix thinklight LED brightness returning 255 (bsc#1210050).
- platform/x86: thinkpad_acpi: Get privacy-screen / lcdshadow ACPI handles only once (bsc#1210050).
- platform/x86: thinkpad_acpi: Make *_init() functions return -ENODEV instead of 1 (bsc#1210050).
- platform/x86: thinkpad_acpi: Properly indent code in tpacpi_dytc_profile_init() (bsc#1210050).
- platform/x86: thinkpad_acpi: Register tpacpi_pdriver after subdriver init (bsc#1210050).
- platform/x86: thinkpad_acpi: Remove 'goto err_exit' from hotkey_init() (bsc#1210050).
- platform/x86: thinkpad_acpi: Remove unused sensors_pdev_attrs_registered flag (bsc#1210050).
- platform/x86: thinkpad_acpi: Restore missing hotkey_tablet_mode and hotkey_radio_sw sysfs-attr (bsc#1210050).
- platform/x86: thinkpad_acpi: Simplify dytc_version handling (bsc#1210050).
- platform/x86: thinkpad_acpi: Switch to common use of attributes (bsc#1210050).
- platform/x86: thinkpad_acpi: tpacpi_attr_group contains driver attributes not device attrs (bsc#1210050).
- platform/x86: thinkpad_acpi: Use backlight helper (bsc#1210050).
- platform/x86: thinkpad_acpi: use strstarts() (bsc#1210050).
- platform/x86: thinkpad-acpi: Add support for automatic mode transitions (bsc#1210050).
- platform/x86: thinkpad-acpi: Enable AMT by default on supported systems (bsc#1210050).
- platform/x86: thinkpad-acpi: profile capabilities as integer (bsc#1210050).
- platform/x86/intel/pmc: Alder Lake PCH slp_s0_residency fix (git-fixes).
- pNFS/filelayout: Fix coalescing test for single DS (git-fixes).
- power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (git-fixes).
- powerpc: Remove linker flag from KBUILD_AFLAGS (bsc#1194869).
- powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (bsc#1194869).
- powerpc/btext: add missing of_node_put (bsc#1065729).
- powerpc/ioda/iommu/debugfs: Generate unique debugfs entries (bsc#1194869).
- powerpc/iommu: Add missing of_node_put in iommu_init_early_dart (bsc#1194869).
- powerpc/iommu: fix memory leak with using debugfs_lookup() (bsc#1194869).
- powerpc/kcsan: Exclude udelay to prevent recursive instrumentation (bsc#1194869).
- powerpc/kexec_file: fix implicit decl error (bsc#1194869).
- powerpc/powernv: fix missing of_node_put in uv_init() (bsc#1194869).
- powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).
- powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).
- powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).
- powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).
- powerpc/vmlinux.lds: Define RUNTIME_DISCARD_EXIT (bsc#1194869).
- powerpc/vmlinux.lds: Do not discard .comment (bsc#1194869).
- powerpc/vmlinux.lds: Do not discard .rela* for relocatable builds (bsc#1194869).
- powerpc/xmon: Fix -Wswitch-unreachable warning in bpt_cmds (bsc#1194869).
- ppc64le: HWPOISON_INJECT=m (bsc#1209572).
- pwm: cros-ec: Explicitly set .polarity in .get_state() (git-fixes).
- pwm: sprd: Explicitly set .polarity in .get_state() (git-fixes).
- r8169: fix RTL8168H and RTL8107E rx crc error (git-fixes).
- rcu: Fix rcu_torture_read ftrace event (git-fixes).
- regulator: Handle deferred clk (git-fixes).
- ring-buffer: Fix race while reader and writer are on the same page (git-fixes).
- ring-buffer: Handle race between rb_move_tail and rb_check_pages (git-fixes).
- ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).
- rpm/constraints.in: increase the disk size for armv6/7 to 24GB It grows and the build fails recently on SLE15-SP4/5.
- s390/boot: simplify and fix kernel memory layout setup (bsc#1209600).
- s390/dasd: fix no record found for raw_track_access (bsc#1207574).
- s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).
- sbitmap: Avoid lockups when waker gets preempted (bsc#1209118).
- sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1209799).
- scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).
- sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list (bsc#1208602, git-fixes).
- serial: 8250: ASPEED_VUART: select REGMAP instead of depending on it (git-fixes).
- serial: 8250: SERIAL_8250_ASPEED_VUART should depend on ARCH_ASPEED (git-fixes).
- serial: fsl_lpuart: Fix comment typo (git-fixes).
- smb3: fix unusable share after force unmount failure (bsc#1193629).
- smb3: lower default deferred close timeout to address perf regression (bsc#1193629).
- struct dwc3: mask new member (git-fixes).
- SUNRPC: ensure the matching upcall is in-flight upon downcall (git-fixes).
- SUNRPC: Fix a server shutdown leak (git-fixes).
- SUNRPC: Fix missing release socket in rpc_sockname() (git-fixes).
- thunderbolt: Add missing UNSET_INBOUND_SBTX for retimer access (git-fixes).
- thunderbolt: Call tb_check_quirks() after initializing adapters (git-fixes).
- thunderbolt: Disable interrupt auto clear for rings (git-fixes).
- thunderbolt: Rename shadowed variables bit to interrupt_bit and auto_clear_bit (git-fixes).
- thunderbolt: Use const qualifier for `ring_interrupt_index` (git-fixes).
- thunderbolt: Use scale field when allocating USB3 bandwidth (git-fixes).
- timers: Prevent union confusion from unexpected (git-fixes)
- trace/hwlat: Do not start per-cpu thread if it is already running (git-fixes).
- trace/hwlat: Do not wipe the contents of per-cpu thread data (git-fixes).
- trace/hwlat: make use of the helper function kthread_run_on_cpu() (git-fixes).
- tracing: Add NULL checks for buffer in ring_buffer_free_read_page() (git-fixes).
- tracing: Add trace_array_puts() to write into instance (git-fixes).
- tracing: Check field value in hist_field_name() (git-fixes).
- tracing: Do not let histogram values have some modifiers (git-fixes).
- tracing: Fix wrong return in kprobe_event_gen_test.c (git-fixes).
- tracing: Free error logs of tracing instances (git-fixes).
- tracing: Have tracing_snapshot_instance_cond() write errors to the appropriate instance (git-fixes).
- tracing: Make splice_read available again (git-fixes).
- tracing: Make tracepoint lockdep check actually test something (git-fixes).
- tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr (git-fixes).
- tty: serial: fsl_lpuart: avoid checking for transfer complete when UARTCTRL_SBK is asserted in lpuart32_tx_empty (git-fixes).
- tty: serial: fsl_lpuart: skip waiting for transmission complete when UARTCTRL_SBK is asserted (git-fixes).
- tty: serial: sh-sci: Fix Rx on RZ/G2L SCI (git-fixes).
- tty: serial: sh-sci: Fix transmit end interrupt handler (git-fixes).
- uas: Add US_FL_NO_REPORT_OPCODES for JMicron JMS583Gen 2 (git-fixes).
- USB: cdns3: Fix issue with using incorrect PCI device function (git-fixes).
- USB: cdnsp: changes PCI Device ID to fix conflict with CNDS3 driver (git-fixes).
- USB: cdnsp: Fixes error: uninitialized symbol 'len' (git-fixes).
- USB: cdnsp: Fixes issue with redundant Status Stage (git-fixes).
- USB: chipdea: core: fix return -EINVAL if request role is the same with current role (git-fixes).
- USB: chipidea: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: dwc2: fix a devres leak in hw_enable upon suspend resume (git-fixes).
- USB: dwc3: Fix a typo in field name (git-fixes).
- USB: dwc3: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: dwc3: gadget: Add 1ms delay after end transfer command without IOC (git-fixes).
- USB: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: fotg210: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: bcm63xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: gr_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: lpc32xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: pxa25x_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: pxa27x_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: u_audio: do not let userspace block driver unbind (git-fixes).
- USB: isp116x: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: isp1362: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: sl811: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: typec: altmodes/displayport: Fix configure initial pin assignment (git-fixes).
- USB: typec: tcpm: fix warning when handle discover_identity message (git-fixes).
- USB: ucsi: Fix NULL pointer deref in ucsi_connector_change() (git-fixes).
- USB: ucsi: Fix ucsi-&gt;connector race (git-fixes).
- USB: uhci: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: xhci: tegra: fix sleep in atomic call (git-fixes).
- vdpa_sim: set last_used_idx as last_avail_idx in vdpasim_queue_ready (git-fixes).
- wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta (git-fixes).
- wifi: mac80211: fix qos on mesh interfaces (git-fixes).
- wireguard: ratelimiter: use hrtimer in selftest (git-fixes)
- x86: Annotate call_on_stack() (git-fixes).
- x86: Annotate call_on_stack() (git-fixes).
- x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/fpu: Cache xfeature flags from CPUID (git-fixes).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/msr: Remove .fixup usage (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- xfs: convert ptag flags to unsigned (git-fixes).
- xfs: do not assert fail on perag references on teardown (git-fixes).
- xfs: do not leak btree cursor when insrec fails after a split (git-fixes).
- xfs: pass the correct cursor to xfs_iomap_prealloc_size (git-fixes).
- xfs: remove xfs_setattr_time() declaration (git-fixes).
- xfs: zero inode fork buffer at allocation (git-fixes).
- xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu (git-fixes).
- xhci: Free the command allocated for setting LPM if we return early (git-fixes).
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach (git-fixes).
- xprtrdma: Fix regbuf data not freed in rpcrdma_req_create() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-18"/>
	<updated date="2023-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109158">SUSE bug 1109158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189998">SUSE bug 1189998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203200">SUSE bug 1203200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206552">SUSE bug 1206552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207168">SUSE bug 1207168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207185">SUSE bug 1207185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207574">SUSE bug 1207574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208602">SUSE bug 1208602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208815">SUSE bug 1208815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208829">SUSE bug 1208829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208902">SUSE bug 1208902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209052">SUSE bug 1209052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209118">SUSE bug 1209118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209256">SUSE bug 1209256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209292">SUSE bug 1209292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209366">SUSE bug 1209366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209532">SUSE bug 1209532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209547">SUSE bug 1209547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209556">SUSE bug 1209556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209572">SUSE bug 1209572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209600">SUSE bug 1209600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209634">SUSE bug 1209634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209681">SUSE bug 1209681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209684">SUSE bug 1209684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209687">SUSE bug 1209687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209779">SUSE bug 1209779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209788">SUSE bug 1209788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209798">SUSE bug 1209798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209804">SUSE bug 1209804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209805">SUSE bug 1209805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210050">SUSE bug 1210050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210203">SUSE bug 1210203</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0394/">CVE-2023-0394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1281/">CVE-2023-1281 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1281">CVE-2023-1281 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1513/">CVE-2023-1513 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1611/">CVE-2023-1611 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1637/">CVE-2023-1637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1652/">CVE-2023-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1838/">CVE-2023-1838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23001/">CVE-2023-23001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23001">CVE-2023-23001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28464/">CVE-2023-28464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28464">CVE-2023-28464 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28466/">CVE-2023-28466 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009754598" comment="kernel-default-5.14.21-150400.24.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754599" comment="kernel-default-base-5.14.21-150400.24.60.1.150400.24.24.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205935" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1209873" ref_url="https://bugzilla.suse.com/1209873" source="BUGZILLA"/>
		<reference ref_id="1209878" ref_url="https://bugzilla.suse.com/1209878" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465/" source="CVE"/>
		<reference ref_id="CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014498.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-0465: Invalid certificate policies in leaf certificates were silently ignored (bsc#1209878).
- CVE-2023-0466: Certificate policy check were not enabled (bsc#1209873).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-19"/>
	<updated date="2023-04-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209873">SUSE bug 1209873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209878">SUSE bug 1209878</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009753143" comment="libopenssl-1_1-devel-1.1.1l-150400.7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753144" comment="libopenssl1_1-1.1.1l-150400.7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753145" comment="libopenssl1_1-hmac-1.1.1l-150400.7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009753146" comment="openssl-1_1-1.1.1l-150400.7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205936" version="1" class="patch">
	<metadata>
		<title>Security update for dmidecode (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210418" ref_url="https://bugzilla.suse.com/1210418" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30630" ref_url="https://www.suse.com/security/cve/CVE-2023-30630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028935.html" source="SUSE-SU"/>
		<description>
This update for dmidecode fixes the following issues:

- CVE-2023-30630: Fixed potential privilege escalation vulnerability via file overwrite (bsc#1210418).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-21"/>
	<updated date="2023-04-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210418">SUSE bug 1210418</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-30630/">CVE-2023-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30630">CVE-2023-30630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754847" comment="dmidecode-3.4-150400.16.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205937" version="1" class="patch">
	<metadata>
		<title>Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208916" ref_url="https://bugzilla.suse.com/1208916" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:1966-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028965.html" source="SUSE-SU"/>
		<description>
This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer fixes the following issues:

- build the containerized-data-importer with a supported golang compiler (bsc#1208916)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-24"/>
	<updated date="2023-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208916">SUSE bug 1208916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754997" comment="containerized-data-importer-manifests-1.51.0-150400.4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205938" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208916" ref_url="https://bugzilla.suse.com/1208916" source="BUGZILLA"/>
		<reference ref_id="1209359" ref_url="https://bugzilla.suse.com/1209359" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26484" ref_url="https://www.suse.com/security/cve/CVE-2023-26484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1967-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028964.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container fixes the following issues:

- CVE-2023-26484: Limit operator secrets permission. (bsc#1209359)

kubevirt is also rebuilt with a supported GO compiler (bsc#1208916)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-24"/>
	<updated date="2023-04-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208916">SUSE bug 1208916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209359">SUSE bug 1209359</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26484/">CVE-2023-26484 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26484">CVE-2023-26484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009754984" comment="kubevirt-manifests-0.54.0-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754991" comment="kubevirt-virtctl-0.54.0-150400.3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205939" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1109158" ref_url="https://bugzilla.suse.com/1109158" source="BUGZILLA"/>
		<reference ref_id="1189998" ref_url="https://bugzilla.suse.com/1189998" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1198400" ref_url="https://bugzilla.suse.com/1198400" source="BUGZILLA"/>
		<reference ref_id="1203200" ref_url="https://bugzilla.suse.com/1203200" source="BUGZILLA"/>
		<reference ref_id="1206552" ref_url="https://bugzilla.suse.com/1206552" source="BUGZILLA"/>
		<reference ref_id="1207168" ref_url="https://bugzilla.suse.com/1207168" source="BUGZILLA"/>
		<reference ref_id="1207185" ref_url="https://bugzilla.suse.com/1207185" source="BUGZILLA"/>
		<reference ref_id="1207574" ref_url="https://bugzilla.suse.com/1207574" source="BUGZILLA"/>
		<reference ref_id="1208602" ref_url="https://bugzilla.suse.com/1208602" source="BUGZILLA"/>
		<reference ref_id="1208815" ref_url="https://bugzilla.suse.com/1208815" source="BUGZILLA"/>
		<reference ref_id="1208829" ref_url="https://bugzilla.suse.com/1208829" source="BUGZILLA"/>
		<reference ref_id="1208902" ref_url="https://bugzilla.suse.com/1208902" source="BUGZILLA"/>
		<reference ref_id="1209052" ref_url="https://bugzilla.suse.com/1209052" source="BUGZILLA"/>
		<reference ref_id="1209118" ref_url="https://bugzilla.suse.com/1209118" source="BUGZILLA"/>
		<reference ref_id="1209256" ref_url="https://bugzilla.suse.com/1209256" source="BUGZILLA"/>
		<reference ref_id="1209290" ref_url="https://bugzilla.suse.com/1209290" source="BUGZILLA"/>
		<reference ref_id="1209292" ref_url="https://bugzilla.suse.com/1209292" source="BUGZILLA"/>
		<reference ref_id="1209366" ref_url="https://bugzilla.suse.com/1209366" source="BUGZILLA"/>
		<reference ref_id="1209532" ref_url="https://bugzilla.suse.com/1209532" source="BUGZILLA"/>
		<reference ref_id="1209547" ref_url="https://bugzilla.suse.com/1209547" source="BUGZILLA"/>
		<reference ref_id="1209556" ref_url="https://bugzilla.suse.com/1209556" source="BUGZILLA"/>
		<reference ref_id="1209572" ref_url="https://bugzilla.suse.com/1209572" source="BUGZILLA"/>
		<reference ref_id="1209600" ref_url="https://bugzilla.suse.com/1209600" source="BUGZILLA"/>
		<reference ref_id="1209634" ref_url="https://bugzilla.suse.com/1209634" source="BUGZILLA"/>
		<reference ref_id="1209635" ref_url="https://bugzilla.suse.com/1209635" source="BUGZILLA"/>
		<reference ref_id="1209636" ref_url="https://bugzilla.suse.com/1209636" source="BUGZILLA"/>
		<reference ref_id="1209681" ref_url="https://bugzilla.suse.com/1209681" source="BUGZILLA"/>
		<reference ref_id="1209684" ref_url="https://bugzilla.suse.com/1209684" source="BUGZILLA"/>
		<reference ref_id="1209687" ref_url="https://bugzilla.suse.com/1209687" source="BUGZILLA"/>
		<reference ref_id="1209779" ref_url="https://bugzilla.suse.com/1209779" source="BUGZILLA"/>
		<reference ref_id="1209788" ref_url="https://bugzilla.suse.com/1209788" source="BUGZILLA"/>
		<reference ref_id="1209798" ref_url="https://bugzilla.suse.com/1209798" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1209804" ref_url="https://bugzilla.suse.com/1209804" source="BUGZILLA"/>
		<reference ref_id="1209805" ref_url="https://bugzilla.suse.com/1209805" source="BUGZILLA"/>
		<reference ref_id="1210050" ref_url="https://bugzilla.suse.com/1210050" source="BUGZILLA"/>
		<reference ref_id="1210203" ref_url="https://bugzilla.suse.com/1210203" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744/" source="CVE"/>
		<reference ref_id="CVE-2023-0394" ref_url="https://www.suse.com/security/cve/CVE-2023-0394/" source="CVE"/>
		<reference ref_id="CVE-2023-1281" ref_url="https://www.suse.com/security/cve/CVE-2023-1281/" source="CVE"/>
		<reference ref_id="CVE-2023-1513" ref_url="https://www.suse.com/security/cve/CVE-2023-1513/" source="CVE"/>
		<reference ref_id="CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582/" source="CVE"/>
		<reference ref_id="CVE-2023-1611" ref_url="https://www.suse.com/security/cve/CVE-2023-1611/" source="CVE"/>
		<reference ref_id="CVE-2023-1637" ref_url="https://www.suse.com/security/cve/CVE-2023-1637/" source="CVE"/>
		<reference ref_id="CVE-2023-1652" ref_url="https://www.suse.com/security/cve/CVE-2023-1652/" source="CVE"/>
		<reference ref_id="CVE-2023-1838" ref_url="https://www.suse.com/security/cve/CVE-2023-1838/" source="CVE"/>
		<reference ref_id="CVE-2023-23001" ref_url="https://www.suse.com/security/cve/CVE-2023-23001/" source="CVE"/>
		<reference ref_id="CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327/" source="CVE"/>
		<reference ref_id="CVE-2023-28464" ref_url="https://www.suse.com/security/cve/CVE-2023-28464/" source="CVE"/>
		<reference ref_id="CVE-2023-28466" ref_url="https://www.suse.com/security/cve/CVE-2023-28466/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779, bsc#1198400).
- CVE-2023-1652: Fixed use-after-free that could lead to DoS and information leak in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (bsc#1209788).
- CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).
- CVE-2023-23001: Fixed misinterpretation of regulator_get return value in drivers/scsi/ufs/ufs-mediatek.c (bsc#1208829).
- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).

The following non-security bugs were fixed:

- ACPI: x86: utils: Add Cezanne to the list for forcing StorageD3Enable (git-fixes).
- ALSA: asihpi: check pao in control_message() (git-fixes).
- ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() (git-fixes).
- ALSA: hda/conexant: Partial revert of a quirk for Lenovo (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X370SNW (git-fixes).
- ALSA: hda/realtek: Add quirk for Lenovo ZhaoYang CF4620Z (git-fixes).
- ALSA: hda/realtek: Add quirks for some Clevo laptops (git-fixes).
- ALSA: hda/realtek: Fix support for Dell Precision 3260 (git-fixes).
- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda: intel-dsp-config: add MTL PCI id (git-fixes).
- ALSA: usb-audio: Fix recursive locking at XRUN during syncing (git-fixes).
- ALSA: usb-audio: Fix regression on detection of Roland VS-100 (git-fixes).
- ALSA: ymfpci: Fix BUG_ON in probe function (git-fixes).
- ARM: dts: imx6sl: tolino-shine2hd: fix usbotg1 pinctrl (git-fixes).
- ARM: dts: imx6sll: e60k02: fix usbotg1 pinctrl (git-fixes).
- ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds (git-fixes).
- Bluetooth: L2CAP: Fix responding with wrong PDU type (git-fixes).
- Bluetooth: btqcomsmd: Fix command timeout after setting BD address (git-fixes).
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (git-fixes).
- Fix error path in pci-hyperv to unlock the mutex state_lock
- HID: cp2112: Fix driver not registering GPIO IRQ chip as threaded (git-fixes).
- HID: intel-ish-hid: ipc: Fix potential use-after-free in work function (git-fixes).
- Input: alps - fix compatibility with -funsigned-char (bsc#1209805).
- Input: focaltech - use explicitly signed char type (git-fixes).
- Input: goodix - add Lenovo Yoga Book X90F to nine_bytes_report DMI table (git-fixes).
- KABI FIX FOR: NFSv4: keep state manager thread active if swap is enabled (Never, kabi).
- KVM: x86: fix sending PV IPI (git-fixes).
- NFS: Fix an Oops in nfs_d_automount() (git-fixes).
- NFS: fix disabling of swap (git-fixes).
- NFSD: Protect against filesystem freezing (git-fixes).
- NFSD: fix leaked reference count of nfsd4_ssc_umount_item (git-fixes).
- NFSD: fix problems with cleanup on errors in nfsd4_copy (git-fixes).
- NFSD: fix use-after-free in nfsd4_ssc_setup_dul() (git-fixes).
- NFSd: fix handling of readdir in v4root vs. mount upcall timeout (git-fixes).
- NFSd: fix race to check ls_layouts (git-fixes).
- NFSd: shut down the NFSv4 state objects before the filecache (git-fixes).
- NFSd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure (git-fixes).
- NFSd: zero out pointers after putting nfsd_files on COPY setup error (git-fixes).
- NFSv4.1 provide mount option to toggle trunking discovery (git-fixes).
- NFSv4.2: Fix initialisation of struct nfs4_label (git-fixes).
- NFSv4.x: Fail client initialisation if state manager thread can't run (git-fixes).
- NFSv4: Fix a credential leak in _nfs4_discover_trunking() (git-fixes).
- NFSv4: Fix a deadlock between nfs4_open_recover_helper() and delegreturn (git-fixes).
- NFSv4: Fix hangs when recovering open state after a server reboot (git-fixes).
- NFSv4: fix state manager flag printing (git-fixes).
- NFSv4: keep state manager thread active if swap is enabled (git-fixes).
- PCI/DPC: Await readiness of secondary bus after reset (git-fixes).
- PCI: hv: Add a per-bus mutex state_lock (bsc#1207185).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).
- PCI: hv: Use async probing to reduce boot time (bsc#1207185).
- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207185).
- SUNRPC: Fix a server shutdown leak (git-fixes).
- SUNRPC: Fix missing release socket in rpc_sockname() (git-fixes).
- SUNRPC: ensure the matching upcall is in-flight upon downcall (git-fixes).
- USB: cdns3: Fix issue with using incorrect PCI device function (git-fixes).
- USB: cdnsp: Fixes error: uninitialized symbol 'len' (git-fixes).
- USB: cdnsp: Fixes issue with redundant Status Stage (git-fixes).
- USB: cdnsp: changes PCI Device ID to fix conflict with CNDS3 driver (git-fixes).
- USB: chipdea: core: fix return -EINVAL if request role is the same with current role (git-fixes).
- USB: chipidea: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: dwc2: fix a devres leak in hw_enable upon suspend resume (git-fixes).
- USB: dwc3: Fix a typo in field name (git-fixes).
- USB: dwc3: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: dwc3: gadget: Add 1ms delay after end transfer command without IOC (git-fixes).
- USB: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: fotg210: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: bcm63xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: gr_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: lpc32xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: pxa25x_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: pxa27x_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: u_audio: do not let userspace block driver unbind (git-fixes).
- USB: isp116x: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: isp1362: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: sl811: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: typec: altmodes/displayport: Fix configure initial pin assignment (git-fixes).
- USB: typec: tcpm: fix warning when handle discover_identity message (git-fixes).
- USB: ucsi: Fix NULL pointer deref in ucsi_connector_change() (git-fixes).
- USB: ucsi: Fix ucsi-&gt;connector race (git-fixes).
- USB: uhci: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: xhci: tegra: fix sleep in atomic call (git-fixes).
- alarmtimer: Prevent starvation by small intervals and SIG_IGN (git-fixes)
- arch: fix broken BuildID for arm64 and riscv (bsc#1209798).
- arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)
- arm64: dts: freescale: Fix pca954x i2c-mux node names (git-fixes)
- arm64: dts: imx8mm-nitrogen-r2: fix WM8960 clock name (git-fixes).
- arm64: dts: imx8mn: specify #sound-dai-cells for SAI nodes (git-fixes).
- arm64: dts: imx8mp-phycore-som: Remove invalid PMIC property (git-fixes)
- arm64: dts: imx8mp: correct usb clocks (git-fixes)
- arm64: dts: imx8mq: add mipi csi phy and csi bridge descriptions (git-fixes)
- arm64: dts: imx8mq: fix mipi_csi bidirectional port numbers (git-fixes)
- arm64: dts: qcom: sm8350: Mark UFS controller as cache coherent (git-fixes).
- atm: idt77252: fix kmemleak when rmmod idt77252 (git-fixes).
- ca8210: Fix unsigned mac_len comparison with zero in ca8210_skb_tx() (git-fixes).
- ca8210: fix mac_len negative array access (git-fixes).
- can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write (git-fixes).
- can: isotp: isotp_ops: fix poll() to not report false EPOLLOUT events (git-fixes).
- can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access (git-fixes).
- cifs: Fix smb2_set_path_size() (git-fixes).
- cifs: Move the in_send statistic to __smb_send_rqst() (git-fixes).
- cifs: append path to open_enter trace event (bsc#1193629).
- cifs: avoid race conditions with parallel reconnects (bsc#1193629).
- cifs: avoid races in parallel reconnects in smb1 (bsc#1193629).
- cifs: check only tcon status on tcon related functions (bsc#1193629).
- cifs: do not poll server interfaces too regularly (bsc#1193629).
- cifs: double lock in cifs_reconnect_tcon() (git-fixes).
- cifs: dump pending mids for all channels in DebugData (bsc#1193629).
- cifs: empty interface list when server does not support query interfaces (bsc#1193629).
- cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL (bsc#1193629).
- cifs: fix dentry lookups in directory handle cache (bsc#1193629).
- cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1193629).
- cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1193629).
- cifs: generate signkey for the channel that's reconnecting (bsc#1193629).
- cifs: get rid of dead check in smb2_reconnect() (bsc#1193629).
- cifs: lock chan_lock outside match_session (bsc#1193629).
- cifs: prevent infinite recursion in CIFSGetDFSRefer() (bsc#1193629).
- cifs: print session id while listing open files (bsc#1193629).
- cifs: return DFS root session id in DebugData (bsc#1193629).
- cifs: set DFS root session in cifs_get_smb_ses() (bsc#1193629).
- cifs: use DFS root session instead of tcon ses (bsc#1193629).
- clocksource/drivers/mediatek: Optimize systimer irq clear flow on shutdown (git-fixes).
- debugfs: add debugfs_lookup_and_remove() (git-fixes).
- drivers/base: Fix unsigned comparison to -1 in CPUMAP_FILE_MAX_BYTES (bsc#1208815).
- drivers/base: fix userspace break from using bin_attributes for cpumap and cpulist (bsc#1208815).
- drm/amd/display: Add DSC Support for Synaptics Cascaded MST Hub (git-fixes).
- drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes (git-fixes).
- drm/amdkfd: Fix an illegal memory access (git-fixes).
- drm/bridge: lt8912b: return EPROBE_DEFER if bridge is not found (git-fixes).
- drm/etnaviv: fix reference leak when mmaping imported buffer (git-fixes).
- drm/i915/active: Fix missing debug object activation (git-fixes).
- drm/i915/active: Fix misuse of non-idle barriers as fence trackers (git-fixes).
- drm/i915/display/psr: Handle plane and pipe restrictions at every page flip (git-fixes).
- drm/i915/display/psr: Use drm damage helpers to calculate plane damaged area (git-fixes).
- drm/i915/display: Workaround cursor left overs with PSR2 selective fetch enabled (git-fixes).
- drm/i915/display: clean up comments (git-fixes).
- drm/i915/gt: perform uc late init after probe error injection (git-fixes).
- drm/i915/psr: Use calculated io and fast wake lines (git-fixes).
- drm/i915/tc: Fix the ICL PHY ownership check in TC-cold state (git-fixes).
- drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).
- drm/i915: Do not use stolen memory for ring buffers with LLC (git-fixes).
- drm/i915: Preserve crtc_state-&gt;inherited during state clearing (git-fixes).
- drm/i915: Remove unused bits of i915_vma/active api (git-fixes).
- drm/panfrost: Fix the panfrost_mmu_map_fault_addr() error path (git-fixes).
- dt-bindings: serial: renesas,scif: Fix 4th IRQ for 4-IRQ SCIFs (git-fixes).
- efi: sysfb_efi: Fix DMI quirks not working for simpledrm (git-fixes).
- fbdev: au1200fb: Fix potential divide by zero (git-fixes).
- fbdev: intelfb: Fix potential divide by zero (git-fixes).
- fbdev: lxfb: Fix potential divide by zero (git-fixes).
- fbdev: nvidia: Fix potential divide by zero (git-fixes).
- fbdev: stifb: Provide valid pixelclock and add fb_check_var() checks (git-fixes).
- fbdev: tgafb: Fix potential divide by zero (git-fixes).
- firmware: arm_scmi: Fix device node validation for mailbox transport (git-fixes).
- fotg210-udc: Add missing completion handler (git-fixes).
- ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).
- ftrace: Fix issue that 'direct-&gt;addr' not restored in modify_ftrace_direct() (git-fixes).
- ftrace: Mark get_lock_parent_ip() __always_inline (git-fixes).
- gpio: GPIO_REGMAP: select REGMAP instead of depending on it (git-fixes).
- gpio: davinci: Add irq chip flag to skip set wake (git-fixes).
- hwmon: fix potential sensor registration fail if of_node is missing (git-fixes).
- i2c: hisi: Only use the completion interrupt to finish the transfer (git-fixes).
- i2c: imx-lpi2c: check only for enabled interrupt flags (git-fixes).
- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (git-fixes).
- iio: adc: ad7791: fix IRQ flags (git-fixes).
- iio: adc: ti-ads7950: Set `can_sleep` flag for GPIO chip (git-fixes).
- iio: adis16480: select CONFIG_CRC32 (git-fixes).
- iio: dac: cio-dac: Fix max DAC write value check for 12-bit (git-fixes).
- iio: light: cm32181: Unregister second I2C client if present (git-fixes).
- kABI workaround for xhci (git-fixes).
- kABI: x86/msr: Remove .fixup usage (kabi).
- kconfig: Update config changed flag before calling callback (git-fixes).
- keys: Do not cache key in task struct if key is requested from kernel thread (git-fixes).
- lan78xx: Add missing return code checks (git-fixes).
- lan78xx: Fix exception on link speed change (git-fixes).
- lan78xx: Fix memory allocation bug (git-fixes).
- lan78xx: Fix partial packet errors on suspend/resume (git-fixes).
- lan78xx: Fix race condition in disconnect handling (git-fixes).
- lan78xx: Fix race conditions in suspend/resume handling (git-fixes).
- lan78xx: Fix white space and style issues (git-fixes).
- lan78xx: Remove unused pause frame queue (git-fixes).
- lan78xx: Remove unused timer (git-fixes).
- lan78xx: Set flow control threshold to prevent packet loss (git-fixes).
- lockd: set file_lock start and end when decoding nlm4 testargs (git-fixes).
- locking/rwbase: Mitigate indefinite writer starvation (bsc#1189998 (PREEMPT_RT prerequisite backports), bsc#1206552).
- mm: memcg: fix swapcached stat accounting (bsc#1209804).
- mm: mmap: remove newline at the end of the trace (git-fixes).
- mmc: atmel-mci: fix race between stop command and start of next command (git-fixes).
- mtd: rawnand: meson: fix bitmask for length in command word (git-fixes).
- mtd: rawnand: meson: invalidate cache on polling ECC bit (git-fixes).
- mtd: rawnand: stm32_fmc2: remove unsupported EDO mode (git-fixes).
- mtd: rawnand: stm32_fmc2: use timings.mode instead of checking tRC_min (git-fixes).
- mtdblock: tolerate corrected bit-flips (git-fixes).
- net: asix: fix modprobe 'sysfs: cannot create duplicate filename' (git-fixes).
- net: mdio: thunder: Add missing fwnode_handle_put() (git-fixes).
- net: phy: Ensure state transitions are processed from phy_stop() (git-fixes).
- net: phy: dp83869: fix default value for tx-/rx-internal-delay (git-fixes).
- net: phy: nxp-c45-tja11xx: fix MII_BASIC_CONFIG_REV bit (git-fixes).
- net: phy: smsc: bail out in lan87xx_read_status if genphy_read_status fails (git-fixes).
- net: qcom/emac: Fix use after free bug in emac_remove due to race condition (git-fixes).
- net: usb: asix: remove redundant assignment to variable reg (git-fixes).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FE990 (git-fixes).
- net: usb: lan78xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes).
- net: usb: smsc75xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).
- net: usb: smsc95xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: use eth_hw_addr_set() (git-fixes).
- nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() (git-fixes).
- nilfs2: fix sysfs interface lifetime (git-fixes).
- nvme-tcp: always fail a request when sending it failed (bsc#1208902).
- pNFS/filelayout: Fix coalescing test for single DS (git-fixes).
- pinctrl: amd: Disable and mask interrupts on resume (git-fixes).
- pinctrl: at91-pio4: fix domain name assignment (git-fixes).
- pinctrl: ocelot: Fix alt mode for ocelot (git-fixes).
- platform/chrome: cros_ec_chardev: fix kernel data leak from ioctl (git-fixes).
- platform/x86/intel/pmc: Alder Lake PCH slp_s0_residency fix (git-fixes).
- platform/x86: think-lmi: Add possible_values for ThinkStation (git-fixes).
- platform/x86: think-lmi: Certificate authentication support (bsc#1210050).
- platform/x86: think-lmi: Clean up display of current_value on Thinkstation (git-fixes).
- platform/x86: think-lmi: Fix memory leak when showing current settings (git-fixes).
- platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings (git-fixes).
- platform/x86: think-lmi: Move kobject_init() call into tlmi_create_auth() (bsc#1210050).
- platform/x86: think-lmi: Opcode support (bsc#1210050).
- platform/x86: think-lmi: Prevent underflow in index_store() (bsc#1210050).
- platform/x86: think-lmi: Simplify tlmi_analyze() error handling a bit (bsc#1210050).
- platform/x86: think-lmi: Use min_t() for comparison and assignment (bsc#1210050).
- platform/x86: think-lmi: add debug_cmd (bsc#1210050).
- platform/x86: think-lmi: add missing type attribute (git-fixes).
- platform/x86: think-lmi: certificate support clean ups (bsc#1210050).
- platform/x86: think-lmi: only display possible_values if available (git-fixes).
- platform/x86: think-lmi: use correct possible_values delimiters (git-fixes).
- platform/x86: thinkpad-acpi: Add support for automatic mode transitions (bsc#1210050).
- platform/x86: thinkpad-acpi: Enable AMT by default on supported systems (bsc#1210050).
- platform/x86: thinkpad-acpi: profile capabilities as integer (bsc#1210050).
- platform/x86: thinkpad_acpi: Accept ibm_init_struct.init() returning -ENODEV (bsc#1210050).
- platform/x86: thinkpad_acpi: Add LED_RETAIN_AT_SHUTDOWN to led_class_devs (bsc#1210050).
- platform/x86: thinkpad_acpi: Add PSC mode support (bsc#1210050).
- platform/x86: thinkpad_acpi: Add a s2idle resume quirk for a number of laptops (bsc#1210050).
- platform/x86: thinkpad_acpi: Add dual fan probe (bsc#1210050).
- platform/x86: thinkpad_acpi: Add dual-fan quirk for T15g (2nd gen) (bsc#1210050).
- platform/x86: thinkpad_acpi: Add hotkey_notify_extended_hotkey() helper (bsc#1210050).
- platform/x86: thinkpad_acpi: Add lid_logo_dot to the list of safe LEDs (bsc#1210050).
- platform/x86: thinkpad_acpi: Add quirk for ThinkPads without a fan (bsc#1210050).
- platform/x86: thinkpad_acpi: Cleanup dytc_profile_available (bsc#1210050).
- platform/x86: thinkpad_acpi: Convert btusb DMI list to quirks (bsc#1210050).
- platform/x86: thinkpad_acpi: Convert platform driver to use dev_groups (bsc#1210050).
- platform/x86: thinkpad_acpi: Correct dual fan probe (bsc#1210050).
- platform/x86: thinkpad_acpi: Do not use test_bit on an integer (bsc#1210050).
- platform/x86: thinkpad_acpi: Enable s2idle quirk for 21A1 machine type (bsc#1210050).
- platform/x86: thinkpad_acpi: Explicitly set to balanced mode on startup (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix a memory leak of EFCH MMIO resource (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix coccinelle warnings (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix compiler warning about uninitialized err variable (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix incorrect use of platform profile on AMD platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix max_brightness of thinklight (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix profile mode display in AMT mode (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix profile modes on Intel platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix reporting a non present second fan on some models (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix the hwmon sysfs-attr showing up in the wrong place (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix thermal_temp_input_attr sorting (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix thinklight LED brightness returning 255 (bsc#1210050).
- platform/x86: thinkpad_acpi: Get privacy-screen / lcdshadow ACPI handles only once (bsc#1210050).
- platform/x86: thinkpad_acpi: Make *_init() functions return -ENODEV instead of 1 (bsc#1210050).
- platform/x86: thinkpad_acpi: Properly indent code in tpacpi_dytc_profile_init() (bsc#1210050).
- platform/x86: thinkpad_acpi: Register tpacpi_pdriver after subdriver init (bsc#1210050).
- platform/x86: thinkpad_acpi: Remove 'goto err_exit' from hotkey_init() (bsc#1210050).
- platform/x86: thinkpad_acpi: Remove unused sensors_pdev_attrs_registered flag (bsc#1210050).
- platform/x86: thinkpad_acpi: Restore missing hotkey_tablet_mode and hotkey_radio_sw sysfs-attr (bsc#1210050).
- platform/x86: thinkpad_acpi: Simplify dytc_version handling (bsc#1210050).
- platform/x86: thinkpad_acpi: Switch to common use of attributes (bsc#1210050).
- platform/x86: thinkpad_acpi: Use backlight helper (bsc#1210050).
- platform/x86: thinkpad_acpi: clean up dytc profile convert (bsc#1210050).
- platform/x86: thinkpad_acpi: consistently check fan_get_status return (bsc#1210050).
- platform/x86: thinkpad_acpi: do not use PSC mode on Intel platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: tpacpi_attr_group contains driver attributes not device attrs (bsc#1210050).
- platform/x86: thinkpad_acpi: use strstarts() (bsc#1210050).
- power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (git-fixes).
- powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (bsc#1194869).
- powerpc/btext: add missing of_node_put (bsc#1065729).
- powerpc/ioda/iommu/debugfs: Generate unique debugfs entries (bsc#1194869).
- powerpc/iommu: Add missing of_node_put in iommu_init_early_dart (bsc#1194869).
- powerpc/iommu: fix memory leak with using debugfs_lookup() (bsc#1194869).
- powerpc/kcsan: Exclude udelay to prevent recursive instrumentation (bsc#1194869).
- powerpc/kexec_file: fix implicit decl error (bsc#1194869).
- powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).
- powerpc/powernv: fix missing of_node_put in uv_init() (bsc#1194869).
- powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).
- powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).
- powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).
- powerpc/vmlinux.lds: Define RUNTIME_DISCARD_EXIT (bsc#1194869).
- powerpc/vmlinux.lds: Do not discard .comment (bsc#1194869).
- powerpc/vmlinux.lds: Do not discard .rela* for relocatable builds (bsc#1194869).
- powerpc/xmon: Fix -Wswitch-unreachable warning in bpt_cmds (bsc#1194869).
- powerpc: Remove linker flag from KBUILD_AFLAGS (bsc#1194869).
- ppc64le: HWPOISON_INJECT=m (bsc#1209572).
- pwm: cros-ec: Explicitly set .polarity in .get_state() (git-fixes).
- pwm: sprd: Explicitly set .polarity in .get_state() (git-fixes).
- r8169: fix RTL8168H and RTL8107E rx crc error (git-fixes).
- rcu: Fix rcu_torture_read ftrace event (git-fixes).
- ring-buffer: Fix race while reader and writer are on the same page (git-fixes).
- ring-buffer: Handle race between rb_move_tail and rb_check_pages (git-fixes).
- ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).
- s390/boot: simplify and fix kernel memory layout setup (bsc#1209600).
- s390/dasd: fix no record found for raw_track_access (bsc#1207574).
- s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).
- sbitmap: Avoid lockups when waker gets preempted (bsc#1209118).
- sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1209799).
- scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).
- sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list (bsc#1208602, git-fixes).
- serial: 8250: ASPEED_VUART: select REGMAP instead of depending on it (git-fixes).
- serial: 8250: SERIAL_8250_ASPEED_VUART should depend on ARCH_ASPEED (git-fixes).
- serial: fsl_lpuart: Fix comment typo (git-fixes).
- smb3: fix unusable share after force unmount failure (bsc#1193629).
- smb3: lower default deferred close timeout to address perf regression (bsc#1193629).
- struct dwc3: mask new member (git-fixes).
- thunderbolt: Add missing UNSET_INBOUND_SBTX for retimer access (git-fixes).
- thunderbolt: Call tb_check_quirks() after initializing adapters (git-fixes).
- thunderbolt: Disable interrupt auto clear for rings (git-fixes).
- thunderbolt: Rename shadowed variables bit to interrupt_bit and auto_clear_bit (git-fixes).
- thunderbolt: Use const qualifier for `ring_interrupt_index` (git-fixes).
- thunderbolt: Use scale field when allocating USB3 bandwidth (git-fixes).
- timers: Prevent union confusion from unexpected (git-fixes)
- trace/hwlat: Do not start per-cpu thread if it is already running (git-fixes).
- trace/hwlat: Do not wipe the contents of per-cpu thread data (git-fixes).
- trace/hwlat: make use of the helper function kthread_run_on_cpu() (git-fixes).
- tracing: Add trace_array_puts() to write into instance (git-fixes).
- tracing: Fix wrong return in kprobe_event_gen_test.c (git-fixes).
- tracing: Free error logs of tracing instances (git-fixes).
- tracing: Have tracing_snapshot_instance_cond() write errors to the appropriate instance (git-fixes).
- tty: serial: fsl_lpuart: avoid checking for transfer complete when UARTCTRL_SBK is asserted in lpuart32_tx_empty (git-fixes).
- tty: serial: fsl_lpuart: skip waiting for transmission complete when UARTCTRL_SBK is asserted (git-fixes).
- tty: serial: sh-sci: Fix Rx on RZ/G2L SCI (git-fixes).
- tty: serial: sh-sci: Fix transmit end interrupt handler (git-fixes).
- uas: Add US_FL_NO_REPORT_OPCODES for JMicron JMS583Gen 2 (git-fixes).
- vdpa_sim: set last_used_idx as last_avail_idx in vdpasim_queue_ready (git-fixes).
- wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta (git-fixes).
- wifi: mac80211: fix qos on mesh interfaces (git-fixes).
- wireguard: ratelimiter: use hrtimer in selftest (git-fixes)
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/fpu: Cache xfeature flags from CPUID (git-fixes).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/msr: Remove .fixup usage (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- x86: Annotate call_on_stack() (git-fixes).
- x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- xfs: convert ptag flags to unsigned (git-fixes).
- xfs: do not assert fail on perag references on teardown (git-fixes).
- xfs: do not leak btree cursor when insrec fails after a split (git-fixes).
- xfs: pass the correct cursor to xfs_iomap_prealloc_size (git-fixes).
- xfs: remove xfs_setattr_time() declaration (git-fixes).
- xfs: zero inode fork buffer at allocation (git-fixes).
- xhci: Free the command allocated for setting LPM if we return early (git-fixes).
- xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu (git-fixes).
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach (git-fixes).
- xprtrdma: Fix regbuf data not freed in rpcrdma_req_create() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-25"/>
	<updated date="2023-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109158">SUSE bug 1109158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189998">SUSE bug 1189998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198400">SUSE bug 1198400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203200">SUSE bug 1203200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206552">SUSE bug 1206552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207168">SUSE bug 1207168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207185">SUSE bug 1207185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207574">SUSE bug 1207574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208602">SUSE bug 1208602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208815">SUSE bug 1208815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208829">SUSE bug 1208829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208902">SUSE bug 1208902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209052">SUSE bug 1209052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209118">SUSE bug 1209118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209256">SUSE bug 1209256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209292">SUSE bug 1209292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209366">SUSE bug 1209366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209532">SUSE bug 1209532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209547">SUSE bug 1209547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209556">SUSE bug 1209556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209572">SUSE bug 1209572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209600">SUSE bug 1209600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209634">SUSE bug 1209634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209681">SUSE bug 1209681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209684">SUSE bug 1209684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209687">SUSE bug 1209687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209779">SUSE bug 1209779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209788">SUSE bug 1209788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209798">SUSE bug 1209798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209804">SUSE bug 1209804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209805">SUSE bug 1209805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210050">SUSE bug 1210050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210203">SUSE bug 1210203</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0394/">CVE-2023-0394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1281/">CVE-2023-1281 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1281">CVE-2023-1281 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1513/">CVE-2023-1513 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1611/">CVE-2023-1611 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1637/">CVE-2023-1637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1652/">CVE-2023-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1838/">CVE-2023-1838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23001/">CVE-2023-23001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23001">CVE-2023-23001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28464/">CVE-2023-28464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28464">CVE-2023-28464 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28466/">CVE-2023-28466 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754840" comment="kernel-rt-5.14.21-150400.15.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205940" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210328" ref_url="https://bugzilla.suse.com/1210328" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1981" ref_url="https://www.suse.com/security/cve/CVE-2023-1981/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:1994-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028978.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-1981: Fixed crash in avahi-daemon (bsc#1210328).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-25"/>
	<updated date="2023-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210328">SUSE bug 1210328</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1981/">CVE-2023-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1981">CVE-2023-1981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009754600" comment="avahi-0.8-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754601" comment="libavahi-client3-0.8-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754602" comment="libavahi-common3-0.8-150400.7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754603" comment="libavahi-core7-0.8-150400.7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205941" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1168481" ref_url="https://bugzilla.suse.com/1168481" source="BUGZILLA"/>
		<reference ref_id="1208962" ref_url="https://bugzilla.suse.com/1208962" source="BUGZILLA"/>
		<reference ref_id="1209884" ref_url="https://bugzilla.suse.com/1209884" source="BUGZILLA"/>
		<reference ref_id="1209888" ref_url="https://bugzilla.suse.com/1209888" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25809" ref_url="https://www.suse.com/security/cve/CVE-2023-25809/" source="CVE"/>
		<reference ref_id="CVE-2023-27561" ref_url="https://www.suse.com/security/cve/CVE-2023-27561/" source="CVE"/>
		<reference ref_id="CVE-2023-28642" ref_url="https://www.suse.com/security/cve/CVE-2023-28642/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028987.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

Update to runc v1.1.5:

Security fixes:

- CVE-2023-25809: Fixed rootless `/sys/fs/cgroup` is writable when cgroupns isn't unshared (bnc#1209884).
- CVE-2023-27561: Fixed regression that reintroduced CVE-2019-19921 vulnerability (bnc#1208962).
- CVE-2023-28642: Fixed AppArmor/SELinux bypass with symlinked /proc (bnc#1209888).

Other fixes:

 - Fix the inability to use `/dev/null` when inside a container.
 - Fix changing the ownership of host's `/dev/null` caused by fd redirection (bsc#1168481).
 - Fix rare runc exec/enter unshare error on older kernels.
 - nsexec: Check for errors in `write_log()`.
 - Drop version-specific Go requirement.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-25"/>
	<updated date="2023-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168481">SUSE bug 1168481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208962">SUSE bug 1208962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209884">SUSE bug 1209884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209888">SUSE bug 1209888</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25809/">CVE-2023-25809 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25809">CVE-2023-25809 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27561/">CVE-2023-27561 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-28642/">CVE-2023-28642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28642">CVE-2023-28642 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752885" comment="runc-1.1.5-150000.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205942" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-ibmca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210058" ref_url="https://bugzilla.suse.com/1210058" source="BUGZILLA"/>
		<reference ref_id="1210359" ref_url="https://bugzilla.suse.com/1210359" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014594.html" source="SUSE-SU"/>
		<description>
This update for openssl-ibmca fixes the following issues:

Upgraded openssl-ibmca to version 2.4.0 (bsc#1210058) 

- Provider: Adjustments for OpenSSL versions 3.1 and 3.2 
- Provider: Support RSA blinding
- Provider: Constant-time fixes for RSA PKCS#1 v1.5 and OAEP padding
- Provider: Support 'implicit rejection' option for RSA PKCS#1 v1.5 padding
- Provider: Adjustments in OpenSSL config generator and example configs
- Engine: EC: Cache ICA key in EC_KEY object (performance improvement)


- FIPS 140-3: Correct engine handling so only the ciphers selected in the config file are activated (bsc#1210359)

		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-26"/>
	<updated date="2023-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210058">SUSE bug 1210058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210359">SUSE bug 1210359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009754982" comment="openssl-ibmca-2.4.0-150400.4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205943" version="1" class="patch">
	<metadata>
		<title>Security update for libtpms (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1206022" ref_url="https://bugzilla.suse.com/1206022" source="BUGZILLA"/>
		<reference ref_id="1206023" ref_url="https://bugzilla.suse.com/1206023" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1017" ref_url="https://www.suse.com/security/cve/CVE-2023-1017/" source="CVE"/>
		<reference ref_id="CVE-2023-1018" ref_url="https://www.suse.com/security/cve/CVE-2023-1018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029030.html" source="SUSE-SU"/>
		<description>
This update for libtpms fixes the following issues:

- CVE-2023-1017: Fixed out-of-bounds write in CryptParameterDecryption (bsc#1206022).
- CVE-2023-1018: Fixed out-of-bounds read in CryptParameterDecryption (bsc#1206023).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206022">SUSE bug 1206022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206023">SUSE bug 1206023</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1017/">CVE-2023-1017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1017">CVE-2023-1017 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1018/">CVE-2023-1018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1018">CVE-2023-1018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755867" comment="libtpms0-0.8.2-150300.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205944" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1209918" ref_url="https://bugzilla.suse.com/1209918" source="BUGZILLA"/>
		<reference ref_id="1210411" ref_url="https://bugzilla.suse.com/1210411" source="BUGZILLA"/>
		<reference ref_id="1210412" ref_url="https://bugzilla.suse.com/1210412" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28484" ref_url="https://www.suse.com/security/cve/CVE-2023-28484/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029029.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2023-29469: Fixed inconsistent result when hashing empty strings (bsc#1210412).
- CVE-2023-28484: Fixed NULL pointer dereference in xmlSchemaFixupComplexType (bsc#1210411).

The following non-security bug was fixed:

- Remove unneeded dependency (bsc#1209918). 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209918">SUSE bug 1209918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210411">SUSE bug 1210411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210412">SUSE bug 1210412</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28484/">CVE-2023-28484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009755320" comment="libxml2-2-2.9.14-150400.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755321" comment="libxml2-tools-2.9.14-150400.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755322" comment="python3-libxml2-2.9.14-150400.5.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205945" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1209713" ref_url="https://bugzilla.suse.com/1209713" source="BUGZILLA"/>
		<reference ref_id="1209714" ref_url="https://bugzilla.suse.com/1209714" source="BUGZILLA"/>
		<reference ref_id="1210135" ref_url="https://bugzilla.suse.com/1210135" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24593" ref_url="https://www.suse.com/security/cve/CVE-2023-24593/" source="CVE"/>
		<reference ref_id="CVE-2023-25180" ref_url="https://www.suse.com/security/cve/CVE-2023-25180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014618.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2023-24593: Fixed a denial of service caused by handling a malicious text-form variant (bsc#1209714).
- CVE-2023-25180: Fixed a denial of service caused by malicious serialised variant (bsc#1209713).

The following non-security bug was fixed:

- Fixed regression on s390x (bsc#1210135, glgo#GNOME/glib!2978).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209713">SUSE bug 1209713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209714">SUSE bug 1209714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210135">SUSE bug 1210135</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24593/">CVE-2023-24593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-24593">CVE-2023-24593 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25180/">CVE-2023-25180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-25180">CVE-2023-25180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009755558" comment="glib2-tools-2.70.5-150400.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755559" comment="libgio-2_0-0-2.70.5-150400.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755560" comment="libglib-2_0-0-2.70.5-150400.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755561" comment="libgmodule-2_0-0-2.70.5-150400.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755562" comment="libgobject-2_0-0-2.70.5-150400.3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205946" version="1" class="patch">
	<metadata>
		<title>Security update for installation-images (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014774.html" source="SUSE-SU"/>
		<description>

This update of installation-images fixes the following issues:

- rebuild the package with the new secure boot key (bsc#1209188).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-02"/>
	<updated date="2023-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009755871" comment="tftpboot-installation-SLE-Micro-5.4-aarch64-16.57.26-150400.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755872" comment="tftpboot-installation-SLE-Micro-5.4-s390x-16.57.26-150400.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755873" comment="tftpboot-installation-SLE-Micro-5.4-x86_64-16.57.26-150400.3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205947" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210382" ref_url="https://bugzilla.suse.com/1210382" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014772.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- CVE-2022-28737 was missing as reference previously.

- Upgrade shim-install for bsc#1210382

  After closing Leap-gap project since Leap 15.3, openSUSE Leap direct
  uses shim from SLE. So the ca_string is 'SUSE Linux Enterprise Secure Boot
  CA1', not 'openSUSE Secure Boot CA1'. It causes that the update_boot=no,
  so all files in /boot/efi/EFI/boot are not updated.

  Logic was added that is using ID field in os-release for
  checking Leap distro and set ca_string to 'SUSE Linux Enterprise Secure
  Boot CA1'. Then /boot/efi/EFI/boot/* can also be updated.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-02"/>
	<updated date="2023-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210382">SUSE bug 1210382</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755034" comment="shim-15.7-150300.4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205948" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208828" ref_url="https://bugzilla.suse.com/1208828" source="BUGZILLA"/>
		<reference ref_id="1209042" ref_url="https://bugzilla.suse.com/1209042" source="BUGZILLA"/>
		<reference ref_id="1209187" ref_url="https://bugzilla.suse.com/1209187" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1127" ref_url="https://www.suse.com/security/cve/CVE-2023-1127/" source="CVE"/>
		<reference ref_id="CVE-2023-1264" ref_url="https://www.suse.com/security/cve/CVE-2023-1264/" source="CVE"/>
		<reference ref_id="CVE-2023-1355" ref_url="https://www.suse.com/security/cve/CVE-2023-1355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014736.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Updated to version 9.0 with patch level 1443, fixes the following security problems

-  CVE-2023-1264: Fixed NULL Pointer Dereference (bsc#1209042).
-  CVE-2023-1355: Fixed NULL Pointer Dereference (bsc#1209187).
-  CVE-2023-1127: Fixed divide by zero in scrolldown() (bsc#1208828).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-04"/>
	<updated date="2023-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208828">SUSE bug 1208828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209042">SUSE bug 1209042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209187">SUSE bug 1209187</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1127/">CVE-2023-1127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1127">CVE-2023-1127 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1264/">CVE-2023-1264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1264">CVE-2023-1264 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1355/">CVE-2023-1355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1355">CVE-2023-1355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009755947" comment="vim-data-common-9.0.1443-150000.5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756061" comment="vim-small-9.0.1443-150000.5.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756062" comment="xxd-9.0.1443-150000.5.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205949" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210434" ref_url="https://bugzilla.suse.com/1210434" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29491" ref_url="https://www.suse.com/security/cve/CVE-2023-29491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014766.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2023-29491: Fixed memory corruption issues when processing malformed terminfo data (bsc#1210434).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-05"/>
	<updated date="2023-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210434">SUSE bug 1210434</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-29491/">CVE-2023-29491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29491">CVE-2023-29491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009756063" comment="libncurses6-6.1-150000.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756064" comment="ncurses-utils-6.1-150000.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756065" comment="terminfo-6.1-150000.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756066" comment="terminfo-base-6.1-150000.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205950" version="1" class="patch">
	<metadata>
		<title>Security update for ignition (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029307.html" source="SUSE-SU"/>
		<description>

This update of ignition fixes the following issues:

- rebuild the package with the go 19.9 secure release (bsc#1200441).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-09"/>
	<updated date="2023-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009756804" comment="ignition-2.15.0-150400.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756805" comment="ignition-dracut-grub2-2.15.0-150400.4.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205951" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1142685" ref_url="https://bugzilla.suse.com/1142685" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1189999" ref_url="https://bugzilla.suse.com/1189999" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1203039" ref_url="https://bugzilla.suse.com/1203039" source="BUGZILLA"/>
		<reference ref_id="1203325" ref_url="https://bugzilla.suse.com/1203325" source="BUGZILLA"/>
		<reference ref_id="1204042" ref_url="https://bugzilla.suse.com/1204042" source="BUGZILLA"/>
		<reference ref_id="1206649" ref_url="https://bugzilla.suse.com/1206649" source="BUGZILLA"/>
		<reference ref_id="1206891" ref_url="https://bugzilla.suse.com/1206891" source="BUGZILLA"/>
		<reference ref_id="1206992" ref_url="https://bugzilla.suse.com/1206992" source="BUGZILLA"/>
		<reference ref_id="1207088" ref_url="https://bugzilla.suse.com/1207088" source="BUGZILLA"/>
		<reference ref_id="1208076" ref_url="https://bugzilla.suse.com/1208076" source="BUGZILLA"/>
		<reference ref_id="1208822" ref_url="https://bugzilla.suse.com/1208822" source="BUGZILLA"/>
		<reference ref_id="1208845" ref_url="https://bugzilla.suse.com/1208845" source="BUGZILLA"/>
		<reference ref_id="1209615" ref_url="https://bugzilla.suse.com/1209615" source="BUGZILLA"/>
		<reference ref_id="1209693" ref_url="https://bugzilla.suse.com/1209693" source="BUGZILLA"/>
		<reference ref_id="1209739" ref_url="https://bugzilla.suse.com/1209739" source="BUGZILLA"/>
		<reference ref_id="1209871" ref_url="https://bugzilla.suse.com/1209871" source="BUGZILLA"/>
		<reference ref_id="1209927" ref_url="https://bugzilla.suse.com/1209927" source="BUGZILLA"/>
		<reference ref_id="1209999" ref_url="https://bugzilla.suse.com/1209999" source="BUGZILLA"/>
		<reference ref_id="1210034" ref_url="https://bugzilla.suse.com/1210034" source="BUGZILLA"/>
		<reference ref_id="1210158" ref_url="https://bugzilla.suse.com/1210158" source="BUGZILLA"/>
		<reference ref_id="1210202" ref_url="https://bugzilla.suse.com/1210202" source="BUGZILLA"/>
		<reference ref_id="1210206" ref_url="https://bugzilla.suse.com/1210206" source="BUGZILLA"/>
		<reference ref_id="1210301" ref_url="https://bugzilla.suse.com/1210301" source="BUGZILLA"/>
		<reference ref_id="1210329" ref_url="https://bugzilla.suse.com/1210329" source="BUGZILLA"/>
		<reference ref_id="1210336" ref_url="https://bugzilla.suse.com/1210336" source="BUGZILLA"/>
		<reference ref_id="1210337" ref_url="https://bugzilla.suse.com/1210337" source="BUGZILLA"/>
		<reference ref_id="1210439" ref_url="https://bugzilla.suse.com/1210439" source="BUGZILLA"/>
		<reference ref_id="1210453" ref_url="https://bugzilla.suse.com/1210453" source="BUGZILLA"/>
		<reference ref_id="1210454" ref_url="https://bugzilla.suse.com/1210454" source="BUGZILLA"/>
		<reference ref_id="1210469" ref_url="https://bugzilla.suse.com/1210469" source="BUGZILLA"/>
		<reference ref_id="1210499" ref_url="https://bugzilla.suse.com/1210499" source="BUGZILLA"/>
		<reference ref_id="1210506" ref_url="https://bugzilla.suse.com/1210506" source="BUGZILLA"/>
		<reference ref_id="1210629" ref_url="https://bugzilla.suse.com/1210629" source="BUGZILLA"/>
		<reference ref_id="1210630" ref_url="https://bugzilla.suse.com/1210630" source="BUGZILLA"/>
		<reference ref_id="1210725" ref_url="https://bugzilla.suse.com/1210725" source="BUGZILLA"/>
		<reference ref_id="1210729" ref_url="https://bugzilla.suse.com/1210729" source="BUGZILLA"/>
		<reference ref_id="1210762" ref_url="https://bugzilla.suse.com/1210762" source="BUGZILLA"/>
		<reference ref_id="1210763" ref_url="https://bugzilla.suse.com/1210763" source="BUGZILLA"/>
		<reference ref_id="1210764" ref_url="https://bugzilla.suse.com/1210764" source="BUGZILLA"/>
		<reference ref_id="1210765" ref_url="https://bugzilla.suse.com/1210765" source="BUGZILLA"/>
		<reference ref_id="1210766" ref_url="https://bugzilla.suse.com/1210766" source="BUGZILLA"/>
		<reference ref_id="1210767" ref_url="https://bugzilla.suse.com/1210767" source="BUGZILLA"/>
		<reference ref_id="1210768" ref_url="https://bugzilla.suse.com/1210768" source="BUGZILLA"/>
		<reference ref_id="1210769" ref_url="https://bugzilla.suse.com/1210769" source="BUGZILLA"/>
		<reference ref_id="1210770" ref_url="https://bugzilla.suse.com/1210770" source="BUGZILLA"/>
		<reference ref_id="1210771" ref_url="https://bugzilla.suse.com/1210771" source="BUGZILLA"/>
		<reference ref_id="1210793" ref_url="https://bugzilla.suse.com/1210793" source="BUGZILLA"/>
		<reference ref_id="1210816" ref_url="https://bugzilla.suse.com/1210816" source="BUGZILLA"/>
		<reference ref_id="1210817" ref_url="https://bugzilla.suse.com/1210817" source="BUGZILLA"/>
		<reference ref_id="1210827" ref_url="https://bugzilla.suse.com/1210827" source="BUGZILLA"/>
		<reference ref_id="1210943" ref_url="https://bugzilla.suse.com/1210943" source="BUGZILLA"/>
		<reference ref_id="1210953" ref_url="https://bugzilla.suse.com/1210953" source="BUGZILLA"/>
		<reference ref_id="1210986" ref_url="https://bugzilla.suse.com/1210986" source="BUGZILLA"/>
		<reference ref_id="1211025" ref_url="https://bugzilla.suse.com/1211025" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2196" ref_url="https://www.suse.com/security/cve/CVE-2022-2196/" source="CVE"/>
		<reference ref_id="CVE-2023-0386" ref_url="https://www.suse.com/security/cve/CVE-2023-0386/" source="CVE"/>
		<reference ref_id="CVE-2023-1670" ref_url="https://www.suse.com/security/cve/CVE-2023-1670/" source="CVE"/>
		<reference ref_id="CVE-2023-1855" ref_url="https://www.suse.com/security/cve/CVE-2023-1855/" source="CVE"/>
		<reference ref_id="CVE-2023-1989" ref_url="https://www.suse.com/security/cve/CVE-2023-1989/" source="CVE"/>
		<reference ref_id="CVE-2023-1990" ref_url="https://www.suse.com/security/cve/CVE-2023-1990/" source="CVE"/>
		<reference ref_id="CVE-2023-1998" ref_url="https://www.suse.com/security/cve/CVE-2023-1998/" source="CVE"/>
		<reference ref_id="CVE-2023-2008" ref_url="https://www.suse.com/security/cve/CVE-2023-2008/" source="CVE"/>
		<reference ref_id="CVE-2023-2019" ref_url="https://www.suse.com/security/cve/CVE-2023-2019/" source="CVE"/>
		<reference ref_id="CVE-2023-2176" ref_url="https://www.suse.com/security/cve/CVE-2023-2176/" source="CVE"/>
		<reference ref_id="CVE-2023-2235" ref_url="https://www.suse.com/security/cve/CVE-2023-2235/" source="CVE"/>
		<reference ref_id="CVE-2023-23006" ref_url="https://www.suse.com/security/cve/CVE-2023-23006/" source="CVE"/>
		<reference ref_id="CVE-2023-30772" ref_url="https://www.suse.com/security/cve/CVE-2023-30772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-2235: A use-after-free vulnerability in the Performance Events system can be exploited to achieve local privilege escalation (bsc#1210986).
- CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992).
- CVE-2023-23006: Fixed NULL checking against IS_ERR in dr_domain_init_resources (bsc#1208845).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-2176: A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege (bsc#1210629).
- CVE-2023-0386: A flaw was found where unauthorized access to the execution of the setuid file with capabilities was found in the OverlayFS subsystem, when a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allowed a local user to escalate their privileges on the system (bsc#1209615).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
- CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-2019: A flaw was found in the netdevsim device driver, more specifically within the scheduling of events. This issue results from the improper management of a reference count and may lead to a denial of service (bsc#1210454).
- CVE-2023-2008: A flaw was found in the fault handler of the udmabuf device driver. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code (bsc#1210453).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).

The following non-security bugs were fixed:

- ACPI: CPPC: Disable FIE if registers in PCC regions (bsc#1210953).
- ACPI: VIOT: Initialize the correct IOMMU fwspec (git-fixes).
- ACPI: resource: Add Medion S17413 to IRQ override quirk (git-fixes).
- ALSA: emu10k1: do not create old pass-through playback device on Audigy (git-fixes).
- ALSA: emu10k1: fix capture interrupt handler unlinking (git-fixes).
- ALSA: firewire-tascam: add missing unwind goto in snd_tscm_stream_start_duplex() (git-fixes).
- ALSA: hda/cirrus: Add extra 10 ms delay to allow PLL settle and lock (git-fixes).
- ALSA: hda/realtek: Add quirks for Lenovo Z13/Z16 Gen2 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and speaker support for HP Laptops (git-fixes).
- ALSA: hda/realtek: Remove specific patch for Dell Precision 3260 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda/realtek: fix speaker, mute/micmute LEDs not work on a HP platform (git-fixes).
- ALSA: hda/sigmatel: add pin overrides for Intel DP45SG motherboard (git-fixes).
- ALSA: hda/sigmatel: fix S/PDIF out on Intel D*45* motherboards (git-fixes).
- ALSA: hda: cs35l41: Enable Amp High Pass Filter (git-fixes).
- ALSA: hda: patch_realtek: add quirk for Asus N7601ZM (git-fixes).
- ALSA: i2c/cs8427: fix iec958 mixer control deactivation (git-fixes).
- ARM: 9290/1: uaccess: Fix KASAN false-positives (git-fixes).
- ARM: dts: exynos: fix WM8960 clock name in Itop Elite (git-fixes).
- ARM: dts: gta04: fix excess dma channel usage (git-fixes).
- ARM: dts: qcom: ipq4019: Fix the PCI I/O port range (git-fixes).
- ARM: dts: rockchip: fix a typo error for rk3288 spdif node (git-fixes).
- ARM: dts: s5pv210: correct MIPI CSIS clock name (git-fixes).
- ASN.1: Fix check for strdup() success (git-fixes).
- ASoC: cs35l41: Only disable internal boost (git-fixes).
- ASoC: es8316: Handle optional IRQ assignment (git-fixes).
- ASoC: fsl_asrc_dma: fix potential null-ptr-deref (git-fixes).
- ASoC: fsl_mqs: move of_node_put() to the correct location (git-fixes).
- Bluetooth: Fix race condition in hidp_session_thread (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} (git-fixes).
- Drivers: vmbus: Check for channel allocation before looking up relids (git-fixes).
- IB/mlx5: Add support for 400G_8X lane speed (git-fixes)
- Input: hp_sdc_rtc - mark an unused function as __maybe_unused (git-fixes).
- Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe (git-fixes).
- KEYS: Add missing function documentation (git-fixes).
- KEYS: Create static version of public_key_verify_signature (git-fixes).
- NFS: Cleanup unused rpc_clnt variable (git-fixes).
- NFSD: Avoid calling OPDESC() with ops-&gt;opnum == OP_ILLEGAL (git-fixes).
- NFSD: callback request does not use correct credential for AUTH_SYS (git-fixes).
- PCI/EDR: Clear Device Status after EDR error recovery (git-fixes).
- PCI: dwc: Fix PORT_LINK_CONTROL update when CDM check enabled (git-fixes).
- PCI: imx6: Install the fault handler only on compatible match (git-fixes).
- PCI: loongson: Add more devices that need MRRS quirk (git-fixes).
- PCI: loongson: Prevent LS7A MRRS increases (git-fixes).
- PCI: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git-fixes).
- PCI: qcom: Fix the incorrect register usage in v2.7.0 config (git-fixes).
- RDMA/cma: Allow UD qp_type to join multicast only (git-fixes)
- RDMA/core: Fix GID entry ref leak when create_ah fails (git-fixes)
- RDMA/irdma: Add ipv4 check to irdma_find_listener() (git-fixes)
- RDMA/irdma: Fix memory leak of PBLE objects (git-fixes)
- RDMA/irdma: Increase iWARP CM default rexmit count (git-fixes)
- Remove obsolete KMP obsoletes (bsc#1210469).
- Revert 'Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work' (git-fixes).
- Revert 'pinctrl: amd: Disable and mask interrupts on resume' (git-fixes).
- USB: dwc3: fix runtime pm imbalance on probe errors (git-fixes).
- USB: dwc3: fix runtime pm imbalance on unbind (git-fixes).
- USB: serial: cp210x: add Silicon Labs IFS-USB-DATACABLE IDs (git-fixes).
- USB: serial: option: add Quectel RM500U-CN modem (git-fixes).
- USB: serial: option: add Telit FE990 compositions (git-fixes).
- USB: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).
- amdgpu: disable powerpc support for the newer display engine (bsc#1194869).
- arm64: dts: imx8mm-evk: correct pmic clock source (git-fixes).
- arm64: dts: meson-g12-common: specify full DMC range (git-fixes).
- arm64: dts: qcom: ipq8074-hk01: enable QMP device, not the PHY node (git-fixes).
- arm64: dts: qcom: ipq8074: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: msm8994-kitakami: drop unit address from PMI8994 regulator (git-fixes).
- arm64: dts: qcom: msm8994-msft-lumia-octagon: drop unit address from PMI8994 regulator (git-fixes).
- arm64: dts: qcom: msm8996: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: msm8998: Fix stm-stimulus-base reg name (git-fixes).
- arm64: dts: qcom: msm8998: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: sc7180-trogdor-lazor: correct trackpad supply (git-fixes).
- arm64: dts: qcom: sdm845: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: sm8250: Fix the PCI I/O port range (git-fixes).
- arm64: dts: renesas: r8a774c0: Remove bogus voltages from OPP table (git-fixes).
- arm64: dts: renesas: r8a77990: Remove bogus voltages from OPP table (git-fixes).
- arm64: dts: ti: k3-j721e-main: Remove ti,strobe-sel property (git-fixes).
- bluetooth: Perform careful capability checks in hci_sock_ioctl() (git-fixes).
- cgroup/cpuset: Add cpuset_can_fork() and cpuset_cancel_fork() methods
- cgroup/cpuset: Make cpuset_fork() handle CLONE_INTO_CGROUP properly
- cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach() (bsc#1210827).
- cifs: fix negotiate context parsing (bsc#1210301).
- clk: add missing of_node_put() in 'assigned-clocks' property parsing (git-fixes).
- clk: at91: clk-sam9x60-pll: fix return value check (git-fixes).
- clk: rockchip: rk3399: allow clk_cifout to force clk_cifout_src to reparent (git-fixes).
- clk: sprd: set max_register according to mapping range (git-fixes).
- clocksource/drivers/davinci: Fix memory leak in davinci_timer_register when init fails (git-fixes).
- cpufreq: CPPC: Fix build error without CONFIG_ACPI_CPPC_CPUFREQ_FIE (bsc#1210953).
- cpufreq: CPPC: Fix performance/frequency conversion (git-fixes).
- cpumask: fix incorrect cpumask scanning result checks (bsc#1210943).
- crypto: caam - Clear some memory in instantiate_rng (git-fixes).
- crypto: drbg - Only fail when jent is unavailable in FIPS mode (git-fixes).
- crypto: sa2ul - Select CRYPTO_DES (git-fixes).
- crypto: safexcel - Cleanup ring IRQ workqueues on load failure (git-fixes).
- driver core: Do not require dynamic_debug for initcall_debug probe timing (git-fixes).
- drivers: staging: rtl8723bs: Fix locking in _rtw_join_timeout_handler() (git-fixes).
- drivers: staging: rtl8723bs: Fix locking in rtw_scan_timeout_handler() (git-fixes).
- drm/amd/display/dc/dce60/Makefile: Fix previous attempt to silence known override-init warnings (git-fixes).
- drm/amd/display: Fix potential null dereference (git-fixes).
- drm/amdgpu: Re-enable DCN for 64-bit powerpc (bsc#1194869).
- drm/armada: Fix a potential double free in an error handling path (git-fixes).
- drm/bridge: adv7533: Fix adv7533_mode_valid for adv7533 and adv7535 (git-fixes).
- drm/bridge: lt8912b: Fix DSI Video Mode (git-fixes).
- drm/bridge: lt9611: Fix PLL being unable to lock (git-fixes).
- drm/fb-helper: set x/yres_virtual in drm_fb_helper_check_var (git-fixes).
- drm/i915/dsi: fix DSS CTL register offsets for TGL+ (git-fixes).
- drm/i915: Fix fast wake AUX sync len (git-fixes).
- drm/i915: Make intel_get_crtc_new_encoder() less oopsy (git-fixes).
- drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (git-fixes).
- drm/lima/lima_drv: Add missing unwind goto in lima_pdev_probe() (git-fixes).
- drm/msm/adreno: drop bogus pm_runtime_set_active() (git-fixes).
- drm/msm/disp/dpu: check for crtc enable rather than crtc active to release shared resources (git-fixes).
- drm/msm: fix NULL-deref on snapshot tear down (git-fixes).
- drm/nouveau/disp: Support more modes by checking with lower bpc (git-fixes).
- drm/panel: otm8009a: Set backlight parent to panel device (git-fixes).
- drm/probe-helper: Cancel previous job before starting new one (git-fixes).
- drm/rockchip: Drop unbalanced obj unref (git-fixes).
- drm/vgem: add missing mutex_destroy (git-fixes).
- drm: msm: adreno: Disable preemption on Adreno 510 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Book X90F (git-fixes).
- drm: rcar-du: Fix a NULL vs IS_ERR() bug (git-fixes).
- dt-bindings: arm: fsl: Fix copy-paste error in comment (git-fixes).
- dt-bindings: iio: ti,tmp117: fix documentation link (git-fixes).
- dt-bindings: mailbox: qcom,apcs-kpss-global: fix SDX55 'if' match (git-fixes).
- dt-bindings: nvmem: qcom,spmi-sdam: fix example 'reg' property (git-fixes).
- dt-bindings: remoteproc: stm32-rproc: Typo fix (git-fixes).
- dt-bindings: soc: qcom: smd-rpm: re-add missing qcom,rpm-msm8994 (git-fixes).
- e1000e: Disable TSO on i219-LM card to increase speed (git-fixes).
- efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L (git-fixes).
- ext4: Fix deadlock during directory rename (bsc#1210763).
- ext4: Fix possible corruption when moving a directory (bsc#1210763).
- ext4: fix RENAME_WHITEOUT handling for inline directories (bsc#1210766).
- ext4: fix another off-by-one fsmap error on 1k block filesystems (bsc#1210767).
- ext4: fix bad checksum after online resize (bsc#1210762 bsc#1208076).
- ext4: fix cgroup writeback accounting with fs-layer encryption (bsc#1210765).
- ext4: fix corruption when online resizing a 1K bigalloc fs (bsc#1206891).
- ext4: fix incorrect options show of original mount_opt and extend mount_opt2 (bsc#1210764).
- ext4: fix possible double unlock when moving a directory (bsc#1210763).
- ext4: use ext4_journal_start/stop for fast commit transactions (bsc#1210793).
- fbmem: Reject FB_ACTIVATE_KD_TEXT from userspace (git-fixes).
- firmware: qcom_scm: Clear download bit during reboot (git-fixes).
- firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe (git-fixes).
- fpga: bridge: fix kernel-doc parameter description (git-fixes).
- hwmon: (adt7475) Use device_property APIs when configuring polarity (git-fixes).
- hwmon: (k10temp) Check range scale when CUR_TEMP register is read-write (git-fixes).
- hwmon: (pmbus/fsp-3y) Fix functionality bitmask in FSP-3Y YM-2151E (git-fixes).
- i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path (git-fixes).
- i2c: hisi: Avoid redundant interrupts (git-fixes).
- i2c: imx-lpi2c: clean rx/tx buffers upon new message (git-fixes).
- i2c: ocores: generate stop condition after timeout in polling mode (git-fixes).
- i915/perf: Replace DRM_DEBUG with driver specific drm_dbg call (git-fixes).
- ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (bsc#1210158).
- iio: adc: at91-sama5d2_adc: fix an error code in at91_adc_allocate_trigger() (git-fixes).
- iio: light: tsl2772: fix reading proximity-diodes from device tree (git-fixes).
- ipmi: fix SSIF not responding under certain cond (git-fixes).
- ipmi:ssif: Add send_retries increment (git-fixes).
- k-m-s: Drop Linux 2.6 support
- kABI: PCI: loongson: Prevent LS7A MRRS increases (kabi).
- kABI: x86/msi: Fix msi message data shadow struct (kabi).
- kabi/severities: ignore KABI for NVMe target (bsc#1174777).
- keys: Fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
- locking/rwbase: Mitigate indefinite writer starvation.
- media: av7110: prevent underflow in write_ts_to_decoder() (git-fixes).
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (git-fixes).
- media: max9286: Free control handler (git-fixes).
- media: rc: gpio-ir-recv: Fix support for wake-up (git-fixes).
- media: rkvdec: fix use after free bug in rkvdec_remove (git-fixes).
- media: saa7134: fix use after free bug in saa7134_finidev due to race condition (git-fixes).
- media: venus: dec: Fix handling of the start cmd (git-fixes).
- memstick: fix memory leak if card device is never registered (git-fixes).
- mm/filemap: fix page end in filemap_get_read_batch (bsc#1210768).
- mm: page_alloc: skip regions with hugetlbfs pages when allocating 1G pages (bsc#1210034).
- mm: take a page reference when removing device exclusive entries (bsc#1211025).
- mmc: sdhci-of-esdhc: fix quirk to ignore command inhibit for data (git-fixes).
- mmc: sdhci_am654: Set HIGH_SPEED_ENA for SDR12 and SDR25 (git-fixes).
- mtd: core: fix error path for nvmem provider (git-fixes).
- mtd: core: fix nvmem error reporting (git-fixes).
- mtd: core: provide unique name for nvmem device, take two (git-fixes).
- mtd: spi-nor: Fix a trivial typo (git-fixes).
- net: phy: nxp-c45-tja11xx: add remove callback (git-fixes).
- net: phy: nxp-c45-tja11xx: fix unsigned long multiplication overflow (git-fixes).
- nfsd: call op_release, even when op_func returns an error (git-fixes).
- nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() (git-fixes).
- nilfs2: initialize unused bytes in segment summary blocks (git-fixes).
- nvme initialize core quirks before calling nvme_init_subsystem (git-fixes).
- nvme-auth: uninitialized variable in nvme_auth_transform_key() (git-fixes).
- nvme-fcloop: fix 'inconsistent {IN-HARDIRQ-W} -&gt; {HARDIRQ-ON-W} usage' (git-fixes).
- nvme-hwmon: consistently ignore errors from nvme_hwmon_init (git-fixes).
- nvme-hwmon: kmalloc the NVME SMART log buffer (git-fixes).
- nvme-multipath: fix possible hang in live ns resize with ANA access (git-fixes).
- nvme-pci: fix doorbell buffer value endianness (git-fixes).
- nvme-pci: fix mempool alloc size (git-fixes).
- nvme-pci: fix page size checks (git-fixes).
- nvme-pci: fix timeout request state check (git-fixes).
- nvme-rdma: fix possible hang caused during ctrl deletion (git-fixes).
- nvme-tcp: fix possible circular locking when deleting a controller under memory pressure (git-fixes).
- nvme-tcp: fix possible hang caused during ctrl deletion (git-fixes).
- nvme-tcp: fix regression that causes sporadic requests to time out (git-fixes).
- nvme: Fix IOC_PR_CLEAR and IOC_PR_RELEASE ioctls for nvme devices (git-fixes).
- nvme: add device name to warning in uuid_show() (git-fixes).
- nvme: catch -ENODEV from nvme_revalidate_zones again (git-fixes).
- nvme: copy firmware_rev on each init (git-fixes).
- nvme: define compat_ioctl again to unbreak 32-bit userspace (git-fixes).
- nvme: fix async event trace event (git-fixes).
- nvme: fix handling single range discard request (git-fixes).
- nvme: fix per-namespace chardev deletion (git-fixes).
- nvme: fix the NVME_CMD_EFFECTS_CSE_MASK definition (git-fixes).
- nvme: fix the read-only state for zoned namespaces with unsupposed features (git-fixes).
- nvme: improve the NVME_CONNECT_AUTHREQ* definitions (git-fixes).
- nvme: move nvme_multi_css into nvme.h (git-fixes).
- nvme: return err on nvme_init_non_mdts_limits fail (git-fixes).
- nvme: send Identify with CNS 06h only to I/O controllers (bsc#1209693).
- nvme: set dma alignment to dword (git-fixes).
- nvme: use command_id instead of req-&gt;tag in trace_nvme_complete_rq() (git-fixes).
- nvmet-auth: do not try to cancel a non-initialized work_struct (git-fixes).
- nvmet-tcp: fix incomplete data digest send (git-fixes).
- nvmet-tcp: fix regression in data_digest calculation (git-fixes).
- nvmet: add helpers to set the result field for connect commands (git-fixes).
- nvmet: avoid potential UAF in nvmet_req_complete() (git-fixes).
- nvmet: do not defer passthrough commands with trivial effects to the workqueue (git-fixes).
- nvmet: fix I/O Command Set specific Identify Controller (git-fixes).
- nvmet: fix Identify Active Namespace ID list handling (git-fixes).
- nvmet: fix Identify Controller handling (git-fixes).
- nvmet: fix Identify Namespace handling (git-fixes).
- nvmet: fix a memory leak (git-fixes).
- nvmet: fix a memory leak in nvmet_auth_set_key (git-fixes).
- nvmet: fix a use-after-free (git-fixes).
- nvmet: fix invalid memory reference in nvmet_subsys_attr_qid_max_show (git-fixes).
- nvmet: force reconnect when number of queue changes (git-fixes).
- nvmet: looks at the passthrough controller when initializing CAP (git-fixes).
- nvmet: only allocate a single slab for bvecs (git-fixes).
- nvmet: use IOCB_NOWAIT only if the filesystem supports it (git-fixes).
- perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output (git fixes).
- perf/core: Fix the same task check in perf_event_set_output (git fixes).
- perf: Fix check before add_event_to_groups() in perf_group_detach() (git fixes).
- perf: fix perf_event_context-&gt;time (git fixes).
- platform/x86 (gigabyte-wmi): Add support for A320M-S2H V2 (git-fixes).
- platform/x86: gigabyte-wmi: add support for X570S AORUS ELITE (git-fixes).
- power: supply: cros_usbpd: reclassify 'default case!' as debug (git-fixes).
- power: supply: generic-adc-battery: fix unit scaling (git-fixes).
- powerpc/64: Always build with 128-bit long double (bsc#1194869).
- powerpc/64e: Fix amdgpu build on Book3E w/o AltiVec (bsc#1194869).
- powerpc/hv-gpci: Fix hv_gpci event list (git fixes).
- powerpc/papr_scm: Update the NUMA distance table for the target node (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
- powerpc/perf/hv-24x7: add missing RTAS retry status handling (git fixes).
- powerpc/pseries: Consolidate different NUMA distance update code paths (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
- powerpc: declare unmodified attribute_group usages const (git-fixes).
- regulator: core: Avoid lockdep reports when resolving supplies (git-fixes).
- regulator: core: Consistently set mutex_owner when using ww_mutex_lock_slow() (git-fixes).
- regulator: core: Shorten off-on-delay-us for always-on/boot-on by time since booted (git-fixes).
- regulator: fan53555: Explicitly include bits header (git-fixes).
- regulator: fan53555: Fix wrong TCS_SLEW_MASK (git-fixes).
- regulator: stm32-pwr: fix of_iomap leak (git-fixes).
- remoteproc: Harden rproc_handle_vdev() against integer overflow (git-fixes).
- remoteproc: imx_rproc: Call of_node_put() on iteration error (git-fixes).
- remoteproc: st: Call of_node_put() on iteration error (git-fixes).
- remoteproc: stm32: Call of_node_put() on iteration error (git-fixes).
- rtc: meson-vrtc: Use ktime_get_real_ts64() to get the current time (git-fixes).
- rtc: omap: include header for omap_rtc_power_off_program prototype (git-fixes).
- sched/fair: Fix imbalance overflow (bsc#1155798).
- sched/fair: Limit sched slice duration (bsc#1189999).
- sched/fair: Move calculate of avg_load to a better location (bsc#1155798).
- sched/fair: Sanitize vruntime of entity being migrated (bsc#1203325).
- sched/fair: sanitize vruntime of entity being placed (bsc#1203325).
- sched/numa: Stop an exhastive search if an idle core is found (bsc#1189999).
- sched_getaffinity: do not assume 'cpumask_size()' is fully initialized (bsc#1155798).
- scsi: aic94xx: Add missing check for dma_map_single() (git-fixes).
- scsi: core: Add BLIST_NO_VPD_SIZE for some VDASD (git-fixes bsc#1203039).
- scsi: core: Add BLIST_SKIP_VPD_PAGES for SKhynix H28U74301AMR (git-fixes).
- scsi: core: Fix a procfs host directory removal regression (git-fixes).
- scsi: core: Fix a source code comment (git-fixes).
- scsi: core: Remove the /proc/scsi/${proc_name} directory earlier (git-fixes).
- scsi: hisi_sas: Check devm_add_action() return value (git-fixes).
- scsi: hisi_sas: Set a port invalid only if there are no devices attached when refreshing port id (git-fixes).
- scsi: ipr: Work around fortify-string warning (git-fixes).
- scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() (git-fixes).
- scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (git-fixes).
- scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress (git-fixes).
- scsi: kABI workaround for fc_host_fpin_rcv (git-fixes).
- scsi: libsas: Remove useless dev_list delete in sas_ex_discover_end_dev() (git-fixes).
- scsi: lpfc: Avoid usage of list iterator variable after loop (git-fixes).
- scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read() (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.11 patches (bsc#1210943).
- scsi: lpfc: Correct used_rpi count when devloss tmo fires with no recovery (bsc#1210943).
- scsi: lpfc: Defer issuing new PLOGI if received RSCN before completing REG_LOGIN (bsc#1210943).
- scsi: lpfc: Drop redundant pci_enable_pcie_error_reporting() (bsc#1210943).
- scsi: lpfc: Fix double word in comments (bsc#1210943).
- scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() (bsc#1210943).
- scsi: lpfc: Fix lockdep warning for rx_monitor lock when unloading driver (bsc#1210943).
- scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow (bsc#1210943).
- scsi: lpfc: Record LOGO state with discovery engine even if aborted (bsc#1210943).
- scsi: lpfc: Reorder freeing of various DMA buffers and their list removal (bsc#1210943).
- scsi: lpfc: Revise lpfc_error_lost_link() reason code evaluation logic (bsc#1210943).
- scsi: lpfc: Silence an incorrect device output (bsc#1210943).
- scsi: lpfc: Skip waiting for register ready bits when in unrecoverable state (bsc#1210943).
- scsi: lpfc: Update lpfc version to 14.2.0.11 (bsc#1210943).
- scsi: megaraid_sas: Fix crash after a double completion (git-fixes).
- scsi: megaraid_sas: Update max supported LD IDs to 240 (git-fixes).
- scsi: mpt3sas: Do not print sense pool info twice (git-fixes).
- scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() (git-fixes).
- scsi: mpt3sas: Fix a memory leak (git-fixes).
- scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() (git-fixes).
- scsi: qla2xxx: Perform lockless command completion in abort path (git-fixes).
- scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate() (git-fixes).
- scsi: scsi_transport_fc: Add an additional flag to fc_host_fpin_rcv() (bsc#1210943).
- scsi: sd: Fix wrong zone_write_granularity value during revalidate (git-fixes).
- scsi: ses: Do not attach if enclosure has no components (git-fixes).
- scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses (git-fixes).
- scsi: ses: Fix possible desc_ptr out-of-bounds accesses (git-fixes).
- scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() (git-fixes).
- scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() (git-fixes).
- scsi: snic: Fix memory leak with using debugfs_lookup() (git-fixes).
- seccomp: Move copy_seccomp() to no failure path (bsc#1210817).
- selftests/kselftest/runner/run_one(): allow running non-executable files (git-fixes).
- selftests: sigaltstack: fix -Wuninitialized (git-fixes).
- selinux: ensure av_permissions.h is built when needed (git-fixes).
- selinux: fix Makefile dependencies of flask.h (git-fixes).
- serial: 8250: Add missing wakeup event reporting (git-fixes).
- serial: 8250_bcm7271: Fix arbitration handling (git-fixes).
- serial: 8250_exar: derive nr_ports from PCI ID for Acces I/O cards (git-fixes).
- serial: exar: Add support for Sealevel 7xxxC serial cards (git-fixes).
- signal handling: do not use BUG_ON() for debugging (bsc#1210439).
- signal: Add SA_IMMUTABLE to ensure forced siganls do not get changed (bsc#1210816).
- signal: Do not always set SA_IMMUTABLE for forced signals (bsc#1210816).
- signal: HANDLER_EXIT should clear SIGNAL_UNKILLABLE (bsc#1210816).
- soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe (git-fixes).
- spi: cadence-quadspi: fix suspend-resume implementations (git-fixes).
- spi: fsl-spi: Fix CPM/QE mode Litte Endian (git-fixes).
- spi: qup: Do not skip cleanup in remove's error path (git-fixes).
- staging: iio: resolver: ads1210: fix config mode (git-fixes).
- staging: rtl8192e: Fix W_DISABLE# does not work after stop/start (git-fixes).
- stat: fix inconsistency between struct stat and struct compat_stat (git-fixes).
- sunrpc: only free unix grouplist after RCU settles (git-fixes).
- tty: Prevent writing chars during tcsetattr TCSADRAIN/FLUSH (git-fixes).
- tty: serial: fsl_lpuart: adjust buffer length to the intended size (git-fixes).
- udf: Check consistency of Space Bitmap Descriptor (bsc#1210771).
- udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (bsc#1206649).
- udf: Support splicing to file (bsc#1210770).
- usb: chipidea: fix missing goto in `ci_hdrc_probe` (git-fixes).
- usb: chipidea: imx: avoid unnecessary probe defer (git-fixes).
- usb: dwc3: gadget: Change condition for processing suspend event (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-S (git-fixes).
- usb: gadget: tegra-xudc: Fix crash in vbus_draw (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition (git-fixes).
- usb: host: xhci-rcar: remove leftover quirk handling (git-fixes).
- virt/coco/sev-guest: Add throttling awareness (bsc#1209927).
- virt/coco/sev-guest: Carve out the request issuing logic into a helper (bsc#1209927).
- virt/coco/sev-guest: Check SEV_SNP attribute at probe time (bsc#1209927).
- virt/coco/sev-guest: Convert the sw_exit_info_2 checking to a switch-case (bsc#1209927).
- virt/coco/sev-guest: Do some code style cleanups (bsc#1209927).
- virt/coco/sev-guest: Remove the disable_vmpck label in handle_guest_request() (bsc#1209927).
- virt/coco/sev-guest: Simplify extended guest request handling (bsc#1209927).
- virt/sev-guest: Return -EIO if certificate buffer is not large enough (bsc#1209927).
- virtio_ring: do not update event idx on get_buf (git-fixes).
- vmci_host: fix a race condition in vmci_host_poll() causing GPF (git-fixes).
- vmxnet3: use gro callback when UPT is enabled (bsc#1209739).
- wifi: ath5k: fix an off by one check in ath5k_eeprom_read_freq_list() (git-fixes).
- wifi: ath6kl: minor fix for allocation size (git-fixes).
- wifi: ath6kl: reduce WARN to dev_dbg() in callback (git-fixes).
- wifi: ath9k: hif_usb: fix memory leak of remain_skbs (git-fixes).
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (git-fixes).
- wifi: brcmfmac: support CQM RSSI notification with older firmware (git-fixes).
- wifi: iwlwifi: debug: fix crash in __iwl_err() (git-fixes).
- wifi: iwlwifi: fix duplicate entry in iwl_dev_info_table (git-fixes).
- wifi: iwlwifi: fw: fix memory leak in debugfs (git-fixes).
- wifi: iwlwifi: fw: move memset before early return (git-fixes).
- wifi: iwlwifi: make the loop for card preparation effective (git-fixes).
- wifi: iwlwifi: mvm: check firmware response size (git-fixes).
- wifi: iwlwifi: mvm: do not set CHECKSUM_COMPLETE for unsupported protocols (git-fixes).
- wifi: iwlwifi: mvm: fix mvmtxq-&gt;stopped handling (git-fixes).
- wifi: iwlwifi: mvm: initialize seq variable (git-fixes).
- wifi: iwlwifi: trans: do not trigger d3 interrupt twice (git-fixes).
- wifi: iwlwifi: yoyo: Fix possible division by zero (git-fixes).
- wifi: iwlwifi: yoyo: skip dump correctly on hw error (git-fixes).
- wifi: mac80211: adjust scan cancel comment/check (git-fixes).
- wifi: mt76: add missing locking to protect against concurrent rx/status calls (git-fixes).
- wifi: mt76: fix 6GHz high channel not be scanned (git-fixes).
- wifi: mt76: handle failure of vzalloc in mt7615_coredump_work (git-fixes).
- wifi: mwifiex: mark OF related data as maybe unused (git-fixes).
- wifi: rt2x00: Fix memory leak when handling surveys (git-fixes).
- wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_reg() (git-fixes).
- wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_rfreg() (git-fixes).
- wifi: rtw88: mac: Return the original error from rtw_mac_power_switch() (git-fixes).
- wifi: rtw88: mac: Return the original error from rtw_pwr_seq_parser() (git-fixes).
- wifi: rtw89: fix potential race condition between napi_init and napi_enable (git-fixes).
- writeback, cgroup: fix null-ptr-deref write in bdi_split_work_to_wbs (bsc#1210769).
- x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails (git-fixes).
- x86/PCI: Add quirk for AMD XHCI controller that loses MSI-X state in D3hot (git-fixes).
- x86/bug: Prevent shadowing in __WARN_FLAGS (git-fixes).
- x86/bugs: Enable STIBP for IBPB mitigated RETBleed (git-fixes).
- x86/entry: Avoid very early RET (git-fixes).
- x86/entry: Do not call error_entry() for XENPV (git-fixes).
- x86/entry: Move CLD to the start of the idtentry macro (git-fixes).
- x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (git-fixes).
- x86/entry: Switch the stack after error_entry() returns (git-fixes).
- x86/fpu: Prevent FPU state corruption (git-fixes).
- x86/kvm: Preserve BSP MSR_KVM_POLL_CONTROL across suspend/resume (git-fixes).
- x86/msi: Fix msi message data shadow struct (git-fixes).
- x86/pci/xen: Disable PCI/MSI masking for XEN_HVM guests (git-fixes).
- x86/traps: Use pt_regs directly in fixup_bad_iret() (git-fixes).
- x86/tsx: Disable TSX development mode at boot (git-fixes).
- x86: __memcpy_flushcache: fix wrong alignment if size &gt; 2^32 (git-fixes).
- xhci: fix debugfs register accesses while suspended (git-fixes).

kernel-default-base changed:

- Do not ship on s390x (bsc#1210729)
- Add exfat (bsc#1208822)
- Add _diag modules for included socket types (bsc#1204042)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-09"/>
	<updated date="2023-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1142685">SUSE bug 1142685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189999">SUSE bug 1189999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203039">SUSE bug 1203039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203325">SUSE bug 1203325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204042">SUSE bug 1204042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206649">SUSE bug 1206649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206891">SUSE bug 1206891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206992">SUSE bug 1206992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207088">SUSE bug 1207088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208076">SUSE bug 1208076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208822">SUSE bug 1208822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208845">SUSE bug 1208845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209615">SUSE bug 1209615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209693">SUSE bug 1209693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209739">SUSE bug 1209739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209871">SUSE bug 1209871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209927">SUSE bug 1209927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209999">SUSE bug 1209999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210034">SUSE bug 1210034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210158">SUSE bug 1210158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210202">SUSE bug 1210202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210206">SUSE bug 1210206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210301">SUSE bug 1210301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210329">SUSE bug 1210329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210336">SUSE bug 1210336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210337">SUSE bug 1210337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210439">SUSE bug 1210439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210453">SUSE bug 1210453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210454">SUSE bug 1210454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210469">SUSE bug 1210469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210499">SUSE bug 1210499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210506">SUSE bug 1210506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210629">SUSE bug 1210629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210630">SUSE bug 1210630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210725">SUSE bug 1210725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210729">SUSE bug 1210729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210762">SUSE bug 1210762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210763">SUSE bug 1210763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210764">SUSE bug 1210764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210765">SUSE bug 1210765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210766">SUSE bug 1210766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210767">SUSE bug 1210767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210768">SUSE bug 1210768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210769">SUSE bug 1210769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210770">SUSE bug 1210770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210771">SUSE bug 1210771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210793">SUSE bug 1210793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210816">SUSE bug 1210816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210817">SUSE bug 1210817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210827">SUSE bug 1210827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210943">SUSE bug 1210943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210953">SUSE bug 1210953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210986">SUSE bug 1210986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211025">SUSE bug 1211025</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2196/">CVE-2022-2196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0386/">CVE-2023-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0386">CVE-2023-0386 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1670/">CVE-2023-1670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1855/">CVE-2023-1855 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1989/">CVE-2023-1989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1990/">CVE-2023-1990 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1998/">CVE-2023-1998 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2008/">CVE-2023-2008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2008">CVE-2023-2008 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2019/">CVE-2023-2019 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2019">CVE-2023-2019 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2176/">CVE-2023-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2176">CVE-2023-2176 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2235/">CVE-2023-2235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-23006/">CVE-2023-23006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23006">CVE-2023-23006 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30772/">CVE-2023-30772 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009756419" comment="kernel-default-5.14.21-150400.24.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756420" comment="kernel-default-base-5.14.21-150400.24.63.1.150400.24.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205952" version="1" class="patch">
	<metadata>
		<title>Security update for conmon (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014829.html" source="SUSE-SU"/>
		<description>

This update of conmon fixes the following issues:

- rebuild the package with the go 19.9 secure release (bsc#1200441).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-10"/>
	<updated date="2023-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756803" comment="conmon-2.1.5-150400.3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205953" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211230" ref_url="https://bugzilla.suse.com/1211230" source="BUGZILLA"/>
		<reference ref_id="1211231" ref_url="https://bugzilla.suse.com/1211231" source="BUGZILLA"/>
		<reference ref_id="1211232" ref_url="https://bugzilla.suse.com/1211232" source="BUGZILLA"/>
		<reference ref_id="1211233" ref_url="https://bugzilla.suse.com/1211233" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28319" ref_url="https://www.suse.com/security/cve/CVE-2023-28319/" source="CVE"/>
		<reference ref_id="CVE-2023-28320" ref_url="https://www.suse.com/security/cve/CVE-2023-28320/" source="CVE"/>
		<reference ref_id="CVE-2023-28321" ref_url="https://www.suse.com/security/cve/CVE-2023-28321/" source="CVE"/>
		<reference ref_id="CVE-2023-28322" ref_url="https://www.suse.com/security/cve/CVE-2023-28322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014913.html" source="SUSE-SU"/>
		<description>
This update for curl adds the following feature:

Update to version 8.0.1 (jsc#PED-2580)

- CVE-2023-28319: use-after-free in SSH sha256 fingerprint check (bsc#1211230).
- CVE-2023-28320: siglongjmp race condition (bsc#1211231).
- CVE-2023-28321: IDN wildcard matching (bsc#1211232).
- CVE-2023-28322: POST-after-PUT confusion (bsc#1211233).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2023-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211230">SUSE bug 1211230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211231">SUSE bug 1211231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211232">SUSE bug 1211232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211233">SUSE bug 1211233</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28319/">CVE-2023-28319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28319">CVE-2023-28319 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28320/">CVE-2023-28320 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28320">CVE-2023-28320 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28321/">CVE-2023-28321 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28322/">CVE-2023-28322 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009760493" comment="curl-8.0.1-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760494" comment="libcurl4-8.0.1-150400.5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205954" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1142685" ref_url="https://bugzilla.suse.com/1142685" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1189999" ref_url="https://bugzilla.suse.com/1189999" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1203039" ref_url="https://bugzilla.suse.com/1203039" source="BUGZILLA"/>
		<reference ref_id="1203325" ref_url="https://bugzilla.suse.com/1203325" source="BUGZILLA"/>
		<reference ref_id="1206649" ref_url="https://bugzilla.suse.com/1206649" source="BUGZILLA"/>
		<reference ref_id="1206891" ref_url="https://bugzilla.suse.com/1206891" source="BUGZILLA"/>
		<reference ref_id="1206992" ref_url="https://bugzilla.suse.com/1206992" source="BUGZILLA"/>
		<reference ref_id="1207088" ref_url="https://bugzilla.suse.com/1207088" source="BUGZILLA"/>
		<reference ref_id="1208076" ref_url="https://bugzilla.suse.com/1208076" source="BUGZILLA"/>
		<reference ref_id="1208845" ref_url="https://bugzilla.suse.com/1208845" source="BUGZILLA"/>
		<reference ref_id="1209615" ref_url="https://bugzilla.suse.com/1209615" source="BUGZILLA"/>
		<reference ref_id="1209693" ref_url="https://bugzilla.suse.com/1209693" source="BUGZILLA"/>
		<reference ref_id="1209739" ref_url="https://bugzilla.suse.com/1209739" source="BUGZILLA"/>
		<reference ref_id="1209871" ref_url="https://bugzilla.suse.com/1209871" source="BUGZILLA"/>
		<reference ref_id="1209927" ref_url="https://bugzilla.suse.com/1209927" source="BUGZILLA"/>
		<reference ref_id="1209999" ref_url="https://bugzilla.suse.com/1209999" source="BUGZILLA"/>
		<reference ref_id="1210034" ref_url="https://bugzilla.suse.com/1210034" source="BUGZILLA"/>
		<reference ref_id="1210158" ref_url="https://bugzilla.suse.com/1210158" source="BUGZILLA"/>
		<reference ref_id="1210202" ref_url="https://bugzilla.suse.com/1210202" source="BUGZILLA"/>
		<reference ref_id="1210206" ref_url="https://bugzilla.suse.com/1210206" source="BUGZILLA"/>
		<reference ref_id="1210301" ref_url="https://bugzilla.suse.com/1210301" source="BUGZILLA"/>
		<reference ref_id="1210329" ref_url="https://bugzilla.suse.com/1210329" source="BUGZILLA"/>
		<reference ref_id="1210336" ref_url="https://bugzilla.suse.com/1210336" source="BUGZILLA"/>
		<reference ref_id="1210337" ref_url="https://bugzilla.suse.com/1210337" source="BUGZILLA"/>
		<reference ref_id="1210439" ref_url="https://bugzilla.suse.com/1210439" source="BUGZILLA"/>
		<reference ref_id="1210453" ref_url="https://bugzilla.suse.com/1210453" source="BUGZILLA"/>
		<reference ref_id="1210454" ref_url="https://bugzilla.suse.com/1210454" source="BUGZILLA"/>
		<reference ref_id="1210469" ref_url="https://bugzilla.suse.com/1210469" source="BUGZILLA"/>
		<reference ref_id="1210506" ref_url="https://bugzilla.suse.com/1210506" source="BUGZILLA"/>
		<reference ref_id="1210629" ref_url="https://bugzilla.suse.com/1210629" source="BUGZILLA"/>
		<reference ref_id="1210725" ref_url="https://bugzilla.suse.com/1210725" source="BUGZILLA"/>
		<reference ref_id="1210762" ref_url="https://bugzilla.suse.com/1210762" source="BUGZILLA"/>
		<reference ref_id="1210763" ref_url="https://bugzilla.suse.com/1210763" source="BUGZILLA"/>
		<reference ref_id="1210764" ref_url="https://bugzilla.suse.com/1210764" source="BUGZILLA"/>
		<reference ref_id="1210765" ref_url="https://bugzilla.suse.com/1210765" source="BUGZILLA"/>
		<reference ref_id="1210766" ref_url="https://bugzilla.suse.com/1210766" source="BUGZILLA"/>
		<reference ref_id="1210767" ref_url="https://bugzilla.suse.com/1210767" source="BUGZILLA"/>
		<reference ref_id="1210768" ref_url="https://bugzilla.suse.com/1210768" source="BUGZILLA"/>
		<reference ref_id="1210769" ref_url="https://bugzilla.suse.com/1210769" source="BUGZILLA"/>
		<reference ref_id="1210770" ref_url="https://bugzilla.suse.com/1210770" source="BUGZILLA"/>
		<reference ref_id="1210771" ref_url="https://bugzilla.suse.com/1210771" source="BUGZILLA"/>
		<reference ref_id="1210793" ref_url="https://bugzilla.suse.com/1210793" source="BUGZILLA"/>
		<reference ref_id="1210816" ref_url="https://bugzilla.suse.com/1210816" source="BUGZILLA"/>
		<reference ref_id="1210817" ref_url="https://bugzilla.suse.com/1210817" source="BUGZILLA"/>
		<reference ref_id="1210827" ref_url="https://bugzilla.suse.com/1210827" source="BUGZILLA"/>
		<reference ref_id="1210943" ref_url="https://bugzilla.suse.com/1210943" source="BUGZILLA"/>
		<reference ref_id="1210953" ref_url="https://bugzilla.suse.com/1210953" source="BUGZILLA"/>
		<reference ref_id="1210986" ref_url="https://bugzilla.suse.com/1210986" source="BUGZILLA"/>
		<reference ref_id="1211025" ref_url="https://bugzilla.suse.com/1211025" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2196" ref_url="https://www.suse.com/security/cve/CVE-2022-2196/" source="CVE"/>
		<reference ref_id="CVE-2023-0386" ref_url="https://www.suse.com/security/cve/CVE-2023-0386/" source="CVE"/>
		<reference ref_id="CVE-2023-1670" ref_url="https://www.suse.com/security/cve/CVE-2023-1670/" source="CVE"/>
		<reference ref_id="CVE-2023-1855" ref_url="https://www.suse.com/security/cve/CVE-2023-1855/" source="CVE"/>
		<reference ref_id="CVE-2023-1989" ref_url="https://www.suse.com/security/cve/CVE-2023-1989/" source="CVE"/>
		<reference ref_id="CVE-2023-1990" ref_url="https://www.suse.com/security/cve/CVE-2023-1990/" source="CVE"/>
		<reference ref_id="CVE-2023-1998" ref_url="https://www.suse.com/security/cve/CVE-2023-1998/" source="CVE"/>
		<reference ref_id="CVE-2023-2008" ref_url="https://www.suse.com/security/cve/CVE-2023-2008/" source="CVE"/>
		<reference ref_id="CVE-2023-2019" ref_url="https://www.suse.com/security/cve/CVE-2023-2019/" source="CVE"/>
		<reference ref_id="CVE-2023-2176" ref_url="https://www.suse.com/security/cve/CVE-2023-2176/" source="CVE"/>
		<reference ref_id="CVE-2023-2235" ref_url="https://www.suse.com/security/cve/CVE-2023-2235/" source="CVE"/>
		<reference ref_id="CVE-2023-23006" ref_url="https://www.suse.com/security/cve/CVE-2023-23006/" source="CVE"/>
		<reference ref_id="CVE-2023-30772" ref_url="https://www.suse.com/security/cve/CVE-2023-30772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-2235: A use-after-free vulnerability in the Performance Events system can be exploited to achieve local privilege escalation (bsc#1210986).
- CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992).
- CVE-2023-23006: Fixed NULL checking against IS_ERR in dr_domain_init_resources (bsc#1208845).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-2176: A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege (bsc#1210629).
- CVE-2023-0386: A flaw was found where unauthorized access to the execution of the setuid file with capabilities was found in the OverlayFS subsystem, when a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allowed a local user to escalate their privileges on the system (bsc#1209615).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
- CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-2019: A flaw was found in the netdevsim device driver, more specifically within the scheduling of events. This issue results from the improper management of a reference count and may lead to a denial of service (bsc#1210454).
- CVE-2023-2008: A flaw was found in the fault handler of the udmabuf device driver. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code (bsc#1210453).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).

The following non-security bugs were fixed:

- ACPI: CPPC: Disable FIE if registers in PCC regions (bsc#1210953).
- ACPI: VIOT: Initialize the correct IOMMU fwspec (git-fixes).
- ACPI: resource: Add Medion S17413 to IRQ override quirk (git-fixes).
- ALSA: emu10k1: do not create old pass-through playback device on Audigy (git-fixes).
- ALSA: emu10k1: fix capture interrupt handler unlinking (git-fixes).
- ALSA: firewire-tascam: add missing unwind goto in snd_tscm_stream_start_duplex() (git-fixes).
- ALSA: hda/cirrus: Add extra 10 ms delay to allow PLL settle and lock (git-fixes).
- ALSA: hda/realtek: Add quirks for Lenovo Z13/Z16 Gen2 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and speaker support for HP Laptops (git-fixes).
- ALSA: hda/realtek: Remove specific patch for Dell Precision 3260 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda/realtek: fix speaker, mute/micmute LEDs not work on a HP platform (git-fixes).
- ALSA: hda/sigmatel: add pin overrides for Intel DP45SG motherboard (git-fixes).
- ALSA: hda/sigmatel: fix S/PDIF out on Intel D*45* motherboards (git-fixes).
- ALSA: hda: cs35l41: Enable Amp High Pass Filter (git-fixes).
- ALSA: hda: patch_realtek: add quirk for Asus N7601ZM (git-fixes).
- ALSA: i2c/cs8427: fix iec958 mixer control deactivation (git-fixes).
- ARM: 9290/1: uaccess: Fix KASAN false-positives (git-fixes).
- ARM: dts: exynos: fix WM8960 clock name in Itop Elite (git-fixes).
- ARM: dts: gta04: fix excess dma channel usage (git-fixes).
- ARM: dts: qcom: ipq4019: Fix the PCI I/O port range (git-fixes).
- ARM: dts: rockchip: fix a typo error for rk3288 spdif node (git-fixes).
- ARM: dts: s5pv210: correct MIPI CSIS clock name (git-fixes).
- ASN.1: Fix check for strdup() success (git-fixes).
- ASoC: cs35l41: Only disable internal boost (git-fixes).
- ASoC: es8316: Handle optional IRQ assignment (git-fixes).
- ASoC: fsl_asrc_dma: fix potential null-ptr-deref (git-fixes).
- ASoC: fsl_mqs: move of_node_put() to the correct location (git-fixes).
- Add 42a11bf5c543 cgroup/cpuset: Make cpuset_fork() handle CLONE_INTO_CGROUP properly
- Add eee878537941 cgroup/cpuset: Add cpuset_can_fork() and cpuset_cancel_fork() methods
- Bluetooth: Fix race condition in hidp_session_thread (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} (git-fixes).
- Drivers: vmbus: Check for channel allocation before looking up relids (git-fixes).
- IB/mlx5: Add support for 400G_8X lane speed (git-fixes)
- Input: hp_sdc_rtc - mark an unused function as __maybe_unused (git-fixes).
- Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe (git-fixes).
- KEYS: Add missing function documentation (git-fixes).
- KEYS: Create static version of public_key_verify_signature (git-fixes).
- NFS: Cleanup unused rpc_clnt variable (git-fixes).
- NFSD: Avoid calling OPDESC() with ops-&gt;opnum == OP_ILLEGAL (git-fixes).
- NFSD: callback request does not use correct credential for AUTH_SYS (git-fixes).
- PCI/EDR: Clear Device Status after EDR error recovery (git-fixes).
- PCI: dwc: Fix PORT_LINK_CONTROL update when CDM check enabled (git-fixes).
- PCI: imx6: Install the fault handler only on compatible match (git-fixes).
- PCI: loongson: Add more devices that need MRRS quirk (git-fixes).
- PCI: loongson: Prevent LS7A MRRS increases (git-fixes).
- PCI: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git-fixes).
- PCI: qcom: Fix the incorrect register usage in v2.7.0 config (git-fixes).
- RDMA/cma: Allow UD qp_type to join multicast only (git-fixes)
- RDMA/core: Fix GID entry ref leak when create_ah fails (git-fixes)
- RDMA/irdma: Add ipv4 check to irdma_find_listener() (git-fixes)
- RDMA/irdma: Fix memory leak of PBLE objects (git-fixes)
- RDMA/irdma: Increase iWARP CM default rexmit count (git-fixes)
- Remove obsolete KMP obsoletes (bsc#1210469).
- Revert 'Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work' (git-fixes).
- Revert 'pinctrl: amd: Disable and mask interrupts on resume' (git-fixes).
- USB: dwc3: fix runtime pm imbalance on probe errors (git-fixes).
- USB: dwc3: fix runtime pm imbalance on unbind (git-fixes).
- USB: serial: cp210x: add Silicon Labs IFS-USB-DATACABLE IDs (git-fixes).
- USB: serial: option: add Quectel RM500U-CN modem (git-fixes).
- USB: serial: option: add Telit FE990 compositions (git-fixes).
- USB: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).
- amdgpu: disable powerpc support for the newer display engine (bsc#1194869).
- arm64: dts: imx8mm-evk: correct pmic clock source (git-fixes).
- arm64: dts: meson-g12-common: specify full DMC range (git-fixes).
- arm64: dts: qcom: ipq8074-hk01: enable QMP device, not the PHY node (git-fixes).
- arm64: dts: qcom: ipq8074: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: msm8994-kitakami: drop unit address from PMI8994 regulator (git-fixes).
- arm64: dts: qcom: msm8994-msft-lumia-octagon: drop unit address from PMI8994 regulator (git-fixes).
- arm64: dts: qcom: msm8996: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: msm8998: Fix stm-stimulus-base reg name (git-fixes).
- arm64: dts: qcom: msm8998: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: sc7180-trogdor-lazor: correct trackpad supply (git-fixes).
- arm64: dts: qcom: sdm845: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: sm8250: Fix the PCI I/O port range (git-fixes).
- arm64: dts: renesas: r8a774c0: Remove bogus voltages from OPP table (git-fixes).
- arm64: dts: renesas: r8a77990: Remove bogus voltages from OPP table (git-fixes).
- arm64: dts: ti: k3-j721e-main: Remove ti,strobe-sel property (git-fixes).
- arm64: enable jump-label jump-label was disabled on arm64 by a backport error.
- bluetooth: Perform careful capability checks in hci_sock_ioctl() (git-fixes).
- cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach() (bsc#1210827).
- cifs: fix negotiate context parsing (bsc#1210301).
- clk: add missing of_node_put() in 'assigned-clocks' property parsing (git-fixes).
- clk: at91: clk-sam9x60-pll: fix return value check (git-fixes).
- clk: rockchip: rk3399: allow clk_cifout to force clk_cifout_src to reparent (git-fixes).
- clk: sprd: set max_register according to mapping range (git-fixes).
- clocksource/drivers/davinci: Fix memory leak in davinci_timer_register when init fails (git-fixes).
- config: arm64: enable ERRATUM_843419 Config option was incorrectly replaced by the rt-refresh-configs script
- cpufreq: CPPC: Fix build error without CONFIG_ACPI_CPPC_CPUFREQ_FIE (bsc#1210953).
- cpufreq: CPPC: Fix performance/frequency conversion (git-fixes).
- cpumask: fix incorrect cpumask scanning result checks (bsc#1210943).
- crypto: caam - Clear some memory in instantiate_rng (git-fixes).
- crypto: drbg - Only fail when jent is unavailable in FIPS mode (git-fixes).
- crypto: sa2ul - Select CRYPTO_DES (git-fixes).
- crypto: safexcel - Cleanup ring IRQ workqueues on load failure (git-fixes).
- driver core: Do not require dynamic_debug for initcall_debug probe timing (git-fixes).
- drivers: staging: rtl8723bs: Fix locking in _rtw_join_timeout_handler() (git-fixes).
- drivers: staging: rtl8723bs: Fix locking in rtw_scan_timeout_handler() (git-fixes).
- drm/amd/display/dc/dce60/Makefile: Fix previous attempt to silence known override-init warnings (git-fixes).
- drm/amd/display: Fix potential null dereference (git-fixes).
- drm/amdgpu: Re-enable DCN for 64-bit powerpc (bsc#1194869).
- drm/armada: Fix a potential double free in an error handling path (git-fixes).
- drm/bridge: adv7533: Fix adv7533_mode_valid for adv7533 and adv7535 (git-fixes).
- drm/bridge: lt8912b: Fix DSI Video Mode (git-fixes).
- drm/bridge: lt9611: Fix PLL being unable to lock (git-fixes).
- drm/fb-helper: set x/yres_virtual in drm_fb_helper_check_var (git-fixes).
- drm/i915/dsi: fix DSS CTL register offsets for TGL+ (git-fixes).
- drm/i915: Fix fast wake AUX sync len (git-fixes).
- drm/i915: Make intel_get_crtc_new_encoder() less oopsy (git-fixes).
- drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (git-fixes).
- drm/lima/lima_drv: Add missing unwind goto in lima_pdev_probe() (git-fixes).
- drm/msm/adreno: drop bogus pm_runtime_set_active() (git-fixes).
- drm/msm/disp/dpu: check for crtc enable rather than crtc active to release shared resources (git-fixes).
- drm/msm: fix NULL-deref on snapshot tear down (git-fixes).
- drm/nouveau/disp: Support more modes by checking with lower bpc (git-fixes).
- drm/panel: otm8009a: Set backlight parent to panel device (git-fixes).
- drm/probe-helper: Cancel previous job before starting new one (git-fixes).
- drm/rockchip: Drop unbalanced obj unref (git-fixes).
- drm/vgem: add missing mutex_destroy (git-fixes).
- drm: msm: adreno: Disable preemption on Adreno 510 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Book X90F (git-fixes).
- drm: rcar-du: Fix a NULL vs IS_ERR() bug (git-fixes).
- dt-bindings: arm: fsl: Fix copy-paste error in comment (git-fixes).
- dt-bindings: iio: ti,tmp117: fix documentation link (git-fixes).
- dt-bindings: mailbox: qcom,apcs-kpss-global: fix SDX55 'if' match (git-fixes).
- dt-bindings: nvmem: qcom,spmi-sdam: fix example 'reg' property (git-fixes).
- dt-bindings: remoteproc: stm32-rproc: Typo fix (git-fixes).
- dt-bindings: soc: qcom: smd-rpm: re-add missing qcom,rpm-msm8994 (git-fixes).
- e1000e: Disable TSO on i219-LM card to increase speed (git-fixes).
- efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L (git-fixes).
- ext4: Fix deadlock during directory rename (bsc#1210763).
- ext4: Fix possible corruption when moving a directory (bsc#1210763).
- ext4: fix RENAME_WHITEOUT handling for inline directories (bsc#1210766).
- ext4: fix another off-by-one fsmap error on 1k block filesystems (bsc#1210767).
- ext4: fix bad checksum after online resize (bsc#1210762 bsc#1208076).
- ext4: fix cgroup writeback accounting with fs-layer encryption (bsc#1210765).
- ext4: fix corruption when online resizing a 1K bigalloc fs (bsc#1206891).
- ext4: fix incorrect options show of original mount_opt and extend mount_opt2 (bsc#1210764).
- ext4: fix possible double unlock when moving a directory (bsc#1210763).
- ext4: use ext4_journal_start/stop for fast commit transactions (bsc#1210793).
- fbmem: Reject FB_ACTIVATE_KD_TEXT from userspace (git-fixes).
- firmware: qcom_scm: Clear download bit during reboot (git-fixes).
- firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe (git-fixes).
- fpga: bridge: fix kernel-doc parameter description (git-fixes).
- hwmon: (adt7475) Use device_property APIs when configuring polarity (git-fixes).
- hwmon: (k10temp) Check range scale when CUR_TEMP register is read-write (git-fixes).
- hwmon: (pmbus/fsp-3y) Fix functionality bitmask in FSP-3Y YM-2151E (git-fixes).
- i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path (git-fixes).
- i2c: hisi: Avoid redundant interrupts (git-fixes).
- i2c: imx-lpi2c: clean rx/tx buffers upon new message (git-fixes).
- i2c: ocores: generate stop condition after timeout in polling mode (git-fixes).
- i915/perf: Replace DRM_DEBUG with driver specific drm_dbg call (git-fixes).
- ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (bsc#1210158).
- iio: adc: at91-sama5d2_adc: fix an error code in at91_adc_allocate_trigger() (git-fixes).
- iio: light: tsl2772: fix reading proximity-diodes from device tree (git-fixes).
- ipmi: fix SSIF not responding under certain cond (git-fixes).
- ipmi:ssif: Add send_retries increment (git-fixes).
- k-m-s: Drop Linux 2.6 support
- kABI: PCI: loongson: Prevent LS7A MRRS increases (kabi).
- kABI: x86/msi: Fix msi message data shadow struct (kabi).
- kabi/severities: ignore KABI for NVMe target (bsc#1174777) The target code is only for testing and there are no external users.
- keys: Fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
- locking/rwbase: Mitigate indefinite writer starvation.
- media: av7110: prevent underflow in write_ts_to_decoder() (git-fixes).
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (git-fixes).
- media: max9286: Free control handler (git-fixes).
- media: rc: gpio-ir-recv: Fix support for wake-up (git-fixes).
- media: rkvdec: fix use after free bug in rkvdec_remove (git-fixes).
- media: saa7134: fix use after free bug in saa7134_finidev due to race condition (git-fixes).
- media: venus: dec: Fix handling of the start cmd (git-fixes).
- memstick: fix memory leak if card device is never registered (git-fixes).
- mm/filemap: fix page end in filemap_get_read_batch (bsc#1210768).
- mm: page_alloc: skip regions with hugetlbfs pages when allocating 1G pages (bsc#1210034).
- mm: take a page reference when removing device exclusive entries (bsc#1211025).
- mmc: sdhci-of-esdhc: fix quirk to ignore command inhibit for data (git-fixes).
- mmc: sdhci_am654: Set HIGH_SPEED_ENA for SDR12 and SDR25 (git-fixes).
- mtd: core: fix error path for nvmem provider (git-fixes).
- mtd: core: fix nvmem error reporting (git-fixes).
- mtd: core: provide unique name for nvmem device, take two (git-fixes).
- mtd: spi-nor: Fix a trivial typo (git-fixes).
- net: phy: nxp-c45-tja11xx: add remove callback (git-fixes).
- net: phy: nxp-c45-tja11xx: fix unsigned long multiplication overflow (git-fixes).
- nfsd: call op_release, even when op_func returns an error (git-fixes).
- nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() (git-fixes).
- nilfs2: initialize unused bytes in segment summary blocks (git-fixes).
- nvme initialize core quirks before calling nvme_init_subsystem (git-fixes).
- nvme-auth: uninitialized variable in nvme_auth_transform_key() (git-fixes).
- nvme-fcloop: fix 'inconsistent {IN-HARDIRQ-W} -&gt; {HARDIRQ-ON-W} usage' (git-fixes).
- nvme-hwmon: consistently ignore errors from nvme_hwmon_init (git-fixes).
- nvme-hwmon: kmalloc the NVME SMART log buffer (git-fixes).
- nvme-multipath: fix possible hang in live ns resize with ANA access (git-fixes).
- nvme-pci: fix doorbell buffer value endianness (git-fixes).
- nvme-pci: fix mempool alloc size (git-fixes).
- nvme-pci: fix page size checks (git-fixes).
- nvme-pci: fix timeout request state check (git-fixes).
- nvme-rdma: fix possible hang caused during ctrl deletion (git-fixes).
- nvme-tcp: fix possible circular locking when deleting a controller under memory pressure (git-fixes).
- nvme-tcp: fix possible hang caused during ctrl deletion (git-fixes).
- nvme-tcp: fix regression that causes sporadic requests to time out (git-fixes).
- nvme: Fix IOC_PR_CLEAR and IOC_PR_RELEASE ioctls for nvme devices (git-fixes).
- nvme: add device name to warning in uuid_show() (git-fixes).
- nvme: catch -ENODEV from nvme_revalidate_zones again (git-fixes).
- nvme: copy firmware_rev on each init (git-fixes).
- nvme: define compat_ioctl again to unbreak 32-bit userspace (git-fixes).
- nvme: fix async event trace event (git-fixes).
- nvme: fix handling single range discard request (git-fixes).
- nvme: fix per-namespace chardev deletion (git-fixes).
- nvme: fix the NVME_CMD_EFFECTS_CSE_MASK definition (git-fixes).
- nvme: fix the read-only state for zoned namespaces with unsupposed features (git-fixes).
- nvme: improve the NVME_CONNECT_AUTHREQ* definitions (git-fixes).
- nvme: move nvme_multi_css into nvme.h (git-fixes).
- nvme: return err on nvme_init_non_mdts_limits fail (git-fixes).
- nvme: send Identify with CNS 06h only to I/O controllers (bsc#1209693).
- nvme: set dma alignment to dword (git-fixes).
- nvme: use command_id instead of req-&gt;tag in trace_nvme_complete_rq() (git-fixes).
- nvmet-auth: do not try to cancel a non-initialized work_struct (git-fixes).
- nvmet-tcp: fix incomplete data digest send (git-fixes).
- nvmet-tcp: fix regression in data_digest calculation (git-fixes).
- nvmet: add helpers to set the result field for connect commands (git-fixes).
- nvmet: avoid potential UAF in nvmet_req_complete() (git-fixes).
- nvmet: do not defer passthrough commands with trivial effects to the workqueue (git-fixes).
- nvmet: fix I/O Command Set specific Identify Controller (git-fixes).
- nvmet: fix Identify Active Namespace ID list handling (git-fixes).
- nvmet: fix Identify Controller handling (git-fixes).
- nvmet: fix Identify Namespace handling (git-fixes).
- nvmet: fix a memory leak (git-fixes).
- nvmet: fix a memory leak in nvmet_auth_set_key (git-fixes).
- nvmet: fix a use-after-free (git-fixes).
- nvmet: fix invalid memory reference in nvmet_subsys_attr_qid_max_show (git-fixes).
- nvmet: force reconnect when number of queue changes (git-fixes).
- nvmet: looks at the passthrough controller when initializing CAP (git-fixes).
- nvmet: only allocate a single slab for bvecs (git-fixes).
- nvmet: use IOCB_NOWAIT only if the filesystem supports it (git-fixes).
- perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output (git fixes).
- perf/core: Fix the same task check in perf_event_set_output (git fixes).
- perf: Fix check before add_event_to_groups() in perf_group_detach() (git fixes).
- perf: fix perf_event_context-&gt;time (git fixes).
- platform/x86 (gigabyte-wmi): Add support for A320M-S2H V2 (git-fixes).
- platform/x86: gigabyte-wmi: add support for X570S AORUS ELITE (git-fixes).
- power: supply: cros_usbpd: reclassify 'default case!' as debug (git-fixes).
- power: supply: generic-adc-battery: fix unit scaling (git-fixes).
- powerpc/64: Always build with 128-bit long double (bsc#1194869).
- powerpc/64e: Fix amdgpu build on Book3E w/o AltiVec (bsc#1194869).
- powerpc/hv-gpci: Fix hv_gpci event list (git fixes).
- powerpc/papr_scm: Update the NUMA distance table for the target node (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
- powerpc/perf/hv-24x7: add missing RTAS retry status handling (git fixes).
- powerpc/pseries: Consolidate different NUMA distance update code paths (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
- powerpc: declare unmodified attribute_group usages const (git-fixes).
- regulator: core: Avoid lockdep reports when resolving supplies (git-fixes).
- regulator: core: Consistently set mutex_owner when using ww_mutex_lock_slow() (git-fixes).
- regulator: core: Shorten off-on-delay-us for always-on/boot-on by time since booted (git-fixes).
- regulator: fan53555: Explicitly include bits header (git-fixes).
- regulator: fan53555: Fix wrong TCS_SLEW_MASK (git-fixes).
- regulator: stm32-pwr: fix of_iomap leak (git-fixes).
- remoteproc: Harden rproc_handle_vdev() against integer overflow (git-fixes).
- remoteproc: imx_rproc: Call of_node_put() on iteration error (git-fixes).
- remoteproc: st: Call of_node_put() on iteration error (git-fixes).
- remoteproc: stm32: Call of_node_put() on iteration error (git-fixes).
- rtc: meson-vrtc: Use ktime_get_real_ts64() to get the current time (git-fixes).
- rtc: omap: include header for omap_rtc_power_off_program prototype (git-fixes).
- sched/fair: Fix imbalance overflow (bsc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Limit sched slice duration (bsc#1189999 (Scheduler functional and performance backports)).
- sched/fair: Move calculate of avg_load to a better location (bsc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Sanitize vruntime of entity being migrated (bsc#1203325).
- sched/fair: sanitize vruntime of entity being placed (bsc#1203325).
- sched/numa: Stop an exhastive search if an idle core is found (bsc#1189999 (Scheduler functional and performance backports)).
- sched_getaffinity: do not assume 'cpumask_size()' is fully initialized (bsc#1155798 (CPU scheduler functional and performance backports)).
- scsi: aic94xx: Add missing check for dma_map_single() (git-fixes).
- scsi: core: Add BLIST_NO_VPD_SIZE for some VDASD (git-fixes bsc#1203039) (renamed now that it's upstgream)
- scsi: core: Add BLIST_SKIP_VPD_PAGES for SKhynix H28U74301AMR (git-fixes).
- scsi: core: Fix a procfs host directory removal regression (git-fixes).
- scsi: core: Fix a source code comment (git-fixes).
- scsi: core: Remove the /proc/scsi/${proc_name} directory earlier (git-fixes).
- scsi: hisi_sas: Check devm_add_action() return value (git-fixes).
- scsi: hisi_sas: Set a port invalid only if there are no devices attached when refreshing port id (git-fixes).
- scsi: ipr: Work around fortify-string warning (git-fixes).
- scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() (git-fixes).
- scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (git-fixes).
- scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress (git-fixes).
- scsi: kABI workaround for fc_host_fpin_rcv (git-fixes).
- scsi: libsas: Remove useless dev_list delete in sas_ex_discover_end_dev() (git-fixes).
- scsi: lpfc: Avoid usage of list iterator variable after loop (git-fixes).
- scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read() (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.11 patches (bsc#1210943).
- scsi: lpfc: Correct used_rpi count when devloss tmo fires with no recovery (bsc#1210943).
- scsi: lpfc: Defer issuing new PLOGI if received RSCN before completing REG_LOGIN (bsc#1210943).
- scsi: lpfc: Drop redundant pci_enable_pcie_error_reporting() (bsc#1210943).
- scsi: lpfc: Fix double word in comments (bsc#1210943).
- scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() (bsc#1210943).
- scsi: lpfc: Fix lockdep warning for rx_monitor lock when unloading driver (bsc#1210943).
- scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow (bsc#1210943).
- scsi: lpfc: Record LOGO state with discovery engine even if aborted (bsc#1210943).
- scsi: lpfc: Reorder freeing of various DMA buffers and their list removal (bsc#1210943).
- scsi: lpfc: Revise lpfc_error_lost_link() reason code evaluation logic (bsc#1210943).
- scsi: lpfc: Silence an incorrect device output (bsc#1210943).
- scsi: lpfc: Skip waiting for register ready bits when in unrecoverable state (bsc#1210943).
- scsi: lpfc: Update lpfc version to 14.2.0.11 (bsc#1210943).
- scsi: megaraid_sas: Fix crash after a double completion (git-fixes).
- scsi: megaraid_sas: Update max supported LD IDs to 240 (git-fixes).
- scsi: mpt3sas: Do not print sense pool info twice (git-fixes).
- scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() (git-fixes).
- scsi: mpt3sas: Fix a memory leak (git-fixes).
- scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() (git-fixes).
- scsi: qla2xxx: Perform lockless command completion in abort path (git-fixes).
- scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate() (git-fixes).
- scsi: scsi_transport_fc: Add an additional flag to fc_host_fpin_rcv() (bsc#1210943).
- scsi: sd: Fix wrong zone_write_granularity value during revalidate (git-fixes).
- scsi: ses: Do not attach if enclosure has no components (git-fixes).
- scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses (git-fixes).
- scsi: ses: Fix possible desc_ptr out-of-bounds accesses (git-fixes).
- scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() (git-fixes).
- scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() (git-fixes).
- scsi: snic: Fix memory leak with using debugfs_lookup() (git-fixes).
- seccomp: Move copy_seccomp() to no failure path (bsc#1210817).
- selftests/kselftest/runner/run_one(): allow running non-executable files (git-fixes).
- selftests: sigaltstack: fix -Wuninitialized (git-fixes).
- selinux: ensure av_permissions.h is built when needed (git-fixes).
- selinux: fix Makefile dependencies of flask.h (git-fixes).
- serial: 8250: Add missing wakeup event reporting (git-fixes).
- serial: 8250_bcm7271: Fix arbitration handling (git-fixes).
- serial: 8250_exar: derive nr_ports from PCI ID for Acces I/O cards (git-fixes).
- serial: exar: Add support for Sealevel 7xxxC serial cards (git-fixes).
- signal handling: do not use BUG_ON() for debugging (bsc#1210439).
- signal: Add SA_IMMUTABLE to ensure forced siganls do not get changed (bsc#1210816).
- signal: Do not always set SA_IMMUTABLE for forced signals (bsc#1210816).
- signal: HANDLER_EXIT should clear SIGNAL_UNKILLABLE (bsc#1210816).
- soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe (git-fixes).
- spi: cadence-quadspi: fix suspend-resume implementations (git-fixes).
- spi: fsl-spi: Fix CPM/QE mode Litte Endian (git-fixes).
- spi: qup: Do not skip cleanup in remove's error path (git-fixes).
- staging: iio: resolver: ads1210: fix config mode (git-fixes).
- staging: rtl8192e: Fix W_DISABLE# does not work after stop/start (git-fixes).
- stat: fix inconsistency between struct stat and struct compat_stat (git-fixes).
- sunrpc: only free unix grouplist after RCU settles (git-fixes).
- supported.conf: declaring usb_f_ncm supported as requested in (jsc#PED-3750) Support for the legacy functionality g_ncm is still under discussion (see jsc-PED#3200) For maintainance see (jsc#PED-3759)
- supported.conf: support u_ether and libcomposite (jsc-PED#3750) This is necessary for g_ncm (for maintainance see jsc-PED#3759)
- tty: Prevent writing chars during tcsetattr TCSADRAIN/FLUSH (git-fixes).
- tty: serial: fsl_lpuart: adjust buffer length to the intended size (git-fixes).
- udf: Check consistency of Space Bitmap Descriptor (bsc#1210771).
- udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (bsc#1206649).
- udf: Support splicing to file (bsc#1210770).
- usb: chipidea: fix missing goto in `ci_hdrc_probe` (git-fixes).
- usb: chipidea: imx: avoid unnecessary probe defer (git-fixes).
- usb: dwc3: gadget: Change condition for processing suspend event (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-S (git-fixes).
- usb: gadget: tegra-xudc: Fix crash in vbus_draw (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition (git-fixes).
- usb: host: xhci-rcar: remove leftover quirk handling (git-fixes).
- virt/coco/sev-guest: Add throttling awareness (bsc#1209927).
- virt/coco/sev-guest: Carve out the request issuing logic into a helper (bsc#1209927).
- virt/coco/sev-guest: Check SEV_SNP attribute at probe time (bsc#1209927).
- virt/coco/sev-guest: Convert the sw_exit_info_2 checking to a switch-case (bsc#1209927).
- virt/coco/sev-guest: Do some code style cleanups (bsc#1209927).
- virt/coco/sev-guest: Remove the disable_vmpck label in handle_guest_request() (bsc#1209927).
- virt/coco/sev-guest: Simplify extended guest request handling (bsc#1209927).
- virt/sev-guest: Return -EIO if certificate buffer is not large enough (bsc#1209927).
- virtio_ring: do not update event idx on get_buf (git-fixes).
- vmci_host: fix a race condition in vmci_host_poll() causing GPF (git-fixes).
- vmxnet3: use gro callback when UPT is enabled (bsc#1209739).
- wifi: ath5k: fix an off by one check in ath5k_eeprom_read_freq_list() (git-fixes).
- wifi: ath6kl: minor fix for allocation size (git-fixes).
- wifi: ath6kl: reduce WARN to dev_dbg() in callback (git-fixes).
- wifi: ath9k: hif_usb: fix memory leak of remain_skbs (git-fixes).
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (git-fixes).
- wifi: brcmfmac: support CQM RSSI notification with older firmware (git-fixes).
- wifi: iwlwifi: debug: fix crash in __iwl_err() (git-fixes).
- wifi: iwlwifi: fix duplicate entry in iwl_dev_info_table (git-fixes).
- wifi: iwlwifi: fw: fix memory leak in debugfs (git-fixes).
- wifi: iwlwifi: fw: move memset before early return (git-fixes).
- wifi: iwlwifi: make the loop for card preparation effective (git-fixes).
- wifi: iwlwifi: mvm: check firmware response size (git-fixes).
- wifi: iwlwifi: mvm: do not set CHECKSUM_COMPLETE for unsupported protocols (git-fixes).
- wifi: iwlwifi: mvm: fix mvmtxq-&gt;stopped handling (git-fixes).
- wifi: iwlwifi: mvm: initialize seq variable (git-fixes).
- wifi: iwlwifi: trans: do not trigger d3 interrupt twice (git-fixes).
- wifi: iwlwifi: yoyo: Fix possible division by zero (git-fixes).
- wifi: iwlwifi: yoyo: skip dump correctly on hw error (git-fixes).
- wifi: mac80211: adjust scan cancel comment/check (git-fixes).
- wifi: mt76: add missing locking to protect against concurrent rx/status calls (git-fixes).
- wifi: mt76: fix 6GHz high channel not be scanned (git-fixes).
- wifi: mt76: handle failure of vzalloc in mt7615_coredump_work (git-fixes).
- wifi: mwifiex: mark OF related data as maybe unused (git-fixes).
- wifi: rt2x00: Fix memory leak when handling surveys (git-fixes).
- wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_reg() (git-fixes).
- wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_rfreg() (git-fixes).
- wifi: rtw88: mac: Return the original error from rtw_mac_power_switch() (git-fixes).
- wifi: rtw88: mac: Return the original error from rtw_pwr_seq_parser() (git-fixes).
- wifi: rtw89: fix potential race condition between napi_init and napi_enable (git-fixes).
- writeback, cgroup: fix null-ptr-deref write in bdi_split_work_to_wbs (bsc#1210769).
- x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails (git-fixes).
- x86/PCI: Add quirk for AMD XHCI controller that loses MSI-X state in D3hot (git-fixes).
- x86/bug: Prevent shadowing in __WARN_FLAGS (git-fixes).
- x86/bugs: Enable STIBP for IBPB mitigated RETBleed (git-fixes).
- x86/entry: Avoid very early RET (git-fixes).
- x86/entry: Do not call error_entry() for XENPV (git-fixes).
- x86/entry: Move CLD to the start of the idtentry macro (git-fixes).
- x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (git-fixes).
- x86/entry: Switch the stack after error_entry() returns (git-fixes).
- x86/fpu: Prevent FPU state corruption (git-fixes).
- x86/kvm: Preserve BSP MSR_KVM_POLL_CONTROL across suspend/resume (git-fixes).
- x86/msi: Fix msi message data shadow struct (git-fixes).
- x86/pci/xen: Disable PCI/MSI masking for XEN_HVM guests (git-fixes).
- x86/traps: Use pt_regs directly in fixup_bad_iret() (git-fixes).
- x86/tsx: Disable TSX development mode at boot (git-fixes).
- x86: __memcpy_flushcache: fix wrong alignment if size &gt; 2^32 (git-fixes).
- xhci: fix debugfs register accesses while suspended (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2023-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1142685">SUSE bug 1142685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189999">SUSE bug 1189999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203039">SUSE bug 1203039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203325">SUSE bug 1203325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206649">SUSE bug 1206649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206891">SUSE bug 1206891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206992">SUSE bug 1206992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207088">SUSE bug 1207088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208076">SUSE bug 1208076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208845">SUSE bug 1208845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209615">SUSE bug 1209615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209693">SUSE bug 1209693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209739">SUSE bug 1209739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209871">SUSE bug 1209871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209927">SUSE bug 1209927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209999">SUSE bug 1209999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210034">SUSE bug 1210034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210158">SUSE bug 1210158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210202">SUSE bug 1210202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210206">SUSE bug 1210206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210301">SUSE bug 1210301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210329">SUSE bug 1210329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210336">SUSE bug 1210336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210337">SUSE bug 1210337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210439">SUSE bug 1210439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210453">SUSE bug 1210453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210454">SUSE bug 1210454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210469">SUSE bug 1210469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210506">SUSE bug 1210506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210629">SUSE bug 1210629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210725">SUSE bug 1210725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210762">SUSE bug 1210762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210763">SUSE bug 1210763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210764">SUSE bug 1210764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210765">SUSE bug 1210765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210766">SUSE bug 1210766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210767">SUSE bug 1210767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210768">SUSE bug 1210768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210769">SUSE bug 1210769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210770">SUSE bug 1210770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210771">SUSE bug 1210771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210793">SUSE bug 1210793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210816">SUSE bug 1210816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210817">SUSE bug 1210817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210827">SUSE bug 1210827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210943">SUSE bug 1210943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210953">SUSE bug 1210953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210986">SUSE bug 1210986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211025">SUSE bug 1211025</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2196/">CVE-2022-2196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0386/">CVE-2023-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0386">CVE-2023-0386 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1670/">CVE-2023-1670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1855/">CVE-2023-1855 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1989/">CVE-2023-1989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1990/">CVE-2023-1990 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1998/">CVE-2023-1998 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2008/">CVE-2023-2008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2008">CVE-2023-2008 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2019/">CVE-2023-2019 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2019">CVE-2023-2019 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2176/">CVE-2023-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2176">CVE-2023-2176 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2235/">CVE-2023-2235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-23006/">CVE-2023-23006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23006">CVE-2023-23006 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30772/">CVE-2023-30772 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756827" comment="kernel-rt-5.14.21-150400.15.28.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205955" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1174246" ref_url="https://bugzilla.suse.com/1174246" source="BUGZILLA"/>
		<reference ref_id="1196741" ref_url="https://bugzilla.suse.com/1196741" source="BUGZILLA"/>
		<reference ref_id="1205613" ref_url="https://bugzilla.suse.com/1205613" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14560" ref_url="https://www.suse.com/security/cve/CVE-2019-14560/" source="CVE"/>
		<reference ref_id="CVE-2021-38578" ref_url="https://www.suse.com/security/cve/CVE-2021-38578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029445.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2021-38578: Fixed potential underflow in SmmEntryPointwhen computing BufferSize (bsc#1196741).
- CVE-2019-14560: Fixed potential secure boot bypass caused by improper check of GetEfiGlobalVariable2() return value (bsc#1174246).
- revert a patch to fix xen boot problems (bsc#1205613)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2023-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174246">SUSE bug 1174246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196741">SUSE bug 1196741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205613">SUSE bug 1205613</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14560/">CVE-2019-14560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14560">CVE-2019-14560 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-38578/">CVE-2021-38578 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38578">CVE-2021-38578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009757403" comment="qemu-ovmf-x86_64-202202-150400.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757406" comment="qemu-uefi-aarch64-202202-150400.5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205956" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208479" ref_url="https://bugzilla.suse.com/1208479" source="BUGZILLA"/>
		<reference ref_id="1211382" ref_url="https://bugzilla.suse.com/1211382" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33972" ref_url="https://www.suse.com/security/cve/CVE-2022-33972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2243-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029457.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20230512 release. (bsc#1211382).
- New platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL-N          | A0       | 06-be-00/01 |          | 00000010 | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
  | AZB            | A0       | 06-9a-04/40 |          | 00000004 | Intel(R) Atom(R) C1100
  | AZB            | R0       | 06-9a-04/40 |          | 00000004 | Intel(R) Atom(R) C1100
- Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL            | L0       | 06-9a-03/80 | 00000429 | 0000042a | Core Gen12
  | ADL            | L0       | 06-9a-04/80 | 00000429 | 0000042a | Core Gen12
  | AML-Y22        | H0       | 06-8e-09/10 |          | 000000f2 | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CFL-H          | R0       | 06-9e-0d/22 | 000000f4 | 000000f8 | Core Gen9 Mobile
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000f0 | 000000f2 | Core Gen9
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000f0 | 000000f2 | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000f0 | 000000f2 | Core Gen8
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000f0 | 000000f2 | Core Gen8 Mobile
  | CLX-SP         | B0       | 06-55-06/bf | 04003303 | 04003501 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05003303 | 05003501 | Xeon Scalable Gen2
  | CML-H          | R1       | 06-a5-02/20 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CML-S102       | Q0       | 06-a5-05/22 | 000000f4 | 000000f6 | Core Gen10
  | CML-S62        | G1       | 06-a5-03/22 | 000000f4 | 000000f6 | Core Gen10
  | CML-U62 V1     | A0       | 06-a6-00/80 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CML-U62 V2     | K1       | 06-a6-01/80 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf | 07002503 | 07002601 | Xeon Scalable Gen3
  | ICL-D          | B0       | 06-6c-01/10 | 01000211 | 01000230 | Xeon D-17xx, D-27xx
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000b8 | 000000ba | Core Gen10 Mobile
  | ICX-SP         | D0       | 06-6a-06/87 | 0d000389 | 0d000390 | Xeon Scalable Gen3
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000f0 | 000000f2 | Core Gen7; Xeon E3 v6
  | KBL-U/Y        | H0       | 06-8e-09/c0 |          | 000000f2 | Core Gen7 Mobile
  | LKF            | B2/B3    | 06-8a-01/10 | 00000032 | 00000033 | Core w/Hybrid Technology
  | RKL-S          | B0       | 06-a7-01/02 | 00000057 | 00000058 | Core Gen11
  | RPL-H 6+8      | J0       | 06-ba-02/07 | 0000410e | 00004112 | Core Gen13
  | RPL-P 6+8      | J0       | 06-ba-02/07 | 0000410e | 00004112 | Core Gen13
  | RPL-S          | S0       | 06-b7-01/32 | 00000112 | 00000113 | Core Gen13
  | RPL-U 2+8      | Q0       | 06-ba-03/07 | 0000410e | 00004112 | Core Gen13
  | SKX-D          | H0       | 06-55-04/b7 |          | 02006f05 | Xeon D-21xx
  | SKX-SP         | B1       | 06-55-03/97 | 01000161 | 01000171 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 |          | 02006f05 | Xeon Scalable
  | SPR-HBM        | B3       | 06-8f-08/10 | 2c000170 | 2c0001d1 | Xeon Max
  | SPR-SP         | E0       | 06-8f-04/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E2       | 06-8f-05/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E3       | 06-8f-06/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E4       | 06-8f-07/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E5       | 06-8f-08/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | S2       | 06-8f-07/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | S3       | 06-8f-08/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | TGL            | B1       | 06-8c-01/80 | 000000a6 | 000000aa | Core Gen11 Mobile
  | TGL-H          | R0       | 06-8d-01/c2 | 00000042 | 00000044 | Core Gen11 Mobile
  | TGL-R          | C0       | 06-8c-02/c2 | 00000028 | 0000002a | Core Gen11 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000f4 | 000000f6 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 |          | 000000f2 | Core Gen8 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-18"/>
	<updated date="2023-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208479">SUSE bug 1208479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211382">SUSE bug 1211382</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-33972/">CVE-2022-33972 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33972">CVE-2022-33972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758961" comment="ucode-intel-20230512-150200.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205957" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210298" ref_url="https://bugzilla.suse.com/1210298" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029463.html" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

- Rebuild containerd with a current version of go to catch up on bugfixes and security fixes (bsc#1210298)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-19"/>
	<updated date="2023-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210298">SUSE bug 1210298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757025" comment="containerd-1.6.19-150000.90.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205958" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014929.html" source="SUSE-SU"/>
		<description>

This update of runc fixes the following issues:

- rebuild the package with the go 19.9 secure release (bsc#1200441).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-19"/>
	<updated date="2023-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756802" comment="runc-1.1.5-150000.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205959" version="1" class="patch">
	<metadata>
		<title>Security update for c-ares (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211604" ref_url="https://bugzilla.suse.com/1211604" source="BUGZILLA"/>
		<reference ref_id="1211605" ref_url="https://bugzilla.suse.com/1211605" source="BUGZILLA"/>
		<reference ref_id="1211606" ref_url="https://bugzilla.suse.com/1211606" source="BUGZILLA"/>
		<reference ref_id="1211607" ref_url="https://bugzilla.suse.com/1211607" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<reference ref_id="CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147/" source="CVE"/>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015004.html" source="SUSE-SU"/>
		<description>
This update for c-ares fixes the following issues:

Update to version 1.19.1:

- CVE-2023-32067: 0-byte UDP payload causes Denial of Service (bsc#1211604)
- CVE-2023-31147: Insufficient randomness in generation of DNS query IDs (bsc#1211605)
- CVE-2023-31130: Buffer Underwrite in ares_inet_net_pton() (bsc#1211606)
- CVE-2023-31124: AutoTools does not set CARES_RANDOM_FILE during cross compilation (bsc#1211607)
- Fix uninitialized memory warning in test
- ares_getaddrinfo() should allow a port of 0
- Fix memory leak in ares_send() on error
- Fix comment style in ares_data.h
- Fix typo in ares_init_options.3
- Sync ax_pthread.m4 with upstream
- Sync ax_cxx_compile_stdcxx_11.m4 with upstream to fix uclibc support 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-30"/>
	<updated date="2023-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211604">SUSE bug 1211604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211605">SUSE bug 1211605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211606">SUSE bug 1211606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211607">SUSE bug 1211607</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009762600" comment="libcares2-1.19.1-150000.3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205960" version="1" class="patch">
	<metadata>
		<title>Security update for cni-plugins (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029575.html" source="SUSE-SU"/>
		<description>

This update of cni-plugins fixes the following issues:

- rebuild the package with the go 1.19 security release (bsc#1200441).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-30"/>
	<updated date="2023-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757027" comment="cni-plugins-0.8.6-150100.3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205961" version="1" class="patch">
	<metadata>
		<title>Security update for cni (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029574.html" source="SUSE-SU"/>
		<description>

This update of cni fixes the following issues:

- rebuild the package with the go 1.19 security release (bsc#1200441).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-30"/>
	<updated date="2023-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757026" comment="cni-0.7.1-150100.3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205962" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208226" ref_url="https://bugzilla.suse.com/1208226" source="BUGZILLA"/>
		<reference ref_id="1208227" ref_url="https://bugzilla.suse.com/1208227" source="BUGZILLA"/>
		<reference ref_id="1208228" ref_url="https://bugzilla.suse.com/1208228" source="BUGZILLA"/>
		<reference ref_id="1208229" ref_url="https://bugzilla.suse.com/1208229" source="BUGZILLA"/>
		<reference ref_id="1208230" ref_url="https://bugzilla.suse.com/1208230" source="BUGZILLA"/>
		<reference ref_id="1208231" ref_url="https://bugzilla.suse.com/1208231" source="BUGZILLA"/>
		<reference ref_id="1208232" ref_url="https://bugzilla.suse.com/1208232" source="BUGZILLA"/>
		<reference ref_id="1208233" ref_url="https://bugzilla.suse.com/1208233" source="BUGZILLA"/>
		<reference ref_id="1208234" ref_url="https://bugzilla.suse.com/1208234" source="BUGZILLA"/>
		<reference ref_id="1208236" ref_url="https://bugzilla.suse.com/1208236" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0795" ref_url="https://www.suse.com/security/cve/CVE-2023-0795/" source="CVE"/>
		<reference ref_id="CVE-2023-0796" ref_url="https://www.suse.com/security/cve/CVE-2023-0796/" source="CVE"/>
		<reference ref_id="CVE-2023-0797" ref_url="https://www.suse.com/security/cve/CVE-2023-0797/" source="CVE"/>
		<reference ref_id="CVE-2023-0798" ref_url="https://www.suse.com/security/cve/CVE-2023-0798/" source="CVE"/>
		<reference ref_id="CVE-2023-0799" ref_url="https://www.suse.com/security/cve/CVE-2023-0799/" source="CVE"/>
		<reference ref_id="CVE-2023-0800" ref_url="https://www.suse.com/security/cve/CVE-2023-0800/" source="CVE"/>
		<reference ref_id="CVE-2023-0801" ref_url="https://www.suse.com/security/cve/CVE-2023-0801/" source="CVE"/>
		<reference ref_id="CVE-2023-0802" ref_url="https://www.suse.com/security/cve/CVE-2023-0802/" source="CVE"/>
		<reference ref_id="CVE-2023-0803" ref_url="https://www.suse.com/security/cve/CVE-2023-0803/" source="CVE"/>
		<reference ref_id="CVE-2023-0804" ref_url="https://www.suse.com/security/cve/CVE-2023-0804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Fixed multiple out of bounds read/write security issues:

  CVE-2023-0795 (bsc#1208226), CVE-2023-0796 (bsc#1208227), CVE-2023-0797 (bsc#1208228),
  CVE-2023-0798 (bsc#1208229), CVE-2023-0799 (bsc#1208230), CVE-2023-0800 (bsc#1208231),
  CVE-2023-0801 (bsc#1208232), CVE-2023-0802 (bsc#1208233), CVE-2023-0803 (bsc#1208234),
  CVE-2023-0804 (bsc#1208236).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-31"/>
	<updated date="2023-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208226">SUSE bug 1208226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208227">SUSE bug 1208227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208228">SUSE bug 1208228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208229">SUSE bug 1208229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208230">SUSE bug 1208230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208231">SUSE bug 1208231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208232">SUSE bug 1208232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208233">SUSE bug 1208233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208234">SUSE bug 1208234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208236">SUSE bug 1208236</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0795/">CVE-2023-0795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0795">CVE-2023-0795 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0796/">CVE-2023-0796 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0796">CVE-2023-0796 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0797/">CVE-2023-0797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0797">CVE-2023-0797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0798/">CVE-2023-0798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0798">CVE-2023-0798 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0799/">CVE-2023-0799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0799">CVE-2023-0799 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0800/">CVE-2023-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0800">CVE-2023-0800 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0801/">CVE-2023-0801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0801">CVE-2023-0801 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0802/">CVE-2023-0802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0802">CVE-2023-0802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0803/">CVE-2023-0803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0803">CVE-2023-0803 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0804/">CVE-2023-0804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0804">CVE-2023-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763482" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205963" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211430" ref_url="https://bugzilla.suse.com/1211430" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029660.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-01"/>
	<updated date="2023-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211430">SUSE bug 1211430</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763997" comment="libopenssl-1_1-devel-1.1.1l-150400.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763998" comment="libopenssl1_1-1.1.1l-150400.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763999" comment="libopenssl1_1-hmac-1.1.1l-150400.7.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764000" comment="openssl-1_1-1.1.1l-150400.7.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205964" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211643" ref_url="https://bugzilla.suse.com/1211643" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32324" ref_url="https://www.suse.com/security/cve/CVE-2023-32324/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029664.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2023-32324: Fixed a buffer overflow in format_log_line() which could cause a denial-of-service (bsc#1211643).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-01"/>
	<updated date="2023-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211643">SUSE bug 1211643</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32324/">CVE-2023-32324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32324">CVE-2023-32324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764295" comment="cups-config-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764296" comment="libcups2-2.2.7-150000.3.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205965" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1183247" ref_url="https://bugzilla.suse.com/1183247" source="BUGZILLA"/>
		<reference ref_id="1199583" ref_url="https://bugzilla.suse.com/1199583" source="BUGZILLA"/>
		<reference ref_id="1208567" ref_url="https://bugzilla.suse.com/1208567" source="BUGZILLA"/>
		<reference ref_id="1209861" ref_url="https://bugzilla.suse.com/1209861" source="BUGZILLA"/>
		<reference ref_id="1211390" ref_url="https://bugzilla.suse.com/1211390" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2700" ref_url="https://www.suse.com/security/cve/CVE-2023-2700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2356-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029679.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2023-2700: Fixed a memory leak that could be triggered by
  repeatedly querying an SR-IOV PCI device's capabilities
  (bsc#1211390).

Non-security fixes:

- Fixed a potential crash during driver cleanup (bsc#1209861).
- Added Apparmor support for SUSE edk2 firmware paths (boo#1208567).
- Fixed lxc container initialization with systemd and hybrid groups
  (boo#1183247).
- Added the option to specify the virtual CPU address size in bits for
  qemu (bsc#1199583).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-02"/>
	<updated date="2023-06-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183247">SUSE bug 1183247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199583">SUSE bug 1199583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208567">SUSE bug 1208567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209861">SUSE bug 1209861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211390">SUSE bug 1211390</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2700/">CVE-2023-2700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2700">CVE-2023-2700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764001" comment="libvirt-client-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764002" comment="libvirt-daemon-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764003" comment="libvirt-daemon-driver-interface-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764004" comment="libvirt-daemon-driver-network-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764005" comment="libvirt-daemon-driver-nodedev-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764006" comment="libvirt-daemon-driver-nwfilter-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764007" comment="libvirt-daemon-driver-qemu-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764008" comment="libvirt-daemon-driver-secret-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764009" comment="libvirt-daemon-driver-storage-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764010" comment="libvirt-daemon-driver-storage-core-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764011" comment="libvirt-daemon-driver-storage-disk-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764012" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764013" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764014" comment="libvirt-daemon-driver-storage-logical-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764015" comment="libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763777" comment="libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764016" comment="libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764017" comment="libvirt-daemon-qemu-8.0.0-150400.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764018" comment="libvirt-libs-8.0.0-150400.7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205966" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211795" ref_url="https://bugzilla.suse.com/1211795" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2953" ref_url="https://www.suse.com/security/cve/CVE-2023-2953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015137.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2023-2953: Fixed null pointer deref in ber_memalloc_x (bsc#1211795).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-12"/>
	<updated date="2023-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211795">SUSE bug 1211795</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2953/">CVE-2023-2953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">CVE-2023-2953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763996" comment="libldap-2_4-2-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763721" comment="libldap-data-2.4.46-150200.14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205967" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211894" ref_url="https://bugzilla.suse.com/1211894" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2977" ref_url="https://www.suse.com/security/cve/CVE-2023-2977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029894.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2023-2977: Fixed out of bounds read in pkcs15 cardos_have_verifyrc_package() (bsc#1211894).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-15"/>
	<updated date="2023-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211894">SUSE bug 1211894</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2977/">CVE-2023-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2977">CVE-2023-2977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764912" comment="opensc-0.22.0-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205968" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1203750" ref_url="https://bugzilla.suse.com/1203750" source="BUGZILLA"/>
		<reference ref_id="1211158" ref_url="https://bugzilla.suse.com/1211158" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029893.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2007-4559: Fixed filter for tarfile.extractall (bsc#1203750).

- Fixed unittest.mock.patch.dict returns function when applied to coroutines (bsc#1211158).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-15"/>
	<updated date="2023-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203750">SUSE bug 1203750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211158">SUSE bug 1211158</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764905" comment="libpython3_6m1_0-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764906" comment="python3-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764907" comment="python3-base-3.6.15-150300.10.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205969" version="1" class="patch">
	<metadata>
		<title>Security update for Salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1207071" ref_url="https://bugzilla.suse.com/1207071" source="BUGZILLA"/>
		<reference ref_id="1209233" ref_url="https://bugzilla.suse.com/1209233" source="BUGZILLA"/>
		<reference ref_id="1211612" ref_url="https://bugzilla.suse.com/1211612" source="BUGZILLA"/>
		<reference ref_id="1211754" ref_url="https://bugzilla.suse.com/1211754" source="BUGZILLA"/>
		<reference ref_id="1212516" ref_url="https://bugzilla.suse.com/1212516" source="BUGZILLA"/>
		<reference ref_id="1212517" ref_url="https://bugzilla.suse.com/1212517" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029957.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

salt:

- Update to Salt release version 3006.0 (jsc#PED-4361)
  * See release notes: https://docs.saltproject.io/en/latest/topics/releases/3006.0.html
- Add missing patch after rebase to fix collections Mapping issues
- Add python3-looseversion as new dependency for salt
- Add python3-packaging as new dependency for salt
- Allow entrypoint compatibility for 'importlib-metadata&gt;=5.0.0' (bsc#1207071)
- Avoid conflicts with Salt dependencies versions (bsc#1211612)
- Avoid failures due transactional_update module not available in Salt 3006.0 (bsc#1211754)
- Create new salt-tests subpackage containing Salt tests
- Drop conflictive patch dicarded from upstream
- Fix package build with old setuptools versions
- Fix SLS rendering error when Jinja macros are used
- Fix version detection and avoid building and testing failures
- Prevent deadlocks in salt-ssh executions
- Require python3-jmespath runtime dependency (bsc#1209233)
- Make master_tops compatible with Salt 3000 and older minions (bsc#1212516, bsc#1212517)
    
python-jmespath:
    
- Deliver python3-jmespath to SUSE Linux Enterprise Micro on s390x architecture as it is now required by Salt
  (no source changes)
    
python-ply:
    
- Deliver python3-ply to SUSE Linux Enterprise Micro on s390x architecture as it is a requirement for python-jmespath
  (no source changes)
 		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207071">SUSE bug 1207071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209233">SUSE bug 1209233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211612">SUSE bug 1211612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211754">SUSE bug 1211754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212516">SUSE bug 1212516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212517">SUSE bug 1212517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767684" comment="python3-jmespath-0.9.3-150000.3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767685" comment="python3-ply-3.10-150000.3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768089" comment="python3-salt-3006.0-150400.8.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768086" comment="python3-simplejson-3.17.2-150300.3.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768090" comment="salt-3006.0-150400.8.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768091" comment="salt-minion-3006.0-150400.8.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768092" comment="salt-transactional-update-3006.0-150400.8.34.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205970" version="1" class="patch">
	<metadata>
		<title>Security update for salt and python-pyzmq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1186945" ref_url="https://bugzilla.suse.com/1186945" source="BUGZILLA"/>
		<reference ref_id="1207071" ref_url="https://bugzilla.suse.com/1207071" source="BUGZILLA"/>
		<reference ref_id="1209233" ref_url="https://bugzilla.suse.com/1209233" source="BUGZILLA"/>
		<reference ref_id="1211612" ref_url="https://bugzilla.suse.com/1211612" source="BUGZILLA"/>
		<reference ref_id="1211754" ref_url="https://bugzilla.suse.com/1211754" source="BUGZILLA"/>
		<reference ref_id="1212516" ref_url="https://bugzilla.suse.com/1212516" source="BUGZILLA"/>
		<reference ref_id="1212517" ref_url="https://bugzilla.suse.com/1212517" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034401.html" source="SUSE-SU"/>
		<description>
This update for salt and python-pyzmq fixes the following issues:

salt:

- Update to Salt release version 3006.0 (jsc#PED-4361)
  * See release notes: https://docs.saltproject.io/en/latest/topics/releases/3006.0.html
- Add missing patch after rebase to fix collections Mapping issues
- Add python3-looseversion as new dependency for salt
- Add python3-packaging as new dependency for salt
- Allow entrypoint compatibility for 'importlib-metadata&gt;=5.0.0' (bsc#1207071)
- Avoid conflicts with Salt dependencies versions (bsc#1211612)
- Avoid failures due transactional_update module not available in Salt 3006.0 (bsc#1211754)
- Create new salt-tests subpackage containing Salt tests
- Drop conflictive patch dicarded from upstream
- Fix package build with old setuptools versions
- Fix SLS rendering error when Jinja macros are used
- Fix version detection and avoid building and testing failures
- Prevent deadlocks in salt-ssh executions
- Require python3-jmespath runtime dependency (bsc#1209233)
- Make master_tops compatible with Salt 3000 and older minions (bsc#1212516, bsc#1212517)

python-pyzmq:

- Update python-pyzmq to version 17.1.2 in LTSS products (bsc#1186945)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186945">SUSE bug 1186945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207071">SUSE bug 1207071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209233">SUSE bug 1209233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211612">SUSE bug 1211612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211754">SUSE bug 1211754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212516">SUSE bug 1212516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212517">SUSE bug 1212517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768080" comment="python3-pyzmq-17.1.2-150000.3.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205971" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210695" ref_url="https://bugzilla.suse.com/1210695" source="BUGZILLA"/>
		<reference ref_id="1212143" ref_url="https://bugzilla.suse.com/1212143" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20867" ref_url="https://www.suse.com/security/cve/CVE-2023-20867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029997.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

- CVE-2023-20867: Fixed authentication bypass vulnerability in the vgauth module (bsc#1212143).

Bug fixes:

- Fixed build problem with grpc 1.54 (bsc#1210695).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210695">SUSE bug 1210695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212143">SUSE bug 1212143</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20867/">CVE-2023-20867 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767211" comment="libvmtools0-12.2.0-150300.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767212" comment="open-vm-tools-12.2.0-150300.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205972" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210398" ref_url="https://bugzilla.suse.com/1210398" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27349" ref_url="https://www.suse.com/security/cve/CVE-2023-27349/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2605-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029996.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2023-27349: Fixed crash while handling unsupported events (bsc#1210398).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210398">SUSE bug 1210398</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27349/">CVE-2023-27349 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27349">CVE-2023-27349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767001" comment="libbluetooth3-5.62-150400.4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205973" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212102" ref_url="https://bugzilla.suse.com/1212102" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3138" ref_url="https://www.suse.com/security/cve/CVE-2023-3138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030001.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2023-3138: Fixed buffer overflows in InitExt.c (bsc#1212102).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212102">SUSE bug 1212102</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3138/">CVE-2023-3138 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3138">CVE-2023-3138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768087" comment="libX11-6-1.6.5-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767704" comment="libX11-data-1.6.5-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768088" comment="libX11-xcb1-1.6.5-150000.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205974" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212230" ref_url="https://bugzilla.suse.com/1212230" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34241" ref_url="https://www.suse.com/security/cve/CVE-2023-34241/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2616-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030000.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2023-34241: Fixed a use-after-free problem in cupsdAcceptClient() (bsc#1212230).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212230">SUSE bug 1212230</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34241/">CVE-2023-34241 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34241">CVE-2023-34241 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769278" comment="cups-config-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769279" comment="libcups2-2.2.7-150000.3.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205975" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210996" ref_url="https://bugzilla.suse.com/1210996" source="BUGZILLA"/>
		<reference ref_id="1211256" ref_url="https://bugzilla.suse.com/1211256" source="BUGZILLA"/>
		<reference ref_id="1211257" ref_url="https://bugzilla.suse.com/1211257" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2426" ref_url="https://www.suse.com/security/cve/CVE-2023-2426/" source="CVE"/>
		<reference ref_id="CVE-2023-2609" ref_url="https://www.suse.com/security/cve/CVE-2023-2609/" source="CVE"/>
		<reference ref_id="CVE-2023-2610" ref_url="https://www.suse.com/security/cve/CVE-2023-2610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015866.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2023-2426: Fixed out-of-range pointer offset (bsc#1210996).
- CVE-2023-2609: Fixed NULL pointer dereference (bsc#1211256).
- CVE-2023-2610: Fixed integer overflow or wraparound (bsc#1211257).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-10"/>
	<updated date="2023-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210996">SUSE bug 1210996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211256">SUSE bug 1211256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211257">SUSE bug 1211257</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-2426/">CVE-2023-2426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2426">CVE-2023-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2609/">CVE-2023-2609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2609">CVE-2023-2609 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2610/">CVE-2023-2610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2610">CVE-2023-2610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764656" comment="vim-data-common-9.0.1572-150000.5.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764903" comment="vim-small-9.0.1572-150000.5.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205976" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1201627" ref_url="https://bugzilla.suse.com/1201627" source="BUGZILLA"/>
		<reference ref_id="1207534" ref_url="https://bugzilla.suse.com/1207534" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015323.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption.
  The previous fix for this timing side channel turned out to cause a
  severe 2-3x performance regression in the typical use case (bsc#1207534).

- Update further expiring certificates that affect the testsuite (bsc#1201627).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-27"/>
	<updated date="2023-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201627">SUSE bug 1201627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768420" comment="libopenssl-1_1-devel-1.1.1l-150400.7.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768421" comment="libopenssl1_1-1.1.1l-150400.7.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768422" comment="libopenssl1_1-hmac-1.1.1l-150400.7.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768423" comment="openssl-1_1-1.1.1l-150400.7.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205977" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1195655" ref_url="https://bugzilla.suse.com/1195655" source="BUGZILLA"/>
		<reference ref_id="1195921" ref_url="https://bugzilla.suse.com/1195921" source="BUGZILLA"/>
		<reference ref_id="1203906" ref_url="https://bugzilla.suse.com/1203906" source="BUGZILLA"/>
		<reference ref_id="1205650" ref_url="https://bugzilla.suse.com/1205650" source="BUGZILLA"/>
		<reference ref_id="1205756" ref_url="https://bugzilla.suse.com/1205756" source="BUGZILLA"/>
		<reference ref_id="1205758" ref_url="https://bugzilla.suse.com/1205758" source="BUGZILLA"/>
		<reference ref_id="1205760" ref_url="https://bugzilla.suse.com/1205760" source="BUGZILLA"/>
		<reference ref_id="1205762" ref_url="https://bugzilla.suse.com/1205762" source="BUGZILLA"/>
		<reference ref_id="1205803" ref_url="https://bugzilla.suse.com/1205803" source="BUGZILLA"/>
		<reference ref_id="1206024" ref_url="https://bugzilla.suse.com/1206024" source="BUGZILLA"/>
		<reference ref_id="1206578" ref_url="https://bugzilla.suse.com/1206578" source="BUGZILLA"/>
		<reference ref_id="1207553" ref_url="https://bugzilla.suse.com/1207553" source="BUGZILLA"/>
		<reference ref_id="1208604" ref_url="https://bugzilla.suse.com/1208604" source="BUGZILLA"/>
		<reference ref_id="1208758" ref_url="https://bugzilla.suse.com/1208758" source="BUGZILLA"/>
		<reference ref_id="1209287" ref_url="https://bugzilla.suse.com/1209287" source="BUGZILLA"/>
		<reference ref_id="1209288" ref_url="https://bugzilla.suse.com/1209288" source="BUGZILLA"/>
		<reference ref_id="1209856" ref_url="https://bugzilla.suse.com/1209856" source="BUGZILLA"/>
		<reference ref_id="1209982" ref_url="https://bugzilla.suse.com/1209982" source="BUGZILLA"/>
		<reference ref_id="1210165" ref_url="https://bugzilla.suse.com/1210165" source="BUGZILLA"/>
		<reference ref_id="1210294" ref_url="https://bugzilla.suse.com/1210294" source="BUGZILLA"/>
		<reference ref_id="1210449" ref_url="https://bugzilla.suse.com/1210449" source="BUGZILLA"/>
		<reference ref_id="1210450" ref_url="https://bugzilla.suse.com/1210450" source="BUGZILLA"/>
		<reference ref_id="1210498" ref_url="https://bugzilla.suse.com/1210498" source="BUGZILLA"/>
		<reference ref_id="1210533" ref_url="https://bugzilla.suse.com/1210533" source="BUGZILLA"/>
		<reference ref_id="1210551" ref_url="https://bugzilla.suse.com/1210551" source="BUGZILLA"/>
		<reference ref_id="1210647" ref_url="https://bugzilla.suse.com/1210647" source="BUGZILLA"/>
		<reference ref_id="1210741" ref_url="https://bugzilla.suse.com/1210741" source="BUGZILLA"/>
		<reference ref_id="1210775" ref_url="https://bugzilla.suse.com/1210775" source="BUGZILLA"/>
		<reference ref_id="1210783" ref_url="https://bugzilla.suse.com/1210783" source="BUGZILLA"/>
		<reference ref_id="1210791" ref_url="https://bugzilla.suse.com/1210791" source="BUGZILLA"/>
		<reference ref_id="1210806" ref_url="https://bugzilla.suse.com/1210806" source="BUGZILLA"/>
		<reference ref_id="1210940" ref_url="https://bugzilla.suse.com/1210940" source="BUGZILLA"/>
		<reference ref_id="1210947" ref_url="https://bugzilla.suse.com/1210947" source="BUGZILLA"/>
		<reference ref_id="1211037" ref_url="https://bugzilla.suse.com/1211037" source="BUGZILLA"/>
		<reference ref_id="1211043" ref_url="https://bugzilla.suse.com/1211043" source="BUGZILLA"/>
		<reference ref_id="1211044" ref_url="https://bugzilla.suse.com/1211044" source="BUGZILLA"/>
		<reference ref_id="1211089" ref_url="https://bugzilla.suse.com/1211089" source="BUGZILLA"/>
		<reference ref_id="1211105" ref_url="https://bugzilla.suse.com/1211105" source="BUGZILLA"/>
		<reference ref_id="1211113" ref_url="https://bugzilla.suse.com/1211113" source="BUGZILLA"/>
		<reference ref_id="1211131" ref_url="https://bugzilla.suse.com/1211131" source="BUGZILLA"/>
		<reference ref_id="1211205" ref_url="https://bugzilla.suse.com/1211205" source="BUGZILLA"/>
		<reference ref_id="1211263" ref_url="https://bugzilla.suse.com/1211263" source="BUGZILLA"/>
		<reference ref_id="1211280" ref_url="https://bugzilla.suse.com/1211280" source="BUGZILLA"/>
		<reference ref_id="1211281" ref_url="https://bugzilla.suse.com/1211281" source="BUGZILLA"/>
		<reference ref_id="1211449" ref_url="https://bugzilla.suse.com/1211449" source="BUGZILLA"/>
		<reference ref_id="1211465" ref_url="https://bugzilla.suse.com/1211465" source="BUGZILLA"/>
		<reference ref_id="1211519" ref_url="https://bugzilla.suse.com/1211519" source="BUGZILLA"/>
		<reference ref_id="1211564" ref_url="https://bugzilla.suse.com/1211564" source="BUGZILLA"/>
		<reference ref_id="1211590" ref_url="https://bugzilla.suse.com/1211590" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1211686" ref_url="https://bugzilla.suse.com/1211686" source="BUGZILLA"/>
		<reference ref_id="1211687" ref_url="https://bugzilla.suse.com/1211687" source="BUGZILLA"/>
		<reference ref_id="1211688" ref_url="https://bugzilla.suse.com/1211688" source="BUGZILLA"/>
		<reference ref_id="1211689" ref_url="https://bugzilla.suse.com/1211689" source="BUGZILLA"/>
		<reference ref_id="1211690" ref_url="https://bugzilla.suse.com/1211690" source="BUGZILLA"/>
		<reference ref_id="1211691" ref_url="https://bugzilla.suse.com/1211691" source="BUGZILLA"/>
		<reference ref_id="1211692" ref_url="https://bugzilla.suse.com/1211692" source="BUGZILLA"/>
		<reference ref_id="1211693" ref_url="https://bugzilla.suse.com/1211693" source="BUGZILLA"/>
		<reference ref_id="1211714" ref_url="https://bugzilla.suse.com/1211714" source="BUGZILLA"/>
		<reference ref_id="1211796" ref_url="https://bugzilla.suse.com/1211796" source="BUGZILLA"/>
		<reference ref_id="1211804" ref_url="https://bugzilla.suse.com/1211804" source="BUGZILLA"/>
		<reference ref_id="1211807" ref_url="https://bugzilla.suse.com/1211807" source="BUGZILLA"/>
		<reference ref_id="1211808" ref_url="https://bugzilla.suse.com/1211808" source="BUGZILLA"/>
		<reference ref_id="1211847" ref_url="https://bugzilla.suse.com/1211847" source="BUGZILLA"/>
		<reference ref_id="1211855" ref_url="https://bugzilla.suse.com/1211855" source="BUGZILLA"/>
		<reference ref_id="1211960" ref_url="https://bugzilla.suse.com/1211960" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4269" ref_url="https://www.suse.com/security/cve/CVE-2022-4269/" source="CVE"/>
		<reference ref_id="CVE-2022-45884" ref_url="https://www.suse.com/security/cve/CVE-2022-45884/" source="CVE"/>
		<reference ref_id="CVE-2022-45885" ref_url="https://www.suse.com/security/cve/CVE-2022-45885/" source="CVE"/>
		<reference ref_id="CVE-2022-45886" ref_url="https://www.suse.com/security/cve/CVE-2022-45886/" source="CVE"/>
		<reference ref_id="CVE-2022-45887" ref_url="https://www.suse.com/security/cve/CVE-2022-45887/" source="CVE"/>
		<reference ref_id="CVE-2022-45919" ref_url="https://www.suse.com/security/cve/CVE-2022-45919/" source="CVE"/>
		<reference ref_id="CVE-2023-1079" ref_url="https://www.suse.com/security/cve/CVE-2023-1079/" source="CVE"/>
		<reference ref_id="CVE-2023-1380" ref_url="https://www.suse.com/security/cve/CVE-2023-1380/" source="CVE"/>
		<reference ref_id="CVE-2023-1382" ref_url="https://www.suse.com/security/cve/CVE-2023-1382/" source="CVE"/>
		<reference ref_id="CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002/" source="CVE"/>
		<reference ref_id="CVE-2023-2124" ref_url="https://www.suse.com/security/cve/CVE-2023-2124/" source="CVE"/>
		<reference ref_id="CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156/" source="CVE"/>
		<reference ref_id="CVE-2023-2162" ref_url="https://www.suse.com/security/cve/CVE-2023-2162/" source="CVE"/>
		<reference ref_id="CVE-2023-2269" ref_url="https://www.suse.com/security/cve/CVE-2023-2269/" source="CVE"/>
		<reference ref_id="CVE-2023-2483" ref_url="https://www.suse.com/security/cve/CVE-2023-2483/" source="CVE"/>
		<reference ref_id="CVE-2023-2513" ref_url="https://www.suse.com/security/cve/CVE-2023-2513/" source="CVE"/>
		<reference ref_id="CVE-2023-28410" ref_url="https://www.suse.com/security/cve/CVE-2023-28410/" source="CVE"/>
		<reference ref_id="CVE-2023-3006" ref_url="https://www.suse.com/security/cve/CVE-2023-3006/" source="CVE"/>
		<reference ref_id="CVE-2023-30456" ref_url="https://www.suse.com/security/cve/CVE-2023-30456/" source="CVE"/>
		<reference ref_id="CVE-2023-31084" ref_url="https://www.suse.com/security/cve/CVE-2023-31084/" source="CVE"/>
		<reference ref_id="CVE-2023-31436" ref_url="https://www.suse.com/security/cve/CVE-2023-31436/" source="CVE"/>
		<reference ref_id="CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233/" source="CVE"/>
		<reference ref_id="CVE-2023-33288" ref_url="https://www.suse.com/security/cve/CVE-2023-33288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-28410: Fixed improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers that may have allowed an authenticated user to potentially enable escalation of privilege via local access (bsc#1211263).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-3006: Fixed a known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, for the new hw AmpereOne (bsc#1211855).
- CVE-2023-2269: Fixed a denial-of-service problem due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c (bsc#1210806).
- CVE-2023-1079: Fixed a use-after-free problem that could have been triggered in asus_kbd_backlight_set when plugging/disconnecting a malicious USB device (bsc#1208604).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-33288: Fixed a use-after-free in bq24190_remove in drivers/power/supply/bq24190_charger.c (bsc#1211590).
- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).
- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).
- CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb-core/dvb_frontend.c (bsc#1210783).
- CVE-2023-2002: Fixed a flaw that allowed an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication (bsc#1210533).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
- CVE-2023-30456: Fixed an issue in arch/x86/kvm/vmx/nested.c with nVMX on x86_64 lacks consistency checks for CR0 and CR4 (bsc#1210294).
- CVE-2022-4269: Fixed a flaw was found inside the Traffic Control (TC) subsystem (bsc#1206024).
- CVE-2023-32233: Fixed a use-after-free in Netfilter nf_tables when processing batch requests (bsc#1211043).
- CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287).
- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).
- CVE-2023-2483: Fixed a use after free bug in emac_remove caused by a race condition (bsc#1211037).
- CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).


The following non-security bugs were fixed:

- 3c589_cs: Fix an error handling path in tc589_probe() (git-fixes).
- ACPI: EC: Fix oops when removing custom query handlers (git-fixes).
- ACPI: bus: Ensure that notify handlers are not running after removal (git-fixes).
- ACPI: processor: Fix evaluating _PDC method when running as Xen dom0 (git-fixes).
- ACPI: tables: Add support for NBFT (bsc#1195921).
- ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects (git-fixes).
- ACPICA: Avoid undefined behavior: applying zero offset to null pointer (git-fixes).
- ALSA: caiaq: input: Add error handling for unsupported input methods in `snd_usb_caiaq_input_init` (git-fixes).
- ALSA: cs46xx: mark snd_cs46xx_download_image as static (git-fixes).
- ALSA: firewire-digi00x: prevent potential use after free (git-fixes).
- ALSA: hda/ca0132: add quirk for EVGA X299 DARK (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP EliteDesk 805 (git-fixes).
- ALSA: hda/realtek: Add quirk for 2nd ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UM3402YAR using CS35L41 (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo L140AU (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook G10 laptops (git-fixes).
- ALSA: hda/realtek: Add quirk for ThinkPad P1 Gen 6 (git-fixes).
- ALSA: hda/realtek: Apply HP B&amp;O top speaker profile to Pavilion 15 (git-fixes).
- ALSA: hda/realtek: Enable headset onLenovo M70/M90 (git-fixes).
- ALSA: hda/realtek: Fix mute and micmute LEDs for an HP laptop (git-fixes).
- ALSA: hda/realtek: Fix mute and micmute LEDs for yet another HP laptop (git-fixes).
- ALSA: hda/realtek: support HP Pavilion Aero 13-be0xxx Mute LED (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs a3 through a7 to patch table (git-fixes).
- ALSA: hda: Fix Oops by 9.1 surround channel names (git-fixes).
- ALSA: usb-audio: Add a sample rate workaround for Line6 Pod Go (git-fixes).
- ALSA: usb-audio: Add quirk for Pioneer DDJ-800 (git-fixes).
- ARM64: dts: Add DTS files for bcmbca SoC BCM6858 (git-fixes).
- ARM: 9296/1: HP Jornada 7XX: fix kernel-doc warnings (git-fixes).
- ARM: dts: qcom: ipq8064: Fix the PCI I/O port range (git-fixes).
- ARM: dts: qcom: ipq8064: reduce pci IO size to 64K (git-fixes).
- ASOC: Intel: sof_sdw: add quirk for Intel 'Rooks County' NUC M15 (git-fixes).
- ASoC: Intel: Skylake: Fix declaration of enum skl_ch_cfg (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer Iconia One 7 B1-750 (git-fixes).
- ASoC: fsl_micfil: Fix error handler with pm_runtime_enable (git-fixes).
- ASoC: lpass: Fix for KASAN use_after_free out of bounds (git-fixes).
- ASoC: rt5682: Disable jack detection interrupt during suspend (git-fixes).
- ASoC: soc-pcm: fix hw-&gt;formats cleared by soc_pcm_hw_init() for dpcm (git-fixes).
- Bluetooth: L2CAP: fix 'bad unlock balance' in l2cap_disconnect_rsp (git-fixes).
- Bluetooth: btintel: Add LE States quirk support (git-fixes).
- Bluetooth: hci_bcm: Fall back to getting bdaddr from EFI if not set (git-fixes).
- HID: logitech-hidpp: Do not use the USB serial for USB devices (git-fixes).
- HID: logitech-hidpp: Reconcile USB and Unifying serials (git-fixes).
- HID: microsoft: Add rumble support to latest xbox controllers (bsc#1211280).
- HID: wacom: Add new Intuos Pro Small (PTH-460) device IDs (git-fixes).
- HID: wacom: Force pen out of prox if no events have been received in a while (git-fixes).
- HID: wacom: Set a default resolution for older tablets (git-fixes).
- HID: wacom: add three styli to wacom_intuos_get_tool_type (git-fixes).
- HID: wacom: avoid integer overflow in wacom_intuos_inout() (git-fixes).
- HID: wacom: generic: Set battery quirk only when we see battery data (git-fixes).
- IB/hfi1: Fix SDMA mmu_rb_node not being evicted in LRU order (git-fixes)
- IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests (git-fixes)
- IB/hifi1: add a null check of kzalloc_node in hfi1_ipoib_txreq_init (git-fixes)
- Input: xpad - add constants for GIP interface numbers (git-fixes).
- KEYS: asymmetric: Copy sig and digest in public_key_verify_signature() (git-fixes).
- KVM: Destroy target device if coalesced MMIO unregistration fails (git-fixes)
- KVM: Disallow user memslot with size that exceeds 'unsigned long' (git-fixes)
- KVM: Do not create VM debugfs files outside of the VM directory (git-fixes)
- KVM: Do not set Accessed/Dirty bits for ZERO_PAGE (git-fixes)
- KVM: LAPIC: Enable timer posted-interrupt only when mwait/hlt is advertised (git-fixes).
- KVM: Prevent module exit until all VMs are freed (git-fixes)
- KVM: SVM: Do not rewrite guest ICR on AVIC IPI virtualization failure (git-fixes).
- KVM: SVM: Fix benign 'bool vs. int' comparison in svm_set_cr0() (git-fixes).
- KVM: SVM: Require logical ID to be power-of-2 for AVIC entry (git-fixes).
- KVM: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid (git-fixes).
- KVM: SVM: hyper-v: placate modpost section mismatch error (git-fixes).
- KVM: VMX: Introduce vmx_msr_bitmap_l01_changed() helper (git-fixes).
- KVM: VMX: Resume guest immediately when injecting #GP on ECREATE (git-fixes).
- KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow (git-fixes).
- KVM: VMX: Use is_64_bit_mode() to check 64-bit mode in SGX handler (git-fixes).
- KVM: X86: Fix tlb flush for tdp in kvm_invalidate_pcid() (git-fixes).
- KVM: arm64: Do not arm a hrtimer for an already pending timer (git-fixes)
- KVM: arm64: Do not return from void function (git-fixes)
- KVM: arm64: Fix PAR_TO_HPFAR() to work independently of PA_BITS. (git-fixes)
- KVM: arm64: Fix S1PTW handling on RO memslots (git-fixes)
- KVM: arm64: Fix bad dereference on MTE-enabled systems (git-fixes)
- KVM: arm64: Fix buffer overflow in kvm_arm_set_fw_reg() (git-fixes)
- KVM: arm64: Fix kvm init failure when mode!=vhe and VA_BITS=52. (git-fixes)
- KVM: arm64: Free hypervisor allocations if vector slot init fails (git-fixes)
- KVM: arm64: GICv4.1: Fix race with doorbell on VPE (git-fixes)
- KVM: arm64: Limit length in kvm_vm_ioctl_mte_copy_tags() to INT_MAX (git-fixes)
- KVM: arm64: PMU: Restore the guest's EL0 event counting after (git-fixes)
- KVM: arm64: Reject 32bit user PSTATE on asymmetric systems (git-fixes)
- KVM: arm64: Stop handle_exit() from handling HVC twice when an SError (git-fixes)
- KVM: arm64: Treat PMCR_EL1.LC as RES1 on asymmetric systems (git-fixes)
- KVM: arm64: nvhe: Eliminate kernel-doc warnings (git-fixes)
- KVM: arm64: vgic: Fix exit condition in scan_its_table() (git-fixes)
- KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS (git-fixes).
- KVM: nVMX: Do not use Enlightened MSR Bitmap for L3 (git-fixes).
- KVM: nVMX: Document that ignoring memory failures for VMCLEAR is deliberate (git-fixes).
- KVM: nVMX: Emulate NOPs in L2, and PAUSE if it's not intercepted (git-fixes).
- KVM: nVMX: Inject #GP, not #UD, if 'generic' VMXON CR0/CR4 check fails (git-fixes).
- KVM: nVMX: Prioritize TSS T-flag #DBs over Monitor Trap Flag (git-fixes).
- KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1 (git-fixes).
- KVM: nVMX: Treat General Detect #DB (DR7.GD=1) as fault-like (git-fixes).
- KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER (git-fixes).
- KVM: x86/emulator: Emulate RDPID only if it is enabled in guest (git-fixes).
- KVM: x86/mmu: avoid NULL-pointer dereference on page freeing bugs (git-fixes).
- KVM: x86/pmu: Ignore pmu-&gt;global_ctrl check if vPMU does not support global_ctrl (git-fixes).
- KVM: x86/svm: add __GFP_ACCOUNT to __sev_dbg_{en,de}crypt_user() (git-fixes).
- KVM: x86/vmx: Do not skip segment attributes if unusable bit is set (git-fixes).
- KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page() (git-fixes).
- KVM: x86: Copy filter arg outside kvm_vm_ioctl_set_msr_filter() (git-fixes).
- KVM: x86: Do not change ICR on write to APIC_SELF_IPI (git-fixes).
- KVM: x86: Fail emulation during EMULTYPE_SKIP on any exception (git-fixes).
- KVM: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.8000001FH (git-fixes).
- KVM: x86: Mask off unsupported and unknown bits of IA32_ARCH_CAPABILITIES (git-fixes).
- KVM: x86: Protect the unused bits in MSR exiting flags (git-fixes).
- KVM: x86: Remove a redundant guest cpuid check in kvm_set_cr4() (git-fixes).
- KVM: x86: Report deprecated x87 features in supported CPUID (git-fixes).
- KVM: x86: do not set st-&gt;preempted when going back to user space (git-fixes).
- KVM: x86: fix typo in __try_cmpxchg_user causing non-atomicness (git-fixes).
- KVM: x86: ioapic: Fix level-triggered EOI and userspace I/OAPIC reconfigure race (git-fixes).
- PCI/ASPM: Remove pcie_aspm_pm_state_change() (git-fixes).
- PM: hibernate: Do not get block device exclusively in test_resume mode (git-fixes).
- PM: hibernate: Turn snapshot_test into global variable (git-fixes).
- PM: hibernate: fix load_image_and_restore() error path (git-fixes).
- RDMA/bnxt_re: Fix a possible memory leak (git-fixes)
- RDMA/bnxt_re: Fix return value of bnxt_re_process_raw_qp_pkt_rx (git-fixes)
- RDMA/bnxt_re: Fix the page_size used during the MR creation (git-fixes)
- RDMA/cm: Trace icm_send_rej event before the cm state is reset (git-fixes)
- RDMA/core: Fix multiple -Warray-bounds warnings (git-fixes)
- RDMA/efa: Fix unsupported page sizes in device (git-fixes)
- RDMA/hns: Fix base address table allocation (git-fixes)
- RDMA/hns: Fix timeout attr in query qp for HIP08 (git-fixes)
- RDMA/hns: Modify the value of long message loopback slice (git-fixes)
- RDMA/irdma: Add SW mechanism to generate completions on error (jsc#SLE-18383).
- RDMA/irdma: Do not generate SW completions for NOPs (jsc#SLE-18383).
- RDMA/irdma: Fix Local Invalidate fencing (git-fixes)
- RDMA/irdma: Fix RQ completion opcode (jsc#SLE-18383).
- RDMA/irdma: Fix drain SQ hang with no completion (jsc#SLE-18383).
- RDMA/irdma: Fix inline for multiple SGE's (jsc#SLE-18383).
- RDMA/irdma: Prevent QP use after free (git-fixes)
- RDMA/irdma: Remove enum irdma_status_code (jsc#SLE-18383).
- RDMA/irdma: Remove excess error variables (jsc#SLE-18383).
- RDMA/mana: Remove redefinition of basic u64 type (bsc#1210741 jsc#PED-4022).
- RDMA/mana: hide new rdma_driver_ids (bsc#1210741 jsc#PED-4022).
- RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter (bsc#1210741 jsc#PED-4022).
- RDMA/mana_ib: Prevent array underflow in mana_ib_create_qp_raw() (bsc#1210741 jsc#PED-4022).
- RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() (jsc#SLE-19255).
- RDMA/mlx5: Fix flow counter query via DEVX (git-fixes)
- RDMA/mlx5: Use correct device num_ports when modify DC (git-fixes)
- RDMA/rxe: Remove tasklet call from rxe_cq.c (git-fixes)
- RDMA/siw: Fix potential page_array out of range access (git-fixes)
- RDMA/siw: Remove namespace check from siw_netdev_event() (git-fixes)
- RDMA/srpt: Add a check for valid 'mad_agent' pointer (git-fixes)
- Revert 'KVM: set owner of cpu and vm file operations' (git-fixes)
- SMB3.1.1: add new tree connect ShareFlags (bsc#1193629).
- SMB3: Add missing locks to protect deferred close file list (git-fixes).
- SMB3: Close all deferred handles of inode in case of handle lease break (bsc#1193629).
- SMB3: Close deferred file handles in case of handle lease break (bsc#1193629).
- SMB3: drop reference to cfile before sending oplock break (bsc#1193629).
- SMB3: force unmount was failing to close deferred close files (bsc#1193629).
- SUNRPC: fix breakage caused by introduction of rq_xprt_ctxt (bsc#1210775).
- USB / dwc3: Fix a checkpatch warning in core.c (git-fixes).
- USB: UHCI: adjust zhaoxin UHCI controllers OverCurrent bit value (git-fixes).
- USB: core: Add routines for endpoint checks in old drivers (git-fixes).
- USB: sisusbvga: Add endpoint checks (git-fixes).
- USB: usbtmc: Fix direction for 0-length ioctl control messages (git-fixes).
- apparmor: add a kernel label to use on kernel objects (bsc#1211113).
- arm64: dts: Add DTS files for bcmbca SoC BCM4912 (git-fixes).
- arm64: dts: Add DTS files for bcmbca SoC BCM63158 (git-fixes).
- arm64: dts: Add base DTS file for bcmbca device Asus GT-AX6000 (git-fixes).
- arm64: dts: broadcom: bcm4908: add DT for Netgear RAXE500 (git-fixes).
- arm64: dts: qcom: msm8996: Add missing DWC3 quirks (git-fixes).
- arm64: errata: add detection for AMEVCNTR01 incrementing incorrectly (git-fixes) Enable workaround and fix kABI breakage.
- arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes)
- arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes).
- asm-generic/io.h: suppress endianness warnings for readq() and writeq() (git-fixes).
- ata: libata-scsi: Use correct device no in ata_find_dev() (git-fixes).
- ata: pata_octeon_cf: drop kernel-doc notation (git-fixes).
- block: add a bdev_max_zone_append_sectors helper (git-fixes).
- bluetooth: Add cmd validity checks at the start of hci_sock_ioctl() (git-fixes).
- bnxt: Do not read past the end of test names (jsc#SLE-18978).
- bnxt: prevent skb UAF after handing over to PTP worker (jsc#SLE-18978).
- bnxt_en: Add missing 200G link speed reporting (jsc#SLE-18978).
- bnxt_en: Avoid order-5 memory allocation for TPA data (jsc#SLE-18978).
- bnxt_en: Do not initialize PTP on older P3/P4 chips (jsc#SLE-18978).
- bnxt_en: Fix mqprio and XDP ring checking logic (jsc#SLE-18978).
- bnxt_en: Fix reporting of test result in ethtool selftest (jsc#SLE-18978).
- bnxt_en: Fix typo in PCI id to device description string mapping (jsc#SLE-18978).
- bnxt_en: fix NQ resource accounting during vf creation on 57500 chips (jsc#SLE-18978).
- bnxt_en: set missing reload flag in devlink features (jsc#SLE-18978).
- can: isotp: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes).
- can: j1939: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes).
- can: kvaser_pciefd: Call request_irq() before enabling interrupts (git-fixes).
- can: kvaser_pciefd: Clear listen-only bit if not explicitly requested (git-fixes).
- can: kvaser_pciefd: Disable interrupts in probe error path (git-fixes).
- can: kvaser_pciefd: Do not send EFLUSH command on TFD interrupt (git-fixes).
- can: kvaser_pciefd: Empty SRB buffer in probe (git-fixes).
- can: kvaser_pciefd: Set CAN_STATE_STOPPED in kvaser_pciefd_stop() (git-fixes).
- can: kvaser_usb: Add struct kvaser_usb_busparams (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Get capabilities from device (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Handle CMD_ERROR_EVENT (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Rename {leaf,usbcan}_cmd_error_event to {leaf,usbcan}_cmd_can_error_event (git-fixes).
- can: kvaser_usb_leaf: Fix overread with an invalid command (git-fixes).
- cassini: Fix a memory leak in the error handling path of cas_init_one() (git-fixes).
- ceph: force updating the msg pointer in non-split case (bsc#1211804).
- cgroup.c: add helper __cset_cgroup_from_root to cleanup duplicated codes (bsc#1203906).
- cgroup: Homogenize cgroup_get_from_id() return value (bsc#1205650).
- cgroup: Honor caller's cgroup NS when resolving path (bsc#1205650).
- cgroup: Make cgroup_get_from_id() prettier (bsc#1205650).
- cgroup: Reorganize css_set_lock and kernfs path processing (bsc#1205650).
- cgroup: cgroup: Honor caller's cgroup NS when resolving cgroup  id (bsc#1205650).
- cgroup: reduce dependency on cgroup_mutex (bsc#1205650).
- cifs: Avoid a cast in add_lease_context() (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: avoid dup prefix path in dfs_get_automount_devname() (git-fixes).
- cifs: avoid potential races when handling multiple dfs tcons (bsc#1208758).
- cifs: fix pcchunk length type in smb2_copychunk_range (bsc#1193629).
- cifs: fix potential race when tree connecting ipc (bsc#1208758).
- cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname (bsc#1208758).
- cifs: fix sharing of DFS connections (bsc#1208758).
- cifs: fix smb1 mount regression (bsc#1193629).
- cifs: mapchars mount option ignored (bsc#1193629).
- cifs: missing lock when updating session status (bsc#1193629).
- cifs: print smb3_fs_context::source when mounting (bsc#1193629).
- cifs: protect access of TCP_Server_Info::{origin,leaf}_fullpath (bsc#1208758).
- cifs: protect session status check in smb2_reconnect() (bsc#1208758).
- cifs: release leases for deferred close handles when freezing (bsc#1193629).
- cifs: update internal module version number for cifs.ko (bsc#1193629).
- clk: qcom: gcc-sm8350: fix PCIe PIPE clocks handling (git-fixes).
- clk: qcom: regmap: add PHY clock source implementation (git-fixes).
- clk: tegra20: fix gcc-7 constant overflow warning (git-fixes).
- configfs: fix possible memory leak in configfs_create_dir() (git-fixes).
- crypto: acomp - define max size for destination (jsc#PED-3692)
- crypto: drivers - move from strlcpy with unused retval to (jsc#PED-3692)
- crypto: qat - Fix unsigned function returning negative (jsc#PED-3692)
- crypto: qat - Removes the x86 dependency on the QAT drivers (jsc#PED-3692)
- crypto: qat - abstract PFVF messages with struct pfvf_message (jsc#PED-3692)
- crypto: qat - abstract PFVF receive logic (jsc#PED-3692)
- crypto: qat - abstract PFVF send function (jsc#PED-3692)
- crypto: qat - add PFVF support to enable the reset of ring (jsc#PED-3692)
- crypto: qat - add PFVF support to the GEN4 host driver (jsc#PED-3692)
- crypto: qat - add VF and PF wrappers to common send function (jsc#PED-3692)
- crypto: qat - add backlog mechanism (jsc#PED-3692)
- crypto: qat - add check for invalid PFVF protocol version 0 (jsc#PED-3692)
- crypto: qat - add check to validate firmware images (jsc#PED-3692)
- crypto: qat - add limit to linked list parsing (jsc#PED-3692)
- crypto: qat - add misc workqueue (jsc#PED-3692)
- crypto: qat - add missing restarting event notification in (jsc#PED-3692)
- crypto: qat - add param check for DH (jsc#PED-3692)
- crypto: qat - add param check for RSA (jsc#PED-3692)
- crypto: qat - add pfvf_ops (jsc#PED-3692)
- crypto: qat - add resubmit logic for decompression (jsc#PED-3692)
- crypto: qat - add support for 401xx devices (jsc#PED-3692)
- crypto: qat - add support for compression for 4xxx (jsc#PED-3692)
- crypto: qat - add the adf_get_pmisc_base() helper function (jsc#PED-3692)
- crypto: qat - allow detection of dc capabilities for 4xxx (jsc#PED-3692)
- crypto: qat - change PFVF ACK behaviour (jsc#PED-3692)
- crypto: qat - change behaviour of (jsc#PED-3692)
- crypto: qat - change bufferlist logic interface (jsc#PED-3692)
- crypto: qat - config VFs based on ring-to-svc mapping (jsc#PED-3692)
- crypto: qat - differentiate between pf2vf and vf2pf offset (jsc#PED-3692)
- crypto: qat - disable AER if an error occurs in probe (jsc#PED-3692)
- crypto: qat - do not handle PFVF sources for qat_4xxx (jsc#PED-3692)
- crypto: qat - do not rely on min version (jsc#PED-3692)
- crypto: qat - enable deflate for QAT GEN4 (jsc#PED-3692)
- crypto: qat - enable power management for QAT GEN4 (jsc#PED-3692)
- crypto: qat - exchange device capabilities over PFVF (jsc#PED-3692)
- crypto: qat - exchange ring-to-service mappings over PFVF (jsc#PED-3692)
- crypto: qat - expose deflate through acomp api for QAT GEN2 (jsc#PED-3692)
- crypto: qat - expose device config through sysfs for 4xxx (jsc#PED-3692)
- crypto: qat - expose device state through sysfs for 4xxx (jsc#PED-3692)
- crypto: qat - extend buffer list interface (jsc#PED-3692)
- crypto: qat - extend crypto capability detection for 4xxx (jsc#PED-3692)
- crypto: qat - extract send and wait from (jsc#PED-3692)
- crypto: qat - fix DMA transfer direction (jsc#PED-3692)
- crypto: qat - fix ETR sources enabled by default on GEN2 (jsc#PED-3692)
- crypto: qat - fix VF IDs in PFVF log messages (jsc#PED-3692)
- crypto: qat - fix a signedness bug in get_service_enabled() (jsc#PED-3692)
- crypto: qat - fix a typo in a comment (jsc#PED-3692)
- crypto: qat - fix access to PFVF interrupt registers for GEN4 (jsc#PED-3692)
- crypto: qat - fix definition of ring reset results (jsc#PED-3692)
- crypto: qat - fix error return code in adf_probe (jsc#PED-3692)
- crypto: qat - fix handling of VF to PF interrupts (jsc#PED-3692)
- crypto: qat - fix initialization of pfvf cap_msg structures (jsc#PED-3692)
- crypto: qat - fix initialization of pfvf rts_map_msg (jsc#PED-3692)
- crypto: qat - fix off-by-one error in PFVF debug print (jsc#PED-3692)
- crypto: qat - fix wording and formatting in code comment (jsc#PED-3692)
- crypto: qat - flush vf workqueue at driver removal (jsc#PED-3692)
- crypto: qat - free irq in case of failure (jsc#PED-3692)
- crypto: qat - free irqs only if allocated (jsc#PED-3692)
- crypto: qat - generalize crypto request buffers (jsc#PED-3692)
- crypto: qat - get compression extended capabilities (jsc#PED-3692)
- crypto: qat - handle retries due to collisions in (jsc#PED-3692)
- crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag (jsc#PED-3692)
- crypto: qat - improve logging of PFVF messages (jsc#PED-3692)
- crypto: qat - improve the ACK timings in PFVF send (jsc#PED-3692)
- crypto: qat - introduce support for PFVF block messages (jsc#PED-3692)
- crypto: qat - leverage bitfield.h utils for PFVF messages (jsc#PED-3692)
- crypto: qat - leverage read_poll_timeout in PFVF send (jsc#PED-3692)
- crypto: qat - leverage the GEN2 VF mask definiton (jsc#PED-3692)
- crypto: qat - make PFVF message construction direction (jsc#PED-3692)
- crypto: qat - make PFVF send and receive direction agnostic (jsc#PED-3692)
- crypto: qat - move VF message handler to adf_vf2pf_msg.c (jsc#PED-3692)
- crypto: qat - move and rename GEN4 error register definitions (jsc#PED-3692)
- crypto: qat - move interrupt code out of the PFVF handler (jsc#PED-3692)
- crypto: qat - move pfvf collision detection values (jsc#PED-3692)
- crypto: qat - move vf2pf interrupt helpers (jsc#PED-3692)
- crypto: qat - pass the PF2VF responses back to the callers (jsc#PED-3692)
- crypto: qat - prevent spurious MSI interrupt in VF (jsc#PED-3692)
- crypto: qat - re-enable interrupts for legacy PFVF messages (jsc#PED-3692)
- crypto: qat - re-enable registration of algorithms (jsc#PED-3692)
- crypto: qat - refactor PF top half for PFVF (jsc#PED-3692)
- crypto: qat - refactor pfvf version request messages (jsc#PED-3692)
- crypto: qat - refactor submission logic (jsc#PED-3692)
- crypto: qat - relocate PFVF PF related logic (jsc#PED-3692)
- crypto: qat - relocate PFVF VF related logic (jsc#PED-3692)
- crypto: qat - relocate PFVF disabled function (jsc#PED-3692)
- crypto: qat - relocate and rename adf_sriov_prepare_restart() (jsc#PED-3692)
- crypto: qat - relocate backlog related structures (jsc#PED-3692)
- crypto: qat - relocate bufferlist logic (jsc#PED-3692)
- crypto: qat - relocate qat_algs_alloc_flags() (jsc#PED-3692)
- crypto: qat - remove duplicated logic across GEN2 drivers (jsc#PED-3692)
- crypto: qat - remove empty sriov_configure() (jsc#PED-3692)
- crypto: qat - remove line wrapping for pfvf_ops functions (jsc#PED-3692)
- crypto: qat - remove the unnecessary get_vintmsk_offset() (jsc#PED-3692)
- crypto: qat - remove unmatched CPU affinity to cluster IRQ (jsc#PED-3692)
- crypto: qat - remove unnecessary tests to detect PFVF support (jsc#PED-3692)
- crypto: qat - remove unneeded assignment (jsc#PED-3692)
- crypto: qat - remove unneeded braces (jsc#PED-3692)
- crypto: qat - remove unneeded packed attribute (jsc#PED-3692)
- crypto: qat - remove unused PFVF stubs (jsc#PED-3692)
- crypto: qat - rename and relocate GEN2 config function (jsc#PED-3692)
- crypto: qat - rename bufferlist functions (jsc#PED-3692)
- crypto: qat - rename pfvf collision constants (jsc#PED-3692)
- crypto: qat - reorganize PFVF code (jsc#PED-3692)
- crypto: qat - reorganize PFVF protocol definitions (jsc#PED-3692)
- crypto: qat - replace deprecated MSI API (jsc#PED-3692)
- crypto: qat - replace disable_vf2pf_interrupts() (jsc#PED-3692)
- crypto: qat - replace get_current_node() with numa_node_id() (jsc#PED-3692)
- crypto: qat - rework the VF2PF interrupt handling logic (jsc#PED-3692)
- crypto: qat - set CIPHER capability for QAT GEN2 (jsc#PED-3692)
- crypto: qat - set COMPRESSION capability for DH895XCC (jsc#PED-3692)
- crypto: qat - set COMPRESSION capability for QAT GEN2 (jsc#PED-3692)
- crypto: qat - set DMA mask to 48 bits for Gen2 (jsc#PED-3692)
- crypto: qat - set PFVF_MSGORIGIN just before sending (jsc#PED-3692)
- crypto: qat - share adf_enable_pf2vf_comms() from (jsc#PED-3692)
- crypto: qat - simplify adf_enable_aer() (jsc#PED-3692)
- crypto: qat - simplify code and axe the use of a deprecated (jsc#PED-3692)
- crypto: qat - split PFVF message decoding from handling (jsc#PED-3692)
- crypto: qat - stop using iommu_present() (jsc#PED-3692)
- crypto: qat - store the PFVF protocol version of the (jsc#PED-3692)
- crypto: qat - store the ring-to-service mapping (jsc#PED-3692)
- crypto: qat - support fast ACKs in the PFVF protocol (jsc#PED-3692)
- crypto: qat - support the reset of ring pairs on PF (jsc#PED-3692)
- crypto: qat - test PFVF registers for spurious interrupts on (jsc#PED-3692)
- crypto: qat - use enums for PFVF protocol codes (jsc#PED-3692)
- crypto: qat - use hweight for bit counting (jsc#PED-3692)
- crypto: qat - use pre-allocated buffers in datapath (jsc#PED-3692)
- crypto: qat - use reference to structure in dma_map_single() (jsc#PED-3692)
- crypto: qat - use u32 variables in all GEN4 pfvf_ops (jsc#PED-3692)
- crypto: sun8i-ss - Fix a test in sun8i_ss_setup_ivs() (git-fixes).
- cxgb4: fix missing unlock on ETHOFLD desc collect fail path (jsc#SLE-18992).
- debugfs: fix error when writing negative value to atomic_t debugfs file (git-fixes).
- dma: gpi: remove spurious unlock in gpi_ch_init (git-fixes).
- dmaengine: at_xdmac: do not enable all cyclic channels (git-fixes).
- dmaengine: dw-edma: Fix to change for continuous transfer (git-fixes).
- dmaengine: dw-edma: Fix to enable to issue dma request on DMA processing (git-fixes).
- dmaengine: idxd: Do not enable user type Work Queue without Shared Virtual Addressing (git-fixes).
- dmaengine: idxd: Only call idxd_enable_system_pasid() if succeeded in enabling SVA feature (git-fixes).
- dmaengine: idxd: Separate user and kernel pasid enabling (git-fixes).
- dmaengine: mv_xor_v2: Fix an error code (git-fixes).
- do not reuse connection if share marked as isolated (bsc#1193629).
- docs: networking: fix x25-iface.rst heading &amp; index order (git-fixes).
- drivers: base: component: fix memory leak with using debugfs_lookup() (git-fixes).
- drivers: base: dd: fix memory leak with using debugfs_lookup() (git-fixes).
- drm-hyperv: Add a bug reference to two existing changes (bsc#1211281).
- drm/amd/display: Fix hang when skipping modeset (git-fixes).
- drm/amd/display: Use DC_LOG_DC in the trasform pixel function (git-fixes).
- drm/amd/display: fix flickering caused by S/G mode (git-fixes).
- drm/amd: Fix an out of bounds error in BIOS parser (git-fixes).
- drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras (git-fixes).
- drm/amdgpu: Fix vram recover does not work after whole GPU reset (v2) (git-fixes).
- drm/amdgpu: add a missing lock for AMDGPU_SCHED (git-fixes).
- drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend (git-fixes).
- drm/displayid: add displayid_get_header() and check bounds better (git-fixes).
- drm/exynos: fix g2d_open/close helper function definitions (git-fixes).
- drm/i915/dg2: Add HDMI pixel clock frequencies 267.30 and 319.89 MHz (git-fixes).
- drm/i915/dg2: Add additional HDMI pixel clock frequencies (git-fixes).
- drm/i915/dg2: Support 4k@30 on HDMI (git-fixes).
- drm/i915/dp: prevent potential div-by-zero (git-fixes).
- drm/mipi-dsi: Set the fwnode for mipi_dsi_device (git-fixes).
- drm/msm/dp: Clean up handling of DP AUX interrupts (git-fixes).
- drm/msm/dp: unregister audio driver during unbind (git-fixes).
- drm/msm/dpu: Add INTF_5 interrupts (git-fixes).
- drm/msm/dpu: Move non-MDP_TOP INTF_INTR offsets out of hwio header (git-fixes).
- drm/msm/dpu: Remove duplicate register defines from INTF (git-fixes).
- drm/sched: Remove redundant check (git-fixes).
- drm/tegra: Avoid potential 32-bit integer overflow (git-fixes).
- drm/ttm/pool: Fix ttm_pool_alloc error path (git-fixes).
- drm/ttm: optimize pool allocations a bit v2 (git-fixes).
- dt-binding: cdns,usb3: Fix cdns,on-chip-buff-size type (git-fixes).
- dt-bindings: ata: ahci-ceva: Cover all 4 iommus entries (git-fixes).
- dt-bindings: ata: ahci-ceva: convert to yaml (git-fixes).
- dt-bindings: iio: adc: renesas,rcar-gyroadc: Fix adi,ad7476 compatible value (git-fixes).
- dt-bindings: usb: snps,dwc3: Fix 'snps,hsphy_interface' type (git-fixes).
- f2fs: Fix f2fs_truncate_partial_nodes ftrace event (git-fixes).
- fbdev: arcfb: Fix error handling in arcfb_probe() (git-fixes).
- fbdev: ep93xx-fb: Add missing clk_disable_unprepare in ep93xxfb_probe() (git-fixes).
- fbdev: stifb: Fall back to cfb_fillrect() on 32-bit HCRX cards (git-fixes).
- fbdev: udlfb: Fix endpoint check (git-fixes).
- firmware: arm_ffa: Check if ffa_driver remove is present before executing (git-fixes).
- firmware: arm_ffa: Set reserved/MBZ fields to zero in the memory descriptors (git-fixes).
- fuse: always revalidate rename target dentry (bsc#1211808).
- fuse: fix attr version comparison in fuse_read_update_size() (bsc#1211807).
- futex: Resend potentially swallowed owner death notification (git-fixes).
- google/gve:fix repeated words in comments (bsc#1211519).
- gpio: mockup: Fix mode of debugfs files (git-fixes).
- gve: Adding a new AdminQ command to verify driver (bsc#1211519).
- gve: Cache link_speed value from device (git-fixes).
- gve: Fix error return code in gve_prefill_rx_pages() (bsc#1211519).
- gve: Fix spelling mistake 'droping' -&gt; 'dropping' (bsc#1211519).
- gve: Handle alternate miss completions (bsc#1211519).
- gve: Reduce alloc and copy costs in the GQ rx path (bsc#1211519).
- gve: Remove the code of clearing PBA bit (git-fixes).
- gve: Secure enough bytes in the first TX desc for all TCP pkts (git-fixes).
- gve: enhance no queue page list detection (bsc#1211519).
- i2c: omap: Fix standard mode false ACK readings (git-fixes).
- i2c: tegra: Fix PEC support for SMBUS block read (git-fixes).
- i40e: Add checking for null for nlmsg_find_attr() (jsc#SLE-18378).
- i40e: Fix ADQ rate limiting for PF (jsc#SLE-18378).
- i40e: Fix DMA mappings leak (jsc#SLE-18378).
- i40e: Fix VF hang when reset is triggered on another VF (jsc#SLE-18378).
- i40e: Fix VF set max MTU size (jsc#SLE-18378).
- i40e: Fix VF's MAC Address change on VM (jsc#SLE-18378).
- i40e: Fix adding ADQ filter to TC0 (jsc#SLE-18378).
- i40e: Fix calculating the number of queue pairs (jsc#SLE-18378).
- i40e: Fix erroneous adapter reinitialization during recovery process (jsc#SLE-18378).
- i40e: Fix ethtool rx-flow-hash setting for X722 (jsc#SLE-18378).
- i40e: Fix flow-type by setting GL_HASH_INSET registers (jsc#SLE-18378).
- i40e: Fix for VF MAC address 0 (jsc#SLE-18378).
- i40e: Fix incorrect address type for IPv6 flow rules (jsc#SLE-18378).
- i40e: Fix interface init with MSI interrupts (no MSI-X) (jsc#SLE-18378).
- i40e: Fix kernel crash during module removal (jsc#SLE-18378).
- i40e: Fix kernel crash during reboot when adapter is in recovery mode (jsc#SLE-18378).
- i40e: Fix set max_tx_rate when it is lower than 1 Mbps (jsc#SLE-18378).
- i40e: Fix the inability to attach XDP program on downed interface (jsc#SLE-18378).
- i40e: Refactor tc mqprio checks (jsc#SLE-18378).
- i40e: add double of VLAN header when computing the max MTU (jsc#SLE-18378).
- i40e: fix accessing vsi-&gt;active_filters without holding lock (jsc#SLE-18378).
- i40e: fix flow director packet filter programming (jsc#SLE-18378).
- i40e: fix i40e_setup_misc_vector() error handling (jsc#SLE-18378).
- i40e: fix registers dump after run ethtool adapter self test (jsc#SLE-18378).
- iavf/iavf_main: actually log -&gt;src mask when talking about it (jsc#SLE-18385).
- iavf: Detach device during reset task (jsc#SLE-18385).
- iavf: Disallow changing rx/tx-frames and rx/tx-frames-irq (jsc#SLE-18385).
- iavf: Do not restart Tx queues after reset task failure (jsc#SLE-18385).
- iavf: Fix 'tc qdisc show' listing too many queues (jsc#SLE-18385).
- iavf: Fix a crash during reset task (jsc#SLE-18385).
- iavf: Fix bad page state (jsc#SLE-18385).
- iavf: Fix cached head and tail value for iavf_get_tx_pending (jsc#SLE-18385).
- iavf: Fix error handling in iavf_init_module() (jsc#SLE-18385).
- iavf: Fix max_rate limiting (jsc#SLE-18385).
- iavf: Fix race condition between iavf_shutdown and iavf_remove (jsc#SLE-18385).
- iavf: Fix set max MTU size with port VLAN and jumbo frames (jsc#SLE-18385).
- iavf: fix hang on reboot with ice (jsc#SLE-18385).
- iavf: fix inverted Rx hash condition leading to disabled hash (jsc#SLE-18385).
- iavf: fix non-tunneled IPv6 UDP packet type and hashing (jsc#SLE-18385).
- ice: Fix interrupt moderation settings getting cleared (jsc#SLE-18375).
- ice: Set txq_teid to ICE_INVAL_TEID on ring creation (jsc#SLE-18375).
- igb: Add lock to avoid data race (jsc#SLE-18379).
- igb: Enable SR-IOV after reinit (jsc#SLE-18379).
- igb: Initialize mailbox message for VF reset (jsc#SLE-18379).
- igb: conditionalize I2C bit banging on external thermal sensor support (jsc#SLE-18379).
- igb: revert rtnl_lock() that causes deadlock (jsc#SLE-18379).
- igbvf: Regard vf reset nack as success (jsc#SLE-18379).
- igc: Add checking for basetime less than zero (jsc#SLE-18377).
- igc: Add ndo_tx_timeout support (jsc#SLE-18377).
- igc: Enhance Qbv scheduling by using first flag bit (jsc#SLE-18377).
- igc: Fix PPS delta between two synchronized end-points (jsc#SLE-18377).
- igc: Lift TAPRIO schedule restriction (jsc#SLE-18377).
- igc: Reinstate IGC_REMOVED logic and implement it properly (jsc#SLE-18377).
- igc: Set Qbv start_time and end_time to end_time if not being configured in GCL (jsc#SLE-18377).
- igc: Use strict cycles for Qbv scheduling (jsc#SLE-18377).
- igc: allow BaseTime 0 enrollment for Qbv (jsc#SLE-18377).
- igc: fix the validation logic for taprio's gate list (jsc#SLE-18377).
- igc: read before write to SRRCTL register (jsc#SLE-18377).
- igc: recalculate Qbv end_time by considering cycle time (jsc#SLE-18377).
- igc: return an error if the mac type is unknown in igc_ptp_systim_to_hwtstamp() (jsc#SLE-18377).
- iio: accel: st_accel: Fix invalid mount_matrix on devices without ACPI _ONT method (git-fixes).
- iio: adc: ad7192: Change 'shorted' channels to differential (git-fixes).
- iio: adc: ad_sigma_delta: Fix IRQ issue by setting IRQ_DISABLE_UNLAZY flag (git-fixes).
- iio: adc: mxs-lradc: fix the order of two cleanup operations (git-fixes).
- iio: adc: palmas_gpadc: fix NULL dereference on rmmod (git-fixes).
- iio: dac: mcp4725: Fix i2c_master_send() return value handling (git-fixes).
- iio: imu: inv_icm42600: fix timestamp reset (git-fixes).
- iio: light: vcnl4035: fixed chip ID check (git-fixes).
- intel/igbvf: free irq on the error path in igbvf_request_msix() (jsc#SLE-18379).
- ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592).
- iwlwifi: cfg: Add missing MODULE_FIRMWARE() for *.pnvm (bsc#1207553).
- ixgbe: Allow flow hash to be set via ethtool (jsc#SLE-18384).
- ixgbe: Enable setting RSS table to default values (jsc#SLE-18384).
- ixgbe: Fix panic during XDP_TX with &gt; 64 CPUs (jsc#SLE-18384).
- ixgbe: add double of VLAN header when computing the max MTU (jsc#SLE-18384).
- ixgbe: allow to increase MTU to 3K with XDP enabled (jsc#SLE-18384).
- ixgbe: fix pci device refcount leak (jsc#SLE-18384).
- ixgbe: stop resetting SYSTIME in ixgbe_ptp_start_cyclecounter (jsc#SLE-18384).
- kABI workaround for btbcm.c (git-fixes).
- kABI workaround for mt76_poll_msec() (git-fixes).
- kABI: Fix kABI after backport Emulate RDPID only if it is enabled in guest  (git-fixes)
- kabi/severities: added Microsoft mana symbold (bsc#1210551)
- kernel-binary: install expoline.o (boo#1210791 bsc#1211089)
- kernel-source: Remove unused macro variant_symbols
- kernel-spec-macros: Fix up obsolete_rebuilds_subpackage to generate obsoletes correctly (boo#1172073 bsc#1191731).
- kvm: x86: Disable KVM_HC_CLOCK_PAIRING if tsc is in always catchup mode (git-fixes).
- leds: Fix reference to led_set_brightness() in doc (git-fixes).
- leds: TI_LMU_COMMON: select REGMAP instead of depending on it (git-fixes).
- leds: tca6507: Fix error handling of using fwnode_property_read_string (git-fixes).
- libfs: add DEFINE_SIMPLE_ATTRIBUTE_SIGNED for signed value (git-fixes).
- locking/rwsem: Add __always_inline annotation to __down_read_common() and inlined callers (git-fixes).
- mailbox: zynqmp: Fix IPI isr handling (git-fixes).
- mailbox: zynqmp: Fix typo in IPI documentation (git-fixes).
- mce: fix set_mce_nospec to always unmap the whole page (git-fixes).
- media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish() (git-fixes).
- media: netup_unidvb: fix use-after-free at del_timer() (git-fixes).
- media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish (git-fixes).
- media: radio-shark: Add endpoint checks (git-fixes).
- media: rcar_fdp1: Fix the correct variable assignments (git-fixes).
- media: rcar_fdp1: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- memstick: r592: Fix UAF bug in r592_remove due to race condition (bsc#1211449).
- mfd: dln2: Fix memory leak in dln2_probe() (git-fixes).
- mfd: tqmx86: Correct board names for TQMxE39x (git-fixes).
- mfd: tqmx86: Do not access I2C_DETECT register through io_base (git-fixes).
- misc: fastrpc: reject new invocations during device removal (git-fixes).
- misc: fastrpc: return -EPIPE to invocations on device removal (git-fixes).
- mmc: sdhci-esdhc-imx: make 'no-mmc-hs400' works (git-fixes).
- mmc: vub300: fix invalid response handling (git-fixes).
- mt76: mt7915: fix incorrect testmode ipg on band 1 caused by wmm_idx (git-fixes).
- mtd: rawnand: ingenic: fix empty stub helper definitions (git-fixes).
- mtd: rawnand: marvell: do not set the NAND frequency select (git-fixes).
- mtd: rawnand: marvell: ensure timing values are written (git-fixes).
- net/iucv: Fix size of interrupt data (bsc#1211465 git-fixes).
- net: accept UFOv6 packages in virtio_net_hdr_to_skb (git-fixes).
- net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize (git-fixes).
- net: mana: Add new MANA VF performance counters for easier troubleshooting (bsc#1209982).
- net: mana: Add support for auxiliary device (bsc#1210741 jsc#PED-4022).
- net: mana: Add support for jumbo frame (bsc#1210551).
- net: mana: Check if netdev/napi_alloc_frag returns single page (bsc#1210551).
- net: mana: Define and process GDMA response code GDMA_STATUS_MORE_ENTRIES (bsc#1210741 jsc#PED-4022).
- net: mana: Define data structures for allocating doorbell page from GDMA (bsc#1210741 jsc#PED-4022).
- net: mana: Define data structures for protection domain and memory registration (bsc#1210741 jsc#PED-4022).
- net: mana: Define max values for SGL entries (bsc#1210741 jsc#PED-4022).
- net: mana: Enable RX path to handle various MTU sizes (bsc#1210551).
- net: mana: Export Work Queue functions for use by RDMA driver (bsc#1210741 jsc#PED-4022).
- net: mana: Fix perf regression: remove rx_cqes, tx_cqes counters (git-fixes).
- net: mana: Handle vport sharing between devices (bsc#1210741 jsc#PED-4022).
- net: mana: Move header files to a common location (bsc#1210741 jsc#PED-4022).
- net: mana: Record port number in netdev (bsc#1210741 jsc#PED-4022).
- net: mana: Record the physical address for doorbell page region (bsc#1210741 jsc#PED-4022).
- net: mana: Refactor RX buffer allocation code to prepare for various MTU (bsc#1210551).
- net: mana: Rename mana_refill_rxoob and remove some empty lines (bsc#1210551).
- net: mana: Set the DMA device max segment size (bsc#1210741 jsc#PED-4022).
- net: mana: Use napi_build_skb in RX path (bsc#1210551).
- net: mdio: mvusb: Fix an error handling path in mvusb_mdio_probe() (git-fixes).
- net: mellanox: mlxbf_gige: Fix skb_panic splat under memory pressure (bsc#1211564).
- net: phy: dp83867: add w/a for packet errors seen with short cables (git-fixes).
- net: qrtr: correct types of trace event parameters (git-fixes).
- net: skip virtio_net_hdr_set_proto if protocol already set (git-fixes).
- net: tun: avoid disabling NAPI twice (git-fixes).
- net: tun: fix bugs for oversize packet when napi frags enabled (git-fixes).
- net: tun: stop NAPI when detaching queues (git-fixes).
- net: tun: unlink NAPI from device on destruction (git-fixes).
- net: usb: qmi_wwan: Set DTR quirk for BroadMobi BM818 (git-fixes).
- net: virtio_net_hdr_to_skb: count transport header in UFO (git-fixes).
- nilfs2: do not write dirty data after degenerating to read-only (git-fixes).
- nilfs2: fix infinite loop in nilfs_mdt_get_block() (git-fixes).
- nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() (git-fixes).
- nvme-fc: fix a missing queue put in nvmet_fc_ls_create_association (git-fixes).
- nvme-multipath: fix hang when disk goes live over reconnect (git-fixes).
- nvme-pci: add quirks for Samsung X5 SSDs (git-fixes).
- nvme-pci: add the IGNORE_DEV_SUBNQN quirk for Intel P4500/P4600 SSDs (git-fixes).
- nvme-pci: avoid the deepest sleep state on ZHITAI TiPro5000 SSDs (git-fixes).
- nvme-pci: avoid the deepest sleep state on ZHITAI TiPro7000 SSDs (git-fixes).
- nvme-pci: clear the prp2 field when not used (git-fixes).
- nvme-pci: disable write zeroes on various Kingston SSD (git-fixes).
- nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags (git-fixes).
- nvme-pci: mark Lexar NM760 as IGNORE_DEV_SUBNQN (git-fixes).
- nvme-pci: set min_align_mask before calculating max_hw_sectors (git-fixes).
- nvme-tcp: fix a possible UAF when failing to allocate an io queue (git-fixes).
- nvme-tcp: fix bogus request completion when failing to send AER (git-fixes).
- nvme-tcp: lockdep: annotate in-kernel sockets (git-fixes).
- nvme: add a bogus subsystem NQN quirk for Micron MTFDKBA2T0TFH (git-fixes).
- nvme: also return I/O command effects from nvme_command_effects (git-fixes).
- nvme: check for duplicate identifiers earlier (git-fixes).
- nvme: cleanup __nvme_check_ids (git-fixes).
- nvme: fix discard support without oncs (git-fixes).
- nvme: fix interpretation of DMRSL (git-fixes).
- nvme: fix multipath crash caused by flush request when blktrace is enabled (git-fixes).
- nvme: fix passthrough csi check (git-fixes).
- nvme: generalize the nvme_multi_css check in nvme_scan_ns (git-fixes).
- nvme: move the Samsung X5 quirk entry to the core quirks (git-fixes).
- nvme: rename nvme_validate_or_alloc_ns to nvme_scan_ns (git-fixes).
- nvme: set non-mdts limits in nvme_scan_work (git-fixes).
- nvmet-tcp: add bounds check on Transfer Tag (git-fixes).
- nvmet-tcp: fix lockdep complaint on nvmet_tcp_wq flush during queue teardown (git-fixes).
- nvmet-tcp: fix unhandled tcp states in nvmet_tcp_state_change() (git-fixes).
- nvmet: fix mar and mor off-by-one errors (git-fixes).
- nvmet: fix memory leak in nvmet_subsys_attr_model_store_locked (git-fixes).
- nvmet: fix workqueue MEM_RECLAIM flushing dependency (git-fixes).
- nvmet: move the call to nvmet_ns_changed out of nvmet_ns_revalidate (git-fixes).
- nvmet: use NVME_CMD_EFFECTS_CSUPP instead of open coding it (git-fixes).
- phy: st: miphy28lp: use _poll_timeout functions for waits (git-fixes).
- phy: tegra: xusb: Add missing tegra_xusb_port_unregister for usb2_port and ulpi_port (git-fixes).
- pinctrl: qcom: lpass-lpi: set output value before enabling output (git-fixes).
- pinctrl: renesas: r8a779a0: Remove incorrect AVB[01] pinmux configuration (git-fixes).
- platform/x86: hp-wmi: Support touchpad on/off (git-fixes).
- platform/x86: thinkpad_acpi: Fix platform profiles on T490 (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Dexp Ursus KX210i (git-fixes).
- platform/x86: touchscreen_dmi: Add upside-down quirk for GDIX1002 ts on the Juno Tablet (git-fixes).
- power: supply: bq24190_charger: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes).
- power: supply: bq27xxx: Add cache parameter to bq27xxx_battery_current_and_status() (git-fixes).
- power: supply: bq27xxx: After charger plug in/out wait 0.5s for things to stabilize (git-fixes).
- power: supply: bq27xxx: Ensure power_supply_changed() is called on current sign changes (git-fixes).
- power: supply: bq27xxx: Fix I2C IRQ race on remove (git-fixes).
- power: supply: bq27xxx: Fix poll_interval handling and races on remove (git-fixes).
- power: supply: bq27xxx: expose battery data when CI=1 (git-fixes).
- power: supply: leds: Fix blink to LED on transition (git-fixes).
- power: supply: sbs-charger: Fix INHIBITED bit for Status reg (git-fixes).
- powerpc/iommu: DMA address offset is incorrectly calculated with 2MB TCEs (jsc#SLE-19556 git-fixes).
- powerpc/rtas: use memmove for potentially overlapping buffer copy (bsc#1065729).
- powerpc: Do not try to copy PPR for task with NULL pt_regs (bsc#1065729).
- pstore: Revert pmsg_lock back to a normal mutex (git-fixes).
- purgatory: fix disabling debug info (git-fixes).
- pwm: meson: Fix axg ao mux parents (git-fixes).
- pwm: meson: Fix g12a ao clk81 name (git-fixes).
- qed/qed_dev: guard against a possible division by zero (jsc#SLE-19001).
- qed/qed_mng_tlv: correctly zero out -&gt;min instead of -&gt;hour (jsc#SLE-19001).
- qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info (jsc#SLE-19001).
- qed: allow sleep in qed_mcp_trace_dump() (jsc#SLE-19001).
- qede: execute xdp_do_flush() before napi_complete_done() (jsc#SLE-19001).
- r8152: fix flow control issue of RTL8156A (git-fixes).
- r8152: fix the poor throughput for 2.5G devices (git-fixes).
- r8152: move setting r8153b_rx_agg_chg_indicate() (git-fixes).
- regmap: cache: Return error in cache sync operations for REGCACHE_NONE (git-fixes).
- regulator: mt6359: add read check for PMIC MT6359 (git-fixes).
- regulator: pca9450: Fix BUCK2 enable_mask (git-fixes).
- remoteproc: stm32_rproc: Add mutex protection for workqueue (git-fixes).
- ring-buffer: Ensure proper resetting of atomic variables in ring_buffer_reset_online_cpus (git-fixes).
- ring-buffer: Fix kernel-doc (git-fixes).
- ring-buffer: Sync IRQ works before buffer destruction (git-fixes).
- rpm/constraints.in: Increase disk size constraint for riscv64 to 52GB
- rtmutex: Ensure that the top waiter is always woken up (git-fixes).
- s390/ap: fix crash on older machines based on QCI info missing (bsc#1210947)
- s390/ctcm: Fix return type of ctc{mp,}m_tx() (git-fixes bsc#1211686).
- s390/dasd: fix hanging blockdevice after request requeue (git-fixes bsc#1211687).
- s390/extmem: return correct segment type in __segment_load() (bsc#1210450 git-fixes).
- s390/kprobes: fix current_kprobe never cleared after kprobes reenter (git-fixes bsc#1211688).
- s390/kprobes: fix irq mask clobbering on kprobe reenter from post_handler (git-fixes bsc#1211689).
- s390/lcs: Fix return type of lcs_start_xmit() (git-fixes bsc#1211690).
- s390/mem_detect: fix detect_memory() error handling (git-fixes bsc#1211691).
- s390/netiucv: Fix return type of netiucv_tx() (git-fixes bsc#1211692).
- s390/qdio: fix do_sqbs() inline assembly constraint (git-fixes bsc#1211693).
- s390/qeth: fix use-after-free in hsci (bsc#1210449 git-fixes).
- s390/uaccess: add missing earlyclobber annotations to __clear_user() (bsc#1209856 git-fixes).
- s390/vdso: remove -nostdlib compiler flag (git-fixes bsc#1211714).
- s390x: Fixed hard lockups while running stress-ng and LPAR hangs (bsc#1195655 ltc#195733).
- scsi: core: Improve scsi_vpd_inquiry() checks (git-fixes).
- scsi: hisi_sas: Handle NCQ error when IPTT is valid (git-fixes).
- scsi: libsas: Add sas_ata_device_link_abort() (git-fixes).
- scsi: libsas: Grab the ATA port lock in sas_ata_device_link_abort() (git-fixes).
- scsi: lpfc: Add new RCQE status for handling DMA failures (bsc#1211847).
- scsi: lpfc: Fix double free in lpfc_cmpl_els_logo_acc() caused by lpfc_nlp_not_used() (bsc#1211847).
- scsi: lpfc: Fix verbose logging for SCSI commands issued to SES devices (bsc#1211847).
- scsi: lpfc: Match lock ordering of lpfc_cmd-&gt;buf_lock and hbalock for abort paths (bsc#1211847).
- scsi: lpfc: Replace blk_irq_poll intr handler with threaded IRQ (bsc#1211847).
- scsi: lpfc: Update congestion warning notification period (bsc#1211847).
- scsi: lpfc: Update lpfc version to 14.2.0.12 (bsc#1211847).
- scsi: megaraid: Fix mega_cmd_done() CMDID_INT_CMDS (git-fixes).
- scsi: megaraid_sas: Fix fw_crash_buffer_show() (git-fixes).
- scsi: qedi: Fix use after free bug in qedi_remove() (git-fixes).
- scsi: qla2xxx: Drop redundant pci_enable_pcie_error_reporting() (bsc#1211960).
- scsi: qla2xxx: Fix hang in task management (bsc#1211960).
- scsi: qla2xxx: Fix mem access after free (bsc#1211960).
- scsi: qla2xxx: Fix task management cmd fail due to unavailable resource (bsc#1211960).
- scsi: qla2xxx: Fix task management cmd failure (bsc#1211960).
- scsi: qla2xxx: Multi-que support for TMF (bsc#1211960).
- scsi: qla2xxx: Refer directly to the qla2xxx_driver_template (bsc#1211960).
- scsi: qla2xxx: Remove default fabric ops callouts (bsc#1211960).
- scsi: qla2xxx: Replace all non-returning strlcpy() with strscpy() (bsc#1211960).
- scsi: qla2xxx: Update version to 10.02.08.300-k (bsc#1211960).
- scsi: qla2xxx: Wait for io return on terminate rport (bsc#1211960).
- scsi: ses: Handle enclosure with just a primary component gracefully (git-fixes).
- scsi: storvsc: Do not pass unused PFNs to Hyper-V host (git-fixes).
- selftests mount: Fix mount_setattr_test builds failed (git-fixes).
- selftests/resctrl: Allow -&gt;setup() to return errors (git-fixes).
- selftests/resctrl: Check for return value after write_schemata() (git-fixes).
- selftests/resctrl: Extend CPU vendor detection (git-fixes).
- selftests/resctrl: Move -&gt;setup() call outside of test specific branches (git-fixes).
- selftests/resctrl: Return NULL if malloc_and_init_memory() did not alloc mem (git-fixes).
- selftests/sgx: Add 'test_encl.elf' to TEST_FILES (git-fixes).
- selftests: mptcp: connect: skip if MPTCP is not supported (git-fixes).
- selftests: mptcp: pm nl: skip if MPTCP is not supported (git-fixes).
- selftests: mptcp: sockopt: skip if MPTCP is not supported (git-fixes).
- selftests: seg6: disable DAD on IPv6 router cfg for srv6_end_dt4_l3vpn_test (git-fixes).
- selftests: srv6: make srv6_end_dt46_l3vpn_test more robust (git-fixes).
- selftests: xsk: Disable IPv6 on VETH1 (git-fixes).
- selftets: seg6: disable rp_filter by default in srv6_end_dt4_l3vpn_test (git-fixes).
- selinux: do not use make's grouped targets feature yet (git-fixes).
- serial: 8250: Reinit port-&gt;pm on port specific driver unbind (git-fixes).
- serial: 8250_bcm7271: balance clk_enable calls (git-fixes).
- serial: 8250_bcm7271: fix leak in `brcmuart_probe` (git-fixes).
- serial: 8250_exar: Add support for USR298x PCI Modems (git-fixes).
- serial: 8250_tegra: Fix an error handling path in tegra_uart_probe() (git-fixes).
- serial: Add support for Advantech PCI-1611U card (git-fixes).
- serial: arc_uart: fix of_iomap leak in `arc_serial_probe` (git-fixes).
- serial: qcom-geni: fix enabling deactivated interrupt (git-fixes).
- serial: stm32: re-introduce an irq flag condition in usart_receive_chars (git-fixes).
- sfc: Change VF mac via PF as first preference if available (git-fixes).
- sfc: Fix module EEPROM reporting for QSFP modules (git-fixes).
- sfc: Fix use-after-free due to selftest_work (git-fixes).
- sfc: correctly advertise tunneled IPv6 segmentation (git-fixes).
- sfc: ef10: do not overwrite offload features at NIC reset (git-fixes).
- sfc: fix TX channel offset when using legacy interrupts (git-fixes).
- sfc: fix considering that all channels have TX queues (git-fixes).
- sfc: fix null pointer dereference in efx_hard_start_xmit (git-fixes).
- sfc: fix wrong tx channel offset with efx_separate_tx_channels (git-fixes).
- sfc: include vport_id in filter spec hash and equal() (git-fixes).
- smb3: display debug information better for encryption (bsc#1193629).
- smb3: fix problem remounting a share after shutdown (bsc#1193629).
- smb3: improve parallel reads of large files (bsc#1193629).
- smb3: make query_on_disk_id open context consistent and move to common code (bsc#1193629).
- smb3: move some common open context structs to smbfs_common (bsc#1193629).
- soundwire: qcom: correct setting ignore bit on v1.5.1 (git-fixes).
- soundwire: qcom: gracefully handle too many ports in DT (git-fixes).
- spi: spi-imx: fix MX51_ECSPI_* macros when cs &gt; 3 (git-fixes).
- spi: spi-imx: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes).
- staging: rtl8192e: Replace macro RTL_PCI_DEVICE with PCI_DEVICE (git-fixes).
- struct ci_hdrc: hide new member at end (git-fixes).
- supported.conf: mark mana_ib supported
- swiotlb: relocate PageHighMem test away from rmem_swiotlb_setup (git-fixes).
- thunderbolt: Clear registers properly when auto clear isn't in use (bsc#1210165).
- thunderbolt: Mask ring interrupt on Intel hardware as well (bsc#1210165).
- tools/virtio: compile with -pthread (git-fixes).
- tools/virtio: fix the vringh test for virtio ring changes (git-fixes).
- tools/virtio: fix virtio_test execution (git-fixes).
- tools/virtio: initialize spinlocks in vring_test.c (git-fixes).
- tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register (git-fixes).
- tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed (git-fixes).
- tpm/tpm_tis: Disable interrupts for more Lenovo devices (git-fixes).
- tracing: Fix permissions for the buffer_percent file (git-fixes).
- tty: serial: fsl_lpuart: use UARTCTRL_TXINV to send break instead of UARTCTRL_SBK (git-fixes).
- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).
- usb: chipidea: core: fix possible concurrent when switch role (git-fixes).
- usb: dwc3: Align DWC3_EP_* flag macros (git-fixes).
- usb: dwc3: Fix a repeated word checkpatch warning (git-fixes).
- usb: dwc3: Fix ep0 handling when getting reset while doing control transfer (git-fixes).
- usb: dwc3: debugfs: Resume dwc3 before accessing registers (git-fixes).
- usb: dwc3: drd: use helper to get role-switch-default-mode (git-fixes).
- usb: dwc3: ep0: Do not prepare beyond Setup stage (git-fixes).
- usb: dwc3: gadget: Delay issuing End Transfer (git-fixes).
- usb: dwc3: gadget: Execute gadget stop after halting the controller (git-fixes).
- usb: dwc3: gadget: Improve dwc3_gadget_suspend() and dwc3_gadget_resume() (git-fixes).
- usb: dwc3: gadget: Only End Transfer for ep0 data phase (git-fixes).
- usb: dwc3: gadget: Stall and restart EP0 if host is unresponsive (git-fixes).
- usb: dwc3: remove a possible unnecessary 'out of memory' message (git-fixes).
- usb: gadget: f_fs: Add unbind event before functionfs_unbind (git-fixes).
- usb: gadget: u_ether: Fix host MAC address case (git-fixes).
- usb: mtu3: fix kernel panic at qmu transfer done irq handler (git-fixes).
- usb: typec: altmodes/displayport: fix pin_assignment_show (git-fixes).
- usb: typec: tcpm: fix multiple times discover svids error (git-fixes).
- usb: usbfs: Enforce page requirements for mmap (git-fixes).
- usb: usbfs: Use consistent mmap functions (git-fixes).
- usrmerge: Remove usrmerge compatibility symlink in buildroot (boo#1211796).
- vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF (git-fixes).
- vdpa: fix use-after-free on vp_vdpa_remove (git-fixes).
- vhost/net: Clear the pending messages when the backend is removed (git-fixes).
- virtio-net: Keep stop() to follow mirror sequence of open() (git-fixes).
- virtio-net: execute xdp_do_flush() before napi_complete_done() (git-fixes).
- virtio_net: bugfix overflow inside xdp_linearize_page() (git-fixes).
- virtio_net: split free_unused_bufs() (git-fixes).
- virtio_net: suppress cpu stall when free_unused_bufs (git-fixes).
- watchdog: dw_wdt: Fix the error handling path of dw_wdt_drv_probe() (git-fixes).
- watchdog: sp5100_tco: Immediately trigger upon starting (git-fixes).
- wifi: ath11k: Fix SKB corruption in REO destination ring (git-fixes).
- wifi: ath: Silence memcpy run-time false positive warning (git-fixes).
- wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex (git-fixes).
- wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace (git-fixes).
- wifi: iwlwifi: fix OEM's name in the ppag approved list (git-fixes).
- wifi: iwlwifi: fw: fix DBGI dump (git-fixes).
- wifi: iwlwifi: mvm: do not trust firmware n_channels (git-fixes).
- wifi: iwlwifi: mvm: fix OEM's name in the tas approved list (git-fixes).
- wifi: iwlwifi: mvm: fix cancel_delayed_work_sync() deadlock (git-fixes).
- wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf (git-fixes).
- wifi: iwlwifi: pcie: fix possible NULL pointer dereference (git-fixes).
- wifi: mac80211: fix min center freq offset tracing (git-fixes).
- wifi: mt76: add flexible polling wait-interval support (git-fixes).
- wifi: mt76: mt7921e: Set memory space enable in PCI_COMMAND if unset (git-fixes).
- wifi: mt76: mt7921e: fix probe timeout after reboot (git-fixes).
- wifi: mt76: mt7921e: improve reliability of dma reset (git-fixes).
- wifi: rtl8xxxu: RTL8192EU always needs full init (git-fixes).
- workqueue: Fix hung time report of worker pools (bsc#1211044).
- workqueue: Interrupted create_worker() is not a repeated event (bsc#1211044).
- workqueue: Print backtraces from CPUs with hung CPU bound workqueues (bsc#1211044).
- workqueue: Warn when a new worker could not be created (bsc#1211044).
- workqueue: Warn when a rescuer could not be created (bsc#1211044).
- x86, sched: Fix undefined reference to init_freq_invariance_cppc() build error (git-fixes).
- x86/MCE/AMD: Use an u64 for bank_map (git-fixes).
- x86/alternative: Make debug-alternative selective (bsc#1206578).
- x86/alternative: Report missing return thunk details (git-fixes).
- x86/alternative: Support relocations in alternatives (bsc#1206578).
- x86/amd: Use IBPB for firmware calls (git-fixes).
- x86/boot: Skip realmode init code when running as Xen PV guest  (git-fixes).
- x86/bugs: Add 'unknown' reporting for MMIO Stale Data (git-fixes).
- x86/bugs: Do not enable IBPB at firmware entry when IBPB is not available (git-fixes).
- x86/bugs: Warn when 'ibrs' mitigation is selected on Enhanced IBRS parts (git-fixes).
- x86/crash: Disable virt in core NMI crash handler to avoid double shootdown (git-fixes).
- x86/delay: Fix the wrong asm constraint in delay_loop() (git-fixes).
- x86/entry: Build thunk_$(BITS) only if CONFIG_PREEMPTION=y (git-fixes).
- x86/fault: Cast an argument to the proper address space in prefetch() (git-fixes).
- x86/fpu/xsave: Initialize offset/size cache early (bsc#1211205).
- x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly (git-fixes).
- x86/fpu: Fix the init_fpstate size check with the actual size (git-fixes).
- x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes).
- x86/hyperv: Block root partition functionality in a Confidential VM (git-fixes).
- x86/lib/memmove: Decouple ERMS from FSRM (bsc#1206578).
- x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes). This is a preparation for the next patch
- x86/microcode/AMD: Add a @cpu parameter to the reloading functions (git-fixes).
- x86/microcode/AMD: Fix mixed steppings support (git-fixes).
- x86/microcode/AMD: Track patch allocation size explicitly (git-fixes).
- x86/microcode: Add a parameter to microcode_check() to store CPU capabilities (git-fixes).
- x86/microcode: Add explicit CPU vendor dependency (git-fixes).
- x86/microcode: Adjust late loading result reporting message (git-fixes).
- x86/microcode: Rip out the OLD_INTERFACE (git-fixes).
- x86/mm: Cleanup the control_va_addr_alignment() __setup handler (git-fixes).
- x86/mm: Use proper mask when setting PUD mapping (git-fixes).
- x86/nospec: Unwreck the RSB stuffing (git-fixes).
- x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).
- x86/pat: Fix x86_has_pat_wp() (git-fixes).
- x86/pm: Add enumeration check before spec MSRs save/restore setup (git-fixes).
- x86/reboot: Disable SVM, not just VMX, when stopping CPUs (git-fixes).
- x86/resctrl: Fix min_cbm_bits for AMD (git-fixes).
- x86/sev: Add SEV-SNP guest feature negotiation support (git-fixes).
- x86/signal: Fix the value returned by strict_sas_size() (git-fixes).
- x86/speculation/mmio: Print SMT warning (git-fixes).
- x86/speculation: Identify processors vulnerable to SMT RSB predictions (git-fixes).
- x86/static_call: Serialize __static_call_fixup() properly (git-fixes).
- x86/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).
- x86/topology: Fix duplicated core ID within a package (git-fixes).
- x86/topology: Fix multiple packages shown on a single-package system (git-fixes).
- x86/tsx: Add a feature bit for TSX control MSR support (git-fixes).
- x86: Fix return value of __setup handlers (git-fixes).
- x86: drop bogus 'cc' clobber from __try_cmpxchg_user_asm() (git-fixes).
- xen/netback: do not do grant copy across page boundary (git-fixes).
- xen/netback: use same error messages for same errors (git-fixes).
- xhci-pci: Only run d3cold avoidance quirk for s2idle (git-fixes).
- xhci: Fix incorrect tracking of free space on transfer rings (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-27"/>
	<updated date="2023-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195655">SUSE bug 1195655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195921">SUSE bug 1195921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203906">SUSE bug 1203906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205650">SUSE bug 1205650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205756">SUSE bug 1205756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205758">SUSE bug 1205758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205760">SUSE bug 1205760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205762">SUSE bug 1205762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205803">SUSE bug 1205803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206024">SUSE bug 1206024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206578">SUSE bug 1206578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207553">SUSE bug 1207553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208604">SUSE bug 1208604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208758">SUSE bug 1208758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209287">SUSE bug 1209287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209288">SUSE bug 1209288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209856">SUSE bug 1209856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209982">SUSE bug 1209982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210165">SUSE bug 1210165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210294">SUSE bug 1210294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210449">SUSE bug 1210449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210450">SUSE bug 1210450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210498">SUSE bug 1210498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210533">SUSE bug 1210533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210551">SUSE bug 1210551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210647">SUSE bug 1210647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210741">SUSE bug 1210741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210775">SUSE bug 1210775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210783">SUSE bug 1210783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210791">SUSE bug 1210791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210806">SUSE bug 1210806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210940">SUSE bug 1210940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210947">SUSE bug 1210947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211037">SUSE bug 1211037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211043">SUSE bug 1211043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211044">SUSE bug 1211044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211089">SUSE bug 1211089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211105">SUSE bug 1211105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211113">SUSE bug 1211113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211205">SUSE bug 1211205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211263">SUSE bug 1211263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211280">SUSE bug 1211280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211281">SUSE bug 1211281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211449">SUSE bug 1211449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211465">SUSE bug 1211465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211519">SUSE bug 1211519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211564">SUSE bug 1211564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211590">SUSE bug 1211590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211686">SUSE bug 1211686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211687">SUSE bug 1211687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211688">SUSE bug 1211688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211689">SUSE bug 1211689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211690">SUSE bug 1211690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211691">SUSE bug 1211691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211692">SUSE bug 1211692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211693">SUSE bug 1211693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211714">SUSE bug 1211714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211796">SUSE bug 1211796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211804">SUSE bug 1211804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211807">SUSE bug 1211807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211808">SUSE bug 1211808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211847">SUSE bug 1211847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211855">SUSE bug 1211855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211960">SUSE bug 1211960</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4269/">CVE-2022-4269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45884/">CVE-2022-45884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45884">CVE-2022-45884 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45885/">CVE-2022-45885 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45885">CVE-2022-45885 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45886/">CVE-2022-45886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45887/">CVE-2022-45887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45919/">CVE-2022-45919 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1079/">CVE-2023-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1380/">CVE-2023-1380 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1382/">CVE-2023-1382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2124/">CVE-2023-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2162/">CVE-2023-2162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2269/">CVE-2023-2269 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2483/">CVE-2023-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2483">CVE-2023-2483 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2513/">CVE-2023-2513 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28410/">CVE-2023-28410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3006/">CVE-2023-3006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3006">CVE-2023-3006 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-30456/">CVE-2023-30456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31084/">CVE-2023-31084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31084">CVE-2023-31084 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31436/">CVE-2023-31436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33288/">CVE-2023-33288 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009766878" comment="kernel-default-5.14.21-150400.24.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766879" comment="kernel-default-base-5.14.21-150400.24.66.1.150400.24.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205978" version="1" class="patch">
	<metadata>
		<title>Security update for libcap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211418" ref_url="https://bugzilla.suse.com/1211418" source="BUGZILLA"/>
		<reference ref_id="1211419" ref_url="https://bugzilla.suse.com/1211419" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2602" ref_url="https://www.suse.com/security/cve/CVE-2023-2602/" source="CVE"/>
		<reference ref_id="CVE-2023-2603" ref_url="https://www.suse.com/security/cve/CVE-2023-2603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015408.html" source="SUSE-SU"/>
		<description>
This update for libcap fixes the following issues:

- CVE-2023-2602: Fixed improper memory release in libcap/psx/psx.c:__wrap_pthread_create() (bsc#1211418).
- CVE-2023-2603: Fixed an integer overflow or wraparound in libcap/cap_alloc.c:_libcap_strdup() (bsc#1211419).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-03"/>
	<updated date="2023-07-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211418">SUSE bug 1211418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211419">SUSE bug 1211419</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2602/">CVE-2023-2602 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2603/">CVE-2023-2603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770177" comment="libcap2-2.63-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205979" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160435" ref_url="https://bugzilla.suse.com/1160435" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1189998" ref_url="https://bugzilla.suse.com/1189998" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1195655" ref_url="https://bugzilla.suse.com/1195655" source="BUGZILLA"/>
		<reference ref_id="1195921" ref_url="https://bugzilla.suse.com/1195921" source="BUGZILLA"/>
		<reference ref_id="1203906" ref_url="https://bugzilla.suse.com/1203906" source="BUGZILLA"/>
		<reference ref_id="1205650" ref_url="https://bugzilla.suse.com/1205650" source="BUGZILLA"/>
		<reference ref_id="1205756" ref_url="https://bugzilla.suse.com/1205756" source="BUGZILLA"/>
		<reference ref_id="1205758" ref_url="https://bugzilla.suse.com/1205758" source="BUGZILLA"/>
		<reference ref_id="1205760" ref_url="https://bugzilla.suse.com/1205760" source="BUGZILLA"/>
		<reference ref_id="1205762" ref_url="https://bugzilla.suse.com/1205762" source="BUGZILLA"/>
		<reference ref_id="1205803" ref_url="https://bugzilla.suse.com/1205803" source="BUGZILLA"/>
		<reference ref_id="1206024" ref_url="https://bugzilla.suse.com/1206024" source="BUGZILLA"/>
		<reference ref_id="1206578" ref_url="https://bugzilla.suse.com/1206578" source="BUGZILLA"/>
		<reference ref_id="1207553" ref_url="https://bugzilla.suse.com/1207553" source="BUGZILLA"/>
		<reference ref_id="1208050" ref_url="https://bugzilla.suse.com/1208050" source="BUGZILLA"/>
		<reference ref_id="1208410" ref_url="https://bugzilla.suse.com/1208410" source="BUGZILLA"/>
		<reference ref_id="1208600" ref_url="https://bugzilla.suse.com/1208600" source="BUGZILLA"/>
		<reference ref_id="1208604" ref_url="https://bugzilla.suse.com/1208604" source="BUGZILLA"/>
		<reference ref_id="1208758" ref_url="https://bugzilla.suse.com/1208758" source="BUGZILLA"/>
		<reference ref_id="1209039" ref_url="https://bugzilla.suse.com/1209039" source="BUGZILLA"/>
		<reference ref_id="1209287" ref_url="https://bugzilla.suse.com/1209287" source="BUGZILLA"/>
		<reference ref_id="1209288" ref_url="https://bugzilla.suse.com/1209288" source="BUGZILLA"/>
		<reference ref_id="1209367" ref_url="https://bugzilla.suse.com/1209367" source="BUGZILLA"/>
		<reference ref_id="1209856" ref_url="https://bugzilla.suse.com/1209856" source="BUGZILLA"/>
		<reference ref_id="1209982" ref_url="https://bugzilla.suse.com/1209982" source="BUGZILLA"/>
		<reference ref_id="1210165" ref_url="https://bugzilla.suse.com/1210165" source="BUGZILLA"/>
		<reference ref_id="1210294" ref_url="https://bugzilla.suse.com/1210294" source="BUGZILLA"/>
		<reference ref_id="1210449" ref_url="https://bugzilla.suse.com/1210449" source="BUGZILLA"/>
		<reference ref_id="1210450" ref_url="https://bugzilla.suse.com/1210450" source="BUGZILLA"/>
		<reference ref_id="1210498" ref_url="https://bugzilla.suse.com/1210498" source="BUGZILLA"/>
		<reference ref_id="1210533" ref_url="https://bugzilla.suse.com/1210533" source="BUGZILLA"/>
		<reference ref_id="1210551" ref_url="https://bugzilla.suse.com/1210551" source="BUGZILLA"/>
		<reference ref_id="1210647" ref_url="https://bugzilla.suse.com/1210647" source="BUGZILLA"/>
		<reference ref_id="1210741" ref_url="https://bugzilla.suse.com/1210741" source="BUGZILLA"/>
		<reference ref_id="1210775" ref_url="https://bugzilla.suse.com/1210775" source="BUGZILLA"/>
		<reference ref_id="1210783" ref_url="https://bugzilla.suse.com/1210783" source="BUGZILLA"/>
		<reference ref_id="1210791" ref_url="https://bugzilla.suse.com/1210791" source="BUGZILLA"/>
		<reference ref_id="1210806" ref_url="https://bugzilla.suse.com/1210806" source="BUGZILLA"/>
		<reference ref_id="1210940" ref_url="https://bugzilla.suse.com/1210940" source="BUGZILLA"/>
		<reference ref_id="1210947" ref_url="https://bugzilla.suse.com/1210947" source="BUGZILLA"/>
		<reference ref_id="1211037" ref_url="https://bugzilla.suse.com/1211037" source="BUGZILLA"/>
		<reference ref_id="1211043" ref_url="https://bugzilla.suse.com/1211043" source="BUGZILLA"/>
		<reference ref_id="1211044" ref_url="https://bugzilla.suse.com/1211044" source="BUGZILLA"/>
		<reference ref_id="1211089" ref_url="https://bugzilla.suse.com/1211089" source="BUGZILLA"/>
		<reference ref_id="1211105" ref_url="https://bugzilla.suse.com/1211105" source="BUGZILLA"/>
		<reference ref_id="1211113" ref_url="https://bugzilla.suse.com/1211113" source="BUGZILLA"/>
		<reference ref_id="1211131" ref_url="https://bugzilla.suse.com/1211131" source="BUGZILLA"/>
		<reference ref_id="1211205" ref_url="https://bugzilla.suse.com/1211205" source="BUGZILLA"/>
		<reference ref_id="1211263" ref_url="https://bugzilla.suse.com/1211263" source="BUGZILLA"/>
		<reference ref_id="1211280" ref_url="https://bugzilla.suse.com/1211280" source="BUGZILLA"/>
		<reference ref_id="1211281" ref_url="https://bugzilla.suse.com/1211281" source="BUGZILLA"/>
		<reference ref_id="1211299" ref_url="https://bugzilla.suse.com/1211299" source="BUGZILLA"/>
		<reference ref_id="1211346" ref_url="https://bugzilla.suse.com/1211346" source="BUGZILLA"/>
		<reference ref_id="1211387" ref_url="https://bugzilla.suse.com/1211387" source="BUGZILLA"/>
		<reference ref_id="1211410" ref_url="https://bugzilla.suse.com/1211410" source="BUGZILLA"/>
		<reference ref_id="1211414" ref_url="https://bugzilla.suse.com/1211414" source="BUGZILLA"/>
		<reference ref_id="1211449" ref_url="https://bugzilla.suse.com/1211449" source="BUGZILLA"/>
		<reference ref_id="1211465" ref_url="https://bugzilla.suse.com/1211465" source="BUGZILLA"/>
		<reference ref_id="1211519" ref_url="https://bugzilla.suse.com/1211519" source="BUGZILLA"/>
		<reference ref_id="1211564" ref_url="https://bugzilla.suse.com/1211564" source="BUGZILLA"/>
		<reference ref_id="1211590" ref_url="https://bugzilla.suse.com/1211590" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1211686" ref_url="https://bugzilla.suse.com/1211686" source="BUGZILLA"/>
		<reference ref_id="1211687" ref_url="https://bugzilla.suse.com/1211687" source="BUGZILLA"/>
		<reference ref_id="1211688" ref_url="https://bugzilla.suse.com/1211688" source="BUGZILLA"/>
		<reference ref_id="1211689" ref_url="https://bugzilla.suse.com/1211689" source="BUGZILLA"/>
		<reference ref_id="1211690" ref_url="https://bugzilla.suse.com/1211690" source="BUGZILLA"/>
		<reference ref_id="1211691" ref_url="https://bugzilla.suse.com/1211691" source="BUGZILLA"/>
		<reference ref_id="1211692" ref_url="https://bugzilla.suse.com/1211692" source="BUGZILLA"/>
		<reference ref_id="1211693" ref_url="https://bugzilla.suse.com/1211693" source="BUGZILLA"/>
		<reference ref_id="1211714" ref_url="https://bugzilla.suse.com/1211714" source="BUGZILLA"/>
		<reference ref_id="1211796" ref_url="https://bugzilla.suse.com/1211796" source="BUGZILLA"/>
		<reference ref_id="1211804" ref_url="https://bugzilla.suse.com/1211804" source="BUGZILLA"/>
		<reference ref_id="1211807" ref_url="https://bugzilla.suse.com/1211807" source="BUGZILLA"/>
		<reference ref_id="1211808" ref_url="https://bugzilla.suse.com/1211808" source="BUGZILLA"/>
		<reference ref_id="1211847" ref_url="https://bugzilla.suse.com/1211847" source="BUGZILLA"/>
		<reference ref_id="1211852" ref_url="https://bugzilla.suse.com/1211852" source="BUGZILLA"/>
		<reference ref_id="1211855" ref_url="https://bugzilla.suse.com/1211855" source="BUGZILLA"/>
		<reference ref_id="1211960" ref_url="https://bugzilla.suse.com/1211960" source="BUGZILLA"/>
		<reference ref_id="1212129" ref_url="https://bugzilla.suse.com/1212129" source="BUGZILLA"/>
		<reference ref_id="1212154" ref_url="https://bugzilla.suse.com/1212154" source="BUGZILLA"/>
		<reference ref_id="1212155" ref_url="https://bugzilla.suse.com/1212155" source="BUGZILLA"/>
		<reference ref_id="1212158" ref_url="https://bugzilla.suse.com/1212158" source="BUGZILLA"/>
		<reference ref_id="1212350" ref_url="https://bugzilla.suse.com/1212350" source="BUGZILLA"/>
		<reference ref_id="1212448" ref_url="https://bugzilla.suse.com/1212448" source="BUGZILLA"/>
		<reference ref_id="1212494" ref_url="https://bugzilla.suse.com/1212494" source="BUGZILLA"/>
		<reference ref_id="1212504" ref_url="https://bugzilla.suse.com/1212504" source="BUGZILLA"/>
		<reference ref_id="1212513" ref_url="https://bugzilla.suse.com/1212513" source="BUGZILLA"/>
		<reference ref_id="1212540" ref_url="https://bugzilla.suse.com/1212540" source="BUGZILLA"/>
		<reference ref_id="1212561" ref_url="https://bugzilla.suse.com/1212561" source="BUGZILLA"/>
		<reference ref_id="1212563" ref_url="https://bugzilla.suse.com/1212563" source="BUGZILLA"/>
		<reference ref_id="1212564" ref_url="https://bugzilla.suse.com/1212564" source="BUGZILLA"/>
		<reference ref_id="1212584" ref_url="https://bugzilla.suse.com/1212584" source="BUGZILLA"/>
		<reference ref_id="1212592" ref_url="https://bugzilla.suse.com/1212592" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4269" ref_url="https://www.suse.com/security/cve/CVE-2022-4269/" source="CVE"/>
		<reference ref_id="CVE-2022-45884" ref_url="https://www.suse.com/security/cve/CVE-2022-45884/" source="CVE"/>
		<reference ref_id="CVE-2022-45885" ref_url="https://www.suse.com/security/cve/CVE-2022-45885/" source="CVE"/>
		<reference ref_id="CVE-2022-45886" ref_url="https://www.suse.com/security/cve/CVE-2022-45886/" source="CVE"/>
		<reference ref_id="CVE-2022-45887" ref_url="https://www.suse.com/security/cve/CVE-2022-45887/" source="CVE"/>
		<reference ref_id="CVE-2022-45919" ref_url="https://www.suse.com/security/cve/CVE-2022-45919/" source="CVE"/>
		<reference ref_id="CVE-2023-1077" ref_url="https://www.suse.com/security/cve/CVE-2023-1077/" source="CVE"/>
		<reference ref_id="CVE-2023-1079" ref_url="https://www.suse.com/security/cve/CVE-2023-1079/" source="CVE"/>
		<reference ref_id="CVE-2023-1249" ref_url="https://www.suse.com/security/cve/CVE-2023-1249/" source="CVE"/>
		<reference ref_id="CVE-2023-1380" ref_url="https://www.suse.com/security/cve/CVE-2023-1380/" source="CVE"/>
		<reference ref_id="CVE-2023-1382" ref_url="https://www.suse.com/security/cve/CVE-2023-1382/" source="CVE"/>
		<reference ref_id="CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002/" source="CVE"/>
		<reference ref_id="CVE-2023-21102" ref_url="https://www.suse.com/security/cve/CVE-2023-21102/" source="CVE"/>
		<reference ref_id="CVE-2023-2124" ref_url="https://www.suse.com/security/cve/CVE-2023-2124/" source="CVE"/>
		<reference ref_id="CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156/" source="CVE"/>
		<reference ref_id="CVE-2023-2162" ref_url="https://www.suse.com/security/cve/CVE-2023-2162/" source="CVE"/>
		<reference ref_id="CVE-2023-2269" ref_url="https://www.suse.com/security/cve/CVE-2023-2269/" source="CVE"/>
		<reference ref_id="CVE-2023-2483" ref_url="https://www.suse.com/security/cve/CVE-2023-2483/" source="CVE"/>
		<reference ref_id="CVE-2023-2513" ref_url="https://www.suse.com/security/cve/CVE-2023-2513/" source="CVE"/>
		<reference ref_id="CVE-2023-28410" ref_url="https://www.suse.com/security/cve/CVE-2023-28410/" source="CVE"/>
		<reference ref_id="CVE-2023-3006" ref_url="https://www.suse.com/security/cve/CVE-2023-3006/" source="CVE"/>
		<reference ref_id="CVE-2023-30456" ref_url="https://www.suse.com/security/cve/CVE-2023-30456/" source="CVE"/>
		<reference ref_id="CVE-2023-31084" ref_url="https://www.suse.com/security/cve/CVE-2023-31084/" source="CVE"/>
		<reference ref_id="CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141/" source="CVE"/>
		<reference ref_id="CVE-2023-31436" ref_url="https://www.suse.com/security/cve/CVE-2023-31436/" source="CVE"/>
		<reference ref_id="CVE-2023-3161" ref_url="https://www.suse.com/security/cve/CVE-2023-3161/" source="CVE"/>
		<reference ref_id="CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233/" source="CVE"/>
		<reference ref_id="CVE-2023-33288" ref_url="https://www.suse.com/security/cve/CVE-2023-33288/" source="CVE"/>
		<reference ref_id="CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788/" source="CVE"/>
		<reference ref_id="CVE-2023-35823" ref_url="https://www.suse.com/security/cve/CVE-2023-35823/" source="CVE"/>
		<reference ref_id="CVE-2023-35828" ref_url="https://www.suse.com/security/cve/CVE-2023-35828/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-35828: Fixed a use-after-free flaw inside renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c (bsc#1212513).
- CVE-2023-35823: Fixed a use-after-free in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c (bsc#1212494).
- CVE-2023-35788: Fixed an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets in fl_set_geneve_opt in net/sched/cls_flower.c (bsc#1212504).
- CVE-2023-33288: Fixed a use-after-free in bq24190_remove in drivers/power/supply/bq24190_charger.c (bsc#1211590).
- CVE-2023-32233: Fixed a use-after-free in Netfilter nf_tables when processing batch requests (bsc#1211043).
- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
- CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb-core/dvb_frontend.c (bsc#1210783).
- CVE-2023-30456: Fixed an issue in arch/x86/kvm/vmx/nested.c with nVMX on x86_64 lacks consistency checks for CR0 and CR4 (bsc#1210294).
- CVE-2023-3006: Fixed a known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, for the new hw AmpereOne (bsc#1211855).
- CVE-2023-28410: Fixed improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers that may have allowed an authenticated user to potentially enable escalation of privilege via local access (bsc#1211263).
- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).
- CVE-2023-2483: Fixed a use after free bug in emac_remove due caused by a race condition (bsc#1211037).
- CVE-2023-2269: Fixed a denial-of-service problem due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c (bsc#1210806).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
- CVE-2023-21102: Fixed possible bypass of shadow stack protection in __efi_rt_asm_wrapper of efi-rt-wrapper.S (bsc#1212155).
- CVE-2023-2002: Fixed a flaw that allowed an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication (bsc#1210533).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287).
- CVE-2023-1249: Fixed a use-after-free flaw inside the core dump subsystem, that could have been used to crash the system (bsc#1209039).
- CVE-2023-1079: Fixed a use-after-free problem that could have been triggered in asus_kbd_backlight_set when plugging/disconnecting a malicious USB device (bsc#1208604).
- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).
- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).
- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).
- CVE-2022-4269: Fixed a flaw was found inside the Traffic Control (TC) subsystem (bsc#1206024).

The following non-security bugs were fixed:

- 3c589_cs: Fix an error handling path in tc589_probe() (git-fixes).
- ACPI: EC: Fix oops when removing custom query handlers (git-fixes).
- ACPI: bus: Ensure that notify handlers are not running after removal (git-fixes).
- ACPI: processor: Fix evaluating _PDC method when running as Xen dom0 (git-fixes).
- ACPI: sleep: Avoid breaking S3 wakeup due to might_sleep() (git-fixes).
- ACPI: tables: Add support for NBFT (bsc#1195921).
- ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects (git-fixes).
- ACPICA: Avoid undefined behavior: applying zero offset to null pointer (git-fixes).
- ALSA: caiaq: input: Add error handling for unsupported input methods in `snd_usb_caiaq_input_init` (git-fixes).
- ALSA: cs46xx: mark snd_cs46xx_download_image as static (git-fixes).
- ALSA: firewire-digi00x: prevent potential use after free (git-fixes).
- ALSA: hda/ca0132: add quirk for EVGA X299 DARK (git-fixes).
- ALSA: hda/realtek: Add Lenovo P3 Tower platform (git-fixes).
- ALSA: hda/realtek: Add a quirk for Compaq N14JP6 (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP EliteDesk 805 (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP Slim Desktop S01 (git-fixes).
- ALSA: hda/realtek: Add quirk for 2nd ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UM3402YAR using CS35L41 (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo L140AU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50AU (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook G10 laptops (git-fixes).
- ALSA: hda/realtek: Add quirk for ThinkPad P1 Gen 6 (git-fixes).
- ALSA: hda/realtek: Add quirks for Asus ROG 2024 laptops using CS35L41 (git-fixes).
- ALSA: hda/realtek: Apply HP B&amp;O top speaker profile to Pavilion 15 (git-fixes).
- ALSA: hda/realtek: Enable 4 amplifiers instead of 2 on a HP platform (git-fixes).
- ALSA: hda/realtek: Enable headset onLenovo M70/M90 (git-fixes).
- ALSA: hda/realtek: Fix mute and micmute LEDs for an HP laptop (git-fixes).
- ALSA: hda/realtek: Fix mute and micmute LEDs for yet another HP laptop (git-fixes).
- ALSA: hda/realtek: support HP Pavilion Aero 13-be0xxx Mute LED (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs a3 through a7 to patch table (git-fixes).
- ALSA: hda: Fix Oops by 9.1 surround channel names (git-fixes).
- ALSA: hda: Fix unhandled register update during auto-suspend period (git-fixes).
- ALSA: hda: Glenfly: add HD Audio PCI IDs and HDMI Codec Vendor IDs (git-fixes).
- ALSA: oss: avoid missing-prototype warnings (git-fixes).
- ALSA: usb-audio: Add a sample rate workaround for Line6 Pod Go (git-fixes).
- ALSA: usb-audio: Add quirk flag for HEM devices to enable native DSD playback (git-fixes).
- ALSA: usb-audio: Add quirk for Pioneer DDJ-800 (git-fixes).
- ALSA: usb-audio: Fix broken resume due to UAC3 power state (git-fixes).
- ARM64: dts: Add DTS files for bcmbca SoC BCM6858 (git-fixes).
- ARM: 9295/1: unwind:fix unwind abort for uleb128 case (git-fixes)
- ARM: 9296/1: HP Jornada 7XX: fix kernel-doc warnings (git-fixes).
- ARM: cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).
- ARM: dts: qcom: ipq8064: Fix the PCI I/O port range (git-fixes).
- ARM: dts: qcom: ipq8064: reduce pci IO size to 64K (git-fixes).
- ARM: dts: vexpress: add missing cache properties (git-fixes).
- ASOC: Intel: sof_sdw: add quirk for Intel 'Rooks County' NUC M15 (git-fixes).
- ASoC: Intel: Skylake: Fix declaration of enum skl_ch_cfg (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer Iconia One 7 B1-750 (git-fixes).
- ASoC: codecs: wsa881x: do not set can_multi_write flag (git-fixes).
- ASoC: dwc: limit the number of overrun messages (git-fixes).
- ASoC: dwc: move DMA init to snd_soc_dai_driver probe() (git-fixes).
- ASoC: fsl_micfil: Fix error handler with pm_runtime_enable (git-fixes).
- ASoC: lpass: Fix for KASAN use_after_free out of bounds (git-fixes).
- ASoC: rt5682: Disable jack detection interrupt during suspend (git-fixes).
- ASoC: soc-pcm: fix hw-&gt;formats cleared by soc_pcm_hw_init() for dpcm (git-fixes).
- ASoC: soc-pcm: test if a BE can be prepared (git-fixes).
- ASoC: ssm2602: Add workaround for playback distortions (git-fixes).
- Add a bug reference to two existing drm-hyperv changes (bsc#1211281).
- Also include kernel-docs build requirements for ALP
- Avoid unsuported tar parameter on SLE12
- Bluetooth: Fix l2cap_disconnect_req deadlock (git-fixes).
- Bluetooth: Fix use-after-free in hci_remove_ltk/hci_remove_irk (git-fixes).
- Bluetooth: L2CAP: Add missing checks for invalid DCID (git-fixes).
- Bluetooth: L2CAP: fix 'bad unlock balance' in l2cap_disconnect_rsp (git-fixes).
- Bluetooth: btintel: Add LE States quirk support (git-fixes).
- Bluetooth: hci_bcm: Fall back to getting bdaddr from EFI if not set (git-fixes).
- Bluetooth: hci_qca: fix debugfs registration (git-fixes).
- Documentation/filesystems: ramfs-rootfs-initramfs: use :Author: (git-fixes).
- Documentation/filesystems: sharedsubtree: add section headings (git-fixes).
- HID: google: add jewel USB id (git-fixes).
- HID: logitech-hidpp: Do not use the USB serial for USB devices (git-fixes).
- HID: logitech-hidpp: Reconcile USB and Unifying serials (git-fixes).
- HID: microsoft: Add rumble support to latest xbox controllers (bsc#1211280).
- HID: wacom: Add new Intuos Pro Small (PTH-460) device IDs (git-fixes).
- HID: wacom: Force pen out of prox if no events have been received in a while (git-fixes).
- HID: wacom: Set a default resolution for older tablets (git-fixes).
- HID: wacom: add three styli to wacom_intuos_get_tool_type (git-fixes).
- HID: wacom: avoid integer overflow in wacom_intuos_inout() (git-fixes).
- HID: wacom: generic: Set battery quirk only when we see battery data (git-fixes).
- IB/hfi1: Fix SDMA mmu_rb_node not being evicted in LRU order (git-fixes)
- IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests (git-fixes)
- IB/hifi1: add a null check of kzalloc_node in hfi1_ipoib_txreq_init (git-fixes)
- IB/rdmavt: add missing locks in rvt_ruc_loopback (git-fixes)
- Input: fix open count when closing inhibited device (git-fixes).
- Input: psmouse - fix OOB access in Elantech protocol (git-fixes).
- Input: xpad - add constants for GIP interface numbers (git-fixes).
- Input: xpad - delete a Razer DeathAdder mouse VID/PID entry (git-fixes).
- KEYS: asymmetric: Copy sig and digest in public_key_verify_signature() (git-fixes).
- KVM: Destroy target device if coalesced MMIO unregistration fails (git-fixes)
- KVM: Disallow user memslot with size that exceeds 'unsigned long' (git-fixes)
- KVM: Do not create VM debugfs files outside of the VM directory (git-fixes)
- KVM: Do not set Accessed/Dirty bits for ZERO_PAGE (git-fixes)
- KVM: LAPIC: Enable timer posted-interrupt only when mwait/hlt is advertised (git-fixes).
- KVM: Prevent module exit until all VMs are freed (git-fixes)
- KVM: SVM: Do not rewrite guest ICR on AVIC IPI virtualization failure (git-fixes).
- KVM: SVM: Fix benign 'bool vs. int' comparison in svm_set_cr0() (git-fixes).
- KVM: SVM: Fix potential overflow in SEV's send|receive_update_data() (git-fixes).
- KVM: SVM: Require logical ID to be power-of-2 for AVIC entry (git-fixes).
- KVM: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid (git-fixes).
- KVM: SVM: hyper-v: placate modpost section mismatch error (git-fixes).
- KVM: VMX: Introduce vmx_msr_bitmap_l01_changed() helper (git-fixes).
- KVM: VMX: Resume guest immediately when injecting #GP on ECREATE (git-fixes).
- KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow (git-fixes).
- KVM: VMX: Use is_64_bit_mode() to check 64-bit mode in SGX handler (git-fixes).
- KVM: X86: Fix tlb flush for tdp in kvm_invalidate_pcid() (git-fixes).
- KVM: arm64: Do not arm a hrtimer for an already pending timer (git-fixes)
- KVM: arm64: Do not hypercall before EL2 init (git-fixes)
- KVM: arm64: Do not return from void function (git-fixes)
- KVM: arm64: Fix PAR_TO_HPFAR() to work independently of PA_BITS. (git-fixes)
- KVM: arm64: Fix S1PTW handling on RO memslots (git-fixes)
- KVM: arm64: Fix bad dereference on MTE-enabled systems (git-fixes)
- KVM: arm64: Fix buffer overflow in kvm_arm_set_fw_reg() (git-fixes)
- KVM: arm64: Fix kvm init failure when mode!=vhe and VA_BITS=52. (git-fixes)
- KVM: arm64: Free hypervisor allocations if vector slot init fails (git-fixes)
- KVM: arm64: GICv4.1: Fix race with doorbell on VPE (git-fixes)
- KVM: arm64: Limit length in kvm_vm_ioctl_mte_copy_tags() to INT_MAX (git-fixes)
- KVM: arm64: PMU: Restore the guest's EL0 event counting after (git-fixes)
- KVM: arm64: Propagate errors from __pkvm_prot_finalize hypercall (git-fixes)
- KVM: arm64: Reject 32bit user PSTATE on asymmetric systems (git-fixes)
- KVM: arm64: Save PSTATE early on exit (git-fixes)
- KVM: arm64: Stop handle_exit() from handling HVC twice when an SError (git-fixes)
- KVM: arm64: Treat PMCR_EL1.LC as RES1 on asymmetric systems (git-fixes)
- KVM: arm64: nvhe: Eliminate kernel-doc warnings (git-fixes)
- KVM: arm64: vgic: Fix exit condition in scan_its_table() (git-fixes)
- KVM: arm64: vgic: Read HW interrupt pending state from the HW (git-fixes)
- KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS (git-fixes).
- KVM: nVMX: Do not use Enlightened MSR Bitmap for L3 (git-fixes).
- KVM: nVMX: Document that ignoring memory failures for VMCLEAR is deliberate (git-fixes).
- KVM: nVMX: Emulate NOPs in L2, and PAUSE if it's not intercepted (git-fixes).
- KVM: nVMX: Inject #GP, not #UD, if 'generic' VMXON CR0/CR4 check fails (git-fixes).
- KVM: nVMX: Prioritize TSS T-flag #DBs over Monitor Trap Flag (git-fixes).
- KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1 (git-fixes).
- KVM: nVMX: Treat General Detect #DB (DR7.GD=1) as fault-like (git-fixes).
- KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER (git-fixes).
- KVM: x86/emulator: Emulate RDPID only if it is enabled in guest (git-fixes).
- KVM: x86/mmu: avoid NULL-pointer dereference on page freeing bugs (git-fixes).
- KVM: x86/pmu: Ignore pmu-&gt;global_ctrl check if vPMU does not support global_ctrl (git-fixes).
- KVM: x86/svm: add __GFP_ACCOUNT to __sev_dbg_{en,de}crypt_user() (git-fixes).
- KVM: x86/vmx: Do not skip segment attributes if unusable bit is set (git-fixes).
- KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page() (git-fixes).
- KVM: x86: Copy filter arg outside kvm_vm_ioctl_set_msr_filter() (git-fixes).
- KVM: x86: Do not change ICR on write to APIC_SELF_IPI (git-fixes).
- KVM: x86: Fail emulation during EMULTYPE_SKIP on any exception (git-fixes).
- KVM: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.8000001FH (git-fixes).
- KVM: x86: Mask off unsupported and unknown bits of IA32_ARCH_CAPABILITIES (git-fixes).
- KVM: x86: Protect the unused bits in MSR exiting flags (git-fixes).
- KVM: x86: Remove a redundant guest cpuid check in kvm_set_cr4() (git-fixes).
- KVM: x86: Report deprecated x87 features in supported CPUID (git-fixes).
- KVM: x86: do not set st-&gt;preempted when going back to user space (git-fixes).
- KVM: x86: fix typo in __try_cmpxchg_user causing non-atomicness (git-fixes).
- KVM: x86: ioapic: Fix level-triggered EOI and userspace I/OAPIC reconfigure race (git-fixes).
- PCI/ASPM: Remove pcie_aspm_pm_state_change() (git-fixes).
- PM: hibernate: Do not get block device exclusively in test_resume mode (git-fixes).
- PM: hibernate: Turn snapshot_test into global variable (git-fixes).
- PM: hibernate: fix load_image_and_restore() error path (git-fixes).
- RDMA/bnxt_re: Fix a possible memory leak (git-fixes)
- RDMA/bnxt_re: Fix return value of bnxt_re_process_raw_qp_pkt_rx (git-fixes)
- RDMA/bnxt_re: Fix the page_size used during the MR creation (git-fixes)
- RDMA/cm: Trace icm_send_rej event before the cm state is reset (git-fixes)
- RDMA/core: Fix multiple -Warray-bounds warnings (git-fixes)
- RDMA/efa: Fix unsupported page sizes in device (git-fixes)
- RDMA/hns: Fix base address table allocation (git-fixes)
- RDMA/hns: Fix timeout attr in query qp for HIP08 (git-fixes)
- RDMA/hns: Modify the value of long message loopback slice (git-fixes)
- RDMA/irdma: Add SW mechanism to generate completions on error (jsc#SLE-18383).
- RDMA/irdma: Do not generate SW completions for NOPs (jsc#SLE-18383).
- RDMA/irdma: Fix Local Invalidate fencing (git-fixes)
- RDMA/irdma: Fix RQ completion opcode (jsc#SLE-18383).
- RDMA/irdma: Fix drain SQ hang with no completion (jsc#SLE-18383).
- RDMA/irdma: Fix inline for multiple SGE's (jsc#SLE-18383).
- RDMA/irdma: Prevent QP use after free (git-fixes)
- RDMA/irdma: Remove enum irdma_status_code (jsc#SLE-18383).
- RDMA/irdma: Remove excess error variables (jsc#SLE-18383).
- RDMA/mana: Remove redefinition of basic u64 type (bsc#1210741 jsc#PED-4022).
- RDMA/mana: hide new rdma_driver_ids (bsc#1210741 jsc#PED-4022).
- RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter (bsc#1210741 jsc#PED-4022).
- RDMA/mana_ib: Fix a bug when the PF indicates more entries for registering memory on first packet (bsc#1210741 jsc#PED-4022).
- RDMA/mana_ib: Prevent array underflow in mana_ib_create_qp_raw() (bsc#1210741 jsc#PED-4022).
- RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() (jsc#SLE-19255).
- RDMA/mlx5: Fix flow counter query via DEVX (git-fixes)
- RDMA/mlx5: Use correct device num_ports when modify DC (git-fixes)
- RDMA/rdmavt: Delete unnecessary NULL check (git-fixes)
- RDMA/rtrs-clt: Replace list_next_or_null_rr_rcu with an inline function (git-fixes)
- RDMA/rtrs-srv: Pass the correct number of entries for dma mapped SGL (git-fixes)
- RDMA/rxe: Fix the error 'trying to register non-static key in rxe_cleanup_task' (git-fixes)
- RDMA/rxe: Remove tasklet call from rxe_cq.c (git-fixes)
- RDMA/siw: Fix potential page_array out of range access (git-fixes)
- RDMA/siw: Remove namespace check from siw_netdev_event() (git-fixes)
- RDMA/srpt: Add a check for valid 'mad_agent' pointer (git-fixes)
- Remove orphaned CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT (bsc#1189998 git-fixes).
- Revert 'KVM: set owner of cpu and vm file operations' (git-fixes)
- SMB3.1.1: add new tree connect ShareFlags (bsc#1193629).
- SMB3: Add missing locks to protect deferred close file list (git-fixes).
- SMB3: Close all deferred handles of inode in case of handle lease break (bsc#1193629).
- SMB3: Close deferred file handles in case of handle lease break (bsc#1193629).
- SMB3: drop reference to cfile before sending oplock break (bsc#1193629).
- SMB3: force unmount was failing to close deferred close files (bsc#1193629).
- SUNRPC: Clean up svc_deferred_class trace events (git-fixes).
- SUNRPC: fix breakage caused by introduction of rq_xprt_ctxt (bsc#1210775).
- Squashfs: fix handling and sanity checking of xattr_ids count (git-fixes).
- Trim obsolete KMP list. SLE11 is out of support, we do not need to handle upgrading from SLE11 SP1.
- USB / dwc3: Fix a checkpatch warning in core.c (git-fixes).
- USB: UHCI: adjust zhaoxin UHCI controllers OverCurrent bit value (git-fixes).
- USB: core: Add routines for endpoint checks in old drivers (git-fixes).
- USB: dwc3: fix use-after-free on core driver unbind (git-fixes).
- USB: dwc3: qcom: fix NULL-deref on suspend (git-fixes).
- USB: serial: option: add Quectel EM061KGL series (git-fixes).
- USB: sisusbvga: Add endpoint checks (git-fixes).
- USB: usbtmc: Fix direction for 0-length ioctl control messages (git-fixes).
- affs: initialize fsdata in affs_truncate() (git-fixes).
- apparmor: add a kernel label to use on kernel objects (bsc#1211113).
- arm64: Always load shadow stack pointer directly from the task struct (git-fixes)
- arm64: Stash shadow stack pointer in the task struct on interrupt (git-fixes)
- arm64: dts: Add DTS files for bcmbca SoC BCM4912 (git-fixes).
- arm64: dts: Add DTS files for bcmbca SoC BCM63158 (git-fixes).
- arm64: dts: Add base DTS file for bcmbca device Asus GT-AX6000 (git-fixes).
- arm64: dts: broadcom: bcm4908: add DT for Netgear RAXE500 (git-fixes).
- arm64: dts: imx8-ss-dma: assign default clock rate for lpuarts (git-fixes).
- arm64: dts: imx8mn-beacon: Fix SPI CS pinmux (git-fixes).
- arm64: dts: imx8qm-mek: correct GPIOs for USDHC2 CD and WP signals (git-fixes).
- arm64: dts: qcom: msm8996: Add missing DWC3 quirks (git-fixes).
- arm64: dts: qcom: sc7180-lite: Fix SDRAM freq for misidentified sc7180-lite boards (git-fixes).
- arm64: errata: add detection for AMEVCNTR01 incrementing incorrectly (git-fixes).
- arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes)
- arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes).
- asm-generic/io.h: suppress endianness warnings for readq() and writeq() (git-fixes).
- ata: libata-scsi: Use correct device no in ata_find_dev() (git-fixes).
- ata: pata_octeon_cf: drop kernel-doc notation (git-fixes).
- ath6kl: Use struct_group() to avoid size-mismatched casting (git-fixes).
- batman-adv: Broken sync while rescheduling delayed work (git-fixes).
- block: add a bdev_max_zone_append_sectors helper (git-fixes).
- bluetooth: Add cmd validity checks at the start of hci_sock_ioctl() (git-fixes).
- bnxt: Do not read past the end of test names (jsc#SLE-18978).
- bnxt: prevent skb UAF after handing over to PTP worker (jsc#SLE-18978).
- bnxt_en: Add missing 200G link speed reporting (jsc#SLE-18978).
- bnxt_en: Avoid order-5 memory allocation for TPA data (jsc#SLE-18978).
- bnxt_en: Do not initialize PTP on older P3/P4 chips (jsc#SLE-18978).
- bnxt_en: Do not issue AP reset during ethtool's reset operation (git-fixes).
- bnxt_en: Fix mqprio and XDP ring checking logic (jsc#SLE-18978).
- bnxt_en: Fix reporting of test result in ethtool selftest (jsc#SLE-18978).
- bnxt_en: Fix typo in PCI id to device description string mapping (jsc#SLE-18978).
- bnxt_en: Implement .set_port / .unset_port UDP tunnel callbacks (git-fixes).
- bnxt_en: Query default VLAN before VNIC setup on a VF (git-fixes).
- bnxt_en: Skip firmware fatal error recovery if chip is not accessible (git-fixes).
- bnxt_en: fix NQ resource accounting during vf creation on 57500 chips (jsc#SLE-18978).
- bnxt_en: set missing reload flag in devlink features (jsc#SLE-18978).
- bpf, arm64: Call build_prologue() first in first JIT pass (git-fixes)
- bpf, arm64: Clear prog-&gt;jited_len along prog-&gt;jited (git-fixes)
- bpf, arm64: Feed byte-offset into bpf line info (git-fixes)
- bpf, arm64: Use emit_addr_mov_i64() for BPF_PSEUDO_FUNC (git-fixes)
- bpf: Add extra path pointer check to d_path helper (git-fixes).
- bpf: Fix UAF in task local storage (bsc#1212564).
- can: isotp: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes).
- can: j1939: avoid possible use-after-free when j1939_can_rx_register fails (git-fixes).
- can: j1939: change j1939_netdev_lock type to mutex (git-fixes).
- can: j1939: j1939_sk_send_loop_abort(): improved error queue handling in J1939 Socket (git-fixes).
- can: j1939: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes).
- can: kvaser_pciefd: Call request_irq() before enabling interrupts (git-fixes).
- can: kvaser_pciefd: Clear listen-only bit if not explicitly requested (git-fixes).
- can: kvaser_pciefd: Disable interrupts in probe error path (git-fixes).
- can: kvaser_pciefd: Do not send EFLUSH command on TFD interrupt (git-fixes).
- can: kvaser_pciefd: Empty SRB buffer in probe (git-fixes).
- can: kvaser_pciefd: Set CAN_STATE_STOPPED in kvaser_pciefd_stop() (git-fixes).
- can: kvaser_usb: Add struct kvaser_usb_busparams (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Get capabilities from device (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Handle CMD_ERROR_EVENT (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Rename {leaf,usbcan}_cmd_error_event to {leaf,usbcan}_cmd_can_error_event (git-fixes).
- can: kvaser_usb_leaf: Fix overread with an invalid command (git-fixes).
- cassini: Fix a memory leak in the error handling path of cas_init_one() (git-fixes).
- ceph: fix use-after-free bug for inodes when flushing capsnaps (bsc#1212540).
- ceph: force updating the msg pointer in non-split case (bsc#1211804).
- cgroup.c: add helper __cset_cgroup_from_root to cleanup duplicated codes (bsc#1203906).
- cgroup: Homogenize cgroup_get_from_id() return value (bsc#1205650).
- cgroup: Honor caller's cgroup NS when resolving path (bsc#1205650).
- cgroup: Make cgroup_get_from_id() prettier (bsc#1205650).
- cgroup: Reorganize css_set_lock and kernfs path processing (bsc#1205650).
- cgroup: Use cgroup_attach_{lock,unlock}() from cgroup_attach_task_all() (bsc#1212563).
- cgroup: always put cset in cgroup_css_set_put_fork (bsc#1212561).
- cgroup: cgroup: Honor caller's cgroup NS when resolving cgroup  id (bsc#1205650).
- cgroup: fix missing cpus_read_{lock,unlock}() in cgroup_transfer_tasks() (bsc#1212563).
- cgroup: reduce dependency on cgroup_mutex (bsc#1205650).
- cifs: Avoid a cast in add_lease_context() (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: avoid dup prefix path in dfs_get_automount_devname() (git-fixes).
- cifs: avoid potential races when handling multiple dfs tcons (bsc#1208758).
- cifs: fix pcchunk length type in smb2_copychunk_range (bsc#1193629).
- cifs: fix potential race when tree connecting ipc (bsc#1208758).
- cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname (bsc#1208758).
- cifs: fix sharing of DFS connections (bsc#1208758).
- cifs: fix smb1 mount regression (bsc#1193629).
- cifs: mapchars mount option ignored (bsc#1193629).
- cifs: missing lock when updating session status (bsc#1193629).
- cifs: print smb3_fs_context::source when mounting (bsc#1193629).
- cifs: protect access of TCP_Server_Info::{origin,leaf}_fullpath (bsc#1208758).
- cifs: protect session status check in smb2_reconnect() (bsc#1208758).
- cifs: release leases for deferred close handles when freezing (bsc#1193629).
- cifs: sanitize paths in cifs_update_super_prepath (git-fixes).
- cifs: update internal module version number for cifs.ko (bsc#1193629).
- clk: qcom: gcc-sm8350: fix PCIe PIPE clocks handling (git-fixes).
- clk: qcom: regmap: add PHY clock source implementation (git-fixes).
- clk: tegra20: fix gcc-7 constant overflow warning (git-fixes).
- configfs: fix possible memory leak in configfs_create_dir() (git-fixes).
- crypto: acomp - define max size for destination (jsc#PED-3692)
- crypto: drivers - move from strlcpy with unused retval to (jsc#PED-3692)
- crypto: qat - Fix unsigned function returning negative (jsc#PED-3692)
- crypto: qat - Removes the x86 dependency on the QAT drivers (jsc#PED-3692)
- crypto: qat - abstract PFVF messages with struct pfvf_message (jsc#PED-3692)
- crypto: qat - abstract PFVF receive logic (jsc#PED-3692)
- crypto: qat - abstract PFVF send function (jsc#PED-3692)
- crypto: qat - add PFVF support to enable the reset of ring (jsc#PED-3692)
- crypto: qat - add PFVF support to the GEN4 host driver (jsc#PED-3692)
- crypto: qat - add VF and PF wrappers to common send function (jsc#PED-3692)
- crypto: qat - add backlog mechanism (jsc#PED-3692)
- crypto: qat - add check for invalid PFVF protocol version 0 (jsc#PED-3692)
- crypto: qat - add check to validate firmware images (jsc#PED-3692)
- crypto: qat - add limit to linked list parsing (jsc#PED-3692)
- crypto: qat - add misc workqueue (jsc#PED-3692)
- crypto: qat - add missing restarting event notification in (jsc#PED-3692)
- crypto: qat - add param check for DH (jsc#PED-3692)
- crypto: qat - add param check for RSA (jsc#PED-3692)
- crypto: qat - add pfvf_ops (jsc#PED-3692)
- crypto: qat - add resubmit logic for decompression (jsc#PED-3692)
- crypto: qat - add support for 401xx devices (jsc#PED-3692)
- crypto: qat - add support for compression for 4xxx (jsc#PED-3692)
- crypto: qat - add the adf_get_pmisc_base() helper function (jsc#PED-3692)
- crypto: qat - allow detection of dc capabilities for 4xxx (jsc#PED-3692)
- crypto: qat - change PFVF ACK behaviour (jsc#PED-3692)
- crypto: qat - change behaviour of (jsc#PED-3692)
- crypto: qat - change bufferlist logic interface (jsc#PED-3692)
- crypto: qat - config VFs based on ring-to-svc mapping (jsc#PED-3692)
- crypto: qat - differentiate between pf2vf and vf2pf offset (jsc#PED-3692)
- crypto: qat - disable AER if an error occurs in probe (jsc#PED-3692)
- crypto: qat - do not handle PFVF sources for qat_4xxx (jsc#PED-3692)
- crypto: qat - do not rely on min version (jsc#PED-3692)
- crypto: qat - enable deflate for QAT GEN4 (jsc#PED-3692)
- crypto: qat - enable power management for QAT GEN4 (jsc#PED-3692)
- crypto: qat - exchange device capabilities over PFVF (jsc#PED-3692)
- crypto: qat - exchange ring-to-service mappings over PFVF (jsc#PED-3692)
- crypto: qat - expose deflate through acomp api for QAT GEN2 (jsc#PED-3692)
- crypto: qat - expose device config through sysfs for 4xxx (jsc#PED-3692)
- crypto: qat - expose device state through sysfs for 4xxx (jsc#PED-3692)
- crypto: qat - extend buffer list interface (jsc#PED-3692)
- crypto: qat - extend crypto capability detection for 4xxx (jsc#PED-3692)
- crypto: qat - extract send and wait from (jsc#PED-3692)
- crypto: qat - fix DMA transfer direction (jsc#PED-3692)
- crypto: qat - fix ETR sources enabled by default on GEN2 (jsc#PED-3692)
- crypto: qat - fix VF IDs in PFVF log messages (jsc#PED-3692)
- crypto: qat - fix a signedness bug in get_service_enabled() (jsc#PED-3692)
- crypto: qat - fix a typo in a comment (jsc#PED-3692)
- crypto: qat - fix access to PFVF interrupt registers for GEN4 (jsc#PED-3692)
- crypto: qat - fix definition of ring reset results (jsc#PED-3692)
- crypto: qat - fix error return code in adf_probe (jsc#PED-3692)
- crypto: qat - fix handling of VF to PF interrupts (jsc#PED-3692)
- crypto: qat - fix initialization of pfvf cap_msg structures (jsc#PED-3692)
- crypto: qat - fix initialization of pfvf rts_map_msg (jsc#PED-3692)
- crypto: qat - fix off-by-one error in PFVF debug print (jsc#PED-3692)
- crypto: qat - fix wording and formatting in code comment (jsc#PED-3692)
- crypto: qat - flush vf workqueue at driver removal (jsc#PED-3692)
- crypto: qat - free irq in case of failure (jsc#PED-3692)
- crypto: qat - free irqs only if allocated (jsc#PED-3692)
- crypto: qat - generalize crypto request buffers (jsc#PED-3692)
- crypto: qat - get compression extended capabilities (jsc#PED-3692)
- crypto: qat - handle retries due to collisions in (jsc#PED-3692)
- crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag (jsc#PED-3692)
- crypto: qat - improve logging of PFVF messages (jsc#PED-3692)
- crypto: qat - improve the ACK timings in PFVF send (jsc#PED-3692)
- crypto: qat - introduce support for PFVF block messages (jsc#PED-3692)
- crypto: qat - leverage bitfield.h utils for PFVF messages (jsc#PED-3692)
- crypto: qat - leverage read_poll_timeout in PFVF send (jsc#PED-3692)
- crypto: qat - leverage the GEN2 VF mask definiton (jsc#PED-3692)
- crypto: qat - make PFVF message construction direction (jsc#PED-3692)
- crypto: qat - make PFVF send and receive direction agnostic (jsc#PED-3692)
- crypto: qat - move VF message handler to adf_vf2pf_msg.c (jsc#PED-3692)
- crypto: qat - move and rename GEN4 error register definitions (jsc#PED-3692)
- crypto: qat - move interrupt code out of the PFVF handler (jsc#PED-3692)
- crypto: qat - move pfvf collision detection values (jsc#PED-3692)
- crypto: qat - move vf2pf interrupt helpers (jsc#PED-3692)
- crypto: qat - pass the PF2VF responses back to the callers (jsc#PED-3692)
- crypto: qat - prevent spurious MSI interrupt in VF (jsc#PED-3692)
- crypto: qat - re-enable interrupts for legacy PFVF messages (jsc#PED-3692)
- crypto: qat - re-enable registration of algorithms (jsc#PED-3692)
- crypto: qat - refactor PF top half for PFVF (jsc#PED-3692)
- crypto: qat - refactor pfvf version request messages (jsc#PED-3692)
- crypto: qat - refactor submission logic (jsc#PED-3692)
- crypto: qat - relocate PFVF PF related logic (jsc#PED-3692)
- crypto: qat - relocate PFVF VF related logic (jsc#PED-3692)
- crypto: qat - relocate PFVF disabled function (jsc#PED-3692)
- crypto: qat - relocate and rename adf_sriov_prepare_restart() (jsc#PED-3692)
- crypto: qat - relocate backlog related structures (jsc#PED-3692)
- crypto: qat - relocate bufferlist logic (jsc#PED-3692)
- crypto: qat - relocate qat_algs_alloc_flags() (jsc#PED-3692)
- crypto: qat - remove duplicated logic across GEN2 drivers (jsc#PED-3692)
- crypto: qat - remove empty sriov_configure() (jsc#PED-3692)
- crypto: qat - remove line wrapping for pfvf_ops functions (jsc#PED-3692)
- crypto: qat - remove the unnecessary get_vintmsk_offset() (jsc#PED-3692)
- crypto: qat - remove unmatched CPU affinity to cluster IRQ (jsc#PED-3692)
- crypto: qat - remove unnecessary tests to detect PFVF support (jsc#PED-3692)
- crypto: qat - remove unneeded assignment (jsc#PED-3692)
- crypto: qat - remove unneeded braces (jsc#PED-3692)
- crypto: qat - remove unneeded packed attribute (jsc#PED-3692)
- crypto: qat - remove unused PFVF stubs (jsc#PED-3692)
- crypto: qat - rename and relocate GEN2 config function (jsc#PED-3692)
- crypto: qat - rename bufferlist functions (jsc#PED-3692)
- crypto: qat - rename pfvf collision constants (jsc#PED-3692)
- crypto: qat - reorganize PFVF code (jsc#PED-3692)
- crypto: qat - reorganize PFVF protocol definitions (jsc#PED-3692)
- crypto: qat - replace deprecated MSI API (jsc#PED-3692)
- crypto: qat - replace disable_vf2pf_interrupts() (jsc#PED-3692)
- crypto: qat - replace get_current_node() with numa_node_id() (jsc#PED-3692)
- crypto: qat - rework the VF2PF interrupt handling logic (jsc#PED-3692)
- crypto: qat - set CIPHER capability for QAT GEN2 (jsc#PED-3692)
- crypto: qat - set COMPRESSION capability for DH895XCC (jsc#PED-3692)
- crypto: qat - set COMPRESSION capability for QAT GEN2 (jsc#PED-3692)
- crypto: qat - set DMA mask to 48 bits for Gen2 (jsc#PED-3692)
- crypto: qat - set PFVF_MSGORIGIN just before sending (jsc#PED-3692)
- crypto: qat - share adf_enable_pf2vf_comms() from (jsc#PED-3692)
- crypto: qat - simplify adf_enable_aer() (jsc#PED-3692)
- crypto: qat - simplify code and axe the use of a deprecated (jsc#PED-3692)
- crypto: qat - split PFVF message decoding from handling (jsc#PED-3692)
- crypto: qat - stop using iommu_present() (jsc#PED-3692)
- crypto: qat - store the PFVF protocol version of the (jsc#PED-3692)
- crypto: qat - store the ring-to-service mapping (jsc#PED-3692)
- crypto: qat - support fast ACKs in the PFVF protocol (jsc#PED-3692)
- crypto: qat - support the reset of ring pairs on PF (jsc#PED-3692)
- crypto: qat - test PFVF registers for spurious interrupts on (jsc#PED-3692)
- crypto: qat - use enums for PFVF protocol codes (jsc#PED-3692)
- crypto: qat - use hweight for bit counting (jsc#PED-3692)
- crypto: qat - use pre-allocated buffers in datapath (jsc#PED-3692)
- crypto: qat - use reference to structure in dma_map_single() (jsc#PED-3692)
- crypto: qat - use u32 variables in all GEN4 pfvf_ops (jsc#PED-3692)
- crypto: sun8i-ss - Fix a test in sun8i_ss_setup_ivs() (git-fixes).
- cxgb4: fix missing unlock on ETHOFLD desc collect fail path (jsc#SLE-18992).
- debugfs: fix error when writing negative value to atomic_t debugfs file (git-fixes).
- dma: gpi: remove spurious unlock in gpi_ch_init (git-fixes).
- dmaengine: at_xdmac: Move the free desc to the tail of the desc list (git-fixes).
- dmaengine: at_xdmac: do not enable all cyclic channels (git-fixes).
- dmaengine: at_xdmac: fix potential Oops in at_xdmac_prep_interleaved() (git-fixes).
- dmaengine: dw-edma: Fix to change for continuous transfer (git-fixes).
- dmaengine: dw-edma: Fix to enable to issue dma request on DMA processing (git-fixes).
- dmaengine: idxd: Do not enable user type Work Queue without Shared Virtual Addressing (git-fixes).
- dmaengine: idxd: Only call idxd_enable_system_pasid() if succeeded in enabling SVA feature (git-fixes).
- dmaengine: idxd: Separate user and kernel pasid enabling (git-fixes).
- dmaengine: mv_xor_v2: Fix an error code (git-fixes).
- dmaengine: pl330: rename _start to prevent build error (git-fixes).
- do not reuse connection if share marked as isolated (bsc#1193629).
- docs: networking: fix x25-iface.rst heading &amp; index order (git-fixes).
- drivers: base: component: fix memory leak with using debugfs_lookup() (git-fixes).
- drivers: base: dd: fix memory leak with using debugfs_lookup() (git-fixes).
- drm/amd/display: Fix hang when skipping modeset (git-fixes).
- drm/amd/display: Use DC_LOG_DC in the trasform pixel function (git-fixes).
- drm/amd/display: edp do not add non-edid timings (git-fixes).
- drm/amd/display: fix flickering caused by S/G mode (git-fixes).
- drm/amd/pm: Fix power context allocation in SMU13 (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for renoir (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for vangogh (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for yellow carp (git-fixes).
- drm/amd: Fix an out of bounds error in BIOS parser (git-fixes).
- drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras (git-fixes).
- drm/amdgpu: Fix vram recover does not work after whole GPU reset (v2) (git-fixes).
- drm/amdgpu: Use the default reset when loading or reloading the driver (git-fixes).
- drm/amdgpu: add a missing lock for AMDGPU_SCHED (git-fixes).
- drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend (git-fixes).
- drm/amdgpu: fix xclk freq on CHIP_STONEY (git-fixes).
- drm/amdgpu: release gpu full access after 'amdgpu_device_ip_late_init' (git-fixes).
- drm/amdgpu: skip disabling fence driver src_irqs when device is unplugged (git-fixes).
- drm/amdgpu: update drm_display_info correctly when the edid is read (git-fixes).
- drm/ast: Fix ARM compatibility (git-fixes).
- drm/displayid: add displayid_get_header() and check bounds better (git-fixes).
- drm/exynos: fix g2d_open/close helper function definitions (git-fixes).
- drm/i915/dg2: Add HDMI pixel clock frequencies 267.30 and 319.89 MHz (git-fixes).
- drm/i915/dg2: Add additional HDMI pixel clock frequencies (git-fixes).
- drm/i915/dg2: Support 4k@30 on HDMI (git-fixes).
- drm/i915/dp: prevent potential div-by-zero (git-fixes).
- drm/i915/gt: Use the correct error value when kernel_context() fails (git-fixes).
- drm/i915/selftests: Add some missing error propagation (git-fixes).
- drm/i915/selftests: Increase timeout for live_parallel_switch (git-fixes).
- drm/i915/selftests: Stop using kthread_stop() (git-fixes).
- drm/i915: Explain the magic numbers for AUX SYNC/precharge length (git-fixes).
- drm/i915: Use 18 fast wake AUX sync len (git-fixes).
- drm/mipi-dsi: Set the fwnode for mipi_dsi_device (git-fixes).
- drm/msm/dp: Clean up handling of DP AUX interrupts (git-fixes).
- drm/msm/dp: unregister audio driver during unbind (git-fixes).
- drm/msm/dpu: Add INTF_5 interrupts (git-fixes).
- drm/msm/dpu: Move non-MDP_TOP INTF_INTR offsets out of hwio header (git-fixes).
- drm/msm/dpu: Remove duplicate register defines from INTF (git-fixes).
- drm/msm: Be more shouty if per-process pgtables are not working (git-fixes).
- drm/msm: Set max segment size earlier (git-fixes).
- drm/nouveau/dp: check for NULL nv_connector-&gt;native_mode (git-fixes).
- drm/nouveau: add nv_encoder pointer check for NULL (git-fixes).
- drm/nouveau: do not detect DSM for non-NVIDIA device (git-fixes).
- drm/sched: Remove redundant check (git-fixes).
- drm/tegra: Avoid potential 32-bit integer overflow (git-fixes).
- drm/ttm/pool: Fix ttm_pool_alloc error path (git-fixes).
- drm/ttm: optimize pool allocations a bit v2 (git-fixes).
- drm:amd:amdgpu: Fix missing buffer object unlock in failure path (git-fixes).
- dt-binding: cdns,usb3: Fix cdns,on-chip-buff-size type (git-fixes).
- dt-bindings: ata: ahci-ceva: Cover all 4 iommus entries (git-fixes).
- dt-bindings: ata: ahci-ceva: convert to yaml (git-fixes).
- dt-bindings: i3c: silvaco,i3c-master: fix missing schema restriction (git-fixes).
- dt-bindings: iio: adc: renesas,rcar-gyroadc: Fix adi,ad7476 compatible value (git-fixes).
- dt-bindings: usb: snps,dwc3: Fix 'snps,hsphy_interface' type (git-fixes).
- eeprom: at24: also select REGMAP (git-fixes).
- ext4: unconditionally enable the i_version counter (bsc#1211299).
- f2fs: Fix f2fs_truncate_partial_nodes ftrace event (git-fixes).
- fbcon: Fix null-ptr-deref in soft_cursor (git-fixes).
- fbdev: Prevent possible use-after-free in fb_release() (bsc#1152472).
- fbdev: arcfb: Fix error handling in arcfb_probe() (git-fixes).
- fbdev: ep93xx-fb: Add missing clk_disable_unprepare in ep93xxfb_probe() (git-fixes).
- fbdev: fbcon: Destroy mutex on freeing struct fb_info (bsc#1152489)
- fbdev: imsttfb: Fix use after free bug in imsttfb_probe (git-fixes bsc#1211387).
- fbdev: modedb: Add 1920x1080 at 60 Hz video mode (git-fixes).
- fbdev: stifb: Fall back to cfb_fillrect() on 32-bit HCRX cards (git-fixes).
- fbdev: stifb: Fix info entry in sti_struct on error path (git-fixes).
- fbdev: udlfb: Fix endpoint check (git-fixes).
- firmware: arm_ffa: Check if ffa_driver remove is present before executing (git-fixes).
- firmware: arm_ffa: Set handle field to zero in memory descriptor (git-fixes).
- firmware: arm_ffa: Set reserved/MBZ fields to zero in the memory descriptors (git-fixes).
- fs/jfs: fix shift exponent db_agl2size negative (git-fixes).
- fs: hfsplus: fix UAF issue in hfsplus_put_super (git-fixes).
- fs: jfs: fix possible NULL pointer dereference in dbFree() (git-fixes).
- fs: jfs: fix shift-out-of-bounds in dbAllocAG (git-fixes).
- fs: jfs: fix shift-out-of-bounds in dbDiscardAG (git-fixes).
- fs: sysv: Fix sysv_nblocks() returns wrong value (git-fixes).
- fuse: always revalidate rename target dentry (bsc#1211808).
- fuse: fix attr version comparison in fuse_read_update_size() (bsc#1211807).
- futex: Resend potentially swallowed owner death notification (git-fixes).
- google/gve:fix repeated words in comments (bsc#1211519).
- gpio: mockup: Fix mode of debugfs files (git-fixes).
- gve: Adding a new AdminQ command to verify driver (bsc#1211519).
- gve: Cache link_speed value from device (git-fixes).
- gve: Fix error return code in gve_prefill_rx_pages() (bsc#1211519).
- gve: Fix spelling mistake 'droping' -&gt; 'dropping' (bsc#1211519).
- gve: Handle alternate miss completions (bsc#1211519).
- gve: Reduce alloc and copy costs in the GQ rx path (bsc#1211519).
- gve: Remove the code of clearing PBA bit (git-fixes).
- gve: Secure enough bytes in the first TX desc for all TCP pkts (git-fixes).
- gve: enhance no queue page list detection (bsc#1211519).
- hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling (git-fixes).
- hfs/hfsplus: use WARN_ON for sanity check (git-fixes).
- hfs: Fix OOB Write in hfs_asc2mac (git-fixes).
- hfs: fix OOB Read in __hfs_brec_find (git-fixes).
- hfs: fix missing hfs_bnode_get() in __hfs_bnode_create (git-fixes).
- hfsplus: fix bug causing custom uid and gid being unable to be assigned with mount (git-fixes).
- i2c: mv64xxx: Fix reading invalid status value in atomic mode (git-fixes).
- i2c: omap: Fix standard mode false ACK readings (git-fixes).
- i2c: sprd: Delete i2c adapter in .remove's error path (git-fixes).
- i2c: tegra: Fix PEC support for SMBUS block read (git-fixes).
- i40e: Add checking for null for nlmsg_find_attr() (jsc#SLE-18378).
- i40e: Fix ADQ rate limiting for PF (jsc#SLE-18378).
- i40e: Fix DMA mappings leak (jsc#SLE-18378).
- i40e: Fix VF hang when reset is triggered on another VF (jsc#SLE-18378).
- i40e: Fix VF set max MTU size (jsc#SLE-18378).
- i40e: Fix VF's MAC Address change on VM (jsc#SLE-18378).
- i40e: Fix adding ADQ filter to TC0 (jsc#SLE-18378).
- i40e: Fix calculating the number of queue pairs (jsc#SLE-18378).
- i40e: Fix erroneous adapter reinitialization during recovery process (jsc#SLE-18378).
- i40e: Fix ethtool rx-flow-hash setting for X722 (jsc#SLE-18378).
- i40e: Fix flow-type by setting GL_HASH_INSET registers (jsc#SLE-18378).
- i40e: Fix for VF MAC address 0 (jsc#SLE-18378).
- i40e: Fix incorrect address type for IPv6 flow rules (jsc#SLE-18378).
- i40e: Fix interface init with MSI interrupts (no MSI-X) (jsc#SLE-18378).
- i40e: Fix kernel crash during module removal (jsc#SLE-18378).
- i40e: Fix kernel crash during reboot when adapter is in recovery mode (jsc#SLE-18378).
- i40e: Fix set max_tx_rate when it is lower than 1 Mbps (jsc#SLE-18378).
- i40e: Fix the inability to attach XDP program on downed interface (jsc#SLE-18378).
- i40e: Refactor tc mqprio checks (jsc#SLE-18378).
- i40e: add double of VLAN header when computing the max MTU (jsc#SLE-18378).
- i40e: fix accessing vsi-&gt;active_filters without holding lock (jsc#SLE-18378).
- i40e: fix flow director packet filter programming (jsc#SLE-18378).
- i40e: fix i40e_setup_misc_vector() error handling (jsc#SLE-18378).
- i40e: fix registers dump after run ethtool adapter self test (jsc#SLE-18378).
- iavf/iavf_main: actually log -&gt;src mask when talking about it (jsc#SLE-18385).
- iavf: Detach device during reset task (jsc#SLE-18385).
- iavf: Disallow changing rx/tx-frames and rx/tx-frames-irq (jsc#SLE-18385).
- iavf: Do not restart Tx queues after reset task failure (jsc#SLE-18385).
- iavf: Fix 'tc qdisc show' listing too many queues (jsc#SLE-18385).
- iavf: Fix a crash during reset task (jsc#SLE-18385).
- iavf: Fix bad page state (jsc#SLE-18385).
- iavf: Fix cached head and tail value for iavf_get_tx_pending (jsc#SLE-18385).
- iavf: Fix error handling in iavf_init_module() (jsc#SLE-18385).
- iavf: Fix max_rate limiting (jsc#SLE-18385).
- iavf: Fix race condition between iavf_shutdown and iavf_remove (jsc#SLE-18385).
- iavf: Fix set max MTU size with port VLAN and jumbo frames (jsc#SLE-18385).
- iavf: fix hang on reboot with ice (jsc#SLE-18385).
- iavf: fix inverted Rx hash condition leading to disabled hash (jsc#SLE-18385).
- iavf: fix non-tunneled IPv6 UDP packet type and hashing (jsc#SLE-18385).
- iavf: remove mask from iavf_irq_enable_queues() (git-fixes).
- ice: Fix interrupt moderation settings getting cleared (jsc#SLE-18375).
- ice: Set txq_teid to ICE_INVAL_TEID on ring creation (jsc#SLE-18375).
- igb: Add lock to avoid data race (jsc#SLE-18379).
- igb: Enable SR-IOV after reinit (jsc#SLE-18379).
- igb: Initialize mailbox message for VF reset (jsc#SLE-18379).
- igb: conditionalize I2C bit banging on external thermal sensor support (jsc#SLE-18379).
- igb: fix bit_shift to be in [1..8] range (git-fixes).
- igb: fix nvm.ops.read() error handling (git-fixes).
- igb: revert rtnl_lock() that causes deadlock (jsc#SLE-18379).
- igbvf: Regard vf reset nack as success (jsc#SLE-18379).
- igc: Add checking for basetime less than zero (jsc#SLE-18377).
- igc: Add ndo_tx_timeout support (jsc#SLE-18377).
- igc: Clean the TX buffer and TX descriptor ring (git-fixes).
- igc: Enhance Qbv scheduling by using first flag bit (jsc#SLE-18377).
- igc: Fix PPS delta between two synchronized end-points (jsc#SLE-18377).
- igc: Fix possible system crash when loading module (git-fixes).
- igc: Lift TAPRIO schedule restriction (jsc#SLE-18377).
- igc: Reinstate IGC_REMOVED logic and implement it properly (jsc#SLE-18377).
- igc: Set Qbv start_time and end_time to end_time if not being configured in GCL (jsc#SLE-18377).
- igc: Use strict cycles for Qbv scheduling (jsc#SLE-18377).
- igc: allow BaseTime 0 enrollment for Qbv (jsc#SLE-18377).
- igc: fix the validation logic for taprio's gate list (jsc#SLE-18377).
- igc: read before write to SRRCTL register (jsc#SLE-18377).
- igc: recalculate Qbv end_time by considering cycle time (jsc#SLE-18377).
- igc: return an error if the mac type is unknown in igc_ptp_systim_to_hwtstamp() (jsc#SLE-18377).
- iio: accel: st_accel: Fix invalid mount_matrix on devices without ACPI _ONT method (git-fixes).
- iio: adc: ad7192: Change 'shorted' channels to differential (git-fixes).
- iio: adc: ad_sigma_delta: Fix IRQ issue by setting IRQ_DISABLE_UNLAZY flag (git-fixes).
- iio: adc: mxs-lradc: fix the order of two cleanup operations (git-fixes).
- iio: adc: palmas_gpadc: fix NULL dereference on rmmod (git-fixes).
- iio: dac: mcp4725: Fix i2c_master_send() return value handling (git-fixes).
- iio: imu: inv_icm42600: fix timestamp reset (git-fixes).
- iio: light: vcnl4035: fixed chip ID check (git-fixes).
- init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init() (bsc#1212448).
- init: Invoke arch_cpu_finalize_init() earlier (bsc#1212448).
- init: Provide arch_cpu_finalize_init() (bsc#1212448).
- init: Remove check_bugs() leftovers (bsc#1212448).
- intel/igbvf: free irq on the error path in igbvf_request_msix() (jsc#SLE-18379).
- ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592).
- iwlwifi: cfg: Add missing MODULE_FIRMWARE() for *.pnvm (bsc#1207553).
- ixgbe: Allow flow hash to be set via ethtool (jsc#SLE-18384).
- ixgbe: Enable setting RSS table to default values (jsc#SLE-18384).
- ixgbe: Fix panic during XDP_TX with &gt; 64 CPUs (jsc#SLE-18384).
- ixgbe: add double of VLAN header when computing the max MTU (jsc#SLE-18384).
- ixgbe: allow to increase MTU to 3K with XDP enabled (jsc#SLE-18384).
- ixgbe: fix pci device refcount leak (jsc#SLE-18384).
- ixgbe: stop resetting SYSTIME in ixgbe_ptp_start_cyclecounter (jsc#SLE-18384).
- jfs: Fix fortify moan in symlink (git-fixes).
- kABI workaround for btbcm.c (git-fixes).
- kABI workaround for mt76_poll_msec() (git-fixes).
- kABI: Fix kABI after backport Emulate RDPID only if it is enabled in guest  (git-fixes)
- kABI: Fixed broken 3rd party dirvers issue (bsc#1208050 bsc#1211414).
- kabi/severities: added Microsoft mana symbold (bsc#1210551)
- kernel-binary: install expoline.o (boo#1210791 bsc#1211089)
- kernel-docs: Add buildrequires on python3-base when using python3 The python3 binary is provided by python3-base.
- kernel-docs: Add missing top level chapter numbers on SLE12 SP5 (bsc#1212158).
- kernel-source: Remove unused macro variant_symbols
- kernel-spec-macros: Fix up obsolete_rebuilds_subpackage to generate obsoletes correctly (boo#1172073 bsc#1191731).
- kprobe: reverse kp-&gt;flags when arm_kprobe failed (git-fixes).
- kprobes: Fix check for probe enabled in kill_kprobe() (git-fixes).
- kprobes: Fix to handle forcibly unoptimized kprobes on freeing_list (git-fixes).
- kprobes: Forbid probing on trampoline and BPF code areas (git-fixes).
- kprobes: Prohibit probes in gate area (git-fixes).
- kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case (git-fixes).
- kprobes: do not call disarm_kprobe() for disabled kprobes (git-fixes).
- kvm: x86: Disable KVM_HC_CLOCK_PAIRING if tsc is in always catchup mode (git-fixes).
- leds: Fix reference to led_set_brightness() in doc (git-fixes).
- leds: TI_LMU_COMMON: select REGMAP instead of depending on it (git-fixes).
- leds: tca6507: Fix error handling of using fwnode_property_read_string (git-fixes).
- libfs: add DEFINE_SIMPLE_ATTRIBUTE_SIGNED for signed value (git-fixes).
- locking/rwsem: Add __always_inline annotation to __down_read_common() and inlined callers (git-fixes).
- lpfc: Account for fabric domain ctlr device loss recovery (bsc#1211346, bsc#1211852).
- lpfc: Change firmware upgrade logging to KERN_NOTICE instead of TRACE_EVENT (bsc#1211852).
- lpfc: Clean up SLI-4 CQE status handling (bsc#1211852).
- lpfc: Clear NLP_IN_DEV_LOSS flag if already in rediscovery (bsc#1211852).
- lpfc: Copyright updates for 14.2.0.13 patches (bsc#1211852).
- lpfc: Enhance congestion statistics collection (bsc#1211852).
- lpfc: Fix use-after-free rport memory access in lpfc_register_remote_port (bsc#1211852, bsc#1208410, bsc#1211346).
- lpfc: Revise NPIV ELS unsol rcv cmpl logic to drop ndlp based on nlp_state (bsc#1211852).
- lpfc: Update lpfc version to 14.2.0.13 (bsc#1211852).
- mailbox: mailbox-test: Fix potential double-free in mbox_test_message_write() (git-fixes).
- mailbox: mailbox-test: fix a locking issue in mbox_test_message_write() (git-fixes).
- mailbox: zynqmp: Fix IPI isr handling (git-fixes).
- mailbox: zynqmp: Fix typo in IPI documentation (git-fixes).
- mce: fix set_mce_nospec to always unmap the whole page (git-fixes).
- media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish() (git-fixes).
- media: dvb-usb-v2: ce6230: fix null-ptr-deref in ce6230_i2c_master_xfer() (git-fixes).
- media: dvb-usb-v2: ec168: fix null-ptr-deref in ec168_i2c_xfer() (git-fixes).
- media: dvb-usb-v2: rtl28xxu: fix null-ptr-deref in rtl28xxu_i2c_xfer (git-fixes).
- media: dvb-usb: az6027: fix three null-ptr-deref in az6027_i2c_xfer() (git-fixes).
- media: dvb-usb: digitv: fix null-ptr-deref in digitv_i2c_xfer() (git-fixes).
- media: dvb-usb: dw2102: fix uninit-value in su3000_read_mac_address (git-fixes).
- media: dvb_ca_en50221: fix a size write bug (git-fixes).
- media: dvb_demux: fix a bug for the continuity counter (git-fixes).
- media: mn88443x: fix !CONFIG_OF error by drop of_match_ptr from ID table (git-fixes).
- media: netup_unidvb: fix irq init by register it at the end of probe (git-fixes).
- media: netup_unidvb: fix use-after-free at del_timer() (git-fixes).
- media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish (git-fixes).
- media: radio-shark: Add endpoint checks (git-fixes).
- media: rcar_fdp1: Fix the correct variable assignments (git-fixes).
- media: rcar_fdp1: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- memstick: r592: Fix UAF bug in r592_remove due to race condition (bsc#1211449).
- mfd: dln2: Fix memory leak in dln2_probe() (git-fixes).
- mfd: tqmx86: Correct board names for TQMxE39x (git-fixes).
- mfd: tqmx86: Do not access I2C_DETECT register through io_base (git-fixes).
- misc: fastrpc: reject new invocations during device removal (git-fixes).
- misc: fastrpc: return -EPIPE to invocations on device removal (git-fixes).
- mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next() (git-fixes).
- mm/vmalloc: do not output a spurious warning when huge vmalloc() fails (bsc#1211410).
- mm: vmalloc: avoid warn_alloc noise caused by fatal signal (bsc#1211410).
- mmc: sdhci-esdhc-imx: make 'no-mmc-hs400' works (git-fixes).
- mmc: vub300: fix invalid response handling (git-fixes).
- mt76: mt7915: fix incorrect testmode ipg on band 1 caused by wmm_idx (git-fixes).
- mtd: rawnand: ingenic: fix empty stub helper definitions (git-fixes).
- mtd: rawnand: marvell: do not set the NAND frequency select (git-fixes).
- mtd: rawnand: marvell: ensure timing values are written (git-fixes).
- net/iucv: Fix size of interrupt data (bsc#1211465 git-fixes).
- net/net_failover: fix txq exceeding warning (git-fixes).
- net/sched: fix initialization order when updating chain 0 head (git-fixes).
- net/sched: flower: fix possible OOB write in fl_set_geneve_opt() (git-fixes).
- net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms (git-fixes).
- net: accept UFOv6 packages in virtio_net_hdr_to_skb (git-fixes).
- net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize (git-fixes).
- net: ena: Account for the number of processed bytes in XDP (git-fixes).
- net: ena: Do not register memory info on XDP exchange (git-fixes).
- net: ena: Fix rx_copybreak value update (git-fixes).
- net: ena: Fix toeplitz initial hash value (git-fixes).
- net: ena: Set default value for RX interrupt moderation (git-fixes).
- net: ena: Update NUMA TPH hint register upon NUMA node update (git-fixes).
- net: ena: Use bitmask to indicate packet redirection (git-fixes).
- net: hns3: add interrupts re-initialization while doing VF FLR (git-fixes).
- net: hns3: fix output information incomplete for dumping tx queue info with debugfs (git-fixes).
- net: hns3: fix reset delay time to avoid configuration timeout (git-fixes).
- net: hns3: fix sending pfc frames after reset issue (git-fixes).
- net: hns3: fix tm port shapping of fibre port is incorrect after driver initialization (git-fixes).
- net: mana: Add new MANA VF performance counters for easier troubleshooting (bsc#1209982).
- net: mana: Add support for auxiliary device (bsc#1210741 jsc#PED-4022).
- net: mana: Add support for jumbo frame (bsc#1210551).
- net: mana: Check if netdev/napi_alloc_frag returns single page (bsc#1210551).
- net: mana: Define and process GDMA response code GDMA_STATUS_MORE_ENTRIES (bsc#1210741 jsc#PED-4022).
- net: mana: Define data structures for allocating doorbell page from GDMA (bsc#1210741 jsc#PED-4022).
- net: mana: Define data structures for protection domain and memory registration (bsc#1210741 jsc#PED-4022).
- net: mana: Define max values for SGL entries (bsc#1210741 jsc#PED-4022).
- net: mana: Enable RX path to handle various MTU sizes (bsc#1210551).
- net: mana: Export Work Queue functions for use by RDMA driver (bsc#1210741 jsc#PED-4022).
- net: mana: Fix perf regression: remove rx_cqes, tx_cqes counters (git-fixes).
- net: mana: Handle vport sharing between devices (bsc#1210741 jsc#PED-4022).
- net: mana: Move header files to a common location (bsc#1210741 jsc#PED-4022).
- net: mana: Record port number in netdev (bsc#1210741 jsc#PED-4022).
- net: mana: Record the physical address for doorbell page region (bsc#1210741 jsc#PED-4022).
- net: mana: Refactor RX buffer allocation code to prepare for various MTU (bsc#1210551).
- net: mana: Rename mana_refill_rxoob and remove some empty lines (bsc#1210551).
- net: mana: Set the DMA device max segment size (bsc#1210741 jsc#PED-4022).
- net: mana: Use napi_build_skb in RX path (bsc#1210551).
- net: mdio: mvusb: Fix an error handling path in mvusb_mdio_probe() (git-fixes).
- net: mellanox: mlxbf_gige: Fix skb_panic splat under memory pressure (bsc#1211564).
- net: phy: dp83867: add w/a for packet errors seen with short cables (git-fixes).
- net: qrtr: correct types of trace event parameters (git-fixes).
- net: sched: fix possible refcount leak in tc_chain_tmplt_add() (git-fixes).
- net: skip virtio_net_hdr_set_proto if protocol already set (git-fixes).
- net: tun: avoid disabling NAPI twice (git-fixes).
- net: tun: fix bugs for oversize packet when napi frags enabled (git-fixes).
- net: tun: stop NAPI when detaching queues (git-fixes).
- net: tun: unlink NAPI from device on destruction (git-fixes).
- net: usb: qmi_wwan: Set DTR quirk for BroadMobi BM818 (git-fixes).
- net: usb: qmi_wwan: add support for Compal RXM-G1 (git-fixes).
- net: virtio_net_hdr_to_skb: count transport header in UFO (git-fixes).
- nfp: only report pause frame configuration for physical device (git-fixes).
- nilfs2: do not write dirty data after degenerating to read-only (git-fixes).
- nilfs2: fix incomplete buffer cleanup in nilfs_btnode_abort_change_key() (git-fixes).
- nilfs2: fix infinite loop in nilfs_mdt_get_block() (git-fixes).
- nilfs2: fix possible out-of-bounds segment allocation in resize ioctl (git-fixes).
- nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() (git-fixes).
- nouveau: fix client work fence deletion race (git-fixes).
- nvme-fc: fix a missing queue put in nvmet_fc_ls_create_association (git-fixes).
- nvme-multipath: fix hang when disk goes live over reconnect (git-fixes).
- nvme-pci: add quirks for Samsung X5 SSDs (git-fixes).
- nvme-pci: add the IGNORE_DEV_SUBNQN quirk for Intel P4500/P4600 SSDs (git-fixes).
- nvme-pci: avoid the deepest sleep state on ZHITAI TiPro5000 SSDs (git-fixes).
- nvme-pci: avoid the deepest sleep state on ZHITAI TiPro7000 SSDs (git-fixes).
- nvme-pci: clear the prp2 field when not used (git-fixes).
- nvme-pci: disable write zeroes on various Kingston SSD (git-fixes).
- nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags (git-fixes).
- nvme-pci: mark Lexar NM760 as IGNORE_DEV_SUBNQN (git-fixes).
- nvme-pci: set min_align_mask before calculating max_hw_sectors (git-fixes).
- nvme-tcp: fix a possible UAF when failing to allocate an io queue (git-fixes).
- nvme-tcp: fix bogus request completion when failing to send AER (git-fixes).
- nvme-tcp: lockdep: annotate in-kernel sockets (git-fixes).
- nvme: add a bogus subsystem NQN quirk for Micron MTFDKBA2T0TFH (git-fixes).
- nvme: also return I/O command effects from nvme_command_effects (git-fixes).
- nvme: check for duplicate identifiers earlier (git-fixes).
- nvme: cleanup __nvme_check_ids (git-fixes).
- nvme: fix discard support without oncs (git-fixes).
- nvme: fix interpretation of DMRSL (git-fixes).
- nvme: fix multipath crash caused by flush request when blktrace is enabled (git-fixes).
- nvme: fix passthrough csi check (git-fixes).
- nvme: generalize the nvme_multi_css check in nvme_scan_ns (git-fixes).
- nvme: move the Samsung X5 quirk entry to the core quirks (git-fixes).
- nvme: rename nvme_validate_or_alloc_ns to nvme_scan_ns (git-fixes).
- nvme: set non-mdts limits in nvme_scan_work (git-fixes).
- nvmet-tcp: add bounds check on Transfer Tag (git-fixes).
- nvmet-tcp: fix lockdep complaint on nvmet_tcp_wq flush during queue teardown (git-fixes).
- nvmet-tcp: fix unhandled tcp states in nvmet_tcp_state_change() (git-fixes).
- nvmet: fix mar and mor off-by-one errors (git-fixes).
- nvmet: fix memory leak in nvmet_subsys_attr_model_store_locked (git-fixes).
- nvmet: fix workqueue MEM_RECLAIM flushing dependency (git-fixes).
- nvmet: move the call to nvmet_ns_changed out of nvmet_ns_revalidate (git-fixes).
- nvmet: use NVME_CMD_EFFECTS_CSUPP instead of open coding it (git-fixes).
- octeontx2-pf: Avoid use of GFP_KERNEL in atomic context (git-fixes).
- octeontx2-pf: Fix resource leakage in VF driver unbind (git-fixes).
- octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt (git-fixes).
- octeontx2-pf: Recalculate UDP checksum for ptp 1-step sync packet (git-fixes).
- phy: st: miphy28lp: use _poll_timeout functions for waits (git-fixes).
- phy: tegra: xusb: Add missing tegra_xusb_port_unregister for usb2_port and ulpi_port (git-fixes).
- pinctrl: meson-axg: add missing GPIOA_18 gpio group (git-fixes).
- pinctrl: qcom: lpass-lpi: set output value before enabling output (git-fixes).
- pinctrl: renesas: r8a779a0: Remove incorrect AVB[01] pinmux configuration (git-fixes).
- platform/surface: aggregator: Allow completion work-items to be executed in parallel (git-fixes).
- platform/x86: asus-wmi: Ignore WMI events with codes 0x7B, 0xC0 (git-fixes).
- platform/x86: hp-wmi: Support touchpad on/off (git-fixes).
- platform/x86: intel_scu_pcidrv: Add back PCI ID for Medfield (git-fixes).
- platform/x86: thinkpad_acpi: Fix platform profiles on T490 (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Dexp Ursus KX210i (git-fixes).
- platform/x86: touchscreen_dmi: Add upside-down quirk for GDIX1002 ts on the Juno Tablet (git-fixes).
- power: supply: Fix logic checking if system is running from battery (git-fixes).
- power: supply: Ratelimit no data debug output (git-fixes).
- power: supply: ab8500: Fix external_power_changed race (git-fixes).
- power: supply: bq24190_charger: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes).
- power: supply: bq27xxx: Add cache parameter to bq27xxx_battery_current_and_status() (git-fixes).
- power: supply: bq27xxx: After charger plug in/out wait 0.5s for things to stabilize (git-fixes).
- power: supply: bq27xxx: Ensure power_supply_changed() is called on current sign changes (git-fixes).
- power: supply: bq27xxx: Fix I2C IRQ race on remove (git-fixes).
- power: supply: bq27xxx: Fix bq27xxx_battery_update() race condition (git-fixes).
- power: supply: bq27xxx: Fix poll_interval handling and races on remove (git-fixes).
- power: supply: bq27xxx: Move bq27xxx_battery_update() down (git-fixes).
- power: supply: bq27xxx: Use mod_delayed_work() instead of cancel() + schedule() (git-fixes).
- power: supply: bq27xxx: expose battery data when CI=1 (git-fixes).
- power: supply: leds: Fix blink to LED on transition (git-fixes).
- power: supply: sbs-charger: Fix INHIBITED bit for Status reg (git-fixes).
- power: supply: sc27xx: Fix external_power_changed race (git-fixes).
- powerpc/64s/radix: Fix soft dirty tracking (bsc#1065729).
- powerpc/64s: Make POWER10 and later use pause_short in cpu_relax loops (bsc#1209367 ltc#195662).
- powerpc/iommu: DMA address offset is incorrectly calculated with 2MB TCEs (jsc#SLE-19556 git-fixes).
- powerpc/purgatory: remove PGO flags (bsc#1194869).
- powerpc/rtas: use memmove for potentially overlapping buffer copy (bsc#1065729).
- powerpc: Do not try to copy PPR for task with NULL pt_regs (bsc#1065729).
- powerpc: Redefine HMT_xxx macros as empty on PPC32 (bsc#1209367 ltc#195662).
- powerpc: add ISA v3.0 / v3.1 wait opcode macro (bsc#1209367 ltc#195662).
- pstore: Revert pmsg_lock back to a normal mutex (git-fixes).
- purgatory: fix disabling debug info (git-fixes).
- pwm: meson: Fix axg ao mux parents (git-fixes).
- pwm: meson: Fix g12a ao clk81 name (git-fixes).
- qed/qed_dev: guard against a possible division by zero (jsc#SLE-19001).
- qed/qed_mng_tlv: correctly zero out -&gt;min instead of -&gt;hour (jsc#SLE-19001).
- qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info (jsc#SLE-19001).
- qed/qede: Fix scheduling while atomic (git-fixes).
- qed: allow sleep in qed_mcp_trace_dump() (jsc#SLE-19001).
- qede: execute xdp_do_flush() before napi_complete_done() (jsc#SLE-19001).
- r8152: fix flow control issue of RTL8156A (git-fixes).
- r8152: fix the poor throughput for 2.5G devices (git-fixes).
- r8152: move setting r8153b_rx_agg_chg_indicate() (git-fixes).
- rcu: Fix missing TICK_DEP_MASK_RCU_EXP dependency check (git-fixes).
- regmap: Account for register length when chunking (git-fixes).
- regmap: cache: Return error in cache sync operations for REGCACHE_NONE (git-fixes).
- regmap: spi-avmm: Fix regmap_bus max_raw_write (git-fixes).
- regulator: Fix error checking for debugfs_create_dir (git-fixes).
- regulator: mt6359: add read check for PMIC MT6359 (git-fixes).
- regulator: pca9450: Fix BUCK2 enable_mask (git-fixes).
- regulator: pca9450: Fix LDO3OUT and LDO4OUT MASK (git-fixes).
- reiserfs: Add missing calls to reiserfs_security_free() (git-fixes).
- reiserfs: Add security prefix to xattr name in reiserfs_security_write() (git-fixes).
- remoteproc: stm32_rproc: Add mutex protection for workqueue (git-fixes).
- revert 'squashfs: harden sanity check in squashfs_read_xattr_id_table' (git-fixes).
- ring-buffer: Ensure proper resetting of atomic variables in ring_buffer_reset_online_cpus (git-fixes).
- ring-buffer: Fix kernel-doc (git-fixes).
- ring-buffer: Sync IRQ works before buffer destruction (git-fixes).
- rpm/constraints.in: Increase disk size constraint for riscv64 to 52GB
- rpm/kernel-binary.spec.in: Fix compatibility wth newer rpm
- rpm/kernel-docs.spec.in: pass PYTHON=python3 to fix build error (bsc#1160435)
- rpm/kernel-source.spec.in: Add patches.drm for moved DRM patches
- rtmutex: Ensure that the top waiter is always woken up (git-fixes).
- s390/ap: fix crash on older machines based on QCI info missing (bsc#1210947)
- s390/ctcm: Fix return type of ctc{mp,}m_tx() (git-fixes bsc#1211686).
- s390/dasd: Use correct lock while counting channel queue length (git-fixes bsc#1212592).
- s390/dasd: fix hanging blockdevice after request requeue (git-fixes bsc#1211687).
- s390/extmem: return correct segment type in __segment_load() (bsc#1210450 git-fixes).
- s390/kprobes: fix current_kprobe never cleared after kprobes reenter (git-fixes bsc#1211688).
- s390/kprobes: fix irq mask clobbering on kprobe reenter from post_handler (git-fixes bsc#1211689).
- s390/lcs: Fix return type of lcs_start_xmit() (git-fixes bsc#1211690).
- s390/mem_detect: fix detect_memory() error handling (git-fixes bsc#1211691).
- s390/netiucv: Fix return type of netiucv_tx() (git-fixes bsc#1211692).
- s390/qdio: fix do_sqbs() inline assembly constraint (git-fixes bsc#1211693).
- s390/qeth: fix use-after-free in hsci (bsc#1210449 git-fixes).
- s390/uaccess: add missing earlyclobber annotations to __clear_user() (bsc#1209856 git-fixes).
- s390/vdso: remove -nostdlib compiler flag (git-fixes bsc#1211714).
- s390: Hard lockups are observed while running stress-ng and LPAR hangs (bsc#1195655 ltc#195733).
- scsi: core: Decrease scsi_device's iorequest_cnt if dispatch failed (git-fixes).
- scsi: core: Improve scsi_vpd_inquiry() checks (git-fixes).
- scsi: hisi_sas: Handle NCQ error when IPTT is valid (git-fixes).
- scsi: libsas: Add sas_ata_device_link_abort() (git-fixes).
- scsi: libsas: Grab the ATA port lock in sas_ata_device_link_abort() (git-fixes).
- scsi: lpfc: Add new RCQE status for handling DMA failures (bsc#1211847).
- scsi: lpfc: Fix double free in lpfc_cmpl_els_logo_acc() caused by lpfc_nlp_not_used() (bsc#1211847).
- scsi: lpfc: Fix verbose logging for SCSI commands issued to SES devices (bsc#1211847).
- scsi: lpfc: Match lock ordering of lpfc_cmd-&gt;buf_lock and hbalock for abort paths (bsc#1211847).
- scsi: lpfc: Replace blk_irq_poll intr handler with threaded IRQ (bsc#1211847).
- scsi: lpfc: Update congestion warning notification period (bsc#1211847).
- scsi: lpfc: Update lpfc version to 14.2.0.12 (bsc#1211847).
- scsi: megaraid: Fix mega_cmd_done() CMDID_INT_CMDS (git-fixes).
- scsi: megaraid_sas: Fix fw_crash_buffer_show() (git-fixes).
- scsi: qedi: Fix use after free bug in qedi_remove() (git-fixes).
- scsi: qla2xxx: Drop redundant pci_enable_pcie_error_reporting() (bsc#1211960).
- scsi: qla2xxx: Fix hang in task management (bsc#1211960).
- scsi: qla2xxx: Fix mem access after free (bsc#1211960).
- scsi: qla2xxx: Fix task management cmd fail due to unavailable resource (bsc#1211960).
- scsi: qla2xxx: Fix task management cmd failure (bsc#1211960).
- scsi: qla2xxx: Multi-que support for TMF (bsc#1211960).
- scsi: qla2xxx: Refer directly to the qla2xxx_driver_template (bsc#1211960).
- scsi: qla2xxx: Remove default fabric ops callouts (bsc#1211960).
- scsi: qla2xxx: Replace all non-returning strlcpy() with strscpy() (bsc#1211960).
- scsi: qla2xxx: Update version to 10.02.08.300-k (bsc#1211960).
- scsi: qla2xxx: Wait for io return on terminate rport (bsc#1211960).
- scsi: ses: Handle enclosure with just a primary component gracefully (git-fixes).
- scsi: stex: Fix gcc 13 warnings (git-fixes).
- scsi: storvsc: Do not pass unused PFNs to Hyper-V host (git-fixes).
- selftests mount: Fix mount_setattr_test builds failed (git-fixes).
- selftests/ptp: Fix timestamp printf format for PTP_SYS_OFFSET (git-fixes).
- selftests/resctrl: Allow -&gt;setup() to return errors (git-fixes).
- selftests/resctrl: Check for return value after write_schemata() (git-fixes).
- selftests/resctrl: Extend CPU vendor detection (git-fixes).
- selftests/resctrl: Move -&gt;setup() call outside of test specific branches (git-fixes).
- selftests/resctrl: Return NULL if malloc_and_init_memory() did not alloc mem (git-fixes).
- selftests/sgx: Add 'test_encl.elf' to TEST_FILES (git-fixes).
- selftests: mptcp: connect: skip if MPTCP is not supported (git-fixes).
- selftests: mptcp: pm nl: skip if MPTCP is not supported (git-fixes).
- selftests: mptcp: sockopt: skip if MPTCP is not supported (git-fixes).
- selftests: seg6: disable DAD on IPv6 router cfg for srv6_end_dt4_l3vpn_test (git-fixes).
- selftests: srv6: make srv6_end_dt46_l3vpn_test more robust (git-fixes).
- selftests: xsk: Disable IPv6 on VETH1 (git-fixes).
- selftets: seg6: disable rp_filter by default in srv6_end_dt4_l3vpn_test (git-fixes).
- selinux: do not use make's grouped targets feature yet (git-fixes).
- serial: 8250: Reinit port-&gt;pm on port specific driver unbind (git-fixes).
- serial: 8250_bcm7271: balance clk_enable calls (git-fixes).
- serial: 8250_bcm7271: fix leak in `brcmuart_probe` (git-fixes).
- serial: 8250_exar: Add support for USR298x PCI Modems (git-fixes).
- serial: 8250_tegra: Fix an error handling path in tegra_uart_probe() (git-fixes).
- serial: Add support for Advantech PCI-1611U card (git-fixes).
- serial: arc_uart: fix of_iomap leak in `arc_serial_probe` (git-fixes).
- serial: lantiq: add missing interrupt ack (git-fixes).
- serial: qcom-geni: fix enabling deactivated interrupt (git-fixes).
- serial: stm32: re-introduce an irq flag condition in usart_receive_chars (git-fixes).
- sfc: Change VF mac via PF as first preference if available (git-fixes).
- sfc: Fix module EEPROM reporting for QSFP modules (git-fixes).
- sfc: Fix use-after-free due to selftest_work (git-fixes).
- sfc: correctly advertise tunneled IPv6 segmentation (git-fixes).
- sfc: disable RXFCS and RXALL features by default (git-fixes).
- sfc: ef10: do not overwrite offload features at NIC reset (git-fixes).
- sfc: fix TX channel offset when using legacy interrupts (git-fixes).
- sfc: fix considering that all channels have TX queues (git-fixes).
- sfc: fix null pointer dereference in efx_hard_start_xmit (git-fixes).
- sfc: fix wrong tx channel offset with efx_separate_tx_channels (git-fixes).
- sfc: include vport_id in filter spec hash and equal() (git-fixes).
- smb3: display debug information better for encryption (bsc#1193629).
- smb3: fix problem remounting a share after shutdown (bsc#1193629).
- smb3: improve parallel reads of large files (bsc#1193629).
- smb3: make query_on_disk_id open context consistent and move to common code (bsc#1193629).
- smb3: move some common open context structs to smbfs_common (bsc#1193629).
- soundwire: qcom: correct setting ignore bit on v1.5.1 (git-fixes).
- soundwire: qcom: gracefully handle too many ports in DT (git-fixes).
- spi: fsl-dspi: avoid SCK glitches with continuous transfers (git-fixes).
- spi: qup: Request DMA before enabling clocks (git-fixes).
- spi: spi-imx: fix MX51_ECSPI_* macros when cs &gt; 3 (git-fixes).
- spi: spi-imx: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes).
- spi: tegra210-quad: Fix combined sequence (bsc#1212584)
- spi: tegra210-quad: Fix iterator outside loop (git-fixes).
- spi: tegra210-quad: Multi-cs support (bsc#1212584)
- squashfs: harden sanity check in squashfs_read_xattr_id_table (git-fixes).
- staging: rtl8192e: Replace macro RTL_PCI_DEVICE with PCI_DEVICE (git-fixes).
- struct ci_hdrc: hide new member at end (git-fixes).
- supported.conf: Move bt878 and bttv modules to kernel-*-extra (jsc#PED-3931)
- supported.conf: mark mana_ib supported
- swiotlb: relocate PageHighMem test away from rmem_swiotlb_setup (git-fixes).
- test_firmware: Use kstrtobool() instead of strtobool() (git-fixes).
- test_firmware: fix the memory leak of the allocated firmware buffer (git-fixes).
- test_firmware: prevent race conditions by a correct implementation of locking (git-fixes).
- thunderbolt: Clear registers properly when auto clear isn't in use (bsc#1210165).
- thunderbolt: Mask ring interrupt on Intel hardware as well (bsc#1210165).
- thunderbolt: dma_test: Use correct value for absent rings when creating paths (git-fixes).
- tls: Skip tls_append_frag on zero copy size (git-fixes).
- tools/virtio: compile with -pthread (git-fixes).
- tools/virtio: fix the vringh test for virtio ring changes (git-fixes).
- tools/virtio: fix virtio_test execution (git-fixes).
- tools/virtio: initialize spinlocks in vring_test.c (git-fixes).
- tools: bpftool: Remove invalid \' json escape (git-fixes).
- tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register (git-fixes).
- tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed (git-fixes).
- tpm, tpm_tis: Request threaded interrupt handler (git-fixes).
- tpm/tpm_tis: Disable interrupts for more Lenovo devices (git-fixes).
- tracing/histograms: Allow variables to have some modifiers (git-fixes).
- tracing/probe: trace_probe_primary_from_call(): checked list_first_entry (git-fixes).
- tracing: Fix permissions for the buffer_percent file (git-fixes).
- tracing: Have event format check not flag %p* on __get_dynamic_array() (git-fixes, bsc#1212350).
- tracing: Introduce helpers to safely handle dynamic-sized sockaddrs (git-fixes).
- tracing: Update print fmt check to handle new __get_sockaddr() macro (git-fixes, bsc#1212350).
- tty: serial: fsl_lpuart: use UARTCTRL_TXINV to send break instead of UARTCTRL_SBK (git-fixes).
- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).
- usb: cdns3: fix NCM gadget RX speed 20x slow than expection at iMX8QM (git-fixes).
- usb: chipidea: core: fix possible concurrent when switch role (git-fixes).
- usb: dwc3: Align DWC3_EP_* flag macros (git-fixes).
- usb: dwc3: Fix a repeated word checkpatch warning (git-fixes).
- usb: dwc3: Fix ep0 handling when getting reset while doing control transfer (git-fixes).
- usb: dwc3: debugfs: Resume dwc3 before accessing registers (git-fixes).
- usb: dwc3: drd: use helper to get role-switch-default-mode (git-fixes).
- usb: dwc3: ep0: Do not prepare beyond Setup stage (git-fixes).
- usb: dwc3: gadget: Delay issuing End Transfer (git-fixes).
- usb: dwc3: gadget: Execute gadget stop after halting the controller (git-fixes).
- usb: dwc3: gadget: Improve dwc3_gadget_suspend() and dwc3_gadget_resume() (git-fixes).
- usb: dwc3: gadget: Only End Transfer for ep0 data phase (git-fixes).
- usb: dwc3: gadget: Reset num TRBs before giving back the request (git-fixes).
- usb: dwc3: gadget: Stall and restart EP0 if host is unresponsive (git-fixes).
- usb: dwc3: remove a possible unnecessary 'out of memory' message (git-fixes).
- usb: gadget: f_fs: Add unbind event before functionfs_unbind (git-fixes).
- usb: gadget: u_ether: Fix host MAC address case (git-fixes).
- usb: mtu3: fix kernel panic at qmu transfer done irq handler (git-fixes).
- usb: typec: altmodes/displayport: fix pin_assignment_show (git-fixes).
- usb: typec: tcpm: fix multiple times discover svids error (git-fixes).
- usb: typec: ucsi: Fix command cancellation (git-fixes).
- usb: usbfs: Enforce page requirements for mmap (git-fixes).
- usb: usbfs: Use consistent mmap functions (git-fixes).
- usrmerge: Compatibility with earlier rpm (boo#1211796)
- vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF (git-fixes).
- vdpa: fix use-after-free on vp_vdpa_remove (git-fixes).
- vhost/net: Clear the pending messages when the backend is removed (git-fixes).
- virtio-net: Keep stop() to follow mirror sequence of open() (git-fixes).
- virtio-net: execute xdp_do_flush() before napi_complete_done() (git-fixes).
- virtio_net: bugfix overflow inside xdp_linearize_page() (git-fixes).
- virtio_net: split free_unused_bufs() (git-fixes).
- virtio_net: suppress cpu stall when free_unused_bufs (git-fixes).
- watchdog: dw_wdt: Fix the error handling path of dw_wdt_drv_probe() (git-fixes).
- watchdog: menz069_wdt: fix watchdog initialisation (git-fixes).
- watchdog: sp5100_tco: Immediately trigger upon starting (git-fixes).
- wifi: ath11k: Fix SKB corruption in REO destination ring (git-fixes).
- wifi: ath: Silence memcpy run-time false positive warning (git-fixes).
- wifi: b43: fix incorrect __packed annotation (git-fixes).
- wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex (git-fixes).
- wifi: cfg80211: fix locking in regulatory disconnect (git-fixes).
- wifi: cfg80211: fix locking in sched scan stop work (git-fixes).
- wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace (git-fixes).
- wifi: iwlwifi: fix OEM's name in the ppag approved list (git-fixes).
- wifi: iwlwifi: fw: fix DBGI dump (git-fixes).
- wifi: iwlwifi: mvm: do not trust firmware n_channels (git-fixes).
- wifi: iwlwifi: mvm: fix OEM's name in the tas approved list (git-fixes).
- wifi: iwlwifi: mvm: fix cancel_delayed_work_sync() deadlock (git-fixes).
- wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf (git-fixes).
- wifi: iwlwifi: pcie: fix possible NULL pointer dereference (git-fixes).
- wifi: mac80211: fix min center freq offset tracing (git-fixes).
- wifi: mac80211: simplify chanctx allocation (git-fixes).
- wifi: mt76: add flexible polling wait-interval support (git-fixes).
- wifi: mt76: mt7615: fix possible race in mt7615_mac_sta_poll (git-fixes).
- wifi: mt76: mt7921e: Set memory space enable in PCI_COMMAND if unset (git-fixes).
- wifi: mt76: mt7921e: fix probe timeout after reboot (git-fixes).
- wifi: mt76: mt7921e: improve reliability of dma reset (git-fixes).
- wifi: rtl8xxxu: RTL8192EU always needs full init (git-fixes).
- wifi: rtl8xxxu: fix authentication timeout due to incorrect RCR value (git-fixes).
- workqueue: Fix hung time report of worker pools (bsc#1211044).
- workqueue: Interrupted create_worker() is not a repeated event (bsc#1211044).
- workqueue: Print backtraces from CPUs with hung CPU bound workqueues (bsc#1211044).
- workqueue: Warn when a new worker could not be created (bsc#1211044).
- workqueue: Warn when a rescuer could not be created (bsc#1211044).
- x86, sched: Fix undefined reference to init_freq_invariance_cppc() build error (git-fixes).
- x86/MCE/AMD: Use an u64 for bank_map (git-fixes).
- x86/alternative: Make debug-alternative selective (bsc#1206578).
- x86/alternative: Report missing return thunk details (git-fixes).
- x86/alternative: Support relocations in alternatives (bsc#1206578).
- x86/amd: Use IBPB for firmware calls (git-fixes).
- x86/boot: Skip realmode init code when running as Xen PV guest  (git-fixes).
- x86/bugs: Add 'unknown' reporting for MMIO Stale Data (git-fixes).
- x86/bugs: Do not enable IBPB at firmware entry when IBPB is not available (git-fixes).
- x86/bugs: Warn when 'ibrs' mitigation is selected on Enhanced IBRS parts (git-fixes).
- x86/cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).
- x86/crash: Disable virt in core NMI crash handler to avoid double shootdown (git-fixes).
- x86/delay: Fix the wrong asm constraint in delay_loop() (git-fixes).
- x86/entry: Build thunk_$(BITS) only if CONFIG_PREEMPTION=y (git-fixes).
- x86/fault: Cast an argument to the proper address space in prefetch() (git-fixes).
- x86/fpu/xsave: Initialize offset/size cache early (bsc#1211205).
- x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly (git-fixes).
- x86/fpu: Fix the init_fpstate size check with the actual size (git-fixes).
- x86/fpu: Mark init functions __init (bsc#1212448).
- x86/fpu: Move FPU initialization into arch_cpu_finalize_init() (bsc#1212448).
- x86/fpu: Remove cpuinfo argument from init functions (bsc#1212448).
- x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes).
- x86/hyperv: Block root partition functionality in a Confidential VM (git-fixes).
- x86/init: Initialize signal frame size late (bsc#1212448).
- x86/kprobes: Fix __recover_optprobed_insn check optimizing logic (git-fixes).
- x86/lib/memmove: Decouple ERMS from FSRM (bsc#1206578).
- x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes). This is a preparation for the next patch
- x86/microcode/AMD: Add a @cpu parameter to the reloading functions (git-fixes).
- x86/microcode/AMD: Fix mixed steppings support (git-fixes).
- x86/microcode/AMD: Track patch allocation size explicitly (git-fixes).
- x86/microcode: Add a parameter to microcode_check() to store CPU capabilities (git-fixes).
- x86/microcode: Add explicit CPU vendor dependency (git-fixes).
- x86/microcode: Adjust late loading result reporting message (git-fixes).
- x86/microcode: Check CPU capabilities after late microcode update correctly (git-fixes).
- x86/microcode: Rip out the OLD_INTERFACE (git-fixes).
- x86/mm: Cleanup the control_va_addr_alignment() __setup handler (git-fixes).
- x86/mm: Use proper mask when setting PUD mapping (git-fixes).
- x86/mm: fix poking_init() for Xen PV guests (git-fixes).
- x86/nospec: Unwreck the RSB stuffing (git-fixes).
- x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).
- x86/pat: Fix x86_has_pat_wp() (git-fixes).
- x86/pm: Add enumeration check before spec MSRs save/restore setup (git-fixes).
- x86/reboot: Disable SVM, not just VMX, when stopping CPUs (git-fixes).
- x86/resctrl: Fix min_cbm_bits for AMD (git-fixes).
- x86/sev: Add SEV-SNP guest feature negotiation support (git-fixes).
- x86/signal: Fix the value returned by strict_sas_size() (git-fixes).
- x86/speculation/mmio: Print SMT warning (git-fixes).
- x86/speculation: Identify processors vulnerable to SMT RSB predictions (git-fixes).
- x86/static_call: Serialize __static_call_fixup() properly (git-fixes).
- x86/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).
- x86/topology: Fix duplicated core ID within a package (git-fixes).
- x86/topology: Fix multiple packages shown on a single-package system (git-fixes).
- x86/tsx: Add a feature bit for TSX control MSR support (git-fixes).
- x86: Fix return value of __setup handlers (git-fixes).
- x86: drop bogus 'cc' clobber from __try_cmpxchg_user_asm() (git-fixes).
- xen/netback: do not do grant copy across page boundary (git-fixes).
- xen/netback: use same error messages for same errors (git-fixes).
- xfs: fix rm_offset flag handling in rmap keys (git-fixes).
- xfs: set bnobt/cntbt numrecs correctly when formatting new AGs (git-fixes).
- xhci-pci: Only run d3cold avoidance quirk for s2idle (git-fixes).
- xhci: Fix incorrect tracking of free space on transfer rings (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2023-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160435">SUSE bug 1160435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189998">SUSE bug 1189998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195655">SUSE bug 1195655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195921">SUSE bug 1195921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203906">SUSE bug 1203906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205650">SUSE bug 1205650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205756">SUSE bug 1205756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205758">SUSE bug 1205758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205760">SUSE bug 1205760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205762">SUSE bug 1205762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205803">SUSE bug 1205803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206024">SUSE bug 1206024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206578">SUSE bug 1206578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207553">SUSE bug 1207553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208050">SUSE bug 1208050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208410">SUSE bug 1208410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208600">SUSE bug 1208600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208604">SUSE bug 1208604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208758">SUSE bug 1208758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209039">SUSE bug 1209039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209287">SUSE bug 1209287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209288">SUSE bug 1209288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209367">SUSE bug 1209367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209856">SUSE bug 1209856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209982">SUSE bug 1209982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210165">SUSE bug 1210165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210294">SUSE bug 1210294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210449">SUSE bug 1210449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210450">SUSE bug 1210450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210498">SUSE bug 1210498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210533">SUSE bug 1210533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210551">SUSE bug 1210551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210647">SUSE bug 1210647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210741">SUSE bug 1210741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210775">SUSE bug 1210775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210783">SUSE bug 1210783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210791">SUSE bug 1210791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210806">SUSE bug 1210806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210940">SUSE bug 1210940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210947">SUSE bug 1210947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211037">SUSE bug 1211037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211043">SUSE bug 1211043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211044">SUSE bug 1211044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211089">SUSE bug 1211089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211105">SUSE bug 1211105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211113">SUSE bug 1211113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211205">SUSE bug 1211205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211263">SUSE bug 1211263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211280">SUSE bug 1211280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211281">SUSE bug 1211281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211299">SUSE bug 1211299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211346">SUSE bug 1211346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211387">SUSE bug 1211387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211410">SUSE bug 1211410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211414">SUSE bug 1211414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211449">SUSE bug 1211449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211465">SUSE bug 1211465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211519">SUSE bug 1211519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211564">SUSE bug 1211564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211590">SUSE bug 1211590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211686">SUSE bug 1211686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211687">SUSE bug 1211687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211688">SUSE bug 1211688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211689">SUSE bug 1211689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211690">SUSE bug 1211690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211691">SUSE bug 1211691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211692">SUSE bug 1211692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211693">SUSE bug 1211693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211714">SUSE bug 1211714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211796">SUSE bug 1211796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211804">SUSE bug 1211804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211807">SUSE bug 1211807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211808">SUSE bug 1211808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211847">SUSE bug 1211847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211852">SUSE bug 1211852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211855">SUSE bug 1211855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211960">SUSE bug 1211960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212129">SUSE bug 1212129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212154">SUSE bug 1212154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212155">SUSE bug 1212155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212158">SUSE bug 1212158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212350">SUSE bug 1212350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212448">SUSE bug 1212448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212494">SUSE bug 1212494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212504">SUSE bug 1212504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212513">SUSE bug 1212513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212540">SUSE bug 1212540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212561">SUSE bug 1212561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212563">SUSE bug 1212563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212564">SUSE bug 1212564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212584">SUSE bug 1212584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212592">SUSE bug 1212592</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4269/">CVE-2022-4269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45884/">CVE-2022-45884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45884">CVE-2022-45884 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45885/">CVE-2022-45885 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45885">CVE-2022-45885 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45886/">CVE-2022-45886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45887/">CVE-2022-45887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45919/">CVE-2022-45919 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1077/">CVE-2023-1077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1079/">CVE-2023-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1249/">CVE-2023-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1380/">CVE-2023-1380 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1382/">CVE-2023-1382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21102/">CVE-2023-21102 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2124/">CVE-2023-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2162/">CVE-2023-2162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2269/">CVE-2023-2269 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2483/">CVE-2023-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2483">CVE-2023-2483 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2513/">CVE-2023-2513 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28410/">CVE-2023-28410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3006/">CVE-2023-3006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3006">CVE-2023-3006 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-30456/">CVE-2023-30456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31084/">CVE-2023-31084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31084">CVE-2023-31084 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31436/">CVE-2023-31436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3161/">CVE-2023-3161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33288/">CVE-2023-33288 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35823/">CVE-2023-35823 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35828/">CVE-2023-35828 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770398" comment="kernel-rt-5.14.21-150400.15.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205980" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1187829" ref_url="https://bugzilla.suse.com/1187829" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="1212051" ref_url="https://bugzilla.suse.com/1212051" source="BUGZILLA"/>
		<reference ref_id="1212265" ref_url="https://bugzilla.suse.com/1212265" source="BUGZILLA"/>
		<reference ref_id="1212603" ref_url="https://bugzilla.suse.com/1212603" source="BUGZILLA"/>
		<reference ref_id="1212605" ref_url="https://bugzilla.suse.com/1212605" source="BUGZILLA"/>
		<reference ref_id="1212606" ref_url="https://bugzilla.suse.com/1212606" source="BUGZILLA"/>
		<reference ref_id="1212619" ref_url="https://bugzilla.suse.com/1212619" source="BUGZILLA"/>
		<reference ref_id="1212701" ref_url="https://bugzilla.suse.com/1212701" source="BUGZILLA"/>
		<reference ref_id="1212741" ref_url="https://bugzilla.suse.com/1212741" source="BUGZILLA"/>
		<reference ref_id="1212835" ref_url="https://bugzilla.suse.com/1212835" source="BUGZILLA"/>
		<reference ref_id="1212838" ref_url="https://bugzilla.suse.com/1212838" source="BUGZILLA"/>
		<reference ref_id="1212842" ref_url="https://bugzilla.suse.com/1212842" source="BUGZILLA"/>
		<reference ref_id="1212861" ref_url="https://bugzilla.suse.com/1212861" source="BUGZILLA"/>
		<reference ref_id="1212869" ref_url="https://bugzilla.suse.com/1212869" source="BUGZILLA"/>
		<reference ref_id="1212892" ref_url="https://bugzilla.suse.com/1212892" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-3090" ref_url="https://www.suse.com/security/cve/CVE-2023-3090/" source="CVE"/>
		<reference ref_id="CVE-2023-3111" ref_url="https://www.suse.com/security/cve/CVE-2023-3111/" source="CVE"/>
		<reference ref_id="CVE-2023-3212" ref_url="https://www.suse.com/security/cve/CVE-2023-3212/" source="CVE"/>
		<reference ref_id="CVE-2023-3357" ref_url="https://www.suse.com/security/cve/CVE-2023-3357/" source="CVE"/>
		<reference ref_id="CVE-2023-3358" ref_url="https://www.suse.com/security/cve/CVE-2023-3358/" source="CVE"/>
		<reference ref_id="CVE-2023-3389" ref_url="https://www.suse.com/security/cve/CVE-2023-3389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-3389: Fixed a use-after-free vulnerability in the io_uring subsystem (bsc#1212838).
- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).
- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
- CVE-2023-3212: Fixed a NULL pointer dereference flaw in the gfs2 file system (bsc#1212265).
- CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606).
- CVE-2023-3357: Fixed a NULL pointer dereference flaw in the AMD Sensor Fusion Hub driver (bsc#1212605).

The following non-security bugs were fixed:

- Get module prefix from kmod (bsc#1212835).
- Revert 'mtd: rawnand: arasan: Prevent an unsupported configuration' (git-fixes).
- Revert 'net: phy: dp83867: perform soft reset and retain established link' (git-fixes).
- alsa: ac97: Fix possible NULL dereference in snd_ac97_mixer (git-fixes).
- alsa: hda/realtek: Add 'Intel Reference board' and 'NUC 13' SSID in the ALC256 (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG G634Z (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GV601V (git-fixes).
- alsa: hda/realtek: Add quirks for ASUS GU604V and GU603V (git-fixes).
- alsa: hda/realtek: Add quirks for ROG ALLY CS35l41 audio (git-fixes).
- alsa: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook (git-fixes).
- amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (git-fixes).
- arm64: Add missing Set/Way CMO encodings (git-fixes).
- arm64: dts: Move BCM4908 dts to bcmbca folder (git-fixes)
- arm64: dts: broadcom: bcmbca: bcm4908: fix NAND interrupt name (git-fixes)
- arm64: dts: broadcom: bcmbca: bcm4908: fix procmon nodename (git-fixes)
- arm64: dts: imx8mn-var-som: fix PHY detection bug by adding deassert (git-fixes)
- arm: dts: Fix erroneous ADS touchscreen polarities (git-fixes).
- asoc: es8316: Do not set rate constraints for unsupported MCLKs (git-fixes).
- asoc: es8316: Increment max value for ALC Capture Target Volume control (git-fixes).
- asoc: imx-audmix: check return value of devm_kasprintf() (git-fixes).
- asoc: mediatek: mt8173: Fix irq error path (git-fixes).
- asoc: nau8824: Add quirk to active-high jack-detect (git-fixes).
- asoc: simple-card: Add missing of_node_put() in case of error (git-fixes).
- bus: fsl-mc: fsl-mc-allocator: Drop a write-only variable (git-fixes).
- bus: ti-sysc: Fix dispc quirk masking bool variables (git-fixes).
- can: isotp: isotp_sendmsg(): fix return error fix on TX path (git-fixes).
- can: kvaser_pciefd: Remove handler for unused KVASER_PCIEFD_PACK_TYPE_EFRAME_ACK (git-fixes).
- can: kvaser_pciefd: Remove useless write to interrupt register (git-fixes).
- can: length: fix bitstuffing count (git-fixes).
- can: length: fix description of the RRS field (git-fixes).
- can: length: make header self contained (git-fixes).
- clk: Fix memory leak in devm_clk_notifier_register() (git-fixes).
- clk: cdce925: check return value of kasprintf() (git-fixes).
- clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe (git-fixes).
- clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() (git-fixes).
- clk: imx: scu: use _safe list iterator to avoid a use after free (git-fixes).
- clk: keystone: sci-clk: check return value of kasprintf() (git-fixes).
- clk: samsung: Add Exynos4212 compatible to CLKOUT driver (git-fixes).
- clk: si5341: check return value of {devm_}kasprintf() (git-fixes).
- clk: si5341: free unused memory on probe failure (git-fixes).
- clk: si5341: return error if one synth clock registration fails (git-fixes).
- clk: tegra: tegra124-emc: Fix potential memory leak (git-fixes).
- clk: ti: clkctrl: check return value of kasprintf() (git-fixes).
- clk: vc5: check memory returned by kasprintf() (git-fixes).
- clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe (git-fixes).
- crypto: marvell/cesa - Fix type mismatch warning (git-fixes).
- crypto: nx - fix build warnings when DEBUG_FS is not enabled (git-fixes).
- drivers: meson: secure-pwrc: always enable DMA domain (git-fixes).
- drm/amd/display: Add logging for display MALL refresh setting (git-fixes).
- drm/amd/display: Add minimal pipe split transition state (git-fixes).
- drm/amd/display: Add wrapper to call planes and stream update (git-fixes).
- drm/amd/display: Explicitly specify update type per plane info change (git-fixes).
- drm/amd/display: Fix artifacting on eDP panels when engaging freesync video mode (git-fixes).
- drm/amd/display: Use dc_update_planes_and_stream (git-fixes).
- drm/amd/display: drop redundant memset() in get_available_dsc_slices() (git-fixes).
- drm/amd/display: fix the system hang while disable PSR (git-fixes).
- drm/amdkfd: Fix potential deallocation of previously deallocated memory (git-fixes).
- drm/bridge: tc358768: always enable HS video mode (git-fixes).
- drm/bridge: tc358768: fix PLL parameters computation (git-fixes).
- drm/bridge: tc358768: fix PLL target frequency (git-fixes).
- drm/bridge: tc358768: fix TCLK_ZEROCNT computation (git-fixes).
- drm/bridge: tc358768: fix TXTAGOCNT computation (git-fixes).
- drm/exynos: fix race condition UAF in exynos_g2d_exec_ioctl (git-fixes).
- drm/exynos: vidi: fix a wrong error return (git-fixes).
- drm/i915/gvt: remove unused variable gma_bottom in command parser (git-fixes).
- drm/msm/adreno: fix sparse warnings in a6xx code (git-fixes).
- drm/msm/dp: Free resources after unregistering them (git-fixes).
- drm/msm/dpu: correct MERGE_3D length (git-fixes).
- drm/msm/dpu: do not enable color-management if DSPPs are not available (git-fixes).
- drm/msm/dsi: do not allow enabling 14nm VCO with unprogrammed rate (git-fixes).
- drm/panel: sharp-ls043t1le01: adjust mode settings (git-fixes).
- drm/panel: simple: fix active size for Ampire AM-480272H3TMQW-T01H (git-fixes).
- drm/radeon: fix possible division-by-zero errors (git-fixes).
- drm/radeon: fix race condition UAF in radeon_gem_set_domain_ioctl (git-fixes).
- drm/rockchip: vop: Leave vblank enabled in self-refresh (git-fixes).
- drm/vram-helper: fix function names in vram helper doc (git-fixes).
- drm: sun4i_tcon: use devm_clk_get_enabled in `sun4i_tcon_init_clocks` (git-fixes).
- elf: correct note name comment (git-fixes).
- extcon: Fix kernel doc of property capability fields to avoid warnings (git-fixes).
- extcon: Fix kernel doc of property fields to avoid warnings (git-fixes).
- extcon: usbc-tusb320: Add USB TYPE-C support (git-fixes).
- extcon: usbc-tusb320: Call the Type-C IRQ handler only if a port is registered (git-fixes).
- extcon: usbc-tusb320: Unregister typec port on driver removal (git-fixes).
- extcon: usbc-tusb320: Update state on probe even if no IRQ pending (git-fixes).
- fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() (git-fixes).
- firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool() (git-fixes).
- hid: logitech-hidpp: add HIDPP_QUIRK_DELAYED_INIT for the T651 (git-fixes).
- hid: wacom: Add error check to wacom_parse_and_register() (git-fixes).
- hwmon: (gsc-hwmon) fix fan pwm temperature scaling (git-fixes).
- hwrng: imx-rngc - fix the timeout for init and self check (git-fixes).
- hwrng: st - keep clock enabled while hwrng is registered (git-fixes).
- i2c: imx-lpi2c: fix type char overflow issue when calculating the clock cycle (git-fixes).
- i2c: qup: Add missing unwind goto in qup_i2c_probe() (git-fixes).
- ib/hfi1: Fix wrong mmu_node used for user SDMA packet after invalidate (git-fixes)
- ib/isert: Fix dead lock in ib_isert (git-fixes)
- ib/isert: Fix incorrect release of isert connection (git-fixes)
- ib/isert: Fix possible list corruption in CMA handler (git-fixes)
- ib/uverbs: Fix to consider event queue closing also upon non-blocking mode (git-fixes)
- ibmvnic: Do not reset dql stats on NON_FATAL err (bsc#1212603 ltc#202604).
- ice, xsk: Diversify return values from xsk_wakeup call paths (git-fixes).
- ice: Do not double unplug aux on peer initiated reset (git-fixes).
- ice: Do not use WQ_MEM_RECLAIM flag for workqueue (git-fixes).
- ice: Fix DSCP PFC TLV creation (git-fixes).
- ice: Fix XDP memory leak when NIC is brought up and down (git-fixes).
- ice: Fix ice_xdp_xmit() when XDP TX queue number is not sufficient (git-fixes).
- ice: Fix memory corruption in VF driver (git-fixes).
- ice: Ignore EEXIST when setting promisc mode (git-fixes).
- ice: Prevent set_channel from changing queues while RDMA active (git-fixes).
- ice: Reset FDIR counter in FDIR init stage (git-fixes).
- ice: add profile conflict check for AVF FDIR (git-fixes).
- ice: block LAN in case of VF to VF offload (git-fixes).
- ice: config netdev tc before setting queues number (git-fixes).
- ice: copy last block omitted in ice_get_module_eeprom() (git-fixes).
- ice: ethtool: Prohibit improper channel config for DCB (git-fixes).
- ice: ethtool: advertise 1000M speeds properly (git-fixes).
- ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (git-fixes).
- ice: fix wrong fallback logic for FDIR (git-fixes).
- ice: handle E822 generic device ID in PLDM header (git-fixes).
- ice: switch: fix potential memleak in ice_add_adv_recipe() (git-fixes).
- ice: use bitmap_free instead of devm_kfree (git-fixes).
- ice: xsk: use Rx ring's XDP ring when picking NAPI context (git-fixes).
- ieee802154: hwsim: Fix possible memory leaks (git-fixes).
- ifcvf/vDPA: fix misuse virtio-net device config size for blk dev (jsc#SLE-19253).
- iio: accel: fxls8962af: errata bug only applicable for FXLS8962AF (git-fixes).
- iio: accel: fxls8962af: fixup buffer scan element type (git-fixes).
- iio: adc: ad7192: Fix internal/external clock selection (git-fixes).
- iio: adc: ad7192: Fix null ad7192_state pointer access (git-fixes).
- input: adxl34x - do not hardcode interrupt trigger type (git-fixes).
- input: drv260x - fix typo in register value define (git-fixes).
- input: drv260x - remove unused .reg_defaults (git-fixes).
- input: drv260x - sleep between polling GO bit (git-fixes).
- input: soc_button_array - add invalid acpi_index DMI quirk handling (git-fixes).
- integrity: Fix possible multiple allocation in integrity_inode_get() (git-fixes).
- irqchip/clps711x: Remove unused clps711x_intc_init() function (git-fixes).
- irqchip/ftintc010: Mark all function static (git-fixes).
- irqchip/jcore-aic: Fix missing allocation of IRQ descriptors (git-fixes).
- kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741).
- mailbox: ti-msgmgr: Fill non-message tx data fields with 0x0 (git-fixes).
- media: cec: core: do not set last_initiator if tx in progress (git-fixes).
- memory: brcmstb_dpfe: fix testing array offset after use (git-fixes).
- meson saradc: fix clock divider mask length (git-fixes).
- mfd: intel-lpss: Add missing check for platform_get_resource (git-fixes).
- mfd: pm8008: Fix module autoloading (git-fixes).
- mfd: rt5033: Drop rt5033-battery sub-device (git-fixes).
- mfd: stmfx: Fix error path in stmfx_chip_init (git-fixes).
- mfd: stmfx: Nullify stmfx-&gt;vdd in case of error (git-fixes).
- mfd: stmpe: Only disable the regulators if they are enabled (git-fixes).
- misc: fastrpc: Create fastrpc scalar with correct buffer count (git-fixes).
- misc: pci_endpoint_test: Free IRQs before removing the device (git-fixes).
- misc: pci_endpoint_test: Re-init completion for every test (git-fixes).
- mlx5: do not use RT_TOS for IPv6 flowlabel (jsc#SLE-19253).
- mmc: bcm2835: fix deferred probing (git-fixes).
- mmc: meson-gx: remove redundant mmc_request_done() call from irq context (git-fixes).
- mmc: mmci: Set PROBE_PREFER_ASYNCHRONOUS (git-fixes).
- mmc: mmci: stm32: fix max busy timeout calculation (git-fixes).
- mmc: mtk-sd: fix deferred probing (git-fixes).
- mmc: mvsdio: fix deferred probing (git-fixes).
- mmc: omap: fix deferred probing (git-fixes).
- mmc: omap_hsmmc: fix deferred probing (git-fixes).
- mmc: owl: fix deferred probing (git-fixes).
- mmc: sdhci-acpi: fix deferred probing (git-fixes).
- mmc: sdhci-msm: Disable broken 64-bit DMA on MSM8916 (git-fixes).
- mmc: sdhci-spear: fix deferred probing (git-fixes).
- mmc: sh_mmcif: fix deferred probing (git-fixes).
- mmc: sunxi: fix deferred probing (git-fixes).
- mmc: usdhi60rol0: fix deferred probing (git-fixes).
- mtd: rawnand: meson: fix unaligned DMA buffers handling (git-fixes).
- net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#SLE-19253).
- net/mlx5: Allow async trigger completion execution on single CPU systems (jsc#SLE-19253).
- net/mlx5: Allow future addition of IPsec object modifiers (jsc#SLE-19253).
- net/mlx5: Avoid false positive lockdep warning by adding lock_class_key (jsc#SLE-19253).
- net/mlx5: Avoid recovery in probe flows (jsc#SLE-19253).
- net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#SLE-19253).
- net/mlx5: Bridge, verify LAG state when adding bond to bridge (jsc#SLE-19253).
- net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#SLE-19253).
- net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#SLE-19253).
- net/mlx5: DR, Fix missing flow_source when creating multi-destination FW table (jsc#SLE-19253).
- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#SLE-19253).
- net/mlx5: Do not advertise IPsec netdev support for non-IPsec device (jsc#SLE-19253).
- net/mlx5: Do not use already freed action pointer (jsc#SLE-19253).
- net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#SLE-19253).
- net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#SLE-19253).
- net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#SLE-19253).
- net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#SLE-19253).
- net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#SLE-19253).
- net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).
- net/mlx5: Enhance debug print in page allocation failure (jsc#SLE-19253).
- net/mlx5: Fix FW tracer timestamp calculation (jsc#SLE-19253).
- net/mlx5: Fix RoCE setting at HCA level (jsc#SLE-19253).
- net/mlx5: Fix crash during sync firmware reset (jsc#SLE-19253).
- net/mlx5: Fix error message when failing to allocate device memory (jsc#SLE-19253).
- net/mlx5: Fix handling of entry refcount when command is not issued to FW (jsc#SLE-19253).
- net/mlx5: Fix possible use-after-free in async command interface (jsc#SLE-19253).
- net/mlx5: Fix ptp max frequency adjustment range (jsc#SLE-19253).
- net/mlx5: Fix steering rules cleanup (jsc#SLE-19253).
- net/mlx5: Fix uninitialized variable bug in outlen_write() (jsc#SLE-19253).
- net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#SLE-19253).
- net/mlx5: Initialize flow steering during driver probe (jsc#SLE-19253).
- net/mlx5: Read embedded cpu after init bit cleared (jsc#SLE-19253).
- net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#SLE-19253).
- net/mlx5: Rearm the FW tracer after each tracer event (jsc#SLE-19253).
- net/mlx5: SF, Drain health before removing device (jsc#SLE-19253).
- net/mlx5: SF: Fix probing active SFs during driver probe phase (jsc#SLE-19253).
- net/mlx5: Serialize module cleanup with reload and remove (jsc#SLE-19253).
- net/mlx5: Wait for firmware to enable CRS before pci_restore_state (jsc#SLE-19253).
- net/mlx5: add IFC bits for bypassing port select flow table (git-fixes)
- net/mlx5: check attr pointer validity before dereferencing it (jsc#SLE-19253).
- net/mlx5: correct ECE offset in query qp output (jsc#SLE-19253).
- net/mlx5: fix missing mutex_unlock in mlx5_fw_fatal_reporter_err_work() (jsc#SLE-19253).
- net/mlx5: fs, fail conflicting actions (jsc#SLE-19253).
- net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#SLE-19253).
- net/mlx5: fw_tracer, Fix event handling (jsc#SLE-19253).
- net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#SLE-19253).
- net/mlx5e: Always clear dest encap in neigh-update-del (jsc#SLE-19253).
- net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#SLE-19253).
- net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#SLE-19253).
- net/mlx5e: Do not attach netdev profile while handling internal error (jsc#SLE-19253).
- net/mlx5e: Do not increment ESN when updating IPsec ESN state (jsc#SLE-19253).
- net/mlx5e: Do not support encap rules with gbp option (jsc#SLE-19253).
- net/mlx5e: E-Switch, Fix comparing termination table instance (jsc#SLE-19253).
- net/mlx5e: Extend SKB room check to include PTP-SQ (jsc#SLE-19253).
- net/mlx5e: Fix MPLSoUDP encap to use MPLS action information (jsc#SLE-19253).
- net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#SLE-19253).
- net/mlx5e: Fix capability check for updating vnic env counters (jsc#SLE-19253).
- net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#SLE-19253).
- net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#SLE-19253).
- net/mlx5e: Fix the value of MLX5E_MAX_RQ_NUM_MTTS (jsc#SLE-19253).
- net/mlx5e: Fix use-after-free when reverting termination table (jsc#SLE-19253).
- net/mlx5e: Fix wrong application of the LRO state (jsc#SLE-19253).
- net/mlx5e: Fix wrong tc flag used when set hw-tc-offload off (jsc#SLE-19253).
- net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#SLE-19253).
- net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#SLE-19253).
- net/mlx5e: Modify slow path rules to go to slow fdb (jsc#SLE-19253).
- net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).
- net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#SLE-19253).
- net/mlx5e: TC, Fix ct_clear overwriting ct action metadata (jsc#SLE-19253).
- net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#SLE-19253).
- net/mlx5e: Verify flow_source cap before using it (jsc#SLE-19253).
- net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#SLE-19253).
- net/mlx5e: kTLS, Fix build time constant test in RX (jsc#SLE-19253).
- net/mlx5e: kTLS, Fix build time constant test in TX (jsc#SLE-19253).
- net: mlx5: eliminate anonymous module_init &amp; module_exit (jsc#SLE-19253).
- nfcsim.c: Fix error checking for debugfs_create_dir (git-fixes).
- nilfs2: fix buffer corruption due to concurrent device reads (git-fixes).
- nvme-core: fix dev_pm_qos memleak (git-fixes).
- nvme-core: fix memory leak in dhchap_ctrl_secret (git-fixes).
- nvme-core: fix memory leak in dhchap_secret_store (git-fixes).
- nvme-pci: add quirk for missing secondary temperature thresholds (git-fixes).
- nvme: double KA polling frequency to avoid KATO with TBKAS on (git-fixes).
- ocfs2: fix defrag path triggering jbd2 ASSERT (git-fixes).
- ocfs2: fix freeing uninitialized resource on ocfs2_dlm_shutdown (git-fixes).
- ocfs2: fix non-auto defrag path not working issue (git-fixes).
- pci/aspm: Disable ASPM on MFD function removal to avoid use-after-free (git-fixes).
- pci: Add pci_clear_master() stub for non-CONFIG_PCI (git-fixes).
- pci: Release resource invalidated by coalescing (git-fixes).
- pci: cadence: Fix Gen2 Link Retraining process (git-fixes).
- pci: endpoint: Add missing documentation about the MSI/MSI-X range (git-fixes).
- pci: ftpci100: Release the clock resources (git-fixes).
- pci: pciehp: Cancel bringup sequence if card is not present (git-fixes).
- pci: qcom: Disable write access to read only registers for IP v2.3.3 (git-fixes).
- pci: rockchip: Add poll and timeout to wait for PHY PLLs to be locked (git-fixes).
- pci: rockchip: Assert PCI Configuration Enable bit after probe (git-fixes).
- pci: rockchip: Fix legacy IRQ generation for RK3399 PCIe endpoint core (git-fixes).
- pci: rockchip: Set address alignment for endpoint mode (git-fixes).
- pci: rockchip: Use u32 variable to access 32-bit registers (git-fixes).
- pci: rockchip: Write PCI Device ID to correct register (git-fixes).
- pci: vmd: Reset VMD config register between soft reboots (git-fixes).
- pinctrl: at91-pio4: check return value of devm_kasprintf() (git-fixes).
- pinctrl: cherryview: Return correct value if pin in push-pull mode (git-fixes).
- pinctrl: microchip-sgpio: check return value of devm_kasprintf() (git-fixes).
- platform/x86: think-lmi: Correct NVME password handling (git-fixes).
- platform/x86: think-lmi: Correct System password interface (git-fixes).
- platform/x86: think-lmi: mutex protection around multiple WMI calls (git-fixes).
- platform/x86: thinkpad_acpi: Fix lkp-tests warnings for platform profiles (git-fixes).
- pm: domains: fix integer overflow issues in genpd_parse_state() (git-fixes).
- powerpc/64s/radix: Fix exit lazy tlb mm switch with irqs enabled (bsc#1194869).
- powerpc/iommu: Limit number of TCEs to 512 for H_STUFF_TCE hcall (bsc#1194869 bsc#1212701).
- powerpc/set_memory: Avoid spinlock recursion in change_page_attr() (bsc#1194869).
- pstore/ram: Add check for kstrdup (git-fixes).
- radeon: avoid double free in ci_dpm_init() (git-fixes).
- rdma/bnxt_re: Avoid calling wake_up threads from spin_lock context (git-fixes)
- rdma/bnxt_re: Disable/kill tasklet only if it is enabled (git-fixes)
- rdma/bnxt_re: Fix to remove an unnecessary log (git-fixes)
- rdma/bnxt_re: Fix to remove unnecessary return labels (git-fixes)
- rdma/bnxt_re: Remove a redundant check inside bnxt_re_update_gid (git-fixes)
- rdma/bnxt_re: Remove unnecessary checks (git-fixes)
- rdma/bnxt_re: Return directly without goto jumps (git-fixes)
- rdma/bnxt_re: Use unique names while registering interrupts (git-fixes)
- rdma/bnxt_re: wraparound mbox producer index (git-fixes)
- rdma/cma: Always set static rate to 0 for RoCE (git-fixes)
- rdma/hns: Fix hns_roce_table_get return value (git-fixes)
- rdma/irdma: avoid fortify-string warning in irdma_clr_wqes (git-fixes)
- rdma/mlx5: Do not set tx affinity when lag is in hash mode (git-fixes)
- rdma/mlx5: Fix affinity assignment (git-fixes)
- rdma/mlx5: Initiate dropless RQ for RAW Ethernet functions (git-fixes)
- rdma/mlx5: Rely on RoCE fw cap instead of devlink when setting profile (jsc#SLE-19253).
- rdma/rtrs: Fix rxe_dealloc_pd warning (git-fixes)
- rdma/rtrs: Fix the last iu-&gt;buf leak in err path (git-fixes)
- rdma/rxe: Fix packet length checks (git-fixes)
- rdma/rxe: Fix ref count error in check_rkey() (git-fixes)
- rdma/rxe: Fix rxe_cq_post (git-fixes)
- rdma/rxe: Fix the use-before-initialization error of resp_pkts (git-fixes)
- rdma/rxe: Remove dangling declaration of rxe_cq_disable() (git-fixes)
- rdma/rxe: Remove the unused variable obj (git-fixes)
- rdma/rxe: Removed unused name from rxe_task struct (git-fixes)
- rdma/uverbs: Restrict usage of privileged QKEYs (git-fixes)
- rdma/vmw_pvrdma: Remove unnecessary check on wr-&gt;opcode (git-fixes)
- regulator: core: Fix more error checking for debugfs_create_dir() (git-fixes).
- regulator: core: Streamline debugfs operations (git-fixes).
- regulator: helper: Document ramp_delay parameter of regulator_set_ramp_delay_regmap() (git-fixes).
- rpm/check-for-config-changes: ignore also PAHOLE_HAS_* We now also have options like CONFIG_PAHOLE_HAS_LANG_EXCLUDE.
- rtc: st-lpc: Release some resources in st_rtc_probe() in case of error (git-fixes).
- s390/gmap: voluntarily schedule during key setting (git-fixes bsc#1212892).
- s390/pkey: zeroize key blobs (git-fixes bsc#1212619).
- serial: 8250: lock port for UART_IER access in omap8250_irq() (git-fixes).
- serial: 8250: lock port for stop_rx() in omap8250_irq() (git-fixes).
- serial: 8250: omap: Fix freeing of resources on failed register (git-fixes).
- serial: 8250_omap: Use force_suspend and resume for system suspend (git-fixes).
- serial: atmel: do not enable IRQs prematurely (git-fixes).
- signal/s390: Use force_sigsegv in default_trap_handler (git-fixes bsc#1212861).
- soc/fsl/qe: fix usb.c build errors (git-fixes).
- soc: samsung: exynos-pmu: Re-introduce Exynos4212 support (git-fixes).
- soundwire: dmi-quirks: add new mapping for HP Spectre x360 (git-fixes).
- spi: dw: Round of n_bytes to power of 2 (git-fixes).
- spi: lpspi: disable lpspi module irq in DMA mode (git-fixes).
- spi: spi-geni-qcom: Correct CS_TOGGLE bit in SPI_TRANS_CFG (git-fixes).
- test_firmware: return ENOMEM instead of ENOSPC on failed memory allocation (git-fixes).
- thermal/drivers/sun8i: Fix some error handling paths in sun8i_ths_probe() (git-fixes).
- tracing/timer: Add missing hrtimer modes to decode_hrtimer_mode() (git-fixes).
- tty: serial: imx: fix rs485 rx after tx (git-fixes).
- tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error (git-fixes).
- tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk (git-fixes).
- usb: dwc3-meson-g12a: Fix an error handling path in dwc3_meson_g12a_probe() (git-fixes).
- usb: dwc3: gadget: Propagate core init errors to UDC during pullup (git-fixes).
- usb: dwc3: qcom: Fix an error handling path in dwc3_qcom_probe() (git-fixes).
- usb: dwc3: qcom: Fix potential memory leak (git-fixes).
- usb: dwc3: qcom: Release the correct resources in dwc3_qcom_remove() (git-fixes).
- usb: gadget: u_serial: Add null pointer check in gserial_suspend (git-fixes).
- usb: gadget: udc: fix NULL dereference in remove() (git-fixes).
- usb: hide unused usbfs_notify_suspend/resume functions (git-fixes).
- usb: phy: phy-tahvo: fix memory leak in tahvo_usb_probe() (git-fixes).
- usb: xhci: Remove unused udev from xhci_log_ctx trace event (git-fixes).
- usrmerge: Adjust module path in the kernel sources (bsc#1212835). 
- vdpa/mlx5: Directly assign memory key (jsc#SLE-19253).
- vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#SLE-19253).
- vdpa/mlx5: Fix wrong configuration of virtio_version_1_0 (jsc#SLE-19253).
- vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#SLE-19253).
- vhost_vdpa: support PACKED when setting-getting vring_base (jsc#SLE-19253).
- w1: fix loop in w1_fini() (git-fixes).
- w1: w1_therm: fix locking behavior in convert_t (git-fixes).
- wifi: ath9k: Fix possible stall on ath9k_txq_list_has_key() (git-fixes).
- wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (git-fixes).
- wifi: ath9k: convert msecs to jiffies where needed (git-fixes).
- wifi: ath9k: do not allow to overwrite ENDPOINT0 attributes (git-fixes).
- wifi: ath9k: fix AR9003 mac hardware hang check register offset calculation (git-fixes).
- wifi: atmel: Fix an error handling path in atmel_probe() (git-fixes).
- wifi: cfg80211: rewrite merging of inherited elements (git-fixes).
- wifi: iwlwifi: mvm: indicate HW decrypt for beacon protection (git-fixes).
- wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler() (git-fixes).
- wifi: iwlwifi: pull from TXQs with softirqs disabled (git-fixes).
- wifi: mwifiex: Fix the size of a memory allocation in mwifiex_ret_802_11_scan() (git-fixes).
- wifi: orinoco: Fix an error handling path in orinoco_cs_probe() (git-fixes).
- wifi: orinoco: Fix an error handling path in spectrum_cs_probe() (git-fixes).
- wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled (git-fixes).
- wifi: rsi: Do not set MMC_PM_KEEP_POWER in shutdown (git-fixes).
- wifi: wilc1000: fix for absent RSN capabilities WFA testcase (git-fixes).
- writeback: fix dereferencing NULL mapping-&gt;host on writeback_page_template (git-fixes).
- x86/build: Avoid relocation information in final vmlinux (bsc#1187829).
- x86/kprobes: Fix arch_check_optimized_kprobe check within optimized_kprobe range (git-fixes).
- x86/mm: Fix RESERVE_BRK() for older binutils (git-fixes).
- x86/mm: Fix use of uninitialized buffer in sme_enable() (git-fixes).
- x86/sgx: Fix race between reclaimer and page fault handler (git-fixes).
- x86/sgx: Mark PCMD page as dirty when modifying contents (git-fixes).
- x86/xen: fix secondary processor fpu initialization (bsc#1212869).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-10"/>
	<updated date="2023-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187829">SUSE bug 1187829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212051">SUSE bug 1212051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212265">SUSE bug 1212265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212603">SUSE bug 1212603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212605">SUSE bug 1212605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212606">SUSE bug 1212606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212619">SUSE bug 1212619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212701">SUSE bug 1212701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212741">SUSE bug 1212741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212835">SUSE bug 1212835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212838">SUSE bug 1212838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212842">SUSE bug 1212842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212861">SUSE bug 1212861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212869">SUSE bug 1212869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212892">SUSE bug 1212892</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3090/">CVE-2023-3090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3111/">CVE-2023-3111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3212/">CVE-2023-3212 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3357/">CVE-2023-3357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3357">CVE-2023-3357 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3358/">CVE-2023-3358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3389/">CVE-2023-3389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3389">CVE-2023-3389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771322" comment="kernel-rt-5.14.21-150400.15.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205981" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160435" ref_url="https://bugzilla.suse.com/1160435" source="BUGZILLA"/>
		<reference ref_id="1187829" ref_url="https://bugzilla.suse.com/1187829" source="BUGZILLA"/>
		<reference ref_id="1189998" ref_url="https://bugzilla.suse.com/1189998" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1205758" ref_url="https://bugzilla.suse.com/1205758" source="BUGZILLA"/>
		<reference ref_id="1208410" ref_url="https://bugzilla.suse.com/1208410" source="BUGZILLA"/>
		<reference ref_id="1208600" ref_url="https://bugzilla.suse.com/1208600" source="BUGZILLA"/>
		<reference ref_id="1209039" ref_url="https://bugzilla.suse.com/1209039" source="BUGZILLA"/>
		<reference ref_id="1209367" ref_url="https://bugzilla.suse.com/1209367" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="1211299" ref_url="https://bugzilla.suse.com/1211299" source="BUGZILLA"/>
		<reference ref_id="1211346" ref_url="https://bugzilla.suse.com/1211346" source="BUGZILLA"/>
		<reference ref_id="1211387" ref_url="https://bugzilla.suse.com/1211387" source="BUGZILLA"/>
		<reference ref_id="1211410" ref_url="https://bugzilla.suse.com/1211410" source="BUGZILLA"/>
		<reference ref_id="1211449" ref_url="https://bugzilla.suse.com/1211449" source="BUGZILLA"/>
		<reference ref_id="1211796" ref_url="https://bugzilla.suse.com/1211796" source="BUGZILLA"/>
		<reference ref_id="1211852" ref_url="https://bugzilla.suse.com/1211852" source="BUGZILLA"/>
		<reference ref_id="1212051" ref_url="https://bugzilla.suse.com/1212051" source="BUGZILLA"/>
		<reference ref_id="1212129" ref_url="https://bugzilla.suse.com/1212129" source="BUGZILLA"/>
		<reference ref_id="1212154" ref_url="https://bugzilla.suse.com/1212154" source="BUGZILLA"/>
		<reference ref_id="1212155" ref_url="https://bugzilla.suse.com/1212155" source="BUGZILLA"/>
		<reference ref_id="1212158" ref_url="https://bugzilla.suse.com/1212158" source="BUGZILLA"/>
		<reference ref_id="1212265" ref_url="https://bugzilla.suse.com/1212265" source="BUGZILLA"/>
		<reference ref_id="1212350" ref_url="https://bugzilla.suse.com/1212350" source="BUGZILLA"/>
		<reference ref_id="1212448" ref_url="https://bugzilla.suse.com/1212448" source="BUGZILLA"/>
		<reference ref_id="1212494" ref_url="https://bugzilla.suse.com/1212494" source="BUGZILLA"/>
		<reference ref_id="1212495" ref_url="https://bugzilla.suse.com/1212495" source="BUGZILLA"/>
		<reference ref_id="1212504" ref_url="https://bugzilla.suse.com/1212504" source="BUGZILLA"/>
		<reference ref_id="1212513" ref_url="https://bugzilla.suse.com/1212513" source="BUGZILLA"/>
		<reference ref_id="1212540" ref_url="https://bugzilla.suse.com/1212540" source="BUGZILLA"/>
		<reference ref_id="1212561" ref_url="https://bugzilla.suse.com/1212561" source="BUGZILLA"/>
		<reference ref_id="1212563" ref_url="https://bugzilla.suse.com/1212563" source="BUGZILLA"/>
		<reference ref_id="1212564" ref_url="https://bugzilla.suse.com/1212564" source="BUGZILLA"/>
		<reference ref_id="1212584" ref_url="https://bugzilla.suse.com/1212584" source="BUGZILLA"/>
		<reference ref_id="1212592" ref_url="https://bugzilla.suse.com/1212592" source="BUGZILLA"/>
		<reference ref_id="1212603" ref_url="https://bugzilla.suse.com/1212603" source="BUGZILLA"/>
		<reference ref_id="1212605" ref_url="https://bugzilla.suse.com/1212605" source="BUGZILLA"/>
		<reference ref_id="1212606" ref_url="https://bugzilla.suse.com/1212606" source="BUGZILLA"/>
		<reference ref_id="1212619" ref_url="https://bugzilla.suse.com/1212619" source="BUGZILLA"/>
		<reference ref_id="1212701" ref_url="https://bugzilla.suse.com/1212701" source="BUGZILLA"/>
		<reference ref_id="1212741" ref_url="https://bugzilla.suse.com/1212741" source="BUGZILLA"/>
		<reference ref_id="1212835" ref_url="https://bugzilla.suse.com/1212835" source="BUGZILLA"/>
		<reference ref_id="1212838" ref_url="https://bugzilla.suse.com/1212838" source="BUGZILLA"/>
		<reference ref_id="1212842" ref_url="https://bugzilla.suse.com/1212842" source="BUGZILLA"/>
		<reference ref_id="1212861" ref_url="https://bugzilla.suse.com/1212861" source="BUGZILLA"/>
		<reference ref_id="1212869" ref_url="https://bugzilla.suse.com/1212869" source="BUGZILLA"/>
		<reference ref_id="1212892" ref_url="https://bugzilla.suse.com/1212892" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1077" ref_url="https://www.suse.com/security/cve/CVE-2023-1077/" source="CVE"/>
		<reference ref_id="CVE-2023-1249" ref_url="https://www.suse.com/security/cve/CVE-2023-1249/" source="CVE"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-21102" ref_url="https://www.suse.com/security/cve/CVE-2023-21102/" source="CVE"/>
		<reference ref_id="CVE-2023-3090" ref_url="https://www.suse.com/security/cve/CVE-2023-3090/" source="CVE"/>
		<reference ref_id="CVE-2023-3111" ref_url="https://www.suse.com/security/cve/CVE-2023-3111/" source="CVE"/>
		<reference ref_id="CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141/" source="CVE"/>
		<reference ref_id="CVE-2023-3161" ref_url="https://www.suse.com/security/cve/CVE-2023-3161/" source="CVE"/>
		<reference ref_id="CVE-2023-3212" ref_url="https://www.suse.com/security/cve/CVE-2023-3212/" source="CVE"/>
		<reference ref_id="CVE-2023-3357" ref_url="https://www.suse.com/security/cve/CVE-2023-3357/" source="CVE"/>
		<reference ref_id="CVE-2023-3358" ref_url="https://www.suse.com/security/cve/CVE-2023-3358/" source="CVE"/>
		<reference ref_id="CVE-2023-3389" ref_url="https://www.suse.com/security/cve/CVE-2023-3389/" source="CVE"/>
		<reference ref_id="CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788/" source="CVE"/>
		<reference ref_id="CVE-2023-35823" ref_url="https://www.suse.com/security/cve/CVE-2023-35823/" source="CVE"/>
		<reference ref_id="CVE-2023-35828" ref_url="https://www.suse.com/security/cve/CVE-2023-35828/" source="CVE"/>
		<reference ref_id="CVE-2023-35829" ref_url="https://www.suse.com/security/cve/CVE-2023-35829/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-3389: Fixed a use-after-free vulnerability in the io_uring subsystem (bsc#1212838).
- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).
- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
- CVE-2023-3212: Fixed a NULL pointer dereference flaw in the gfs2 file system (bsc#1212265).
- CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606).
- CVE-2023-3357: Fixed a NULL pointer dereference flaw in the AMD Sensor Fusion Hub driver (bsc#1212605).
- CVE-2023-35828: Fixed a use-after-free flaw in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c (bsc#1212513).
- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).
- CVE-2023-35829: Fixed a use-after-free flaw in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c (bsc#1212495).
- CVE-2023-35788: Fixed an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets in fl_set_geneve_opt in net/sched/cls_flower.c (bsc#1212504).
- CVE-2023-35823: Fixed a use-after-free flaw in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c (bsc#1212494).
- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
- CVE-2023-21102: Fixed possible bypass of shadow stack protection in __efi_rt_asm_wrapper of efi-rt-wrapper.S (bsc#1212155).
- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).

The following non-security bugs were fixed:

- Drop dvb-core fix patch due to a bug (bsc#1205758).
- Enable kernel modules bttv bt878 and snd-bt878 (jsc#PED-3931).
- Fix missing top level chapter numbers on SLE12 SP5 (bsc#1212158).
- Fix usrmerge error (boo#1211796).
- Generalize kernel-doc build requirements.
- Get module prefix from kmod (bsc#1212835).
- Remove orphaned CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT (bsc#1189998 git-fixes).
- Revert 'mtd: rawnand: arasan: Prevent an unsupported configuration' (git-fixes).
- Revert 'net: phy: dp83867: perform soft reset and retain established link' (git-fixes).
- Squashfs: fix handling and sanity checking of xattr_ids count (git-fixes).
- Update the Mellanox/Nvidia mlx5_core driver (jsc#SLE-19253).
- acpi: sleep: Avoid breaking S3 wakeup due to might_sleep() (git-fixes).
- affs: initialize fsdata in affs_truncate() (git-fixes).
- alsa: ac97: Fix possible NULL dereference in snd_ac97_mixer (git-fixes).
- alsa: hda/realtek: Add 'Intel Reference board' and 'NUC 13' SSID in the ALC256 (git-fixes).
- alsa: hda/realtek: Add Lenovo P3 Tower platform (git-fixes).
- alsa: hda/realtek: Add a quirk for Compaq N14JP6 (git-fixes).
- alsa: hda/realtek: Add a quirk for HP Slim Desktop S01 (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG G634Z (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GV601V (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NS50AU (git-fixes).
- alsa: hda/realtek: Add quirks for ASUS GU604V and GU603V (git-fixes).
- alsa: hda/realtek: Add quirks for Asus ROG 2024 laptops using CS35L41 (git-fixes).
- alsa: hda/realtek: Add quirks for ROG ALLY CS35l41 audio (git-fixes).
- alsa: hda/realtek: Enable 4 amplifiers instead of 2 on a HP platform (git-fixes).
- alsa: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook (git-fixes).
- alsa: hda: Glenfly: add HD Audio PCI IDs and HDMI Codec Vendor IDs (git-fixes).
- alsa: oss: avoid missing-prototype warnings (git-fixes).
- alsa: usb-audio: Add quirk flag for HEM devices to enable native DSD playback (git-fixes).
- alsa: usb-audio: Fix broken resume due to UAC3 power state (git-fixes).
- amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (git-fixes).
- arm64: Add missing Set/Way CMO encodings (git-fixes).
- arm64: Always load shadow stack pointer directly from the task struct (git-fixes)
- arm64: Stash shadow stack pointer in the task struct on interrupt (git-fixes)
- arm64: dts: Move BCM4908 dts to bcmbca folder (git-fixes)
- arm64: dts: broadcom: bcmbca: bcm4908: fix NAND interrupt name (git-fixes)
- arm64: dts: broadcom: bcmbca: bcm4908: fix procmon nodename (git-fixes)
- arm64: dts: imx8-ss-dma: assign default clock rate for lpuarts (git-fixes).
- arm64: dts: imx8mn-beacon: Fix SPI CS pinmux (git-fixes).
- arm64: dts: imx8mn-var-som: fix PHY detection bug by adding deassert (git-fixes)
- arm64: dts: imx8qm-mek: correct GPIOs for USDHC2 CD and WP signals (git-fixes).
- arm64: dts: qcom: sc7180-lite: Fix SDRAM freq for misidentified sc7180-lite boards (git-fixes).
- arm: 9295/1: unwind:fix unwind abort for uleb128 case (git-fixes)
- arm: cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).
- arm: dts: Fix erroneous ADS touchscreen polarities (git-fixes).
- arm: dts: vexpress: add missing cache properties (git-fixes).
- asoc: codecs: wsa881x: do not set can_multi_write flag (git-fixes).
- asoc: dwc: limit the number of overrun messages (git-fixes).
- asoc: dwc: move DMA init to snd_soc_dai_driver probe() (git-fixes).
- asoc: es8316: Do not set rate constraints for unsupported MCLKs (git-fixes).
- asoc: es8316: Increment max value for ALC Capture Target Volume control (git-fixes).
- asoc: imx-audmix: check return value of devm_kasprintf() (git-fixes).
- asoc: mediatek: mt8173: Fix irq error path (git-fixes).
- asoc: nau8824: Add quirk to active-high jack-detect (git-fixes).
- asoc: simple-card: Add missing of_node_put() in case of error (git-fixes).
- asoc: soc-pcm: test if a BE can be prepared (git-fixes).
- asoc: ssm2602: Add workaround for playback distortions (git-fixes).
- ath6kl: Use struct_group() to avoid size-mismatched casting (git-fixes).
- batman-adv: Broken sync while rescheduling delayed work (git-fixes).
- binfmt_elf: Take the mmap lock when walking the VMA list (bsc#1209039 CVE-2023-1249).
- bluetooth: Fix l2cap_disconnect_req deadlock (git-fixes).
- bluetooth: Fix use-after-free in hci_remove_ltk/hci_remove_irk (git-fixes).
- bluetooth: L2CAP: Add missing checks for invalid DCID (git-fixes).
- bluetooth: hci_qca: fix debugfs registration (git-fixes).
- bnxt_en: Do not issue AP reset during ethtool's reset operation (git-fixes).
- bnxt_en: Implement .set_port / .unset_port UDP tunnel callbacks (git-fixes).
- bnxt_en: Query default VLAN before VNIC setup on a VF (git-fixes).
- bnxt_en: Skip firmware fatal error recovery if chip is not accessible (git-fixes).
- bpf, arm64: Call build_prologue() first in first JIT pass (git-fixes)
- bpf, arm64: Clear prog-&gt;jited_len along prog-&gt;jited (git-fixes)
- bpf, arm64: Feed byte-offset into bpf line info (git-fixes)
- bpf, arm64: Use emit_addr_mov_i64() for BPF_PSEUDO_FUNC (git-fixes)
- bpf: Add extra path pointer check to d_path helper (git-fixes).
- bpf: Fix UAF in task local storage (bsc#1212564).
- btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() (bsc#1212051 CVE-2023-3111).
- bus: fsl-mc: fsl-mc-allocator: Drop a write-only variable (git-fixes).
- bus: ti-sysc: Fix dispc quirk masking bool variables (git-fixes).
- can: isotp: isotp_sendmsg(): fix return error fix on TX path (git-fixes).
- can: j1939: avoid possible use-after-free when j1939_can_rx_register fails (git-fixes).
- can: j1939: change j1939_netdev_lock type to mutex (git-fixes).
- can: j1939: j1939_sk_send_loop_abort(): improved error queue handling in J1939 Socket (git-fixes).
- can: kvaser_pciefd: Remove handler for unused KVASER_PCIEFD_PACK_TYPE_EFRAME_ACK (git-fixes).
- can: kvaser_pciefd: Remove useless write to interrupt register (git-fixes).
- can: length: fix bitstuffing count (git-fixes).
- can: length: fix description of the RRS field (git-fixes).
- can: length: make header self contained (git-fixes).
- ceph: fix use-after-free bug for inodes when flushing capsnaps (bsc#1212540).
- cgroup: Use cgroup_attach_{lock,unlock}() from cgroup_attach_task_all() (bsc#1212563).
- cgroup: always put cset in cgroup_css_set_put_fork (bsc#1212561).
- cgroup: fix missing cpus_read_{lock,unlock}() in cgroup_transfer_tasks() (bsc#1212563).
- clk: Fix memory leak in devm_clk_notifier_register() (git-fixes).
- clk: cdce925: check return value of kasprintf() (git-fixes).
- clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe (git-fixes).
- clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() (git-fixes).
- clk: imx: scu: use _safe list iterator to avoid a use after free (git-fixes).
- clk: keystone: sci-clk: check return value of kasprintf() (git-fixes).
- clk: samsung: Add Exynos4212 compatible to CLKOUT driver (git-fixes).
- clk: si5341: check return value of {devm_}kasprintf() (git-fixes).
- clk: si5341: free unused memory on probe failure (git-fixes).
- clk: si5341: return error if one synth clock registration fails (git-fixes).
- clk: tegra: tegra124-emc: Fix potential memory leak (git-fixes).
- clk: ti: clkctrl: check return value of kasprintf() (git-fixes).
- clk: vc5: check memory returned by kasprintf() (git-fixes).
- clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe (git-fixes).
- crypto: marvell/cesa - Fix type mismatch warning (git-fixes).
- crypto: nx - fix build warnings when DEBUG_FS is not enabled (git-fixes).
- dmaengine: at_xdmac: Move the free desc to the tail of the desc list (git-fixes).
- dmaengine: at_xdmac: fix potential Oops in at_xdmac_prep_interleaved() (git-fixes).
- dmaengine: pl330: rename _start to prevent build error (git-fixes).
- drivers: meson: secure-pwrc: always enable DMA domain (git-fixes).
- drm/amd/display: Add logging for display MALL refresh setting (git-fixes).
- drm/amd/display: Add minimal pipe split transition state (git-fixes).
- drm/amd/display: Add wrapper to call planes and stream update (git-fixes).
- drm/amd/display: Explicitly specify update type per plane info change (git-fixes).
- drm/amd/display: Fix artifacting on eDP panels when engaging freesync video mode (git-fixes).
- drm/amd/display: Use dc_update_planes_and_stream (git-fixes).
- drm/amd/display: drop redundant memset() in get_available_dsc_slices() (git-fixes).
- drm/amd/display: edp do not add non-edid timings (git-fixes).
- drm/amd/display: fix the system hang while disable PSR (git-fixes).
- drm/amd/pm: Fix power context allocation in SMU13 (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for renoir (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for vangogh (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for yellow carp (git-fixes).
- drm/amdgpu: Use the default reset when loading or reloading the driver (git-fixes).
- drm/amdgpu: fix xclk freq on CHIP_STONEY (git-fixes).
- drm/amdgpu: release gpu full access after 'amdgpu_device_ip_late_init' (git-fixes).
- drm/amdgpu: skip disabling fence driver src_irqs when device is unplugged (git-fixes).
- drm/amdkfd: Fix potential deallocation of previously deallocated memory (git-fixes).
- drm/ast: Fix ARM compatibility (git-fixes).
- drm/bridge: tc358768: always enable HS video mode (git-fixes).
- drm/bridge: tc358768: fix PLL parameters computation (git-fixes).
- drm/bridge: tc358768: fix PLL target frequency (git-fixes).
- drm/bridge: tc358768: fix TCLK_ZEROCNT computation (git-fixes).
- drm/bridge: tc358768: fix TXTAGOCNT computation (git-fixes).
- drm/exynos: fix race condition UAF in exynos_g2d_exec_ioctl (git-fixes).
- drm/exynos: vidi: fix a wrong error return (git-fixes).
- drm/i915/gt: Use the correct error value when kernel_context() fails (git-fixes).
- drm/i915/gvt: remove unused variable gma_bottom in command parser (git-fixes).
- drm/i915/selftests: Add some missing error propagation (git-fixes).
- drm/i915/selftests: Increase timeout for live_parallel_switch (git-fixes).
- drm/i915/selftests: Stop using kthread_stop() (git-fixes).
- drm/i915: Explain the magic numbers for AUX SYNC/precharge length (git-fixes).
- drm/i915: Use 18 fast wake AUX sync len (git-fixes).
- drm/msm/adreno: fix sparse warnings in a6xx code (git-fixes).
- drm/msm/dp: Free resources after unregistering them (git-fixes).
- drm/msm/dpu: correct MERGE_3D length (git-fixes).
- drm/msm/dpu: do not enable color-management if DSPPs are not available (git-fixes).
- drm/msm/dsi: do not allow enabling 14nm VCO with unprogrammed rate (git-fixes).
- drm/msm: Be more shouty if per-process pgtables are not working (git-fixes).
- drm/msm: Set max segment size earlier (git-fixes).
- drm/nouveau/dp: check for NULL nv_connector-&gt;native_mode (git-fixes).
- drm/nouveau: add nv_encoder pointer check for NULL (git-fixes).
- drm/nouveau: do not detect DSM for non-NVIDIA device (git-fixes).
- drm/panel: sharp-ls043t1le01: adjust mode settings (git-fixes).
- drm/panel: simple: fix active size for Ampire AM-480272H3TMQW-T01H (git-fixes).
- drm/radeon: fix possible division-by-zero errors (git-fixes).
- drm/radeon: fix race condition UAF in radeon_gem_set_domain_ioctl (git-fixes).
- drm/rockchip: vop: Leave vblank enabled in self-refresh (git-fixes).
- drm/vram-helper: fix function names in vram helper doc (git-fixes).
- drm: sun4i_tcon: use devm_clk_get_enabled in `sun4i_tcon_init_clocks` (git-fixes).
- drm:amd:amdgpu: Fix missing buffer object unlock in failure path (git-fixes).
- dt-bindings: i3c: silvaco,i3c-master: fix missing schema restriction (git-fixes).
- eeprom: at24: also select REGMAP (git-fixes).
- elf: correct note name comment (git-fixes).
- ext4: unconditionally enable the i_version counter (bsc#1211299).
- extcon: Fix kernel doc of property capability fields to avoid warnings (git-fixes).
- extcon: Fix kernel doc of property fields to avoid warnings (git-fixes).
- extcon: usbc-tusb320: Add USB TYPE-C support (git-fixes).
- extcon: usbc-tusb320: Call the Type-C IRQ handler only if a port is registered (git-fixes).
- extcon: usbc-tusb320: Unregister typec port on driver removal (git-fixes).
- extcon: usbc-tusb320: Update state on probe even if no IRQ pending (git-fixes).
- fbcon: Fix null-ptr-deref in soft_cursor (git-fixes).
- fbdev: Prevent possible use-after-free in fb_release() (bsc#1152472) Backporting changes: 	* replace refcount_read() with atomic_read()
- fbdev: fbcon: Destroy mutex on freeing struct fb_info (bsc#1152489)
- fbdev: imsttfb: Fix use after free bug in imsttfb_probe (git-fixes bsc#1211387).
- fbdev: modedb: Add 1920x1080 at 60 Hz video mode (git-fixes).
- fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() (git-fixes).
- fbdev: stifb: Fix info entry in sti_struct on error path (git-fixes).
- firmware: arm_ffa: Set handle field to zero in memory descriptor (git-fixes).
- firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool() (git-fixes).
- fs/jfs: fix shift exponent db_agl2size negative (git-fixes).
- fs: hfsplus: fix UAF issue in hfsplus_put_super (git-fixes).
- fs: jfs: fix possible NULL pointer dereference in dbFree() (git-fixes).
- fs: jfs: fix shift-out-of-bounds in dbAllocAG (git-fixes).
- fs: jfs: fix shift-out-of-bounds in dbDiscardAG (git-fixes).
- fs: sysv: Fix sysv_nblocks() returns wrong value (git-fixes).
- gfs2: Do not deref jdesc in evict (bsc#1212265 CVE-2023-3212).
- hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling (git-fixes).
- hfs/hfsplus: use WARN_ON for sanity check (git-fixes).
- hfs: Fix OOB Write in hfs_asc2mac (git-fixes).
- hfs: fix OOB Read in __hfs_brec_find (git-fixes).
- hfs: fix missing hfs_bnode_get() in __hfs_bnode_create (git-fixes).
- hfsplus: fix bug causing custom uid and gid being unable to be assigned with mount (git-fixes).
- hid: amd_sfh: Add missing check for dma_alloc_coherent (bsc#1212605 CVE-2023-3357).
- hid: google: add jewel USB id (git-fixes).
- hid: logitech-hidpp: add HIDPP_QUIRK_DELAYED_INIT for the T651 (git-fixes).
- hid: wacom: Add error check to wacom_parse_and_register() (git-fixes).
- hwmon: (gsc-hwmon) fix fan pwm temperature scaling (git-fixes).
- hwrng: imx-rngc - fix the timeout for init and self check (git-fixes).
- hwrng: st - keep clock enabled while hwrng is registered (git-fixes).
- i2c: imx-lpi2c: fix type char overflow issue when calculating the clock cycle (git-fixes).
- i2c: mv64xxx: Fix reading invalid status value in atomic mode (git-fixes).
- i2c: qup: Add missing unwind goto in qup_i2c_probe() (git-fixes).
- i2c: sprd: Delete i2c adapter in .remove's error path (git-fixes).
- iavf: remove mask from iavf_irq_enable_queues() (git-fixes).
- ib/hfi1: Fix wrong mmu_node used for user SDMA packet after invalidate (git-fixes)
- ib/isert: Fix dead lock in ib_isert (git-fixes)
- ib/isert: Fix incorrect release of isert connection (git-fixes)
- ib/isert: Fix possible list corruption in CMA handler (git-fixes)
- ib/rdmavt: add missing locks in rvt_ruc_loopback (git-fixes)
- ib/uverbs: Fix to consider event queue closing also upon non-blocking mode (git-fixes)
- ibmvnic: Do not reset dql stats on NON_FATAL err (bsc#1212603 ltc#202604).
- ice, xsk: Diversify return values from xsk_wakeup call paths (git-fixes).
- ice: Do not double unplug aux on peer initiated reset (git-fixes).
- ice: Do not use WQ_MEM_RECLAIM flag for workqueue (git-fixes).
- ice: Fix DSCP PFC TLV creation (git-fixes).
- ice: Fix XDP memory leak when NIC is brought up and down (git-fixes).
- ice: Fix ice_xdp_xmit() when XDP TX queue number is not sufficient (git-fixes).
- ice: Fix memory corruption in VF driver (git-fixes).
- ice: Ignore EEXIST when setting promisc mode (git-fixes).
- ice: Prevent set_channel from changing queues while RDMA active (git-fixes).
- ice: Reset FDIR counter in FDIR init stage (git-fixes).
- ice: add profile conflict check for AVF FDIR (git-fixes).
- ice: block LAN in case of VF to VF offload (git-fixes).
- ice: config netdev tc before setting queues number (git-fixes).
- ice: copy last block omitted in ice_get_module_eeprom() (git-fixes).
- ice: ethtool: Prohibit improper channel config for DCB (git-fixes).
- ice: ethtool: advertise 1000M speeds properly (git-fixes).
- ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (git-fixes).
- ice: fix wrong fallback logic for FDIR (git-fixes).
- ice: handle E822 generic device ID in PLDM header (git-fixes).
- ice: switch: fix potential memleak in ice_add_adv_recipe() (git-fixes).
- ice: use bitmap_free instead of devm_kfree (git-fixes).
- ice: xsk: use Rx ring's XDP ring when picking NAPI context (git-fixes).
- ieee802154: hwsim: Fix possible memory leaks (git-fixes).
- ifcvf/vDPA: fix misuse virtio-net device config size for blk dev (jsc#SLE-19253).
- igb: fix bit_shift to be in [1..8] range (git-fixes).
- igb: fix nvm.ops.read() error handling (git-fixes).
- igc: Clean the TX buffer and TX descriptor ring (git-fixes).
- igc: Fix possible system crash when loading module (git-fixes).
- iio: accel: fxls8962af: errata bug only applicable for FXLS8962AF (git-fixes).
- iio: accel: fxls8962af: fixup buffer scan element type (git-fixes).
- iio: adc: ad7192: Fix internal/external clock selection (git-fixes).
- iio: adc: ad7192: Fix null ad7192_state pointer access (git-fixes).
- init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init() (bsc#1212448).
- init: Invoke arch_cpu_finalize_init() earlier (bsc#1212448).
- init: Provide arch_cpu_finalize_init() (bsc#1212448).
- init: Remove check_bugs() leftovers (bsc#1212448).
- input: adxl34x - do not hardcode interrupt trigger type (git-fixes).
- input: drv260x - fix typo in register value define (git-fixes).
- input: drv260x - remove unused .reg_defaults (git-fixes).
- input: drv260x - sleep between polling GO bit (git-fixes).
- input: fix open count when closing inhibited device (git-fixes).
- input: psmouse - fix OOB access in Elantech protocol (git-fixes).
- input: soc_button_array - add invalid acpi_index DMI quirk handling (git-fixes).
- input: xpad - delete a Razer DeathAdder mouse VID/PID entry (git-fixes).
- integrity: Fix possible multiple allocation in integrity_inode_get() (git-fixes).
- io_uring: hold uring mutex around poll removal (bsc#1212838 CVE-2023-3389).
- ipvlan:Fix out-of-bounds caused by unclear skb-&gt;cb (bsc#1212842 CVE-2023-3090).
- irqchip/clps711x: Remove unused clps711x_intc_init() function (git-fixes).
- irqchip/ftintc010: Mark all function static (git-fixes).
- irqchip/jcore-aic: Fix missing allocation of IRQ descriptors (git-fixes).
- jfs: Fix fortify moan in symlink (git-fixes).
- kernel-binary: Add back kernel-default-base guarded by option Add configsh option for splitting off kernel-default-base, and for not signing the kernel on non-efi
- kernel-docs: Add buildrequires on python3-base when using python3 The python3 binary is provided by python3-base.
- kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741).
- kprobe: reverse kp-&gt;flags when arm_kprobe failed (git-fixes).
- kprobes: Fix check for probe enabled in kill_kprobe() (git-fixes).
- kprobes: Fix to handle forcibly unoptimized kprobes on freeing_list (git-fixes).
- kprobes: Forbid probing on trampoline and BPF code areas (git-fixes).
- kprobes: Prohibit probes in gate area (git-fixes).
- kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case (git-fixes).
- kprobes: do not call disarm_kprobe() for disabled kprobes (git-fixes).
- kvm: arm64: Do not hypercall before EL2 init (git-fixes)
- kvm: arm64: Propagate errors from __pkvm_prot_finalize hypercall (git-fixes)
- kvm: arm64: Save PSTATE early on exit (git-fixes)
- kvm: arm64: vgic: Read HW interrupt pending state from the HW (git-fixes)
- lpfc: Account for fabric domain ctlr device loss recovery (bsc#1211346, bsc#1211852).
- lpfc: Change firmware upgrade logging to KERN_NOTICE instead of TRACE_EVENT (bsc#1211852).
- lpfc: Clean up SLI-4 CQE status handling (bsc#1211852).
- lpfc: Clear NLP_IN_DEV_LOSS flag if already in rediscovery (bsc#1211852).
- lpfc: Copyright updates for 14.2.0.13 patches (bsc#1211852).
- lpfc: Enhance congestion statistics collection (bsc#1211852).
- lpfc: Fix use-after-free rport memory access in lpfc_register_remote_port (bsc#1211852, bsc#1208410, bsc#1211346).
- lpfc: Revise NPIV ELS unsol rcv cmpl logic to drop ndlp based on nlp_state (bsc#1211852).
- lpfc: Update lpfc version to 14.2.0.13 (bsc#1211852).
- mailbox: mailbox-test: Fix potential double-free in mbox_test_message_write() (git-fixes).
- mailbox: mailbox-test: fix a locking issue in mbox_test_message_write() (git-fixes).
- mailbox: ti-msgmgr: Fill non-message tx data fields with 0x0 (git-fixes).
- media: cec: core: do not set last_initiator if tx in progress (git-fixes).
- media: dvb-usb-v2: ce6230: fix null-ptr-deref in ce6230_i2c_master_xfer() (git-fixes).
- media: dvb-usb-v2: ec168: fix null-ptr-deref in ec168_i2c_xfer() (git-fixes).
- media: dvb-usb-v2: rtl28xxu: fix null-ptr-deref in rtl28xxu_i2c_xfer (git-fixes).
- media: dvb-usb: az6027: fix three null-ptr-deref in az6027_i2c_xfer() (git-fixes).
- media: dvb-usb: digitv: fix null-ptr-deref in digitv_i2c_xfer() (git-fixes).
- media: dvb-usb: dw2102: fix uninit-value in su3000_read_mac_address (git-fixes).
- media: dvb_ca_en50221: fix a size write bug (git-fixes).
- media: dvb_demux: fix a bug for the continuity counter (git-fixes).
- media: mn88443x: fix !CONFIG_OF error by drop of_match_ptr from ID table (git-fixes).
- media: netup_unidvb: fix irq init by register it at the end of probe (git-fixes).
- memory: brcmstb_dpfe: fix testing array offset after use (git-fixes).
- meson saradc: fix clock divider mask length (git-fixes).
- mfd: intel-lpss: Add missing check for platform_get_resource (git-fixes).
- mfd: pm8008: Fix module autoloading (git-fixes).
- mfd: rt5033: Drop rt5033-battery sub-device (git-fixes).
- mfd: stmfx: Fix error path in stmfx_chip_init (git-fixes).
- mfd: stmfx: Nullify stmfx-&gt;vdd in case of error (git-fixes).
- mfd: stmpe: Only disable the regulators if they are enabled (git-fixes).
- misc: fastrpc: Create fastrpc scalar with correct buffer count (git-fixes).
- misc: pci_endpoint_test: Free IRQs before removing the device (git-fixes).
- misc: pci_endpoint_test: Re-init completion for every test (git-fixes).
- mlx5: do not use RT_TOS for IPv6 flowlabel (jsc#SLE-19253).
- mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next() (git-fixes).
- mm/vmalloc: do not output a spurious warning when huge vmalloc() fails (bsc#1211410).
- mm: Move mm_cachep initialization to mm_init() (bsc#1212448).
- mm: vmalloc: avoid warn_alloc noise caused by fatal signal (bsc#1211410).
- mmc: bcm2835: fix deferred probing (git-fixes).
- mmc: meson-gx: remove redundant mmc_request_done() call from irq context (git-fixes).
- mmc: mmci: Set PROBE_PREFER_ASYNCHRONOUS (git-fixes).
- mmc: mmci: stm32: fix max busy timeout calculation (git-fixes).
- mmc: mtk-sd: fix deferred probing (git-fixes).
- mmc: mvsdio: fix deferred probing (git-fixes).
- mmc: omap: fix deferred probing (git-fixes).
- mmc: omap_hsmmc: fix deferred probing (git-fixes).
- mmc: owl: fix deferred probing (git-fixes).
- mmc: sdhci-acpi: fix deferred probing (git-fixes).
- mmc: sdhci-msm: Disable broken 64-bit DMA on MSM8916 (git-fixes).
- mmc: sdhci-spear: fix deferred probing (git-fixes).
- mmc: sh_mmcif: fix deferred probing (git-fixes).
- mmc: sunxi: fix deferred probing (git-fixes).
- mmc: usdhi60rol0: fix deferred probing (git-fixes).
- mtd: rawnand: meson: fix unaligned DMA buffers handling (git-fixes).
- net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#SLE-19253).
- net/mlx5: Allow async trigger completion execution on single CPU systems (jsc#SLE-19253).
- net/mlx5: Allow future addition of IPsec object modifiers (jsc#SLE-19253).
- net/mlx5: Avoid false positive lockdep warning by adding lock_class_key (jsc#SLE-19253).
- net/mlx5: Avoid recovery in probe flows (jsc#SLE-19253).
- net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#SLE-19253).
- net/mlx5: Bridge, verify LAG state when adding bond to bridge (jsc#SLE-19253).
- net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#SLE-19253).
- net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#SLE-19253).
- net/mlx5: DR, Fix missing flow_source when creating multi-destination FW table (jsc#SLE-19253).
- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#SLE-19253).
- net/mlx5: Do not advertise IPsec netdev support for non-IPsec device (jsc#SLE-19253).
- net/mlx5: Do not use already freed action pointer (jsc#SLE-19253).
- net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#SLE-19253).
- net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#SLE-19253).
- net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#SLE-19253).
- net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#SLE-19253).
- net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#SLE-19253).
- net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).
- net/mlx5: Enhance debug print in page allocation failure (jsc#SLE-19253).
- net/mlx5: Fix FW tracer timestamp calculation (jsc#SLE-19253).
- net/mlx5: Fix RoCE setting at HCA level (jsc#SLE-19253).
- net/mlx5: Fix crash during sync firmware reset (jsc#SLE-19253).
- net/mlx5: Fix error message when failing to allocate device memory (jsc#SLE-19253).
- net/mlx5: Fix handling of entry refcount when command is not issued to FW (jsc#SLE-19253).
- net/mlx5: Fix possible use-after-free in async command interface (jsc#SLE-19253).
- net/mlx5: Fix ptp max frequency adjustment range (jsc#SLE-19253).
- net/mlx5: Fix steering rules cleanup (jsc#SLE-19253).
- net/mlx5: Fix uninitialized variable bug in outlen_write() (jsc#SLE-19253).
- net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#SLE-19253).
- net/mlx5: Initialize flow steering during driver probe (jsc#SLE-19253).
- net/mlx5: Read embedded cpu after init bit cleared (jsc#SLE-19253).
- net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#SLE-19253).
- net/mlx5: Rearm the FW tracer after each tracer event (jsc#SLE-19253).
- net/mlx5: SF, Drain health before removing device (jsc#SLE-19253).
- net/mlx5: SF: Fix probing active SFs during driver probe phase (jsc#SLE-19253).
- net/mlx5: Serialize module cleanup with reload and remove (jsc#SLE-19253).
- net/mlx5: Wait for firmware to enable CRS before pci_restore_state (jsc#SLE-19253).
- net/mlx5: add IFC bits for bypassing port select flow table (git-fixes)
- net/mlx5: check attr pointer validity before dereferencing it (jsc#SLE-19253).
- net/mlx5: correct ECE offset in query qp output (jsc#SLE-19253).
- net/mlx5: fix missing mutex_unlock in mlx5_fw_fatal_reporter_err_work() (jsc#SLE-19253).
- net/mlx5: fs, fail conflicting actions (jsc#SLE-19253).
- net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#SLE-19253).
- net/mlx5: fw_tracer, Fix event handling (jsc#SLE-19253).
- net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#SLE-19253).
- net/mlx5e: Always clear dest encap in neigh-update-del (jsc#SLE-19253).
- net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#SLE-19253).
- net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#SLE-19253).
- net/mlx5e: Do not attach netdev profile while handling internal error (jsc#SLE-19253).
- net/mlx5e: Do not increment ESN when updating IPsec ESN state (jsc#SLE-19253).
- net/mlx5e: Do not support encap rules with gbp option (jsc#SLE-19253).
- net/mlx5e: E-Switch, Fix comparing termination table instance (jsc#SLE-19253).
- net/mlx5e: Extend SKB room check to include PTP-SQ (jsc#SLE-19253).
- net/mlx5e: Fix MPLSoUDP encap to use MPLS action information (jsc#SLE-19253).
- net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#SLE-19253).
- net/mlx5e: Fix capability check for updating vnic env counters (jsc#SLE-19253).
- net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#SLE-19253).
- net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#SLE-19253).
- net/mlx5e: Fix the value of MLX5E_MAX_RQ_NUM_MTTS (jsc#SLE-19253).
- net/mlx5e: Fix use-after-free when reverting termination table (jsc#SLE-19253).
- net/mlx5e: Fix wrong application of the LRO state (jsc#SLE-19253).
- net/mlx5e: Fix wrong tc flag used when set hw-tc-offload off (jsc#SLE-19253).
- net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#SLE-19253).
- net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#SLE-19253).
- net/mlx5e: Modify slow path rules to go to slow fdb (jsc#SLE-19253).
- net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).
- net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#SLE-19253).
- net/mlx5e: TC, Fix ct_clear overwriting ct action metadata (jsc#SLE-19253).
- net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#SLE-19253).
- net/mlx5e: Verify flow_source cap before using it (jsc#SLE-19253).
- net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#SLE-19253).
- net/mlx5e: kTLS, Fix build time constant test in RX (jsc#SLE-19253).
- net/mlx5e: kTLS, Fix build time constant test in TX (jsc#SLE-19253).
- net/net_failover: fix txq exceeding warning (git-fixes).
- net/sched: fix initialization order when updating chain 0 head (git-fixes).
- net/sched: flower: fix possible OOB write in fl_set_geneve_opt() (git-fixes).
- net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms (git-fixes).
- net/sched: tcindex: Do not use perfect hashing (bsc#1210335 CVE-2023-1829).
- net: ena: Account for the number of processed bytes in XDP (git-fixes).
- net: ena: Do not register memory info on XDP exchange (git-fixes).
- net: ena: Fix rx_copybreak value update (git-fixes).
- net: ena: Fix toeplitz initial hash value (git-fixes).
- net: ena: Set default value for RX interrupt moderation (git-fixes).
- net: ena: Update NUMA TPH hint register upon NUMA node update (git-fixes).
- net: ena: Use bitmask to indicate packet redirection (git-fixes).
- net: hns3: add interrupts re-initialization while doing VF FLR (git-fixes).
- net: hns3: fix output information incomplete for dumping tx queue info with debugfs (git-fixes).
- net: hns3: fix reset delay time to avoid configuration timeout (git-fixes).
- net: hns3: fix sending pfc frames after reset issue (git-fixes).
- net: hns3: fix tm port shapping of fibre port is incorrect after driver initialization (git-fixes).
- net: mlx5: eliminate anonymous module_init &amp; module_exit (jsc#SLE-19253).
- net: sched: fix possible refcount leak in tc_chain_tmplt_add() (git-fixes).
- net: usb: qmi_wwan: add support for Compal RXM-G1 (git-fixes).
- nfcsim.c: Fix error checking for debugfs_create_dir (git-fixes).
- nfp: only report pause frame configuration for physical device (git-fixes).
- nilfs2: fix buffer corruption due to concurrent device reads (git-fixes).
- nilfs2: fix incomplete buffer cleanup in nilfs_btnode_abort_change_key() (git-fixes).
- nilfs2: fix possible out-of-bounds segment allocation in resize ioctl (git-fixes).
- nouveau: fix client work fence deletion race (git-fixes).
- nvme-core: fix dev_pm_qos memleak (git-fixes).
- nvme-core: fix memory leak in dhchap_ctrl_secret (git-fixes).
- nvme-core: fix memory leak in dhchap_secret_store (git-fixes).
- nvme-pci: add quirk for missing secondary temperature thresholds (git-fixes).
- nvme: double KA polling frequency to avoid KATO with TBKAS on (git-fixes).
- ocfs2: fix defrag path triggering jbd2 ASSERT (git-fixes).
- ocfs2: fix freeing uninitialized resource on ocfs2_dlm_shutdown (git-fixes).
- ocfs2: fix non-auto defrag path not working issue (git-fixes).
- octeontx2-pf: Avoid use of GFP_KERNEL in atomic context (git-fixes).
- octeontx2-pf: Fix resource leakage in VF driver unbind (git-fixes).
- octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt (git-fixes).
- octeontx2-pf: Recalculate UDP checksum for ptp 1-step sync packet (git-fixes).
- pci/aspm: Disable ASPM on MFD function removal to avoid use-after-free (git-fixes).
- pci: Add pci_clear_master() stub for non-CONFIG_PCI (git-fixes).
- pci: Release resource invalidated by coalescing (git-fixes).
- pci: cadence: Fix Gen2 Link Retraining process (git-fixes).
- pci: endpoint: Add missing documentation about the MSI/MSI-X range (git-fixes).
- pci: ftpci100: Release the clock resources (git-fixes).
- pci: pciehp: Cancel bringup sequence if card is not present (git-fixes).
- pci: qcom: Disable write access to read only registers for IP v2.3.3 (git-fixes).
- pci: rockchip: Add poll and timeout to wait for PHY PLLs to be locked (git-fixes).
- pci: rockchip: Assert PCI Configuration Enable bit after probe (git-fixes).
- pci: rockchip: Fix legacy IRQ generation for RK3399 PCIe endpoint core (git-fixes).
- pci: rockchip: Set address alignment for endpoint mode (git-fixes).
- pci: rockchip: Use u32 variable to access 32-bit registers (git-fixes).
- pci: rockchip: Write PCI Device ID to correct register (git-fixes).
- pci: vmd: Reset VMD config register between soft reboots (git-fixes).
- pinctrl: at91-pio4: check return value of devm_kasprintf() (git-fixes).
- pinctrl: cherryview: Return correct value if pin in push-pull mode (git-fixes).
- pinctrl: meson-axg: add missing GPIOA_18 gpio group (git-fixes).
- pinctrl: microchip-sgpio: check return value of devm_kasprintf() (git-fixes).
- platform/surface: aggregator: Allow completion work-items to be executed in parallel (git-fixes).
- platform/x86: asus-wmi: Ignore WMI events with codes 0x7B, 0xC0 (git-fixes).
- platform/x86: intel_scu_pcidrv: Add back PCI ID for Medfield (git-fixes).
- platform/x86: think-lmi: Correct NVME password handling (git-fixes).
- platform/x86: think-lmi: Correct System password interface (git-fixes).
- platform/x86: think-lmi: mutex protection around multiple WMI calls (git-fixes).
- platform/x86: thinkpad_acpi: Fix lkp-tests warnings for platform profiles (git-fixes).
- pm: domains: fix integer overflow issues in genpd_parse_state() (git-fixes).
- power: supply: Fix logic checking if system is running from battery (git-fixes).
- power: supply: Ratelimit no data debug output (git-fixes).
- power: supply: ab8500: Fix external_power_changed race (git-fixes).
- power: supply: bq27xxx: Use mod_delayed_work() instead of cancel() + schedule() (git-fixes).
- power: supply: sc27xx: Fix external_power_changed race (git-fixes).
- powerpc/64s/radix: Fix exit lazy tlb mm switch with irqs enabled (bsc#1194869).
- powerpc/64s/radix: Fix soft dirty tracking (bsc#1065729).
- powerpc/64s: Make POWER10 and later use pause_short in cpu_relax loops (bsc#1209367 ltc#195662).
- powerpc/iommu: Limit number of TCEs to 512 for H_STUFF_TCE hcall (bsc#1194869 bsc#1212701).
- powerpc/purgatory: remove PGO flags (bsc#1194869).
- powerpc/set_memory: Avoid spinlock recursion in change_page_attr() (bsc#1194869).
- powerpc: Redefine HMT_xxx macros as empty on PPC32 (bsc#1209367 ltc#195662).
- powerpc: add ISA v3.0 / v3.1 wait opcode macro (bsc#1209367 ltc#195662).
- pstore/ram: Add check for kstrdup (git-fixes).
- qed/qede: Fix scheduling while atomic (git-fixes).
- radeon: avoid double free in ci_dpm_init() (git-fixes).
- rcu: Fix missing TICK_DEP_MASK_RCU_EXP dependency check (git-fixes).
- rdma/bnxt_re: Avoid calling wake_up threads from spin_lock context (git-fixes)
- rdma/bnxt_re: Disable/kill tasklet only if it is enabled (git-fixes)
- rdma/bnxt_re: Fix to remove an unnecessary log (git-fixes)
- rdma/bnxt_re: Fix to remove unnecessary return labels (git-fixes)
- rdma/bnxt_re: Remove a redundant check inside bnxt_re_update_gid (git-fixes)
- rdma/bnxt_re: Remove unnecessary checks (git-fixes)
- rdma/bnxt_re: Return directly without goto jumps (git-fixes)
- rdma/bnxt_re: Use unique names while registering interrupts (git-fixes)
- rdma/bnxt_re: wraparound mbox producer index (git-fixes)
- rdma/cma: Always set static rate to 0 for RoCE (git-fixes)
- rdma/hns: Fix hns_roce_table_get return value (git-fixes)
- rdma/irdma: avoid fortify-string warning in irdma_clr_wqes (git-fixes)
- rdma/mlx5: Do not set tx affinity when lag is in hash mode (git-fixes)
- rdma/mlx5: Fix affinity assignment (git-fixes)
- rdma/mlx5: Initiate dropless RQ for RAW Ethernet functions (git-fixes)
- rdma/mlx5: Rely on RoCE fw cap instead of devlink when setting profile (jsc#SLE-19253).
- rdma/rtrs-clt: Replace list_next_or_null_rr_rcu with an inline function (git-fixes)
- rdma/rtrs-srv: Pass the correct number of entries for dma mapped SGL (git-fixes)
- rdma/rtrs: Fix rxe_dealloc_pd warning (git-fixes)
- rdma/rtrs: Fix the last iu-&gt;buf leak in err path (git-fixes)
- rdma/rxe: Fix packet length checks (git-fixes)
- rdma/rxe: Fix ref count error in check_rkey() (git-fixes)
- rdma/rxe: Fix rxe_cq_post (git-fixes)
- rdma/rxe: Fix the error 'trying to register non-static key in rxe_cleanup_task' (git-fixes)
- rdma/rxe: Fix the use-before-initialization error of resp_pkts (git-fixes)
- rdma/rxe: Remove dangling declaration of rxe_cq_disable() (git-fixes)
- rdma/rxe: Remove the unused variable obj (git-fixes)
- rdma/rxe: Removed unused name from rxe_task struct (git-fixes)
- rdma/uverbs: Restrict usage of privileged QKEYs (git-fixes)
- rdma/vmw_pvrdma: Remove unnecessary check on wr-&gt;opcode (git-fixes)
- regmap: Account for register length when chunking (git-fixes).
- regmap: spi-avmm: Fix regmap_bus max_raw_write (git-fixes).
- regulator: Fix error checking for debugfs_create_dir (git-fixes).
- regulator: core: Fix more error checking for debugfs_create_dir() (git-fixes).
- regulator: core: Streamline debugfs operations (git-fixes).
- regulator: helper: Document ramp_delay parameter of regulator_set_ramp_delay_regmap() (git-fixes).
- regulator: pca9450: Fix LDO3OUT and LDO4OUT MASK (git-fixes).
- reiserfs: Add missing calls to reiserfs_security_free() (git-fixes).
- reiserfs: Add security prefix to xattr name in reiserfs_security_write() (git-fixes).
- revert 'squashfs: harden sanity check in squashfs_read_xattr_id_table' (git-fixes).
- rpm/check-for-config-changes: ignore also PAHOLE_HAS_* We now also have options like CONFIG_PAHOLE_HAS_LANG_EXCLUDE.
- rpm/kernel-binary.spec.in: Fix compatibility wth newer rpm
- rpm/kernel-docs.spec.in: pass PYTHON=python3 to fix build error (bsc#1160435)
- rtc: st-lpc: Release some resources in st_rtc_probe() in case of error (git-fixes).
- s390/dasd: Use correct lock while counting channel queue length (git-fixes bsc#1212592).
- s390/gmap: voluntarily schedule during key setting (git-fixes bsc#1212892).
- s390/pkey: zeroize key blobs (git-fixes bsc#1212619).
- sched/rt: pick_next_rt_entity(): check list_entry (bsc#1208600 CVE-2023-1077)
- scsi: core: Decrease scsi_device's iorequest_cnt if dispatch failed (git-fixes).
- scsi: stex: Fix gcc 13 warnings (git-fixes).
- selftests/ptp: Fix timestamp printf format for PTP_SYS_OFFSET (git-fixes).
- serial: 8250: lock port for UART_IER access in omap8250_irq() (git-fixes).
- serial: 8250: lock port for stop_rx() in omap8250_irq() (git-fixes).
- serial: 8250: omap: Fix freeing of resources on failed register (git-fixes).
- serial: 8250_omap: Use force_suspend and resume for system suspend (git-fixes).
- serial: atmel: do not enable IRQs prematurely (git-fixes).
- serial: lantiq: add missing interrupt ack (git-fixes).
- sfc: disable RXFCS and RXALL features by default (git-fixes).
- signal/s390: Use force_sigsegv in default_trap_handler (git-fixes bsc#1212861).
- soc/fsl/qe: fix usb.c build errors (git-fixes).
- soc: samsung: exynos-pmu: Re-introduce Exynos4212 support (git-fixes).
- soundwire: dmi-quirks: add new mapping for HP Spectre x360 (git-fixes).
- spi: dw: Round of n_bytes to power of 2 (git-fixes).
- spi: fsl-dspi: avoid SCK glitches with continuous transfers (git-fixes).
- spi: lpspi: disable lpspi module irq in DMA mode (git-fixes).
- spi: qup: Request DMA before enabling clocks (git-fixes).
- spi: spi-geni-qcom: Correct CS_TOGGLE bit in SPI_TRANS_CFG (git-fixes).
- spi: tegra210-quad: Fix combined sequence (bsc#1212584)
- spi: tegra210-quad: Fix iterator outside loop (git-fixes).
- spi: tegra210-quad: Multi-cs support (bsc#1212584)
- squashfs: harden sanity check in squashfs_read_xattr_id_table (git-fixes).
- staging: octeon: delete my name from TODO contact (git-fixes).
- sunrpc: Clean up svc_deferred_class trace events (git-fixes).
- supported.conf: Move bt878 and bttv modules to kernel-*-extra (jsc#PED-3931)
- test_firmware: Use kstrtobool() instead of strtobool() (git-fixes).
- test_firmware: fix the memory leak of the allocated firmware buffer (git-fixes).
- test_firmware: prevent race conditions by a correct implementation of locking (git-fixes).
- test_firmware: return ENOMEM instead of ENOSPC on failed memory allocation (git-fixes).
- thermal/drivers/sun8i: Fix some error handling paths in sun8i_ths_probe() (git-fixes).
- thunderbolt: dma_test: Use correct value for absent rings when creating paths (git-fixes).
- tls: Skip tls_append_frag on zero copy size (git-fixes).
- tools: bpftool: Remove invalid \' json escape (git-fixes).
- tpm, tpm_tis: Request threaded interrupt handler (git-fixes).
- tracing/histograms: Allow variables to have some modifiers (git-fixes).
- tracing/probe: trace_probe_primary_from_call(): checked list_first_entry (git-fixes).
- tracing/timer: Add missing hrtimer modes to decode_hrtimer_mode() (git-fixes).
- tracing: Have event format check not flag %p* on __get_dynamic_array() (git-fixes, bsc#1212350).
- tracing: Introduce helpers to safely handle dynamic-sized sockaddrs (git-fixes).
- tracing: Update print fmt check to handle new __get_sockaddr() macro (git-fixes, bsc#1212350).
- tty: serial: imx: fix rs485 rx after tx (git-fixes).
- tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error (git-fixes).
- tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk (git-fixes).
- usb: cdns3: fix NCM gadget RX speed 20x slow than expection at iMX8QM (git-fixes).
- usb: dwc3-meson-g12a: Fix an error handling path in dwc3_meson_g12a_probe() (git-fixes).
- usb: dwc3: fix use-after-free on core driver unbind (git-fixes).
- usb: dwc3: gadget: Propagate core init errors to UDC during pullup (git-fixes).
- usb: dwc3: gadget: Reset num TRBs before giving back the request (git-fixes).
- usb: dwc3: qcom: Fix an error handling path in dwc3_qcom_probe() (git-fixes).
- usb: dwc3: qcom: Fix potential memory leak (git-fixes).
- usb: dwc3: qcom: Release the correct resources in dwc3_qcom_remove() (git-fixes).
- usb: dwc3: qcom: fix NULL-deref on suspend (git-fixes).
- usb: gadget: u_serial: Add null pointer check in gserial_suspend (git-fixes).
- usb: gadget: udc: fix NULL dereference in remove() (git-fixes).
- usb: hide unused usbfs_notify_suspend/resume functions (git-fixes).
- usb: phy: phy-tahvo: fix memory leak in tahvo_usb_probe() (git-fixes).
- usb: serial: option: add Quectel EM061KGL series (git-fixes).
- usb: typec: ucsi: Fix command cancellation (git-fixes).
- usb: xhci: Remove unused udev from xhci_log_ctx trace event (git-fixes).
- usrmerge: Adjust module path in the kernel sources (bsc#1212835).
- usrmerge: Compatibility with earlier rpm (boo#1211796)
- vdpa/mlx5: Directly assign memory key (jsc#SLE-19253).
- vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#SLE-19253).
- vdpa/mlx5: Fix wrong configuration of virtio_version_1_0 (jsc#SLE-19253).
- vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#SLE-19253).
- vhost_vdpa: support PACKED when setting-getting vring_base (jsc#SLE-19253).
- w1: fix loop in w1_fini() (git-fixes).
- w1: w1_therm: fix locking behavior in convert_t (git-fixes).
- watchdog: menz069_wdt: fix watchdog initialisation (git-fixes).
- wifi: ath9k: Fix possible stall on ath9k_txq_list_has_key() (git-fixes).
- wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (git-fixes).
- wifi: ath9k: convert msecs to jiffies where needed (git-fixes).
- wifi: ath9k: do not allow to overwrite ENDPOINT0 attributes (git-fixes).
- wifi: ath9k: fix AR9003 mac hardware hang check register offset calculation (git-fixes).
- wifi: atmel: Fix an error handling path in atmel_probe() (git-fixes).
- wifi: b43: fix incorrect __packed annotation (git-fixes).
- wifi: cfg80211: fix locking in regulatory disconnect (git-fixes).
- wifi: cfg80211: fix locking in sched scan stop work (git-fixes).
- wifi: cfg80211: rewrite merging of inherited elements (git-fixes).
- wifi: iwlwifi: mvm: indicate HW decrypt for beacon protection (git-fixes).
- wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler() (git-fixes).
- wifi: iwlwifi: pull from TXQs with softirqs disabled (git-fixes).
- wifi: mac80211: simplify chanctx allocation (git-fixes).
- wifi: mt76: mt7615: fix possible race in mt7615_mac_sta_poll (git-fixes).
- wifi: mwifiex: Fix the size of a memory allocation in mwifiex_ret_802_11_scan() (git-fixes).
- wifi: orinoco: Fix an error handling path in orinoco_cs_probe() (git-fixes).
- wifi: orinoco: Fix an error handling path in spectrum_cs_probe() (git-fixes).
- wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled (git-fixes).
- wifi: rsi: Do not set MMC_PM_KEEP_POWER in shutdown (git-fixes).
- wifi: rtl8xxxu: fix authentication timeout due to incorrect RCR value (git-fixes).
- wifi: wilc1000: fix for absent RSN capabilities WFA testcase (git-fixes).
- writeback: fix dereferencing NULL mapping-&gt;host on writeback_page_template (git-fixes).
- x86/build: Avoid relocation information in final vmlinux (bsc#1187829).
- x86/cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).
- x86/fpu: Mark init functions __init (bsc#1212448).
- x86/fpu: Move FPU initialization into arch_cpu_finalize_init() (bsc#1212448).
- x86/fpu: Remove cpuinfo argument from init functions (bsc#1212448).
- x86/init: Initialize signal frame size late (bsc#1212448).
- x86/kprobes: Fix __recover_optprobed_insn check optimizing logic (git-fixes).
- x86/kprobes: Fix arch_check_optimized_kprobe check within optimized_kprobe range (git-fixes).
- x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter (git-fixes).
- x86/microcode: Print previous version of microcode after reload (git-fixes).
- x86/mm: Fix RESERVE_BRK() for older binutils (git-fixes).
- x86/mm: Fix use of uninitialized buffer in sme_enable() (git-fixes).
- x86/mm: Initialize text poking earlier (bsc#1212448).
- x86/mm: Use mm_alloc() in poking_init() (bsc#1212448).
- x86/mm: fix poking_init() for Xen PV guests (git-fixes).
- x86/sgx: Fix race between reclaimer and page fault handler (git-fixes).
- x86/sgx: Mark PCMD page as dirty when modifying contents (git-fixes).
- x86/xen: fix secondary processor fpu initialization (bsc#1212869).
- xfs: fix rm_offset flag handling in rmap keys (git-fixes).
- xfs: set bnobt/cntbt numrecs correctly when formatting new AGs (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-13"/>
	<updated date="2023-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160435">SUSE bug 1160435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187829">SUSE bug 1187829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189998">SUSE bug 1189998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205758">SUSE bug 1205758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208410">SUSE bug 1208410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208600">SUSE bug 1208600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209039">SUSE bug 1209039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209367">SUSE bug 1209367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211299">SUSE bug 1211299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211346">SUSE bug 1211346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211387">SUSE bug 1211387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211410">SUSE bug 1211410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211449">SUSE bug 1211449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211796">SUSE bug 1211796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211852">SUSE bug 1211852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212051">SUSE bug 1212051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212129">SUSE bug 1212129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212154">SUSE bug 1212154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212155">SUSE bug 1212155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212158">SUSE bug 1212158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212265">SUSE bug 1212265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212350">SUSE bug 1212350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212448">SUSE bug 1212448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212494">SUSE bug 1212494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212495">SUSE bug 1212495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212504">SUSE bug 1212504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212513">SUSE bug 1212513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212540">SUSE bug 1212540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212561">SUSE bug 1212561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212563">SUSE bug 1212563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212564">SUSE bug 1212564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212584">SUSE bug 1212584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212592">SUSE bug 1212592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212603">SUSE bug 1212603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212605">SUSE bug 1212605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212606">SUSE bug 1212606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212619">SUSE bug 1212619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212701">SUSE bug 1212701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212741">SUSE bug 1212741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212835">SUSE bug 1212835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212838">SUSE bug 1212838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212842">SUSE bug 1212842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212861">SUSE bug 1212861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212869">SUSE bug 1212869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212892">SUSE bug 1212892</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1077/">CVE-2023-1077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1249/">CVE-2023-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21102/">CVE-2023-21102 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3090/">CVE-2023-3090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3111/">CVE-2023-3111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3161/">CVE-2023-3161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3212/">CVE-2023-3212 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3357/">CVE-2023-3357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3357">CVE-2023-3357 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3358/">CVE-2023-3358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3389/">CVE-2023-3389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3389">CVE-2023-3389 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35823/">CVE-2023-35823 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35828/">CVE-2023-35828 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35829/">CVE-2023-35829 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771273" comment="kernel-default-5.14.21-150400.24.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771274" comment="kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205982" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211674" ref_url="https://bugzilla.suse.com/1211674" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015522.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2023-32681: Fixed unintended leak of Proxy-Authorization header (bsc#1211674).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-18"/>
	<updated date="2023-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211674">SUSE bug 1211674</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767761" comment="python3-requests-2.24.0-150300.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205983" version="1" class="patch">
	<metadata>
		<title>Security update for cni (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015521.html" source="SUSE-SU"/>
		<description>

This update of cni fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-18"/>
	<updated date="2023-07-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768419" comment="cni-0.7.1-150100.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205984" version="1" class="patch">
	<metadata>
		<title>Security update for cni-plugins (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015520.html" source="SUSE-SU"/>
		<description>

This update of cni-plugins fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-18"/>
	<updated date="2023-07-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768859" comment="cni-plugins-0.8.6-150100.3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205985" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212126" ref_url="https://bugzilla.suse.com/1212126" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34969" ref_url="https://www.suse.com/security/cve/CVE-2023-34969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015527.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2023-34969: Fixed a possible dbus-daemon crash by an unprivileged users (bsc#1212126).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212126">SUSE bug 1212126</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34969/">CVE-2023-34969 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34969">CVE-2023-34969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769280" comment="dbus-1-1.12.2-150400.18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769281" comment="dbus-1-x11-1.12.2-150400.18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769282" comment="libdbus-1-3-1.12.2-150400.18.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205986" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210999" ref_url="https://bugzilla.suse.com/1210999" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31484" ref_url="https://www.suse.com/security/cve/CVE-2023-31484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017860.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:


  - CVE-2023-31484: Enable TLS cert verification in CPAN (bsc#1210999).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210999">SUSE bug 1210999</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31484/">CVE-2023-31484 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31484">CVE-2023-31484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771462" comment="perl-5.26.1-150300.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771463" comment="perl-base-5.26.1-150300.17.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205987" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213237" ref_url="https://bugzilla.suse.com/1213237" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32001" ref_url="https://www.suse.com/security/cve/CVE-2023-32001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015534.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-32001: Fixed TOCTOU race condition (bsc#1213237).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213237">SUSE bug 1213237</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32001/">CVE-2023-32001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32001">CVE-2023-32001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772448" comment="curl-8.0.1-150400.5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772449" comment="libcurl4-8.0.1-150400.5.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205988" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213171" ref_url="https://bugzilla.suse.com/1213171" source="BUGZILLA"/>
		<reference ref_id="1213172" ref_url="https://bugzilla.suse.com/1213172" source="BUGZILLA"/>
		<reference ref_id="1213173" ref_url="https://bugzilla.suse.com/1213173" source="BUGZILLA"/>
		<reference ref_id="1213174" ref_url="https://bugzilla.suse.com/1213174" source="BUGZILLA"/>
		<reference ref_id="1213384" ref_url="https://bugzilla.suse.com/1213384" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2127" ref_url="https://www.suse.com/security/cve/CVE-2022-2127/" source="CVE"/>
		<reference ref_id="CVE-2023-34966" ref_url="https://www.suse.com/security/cve/CVE-2023-34966/" source="CVE"/>
		<reference ref_id="CVE-2023-34967" ref_url="https://www.suse.com/security/cve/CVE-2023-34967/" source="CVE"/>
		<reference ref_id="CVE-2023-34968" ref_url="https://www.suse.com/security/cve/CVE-2023-34968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018042.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

  - CVE-2022-2127: Fixed issue where lm_resp_len was not checked properly in winbindd_pam_auth_crap_send (bsc#1213174).
  - CVE-2023-34966: Fixed samba spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability (bsc#1213173).
  - CVE-2023-34967: Fixed samba spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability (bsc#1213172).
  - CVE-2023-34968: Fixed spotlight server-side Share Path Disclosure (bsc#1213171).


  Bugfixes:

  - Fixed trust relationship failure (bsc#1213384).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-21"/>
	<updated date="2023-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213171">SUSE bug 1213171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213172">SUSE bug 1213172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213173">SUSE bug 1213173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213174">SUSE bug 1213174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213384">SUSE bug 1213384</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2127/">CVE-2022-2127 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2127">CVE-2022-2127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34966/">CVE-2023-34966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34966">CVE-2023-34966 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34967/">CVE-2023-34967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34967">CVE-2023-34967 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34968/">CVE-2023-34968 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34968">CVE-2023-34968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772450" comment="samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772451" comment="samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205989" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1186673" ref_url="https://bugzilla.suse.com/1186673" source="BUGZILLA"/>
		<reference ref_id="1209536" ref_url="https://bugzilla.suse.com/1209536" source="BUGZILLA"/>
		<reference ref_id="1213004" ref_url="https://bugzilla.suse.com/1213004" source="BUGZILLA"/>
		<reference ref_id="1213008" ref_url="https://bugzilla.suse.com/1213008" source="BUGZILLA"/>
		<reference ref_id="1213504" ref_url="https://bugzilla.suse.com/1213504" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38408" ref_url="https://www.suse.com/security/cve/CVE-2023-38408/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015607.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2023-38408: Fixed a condition where specific libaries loaded via
  ssh-agent(1)'s PKCS#11 support could be abused to achieve remote code
  execution via a forwarded agent socket if those libraries were present on the
  victim's system and if the agent was forwarded to an attacker-controlled
  system. [bsc#1213504, CVE-2023-38408]

- Close the right filedescriptor and also close fdh in read_hmac to avoid file
  descriptor leaks. [bsc#1209536]

- Attempts to mitigate instances of secrets lingering in memory after a session
  exits. [bsc#1186673, bsc#1213004, bsc#1213008]
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-24"/>
	<updated date="2023-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186673">SUSE bug 1186673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209536">SUSE bug 1209536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213004">SUSE bug 1213004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213008">SUSE bug 1213008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213504">SUSE bug 1213504</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38408/">CVE-2023-38408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009773627" comment="openssh-8.4p1-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773628" comment="openssh-clients-8.4p1-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773629" comment="openssh-common-8.4p1-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773630" comment="openssh-fips-8.4p1-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773631" comment="openssh-server-8.4p1-150300.3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205990" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213487" ref_url="https://bugzilla.suse.com/1213487" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015616.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-3446: Fixed DH_check() excessive time with over sized modulus (bsc#1213487).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-25"/>
	<updated date="2023-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213487">SUSE bug 1213487</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772748" comment="libopenssl-1_1-devel-1.1.1l-150400.7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772749" comment="libopenssl1_1-1.1.1l-150400.7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772750" comment="libopenssl1_1-hmac-1.1.1l-150400.7.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772751" comment="openssl-1_1-1.1.1l-150400.7.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205991" version="1" class="patch">
	<metadata>
		<title>Security update for conmon (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208737" ref_url="https://bugzilla.suse.com/1208737" source="BUGZILLA"/>
		<reference ref_id="1209307" ref_url="https://bugzilla.suse.com/1209307" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015667.html" source="SUSE-SU"/>
		<description>
This update for conmon fixes the following issues:

  conmon was updated to version 2.1.7:

  - Bumped go version to 1.19 (bsc#1209307).

  Bugfixes:

  - Fixed leaking symbolic links in the opt_socket_path directory.
  - Fixed cgroup oom issues (bsc#1208737).
  - Fixed OOM watcher for cgroupv2 `oom_kill` events.


		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-26"/>
	<updated date="2023-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208737">SUSE bug 1208737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209307">SUSE bug 1209307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772149" comment="conmon-2.1.7-150400.3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205992" version="1" class="patch">
	<metadata>
		<title>Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="SUSE-SU-2023:3010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030619.html" source="SUSE-SU"/>
		<description>
This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer fixes the following issues:

This update rebuilds containerized-data-importer against the current GO security release.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-01"/>
	<updated date="2023-08-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773744" comment="containerized-data-importer-manifests-1.51.0-150400.4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205993" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213502" ref_url="https://bugzilla.suse.com/1213502" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38633" ref_url="https://www.suse.com/security/cve/CVE-2023-38633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015690.html" source="SUSE-SU"/>
		<description>
This update for librsvg fixes the following issues:

librsvg was updated to version 2.52.10:
 
- CVE-2023-38633: Fixed directory traversal in URI decoder (bsc#1213502).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-28"/>
	<updated date="2023-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213502">SUSE bug 1213502</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38633/">CVE-2023-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38633">CVE-2023-38633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009774221" comment="gdk-pixbuf-loader-rsvg-2.52.10-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774222" comment="librsvg-2-2-2.52.10-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205994" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213286" ref_url="https://bugzilla.suse.com/1213286" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015689.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

  - CVE-2023-20593: Fixed AMD ucode for ZenBleed vulnerability (bsc#1213286).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-28"/>
	<updated date="2023-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009774833" comment="kernel-firmware-all-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774834" comment="kernel-firmware-amdgpu-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774835" comment="kernel-firmware-ath10k-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774836" comment="kernel-firmware-ath11k-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774837" comment="kernel-firmware-atheros-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774838" comment="kernel-firmware-bluetooth-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774839" comment="kernel-firmware-bnx2-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774840" comment="kernel-firmware-brcm-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774841" comment="kernel-firmware-chelsio-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774842" comment="kernel-firmware-dpaa2-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774843" comment="kernel-firmware-i915-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774844" comment="kernel-firmware-intel-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774845" comment="kernel-firmware-iwlwifi-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774846" comment="kernel-firmware-liquidio-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774847" comment="kernel-firmware-marvell-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774848" comment="kernel-firmware-media-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774849" comment="kernel-firmware-mediatek-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774850" comment="kernel-firmware-mellanox-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774851" comment="kernel-firmware-mwifiex-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774852" comment="kernel-firmware-network-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774853" comment="kernel-firmware-nfp-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774854" comment="kernel-firmware-nvidia-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774855" comment="kernel-firmware-platform-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774856" comment="kernel-firmware-prestera-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774857" comment="kernel-firmware-qcom-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774858" comment="kernel-firmware-qlogic-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774859" comment="kernel-firmware-radeon-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774860" comment="kernel-firmware-realtek-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774861" comment="kernel-firmware-serial-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774862" comment="kernel-firmware-sound-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774863" comment="kernel-firmware-ti-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774864" comment="kernel-firmware-ueagle-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774865" comment="kernel-firmware-usb-network-20220509-150400.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774866" comment="ucode-amd-20220509-150400.4.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205995" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="SUSE-SU-2023:3057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030641.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container fixes the following issues:

This update rebuilds the kubevirt stack with the current GO release.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-31"/>
	<updated date="2023-07-31"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009773730" comment="kubevirt-manifests-0.54.0-150400.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773737" comment="kubevirt-virtctl-0.54.0-150400.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205996" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208612" ref_url="https://bugzilla.suse.com/1208612" source="BUGZILLA"/>
		<reference ref_id="1211741" ref_url="https://bugzilla.suse.com/1211741" source="BUGZILLA"/>
		<reference ref_id="1212279" ref_url="https://bugzilla.suse.com/1212279" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015736.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

python-tornado:
    
- Security fixes:
  * CVE-2023-28370: Fixed an open redirect issue in the static file handler (bsc#1211741)

prometheus-blackbox_exporter:

- Use obscpio for go modules service
- Set version number
- Set build date from SOURCE_DATE_EPOCH
- Update to 0.24.0 (bsc#1212279, jsc#PED-4556)
  * Requires go1.19
- Avoid empty validation script
- Add rc symlink for backwards compatibility

spacecmd:

- Version 4.3.22-1
  * Bypass traditional systems check on older SUMA instances (bsc#1208612)

		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2023-08-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208612">SUSE bug 1208612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211741">SUSE bug 1211741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212279">SUSE bug 1212279</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774213" comment="python3-tornado-4.5.3-150000.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205997" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210994" ref_url="https://bugzilla.suse.com/1210994" source="BUGZILLA"/>
		<reference ref_id="1211591" ref_url="https://bugzilla.suse.com/1211591" source="BUGZILLA"/>
		<reference ref_id="1211741" ref_url="https://bugzilla.suse.com/1211741" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015735.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Security fixes:

- CVE-2023-28370: Fix an open redirect vulnerability in 'StaticFileHandler' under certain configurations (bsc#1211741)

Bug fixes:

- Prevent error loading 'known_hosts' when '$HOME' is not set (bsc#1210994)
- Fix ModuleNotFoundError and other issues raised by salt-support module (bsc#1211591)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2023-08-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210994">SUSE bug 1210994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211591">SUSE bug 1211591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211741">SUSE bug 1211741</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009774216" comment="python3-salt-3006.0-150400.8.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774217" comment="salt-3006.0-150400.8.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774218" comment="salt-minion-3006.0-150400.8.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774219" comment="salt-transactional-update-3006.0-150400.8.37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205998" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1150305" ref_url="https://bugzilla.suse.com/1150305" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1207894" ref_url="https://bugzilla.suse.com/1207894" source="BUGZILLA"/>
		<reference ref_id="1208788" ref_url="https://bugzilla.suse.com/1208788" source="BUGZILLA"/>
		<reference ref_id="1210565" ref_url="https://bugzilla.suse.com/1210565" source="BUGZILLA"/>
		<reference ref_id="1210584" ref_url="https://bugzilla.suse.com/1210584" source="BUGZILLA"/>
		<reference ref_id="1210853" ref_url="https://bugzilla.suse.com/1210853" source="BUGZILLA"/>
		<reference ref_id="1211243" ref_url="https://bugzilla.suse.com/1211243" source="BUGZILLA"/>
		<reference ref_id="1211811" ref_url="https://bugzilla.suse.com/1211811" source="BUGZILLA"/>
		<reference ref_id="1211867" ref_url="https://bugzilla.suse.com/1211867" source="BUGZILLA"/>
		<reference ref_id="1212301" ref_url="https://bugzilla.suse.com/1212301" source="BUGZILLA"/>
		<reference ref_id="1212846" ref_url="https://bugzilla.suse.com/1212846" source="BUGZILLA"/>
		<reference ref_id="1212905" ref_url="https://bugzilla.suse.com/1212905" source="BUGZILLA"/>
		<reference ref_id="1213010" ref_url="https://bugzilla.suse.com/1213010" source="BUGZILLA"/>
		<reference ref_id="1213011" ref_url="https://bugzilla.suse.com/1213011" source="BUGZILLA"/>
		<reference ref_id="1213012" ref_url="https://bugzilla.suse.com/1213012" source="BUGZILLA"/>
		<reference ref_id="1213013" ref_url="https://bugzilla.suse.com/1213013" source="BUGZILLA"/>
		<reference ref_id="1213014" ref_url="https://bugzilla.suse.com/1213014" source="BUGZILLA"/>
		<reference ref_id="1213015" ref_url="https://bugzilla.suse.com/1213015" source="BUGZILLA"/>
		<reference ref_id="1213016" ref_url="https://bugzilla.suse.com/1213016" source="BUGZILLA"/>
		<reference ref_id="1213017" ref_url="https://bugzilla.suse.com/1213017" source="BUGZILLA"/>
		<reference ref_id="1213018" ref_url="https://bugzilla.suse.com/1213018" source="BUGZILLA"/>
		<reference ref_id="1213019" ref_url="https://bugzilla.suse.com/1213019" source="BUGZILLA"/>
		<reference ref_id="1213020" ref_url="https://bugzilla.suse.com/1213020" source="BUGZILLA"/>
		<reference ref_id="1213021" ref_url="https://bugzilla.suse.com/1213021" source="BUGZILLA"/>
		<reference ref_id="1213024" ref_url="https://bugzilla.suse.com/1213024" source="BUGZILLA"/>
		<reference ref_id="1213025" ref_url="https://bugzilla.suse.com/1213025" source="BUGZILLA"/>
		<reference ref_id="1213032" ref_url="https://bugzilla.suse.com/1213032" source="BUGZILLA"/>
		<reference ref_id="1213034" ref_url="https://bugzilla.suse.com/1213034" source="BUGZILLA"/>
		<reference ref_id="1213035" ref_url="https://bugzilla.suse.com/1213035" source="BUGZILLA"/>
		<reference ref_id="1213036" ref_url="https://bugzilla.suse.com/1213036" source="BUGZILLA"/>
		<reference ref_id="1213037" ref_url="https://bugzilla.suse.com/1213037" source="BUGZILLA"/>
		<reference ref_id="1213038" ref_url="https://bugzilla.suse.com/1213038" source="BUGZILLA"/>
		<reference ref_id="1213039" ref_url="https://bugzilla.suse.com/1213039" source="BUGZILLA"/>
		<reference ref_id="1213040" ref_url="https://bugzilla.suse.com/1213040" source="BUGZILLA"/>
		<reference ref_id="1213041" ref_url="https://bugzilla.suse.com/1213041" source="BUGZILLA"/>
		<reference ref_id="1213059" ref_url="https://bugzilla.suse.com/1213059" source="BUGZILLA"/>
		<reference ref_id="1213061" ref_url="https://bugzilla.suse.com/1213061" source="BUGZILLA"/>
		<reference ref_id="1213087" ref_url="https://bugzilla.suse.com/1213087" source="BUGZILLA"/>
		<reference ref_id="1213088" ref_url="https://bugzilla.suse.com/1213088" source="BUGZILLA"/>
		<reference ref_id="1213089" ref_url="https://bugzilla.suse.com/1213089" source="BUGZILLA"/>
		<reference ref_id="1213090" ref_url="https://bugzilla.suse.com/1213090" source="BUGZILLA"/>
		<reference ref_id="1213092" ref_url="https://bugzilla.suse.com/1213092" source="BUGZILLA"/>
		<reference ref_id="1213093" ref_url="https://bugzilla.suse.com/1213093" source="BUGZILLA"/>
		<reference ref_id="1213094" ref_url="https://bugzilla.suse.com/1213094" source="BUGZILLA"/>
		<reference ref_id="1213095" ref_url="https://bugzilla.suse.com/1213095" source="BUGZILLA"/>
		<reference ref_id="1213096" ref_url="https://bugzilla.suse.com/1213096" source="BUGZILLA"/>
		<reference ref_id="1213098" ref_url="https://bugzilla.suse.com/1213098" source="BUGZILLA"/>
		<reference ref_id="1213099" ref_url="https://bugzilla.suse.com/1213099" source="BUGZILLA"/>
		<reference ref_id="1213100" ref_url="https://bugzilla.suse.com/1213100" source="BUGZILLA"/>
		<reference ref_id="1213102" ref_url="https://bugzilla.suse.com/1213102" source="BUGZILLA"/>
		<reference ref_id="1213103" ref_url="https://bugzilla.suse.com/1213103" source="BUGZILLA"/>
		<reference ref_id="1213104" ref_url="https://bugzilla.suse.com/1213104" source="BUGZILLA"/>
		<reference ref_id="1213105" ref_url="https://bugzilla.suse.com/1213105" source="BUGZILLA"/>
		<reference ref_id="1213106" ref_url="https://bugzilla.suse.com/1213106" source="BUGZILLA"/>
		<reference ref_id="1213107" ref_url="https://bugzilla.suse.com/1213107" source="BUGZILLA"/>
		<reference ref_id="1213108" ref_url="https://bugzilla.suse.com/1213108" source="BUGZILLA"/>
		<reference ref_id="1213109" ref_url="https://bugzilla.suse.com/1213109" source="BUGZILLA"/>
		<reference ref_id="1213110" ref_url="https://bugzilla.suse.com/1213110" source="BUGZILLA"/>
		<reference ref_id="1213111" ref_url="https://bugzilla.suse.com/1213111" source="BUGZILLA"/>
		<reference ref_id="1213112" ref_url="https://bugzilla.suse.com/1213112" source="BUGZILLA"/>
		<reference ref_id="1213113" ref_url="https://bugzilla.suse.com/1213113" source="BUGZILLA"/>
		<reference ref_id="1213114" ref_url="https://bugzilla.suse.com/1213114" source="BUGZILLA"/>
		<reference ref_id="1213134" ref_url="https://bugzilla.suse.com/1213134" source="BUGZILLA"/>
		<reference ref_id="1213245" ref_url="https://bugzilla.suse.com/1213245" source="BUGZILLA"/>
		<reference ref_id="1213247" ref_url="https://bugzilla.suse.com/1213247" source="BUGZILLA"/>
		<reference ref_id="1213252" ref_url="https://bugzilla.suse.com/1213252" source="BUGZILLA"/>
		<reference ref_id="1213258" ref_url="https://bugzilla.suse.com/1213258" source="BUGZILLA"/>
		<reference ref_id="1213259" ref_url="https://bugzilla.suse.com/1213259" source="BUGZILLA"/>
		<reference ref_id="1213263" ref_url="https://bugzilla.suse.com/1213263" source="BUGZILLA"/>
		<reference ref_id="1213264" ref_url="https://bugzilla.suse.com/1213264" source="BUGZILLA"/>
		<reference ref_id="1213286" ref_url="https://bugzilla.suse.com/1213286" source="BUGZILLA"/>
		<reference ref_id="1213523" ref_url="https://bugzilla.suse.com/1213523" source="BUGZILLA"/>
		<reference ref_id="1213524" ref_url="https://bugzilla.suse.com/1213524" source="BUGZILLA"/>
		<reference ref_id="1213543" ref_url="https://bugzilla.suse.com/1213543" source="BUGZILLA"/>
		<reference ref_id="1213705" ref_url="https://bugzilla.suse.com/1213705" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-2985" ref_url="https://www.suse.com/security/cve/CVE-2023-2985/" source="CVE"/>
		<reference ref_id="CVE-2023-3117" ref_url="https://www.suse.com/security/cve/CVE-2023-3117/" source="CVE"/>
		<reference ref_id="CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248/" source="CVE"/>
		<reference ref_id="CVE-2023-3390" ref_url="https://www.suse.com/security/cve/CVE-2023-3390/" source="CVE"/>
		<reference ref_id="CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001/" source="CVE"/>
		<reference ref_id="CVE-2023-3812" ref_url="https://www.suse.com/security/cve/CVE-2023-3812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).
- CVE-2023-3117: Fixed an use-after-free vulnerability in the netfilter subsystem when processing named and anonymous sets in batch requests that could allow a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system (bsc#1213245).
- CVE-2023-3390: Fixed an use-after-free vulnerability in the netfilter subsystem in net/netfilter/nf_tables_api.c that could allow a local attacker with user access to cause a privilege escalation issue (bsc#1212846).
- CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1213543).
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).
- CVE-2023-31248: Fixed an use-after-free vulnerability in nft_chain_lookup_byid that could allow a local attacker to escalate their privilege (bsc#1213061).
- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).


The following non-security bugs were fixed:

- ACPI: utils: Fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).
- ALSA: fireface: make read-only const array for model names static (git-fixes).
- ALSA: hda/realtek - remove 3k pull low procedure (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG G614Jx (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG GA402X (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG GX650P (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG GZ301V (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NPx0SNx (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS70AU (git-fixes).
- ALSA: hda/realtek: Add quirks for Unis H3C Desktop B760 &amp; Q760 (git-fixes).
- ALSA: hda/realtek: Add support for DELL Oasis 13/14/16 laptops (git-fixes).
- ALSA: hda/realtek: Amend G634 quirk to enable rear speakers (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP Laptop 15s-eq2xxx (git-fixes).
- ALSA: hda/realtek: Fix generic fixup definition for cs35l41 amp (git-fixes).
- ALSA: hda/realtek: Whitespace fix (git-fixes).
- ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() (git-fixes).
- ALSA: oxfw: make read-only const array models static (git-fixes).
- ALSA: pcm: Fix potential data race at PCM memory allocation helpers (git-fixes).
- ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).
- ASoC: codecs: wcd934x: fix resource leaks on component remove (git-fixes).
- ASoC: codecs: wcd938x: fix codec initialisation race (git-fixes).
- ASoC: codecs: wcd938x: fix dB range for HPHL and HPHR (git-fixes).
- ASoC: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).
- ASoC: codecs: wcd938x: fix soundwire initialisation race (git-fixes).
- ASoC: tegra: Fix ADX byte map (git-fixes).
- ASoC: tegra: Fix AMX byte map (git-fixes).
- Add MODULE_FIRMWARE() for FIRMWARE_TG357766 (git-fixes).
- Documentation: ABI: sysfs-class-net-qmi: pass_through contact update (git-fixes).
- Documentation: bonding: fix the doc of peer_notif_delay (git-fixes).
- Documentation: timers: hrtimers: Make hybrid union historical (git-fixes).
- Enable NXP SNVS RTC driver for i.MX 8MQ/8MP (jsc#PED-4758)
- Fix documentation of panic_on_warn (git-fixes).
- IB/hfi1: Use bitmap_zalloc() when applicable (git-fixes)
- PCI/PM: Avoid putting EloPOS E2/S2/H2 PCIe Ports in D3cold (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).
- RDMA/rxe: Fix access checks in rxe_check_bind_mw (git-fixes)
- Revert 'arm64: dts: zynqmp: Add address-cells property to interrupt (git-fixes)
- Revert 'drm/amd/display: edp do not add non-edid timings' (git-fixes).
- USB: dwc2: Fix some error handling paths (git-fixes).
- USB: dwc2: platform: Improve error reporting for problems during .remove() (git-fixes).
- USB: gadget: udc: core: Offload usb_udc_vbus_handler processing (git-fixes).
- USB: gadget: udc: core: Prevent soft_connect_store() race (git-fixes).
- USB: serial: option: add LARA-R6 01B PIDs (git-fixes).
- Update config and supported.conf files due to renaming.
- apparmor: fix missing error check for rhashtable_insert_fast (git-fixes).
- arm64/mm: mark private VM_FAULT_X defines as vm_fault_t (git-fixes)
- arm64: dts: microchip: sparx5: do not use PSCI on reference boards (git-fixes)
- arm64: vdso: Pass (void *) to virt_to_page() (git-fixes)
- arm64: xor-neon: mark xor_arm64_neon_*() static (git-fixes)
- can: bcm: Fix UAF in bcm_proc_show() (git-fixes).
- cifs: add a warning when the in-flight count goes negative (bsc#1193629).
- cifs: address unused variable warning (bsc#1193629).
- cifs: do all necessary checks for credits within or before locking (bsc#1193629).
- cifs: fix lease break oops in xfstest generic/098 (bsc#1193629).
- cifs: fix max_credits implementation (bsc#1193629).
- cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1193629).
- cifs: fix session state check in smb2_find_smb_ses (bsc#1193629).
- cifs: fix session state transition to avoid use-after-free issue (bsc#1193629).
- cifs: fix sockaddr comparison in iface_cmp (bsc#1193629).
- cifs: fix status checks in cifs_tree_connect (bsc#1193629).
- cifs: log session id when a matching ses is not found (bsc#1193629).
- cifs: new dynamic tracepoint to track ses not found errors (bsc#1193629).
- cifs: prevent use-after-free by freeing the cfile later (bsc#1193629).
- cifs: print all credit counters in DebugData (bsc#1193629).
- cifs: print client_guid in DebugData (bsc#1193629).
- cifs: print more detail when invalidate_inode_mapping fails (bsc#1193629).
- cifs: print nosharesock value while dumping mount options (bsc#1193629).
- clk: qcom: camcc-sc7180: Add parent dependency to all camera GDSCs (git-fixes).
- clk: qcom: gcc-ipq6018: Use floor ops for sdcc clocks (git-fixes).
- codel: fix kernel-doc notation warnings (git-fixes).
- crypto: kpp - Add helper to set reqsize (git-fixes).
- crypto: qat - Use helper to set reqsize (git-fixes).
- devlink: fix kernel-doc notation warnings (git-fixes).
- docs: networking: Update codeaurora references for rmnet (git-fixes).
- drm/amd/display: Correct `DMUB_FW_VERSION` macro (git-fixes).
- drm/amdgpu: Set vmbo destroy after pt bo is created (git-fixes).
- drm/amdgpu: Validate VM ioctl flags (git-fixes).
- drm/amdgpu: avoid restore process run into dead loop (git-fixes).
- drm/amdgpu: fix clearing mappings for BOs that are always valid in VM (git-fixes).
- drm/atomic: Allow vblank-enabled + self-refresh 'disable' (git-fixes).
- drm/atomic: Fix potential use-after-free in nonblocking commits (git-fixes).
- drm/bridge: tc358768: Add atomic_get_input_bus_fmts() implementation (git-fixes).
- drm/bridge: tc358768: fix TCLK_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_ZEROCNT computation (git-fixes).
- drm/client: Fix memory leak in drm_client_target_cloned (git-fixes).
- drm/i915/psr: Use hw.adjusted mode when calculating io/fast wake times (git-fixes).
- drm/i915: Fix one wrong caching mode enum usage (git-fixes).
- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).
- drm/msm/dpu: Set DPU_DATA_HCTL_EN for in INTF_SC7180_MASK (git-fixes).
- drm/panel: simple: Add Powertip PH800480T013 drm_display_mode flags (git-fixes).
- drm/panel: simple: Add connector_type for innolux_at043tn24 (git-fixes).
- drm/ttm: Do not leak a resource on swapout move error (git-fixes).
- dt-bindings: phy: brcm,brcmstb-usb-phy: Fix error in 'compatible' conditional schema (git-fixes).
- ext4: Fix reusing stale buffer heads from last failed mounting (bsc#1213020).
- ext4: add EA_INODE checking to ext4_iget() (bsc#1213106).
- ext4: add ext4_sb_block_valid() refactored out of ext4_inode_block_valid() (bsc#1213088).
- ext4: add lockdep annotations for i_data_sem for ea_inode's (bsc#1213109).
- ext4: add strict range checks while freeing blocks (bsc#1213089).
- ext4: avoid deadlock in fs reclaim with page writeback (bsc#1213016).
- ext4: bail out of ext4_xattr_ibody_get() fails for any reason (bsc#1213018).
- ext4: block range must be validated before use in ext4_mb_clear_bb() (bsc#1213090).
- ext4: check iomap type only if ext4_iomap_begin() does not fail (bsc#1213103).
- ext4: disallow ea_inodes with extended attributes (bsc#1213108).
- ext4: fail ext4_iget if special inode unallocated (bsc#1213010).
- ext4: fix WARNING in ext4_update_inline_data (bsc#1213012).
- ext4: fix WARNING in mb_find_extent (bsc#1213099).
- ext4: fix bug_on in __es_tree_search caused by bad quota inode (bsc#1213111).
- ext4: fix data races when using cached status extents (bsc#1213102).
- ext4: fix deadlock when converting an inline directory in nojournal mode (bsc#1213105).
- ext4: fix i_disksize exceeding i_size problem in paritally written case (bsc#1213015).
- ext4: fix lockdep warning when enabling MMP (bsc#1213100).
- ext4: fix task hung in ext4_xattr_delete_inode (bsc#1213096).
- ext4: fix to check return value of freeze_bdev() in ext4_shutdown() (bsc#1213021).
- ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline (bsc#1213098).
- ext4: improve error handling from ext4_dirhash() (bsc#1213104).
- ext4: improve error recovery code paths in __ext4_remount() (bsc#1213017).
- ext4: move where set the MAY_INLINE_DATA flag is set (bsc#1213011).
- ext4: only update i_reserved_data_blocks on successful block allocation (bsc#1213019).
- ext4: refactor ext4_free_blocks() to pull out ext4_mb_clear_bb() (bsc#1213087).
- ext4: refuse to create ea block when umounted (bsc#1213093).
- ext4: set lockdep subclass for the ea_inode in ext4_xattr_inode_cache_find() (bsc#1213107).
- ext4: turn quotas off if mount failed after enabling quotas (bsc#1213110).
- ext4: update s_journal_inum if it changes after journal replay (bsc#1213094).
- ext4: use ext4_fc_tl_mem in fast-commit replay path (bsc#1213092).
- ext4: zero i_disksize when initializing the bootloader inode (bsc#1213013).
- fbdev: au1200fb: Fix missing IRQ check in au1200fb_drv_probe (git-fixes).
- fbdev: imxfb: warn about invalid left/right margin (git-fixes).
- fuse: ioctl: translate ENOSYS in outarg (bsc#1213524).
- fuse: revalidate: do not invalidate if interrupted (bsc#1213523).
- hvcs: Fix hvcs port reference counting (bsc#1213134 ltc#202861).
- hvcs: Get reference to tty in remove (bsc#1213134 ltc#202861).
- hvcs: Synchronize hotplug remove with port free (bsc#1213134 ltc#202861).
- hvcs: Use dev_groups to manage hvcs device attributes (bsc#1213134 ltc#202861).
- hvcs: Use driver groups to manage driver attributes (bsc#1213134 ltc#202861).
- hvcs: Use vhangup in hotplug remove (bsc#1213134 ltc#202861).
- hwmon: (adm1275) Allow setting sample averaging (git-fixes).
- hwmon: (pmbus/adm1275) Fix problems with temperature monitoring on ADM1272 (git-fixes).
- i2c: xiic: Defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).
- i2c: xiic: Do not try to handle more interrupt events after error (git-fixes).
- inotify: Avoid reporting event with invalid wd (bsc#1213025).
- jbd2: fix data missing when reusing bh which is ready to be checkpointed (bsc#1213095).
- jdb2: Do not refuse invalidation of already invalidated buffers (bsc#1213014).
- kABI: do not check external trampolines for signature (kabi bsc#1207894 bsc#1211243).
- kabi/severities: Add VAS symbols changed due to recent fix VAS accelerators are directly tied to the architecture, there is no reason to have out-of-tree production drivers
- kselftest: vDSO: Fix accumulation of uninitialized ret when CLOCK_REALTIME is undefined (git-fixes).
- leds: trigger: netdev: Recheck NETDEV_LED_MODE_LINKUP on dev rename (git-fixes).
- media: atomisp: gmin_platform: fix out_len in gmin_get_config_dsm_var() (git-fixes).
- media: cec: i2c: ch7322: also select REGMAP (git-fixes).
- media: i2c: Correct format propagation for st-mipid02 (git-fixes).
- media: usb: Check az6007_read() return value (git-fixes).
- media: usb: siano: Fix warning due to null work_func_t function pointer (git-fixes).
- media: venus: helpers: Fix ALIGN() of non power of two (git-fixes).
- media: videodev2.h: Fix struct v4l2_input tuner index comment (git-fixes).
- memcg: drop kmem.limit_in_bytes (bsc#1208788, bsc#1212905).
- mmc: core: disable TRIM on Kingston EMMC04G-M627 (git-fixes).
- mmc: sdhci: fix DMA configure compatibility issue when 64bit DMA mode is used (git-fixes).
- net: mana: Add support for vlan tagging (bsc#1212301).
- net: phy: prevent stale pointer dereference in phy_init() (git-fixes).
- ntb: amd: Fix error handling in amd_ntb_pci_driver_init() (git-fixes).
- ntb: idt: Fix error handling in idt_pci_driver_init() (git-fixes).
- ntb: intel: Fix error handling in intel_ntb_pci_driver_init() (git-fixes).
- ntb: ntb_tool: Add check for devm_kcalloc (git-fixes).
- ntb: ntb_transport: fix possible memory leak while device_register() fails (git-fixes).
- nvme-multipath: support io stats on the mpath device (bsc#1210565).
- nvme: introduce nvme_start_request (bsc#1210565).
- ocfs2: Switch to security_inode_init_security() (git-fixes).
- ocfs2: check new file size on fallocate call (git-fixes).
- ocfs2: fix use-after-free when unmounting read-only filesystem (git-fixes).
- opp: Fix use-after-free in lazy_opp_tables after probe deferral (git-fixes).
- phy: Revert 'phy: Remove SOC_EXYNOS4212 dep. from PHY_EXYNOS4X12_USB' (git-fixes).
- phy: tegra: xusb: Clear the driver reference in usb-phy dev (git-fixes).
- phy: tegra: xusb: check return value of devm_kzalloc() (git-fixes).
- pie: fix kernel-doc notation warning (git-fixes).
- pinctrl: amd: Detect internal GPIO0 debounce handling (git-fixes).
- pinctrl: amd: Fix mistake in handling clearing pins at startup (git-fixes).
- pinctrl: amd: Only use special debounce behavior for GPIO 0 (git-fixes).
- powerpc/64: Only WARN if __pa()/__va() called with bad addresses (bsc#1194869).
- powerpc/64s: Fix VAS mm use after free (bsc#1194869).
- powerpc/book3s64/mm: Fix DirectMap stats in /proc/meminfo (bsc#1194869).
- powerpc/bpf: Fix use of user_pt_regs in uapi (bsc#1194869).
- powerpc/ftrace: Remove ftrace init tramp once kernel init is complete (bsc#1194869).
- powerpc/interrupt: Do not read MSR from interrupt_exit_kernel_prepare() (bsc#1194869).
- powerpc/mm/dax: Fix the condition when checking if altmap vmemap can cross-boundary (bsc#1150305 ltc#176097 git-fixes).
- powerpc/mm: Switch obsolete dssall to .long (bsc#1194869).
- powerpc/powernv/sriov: perform null check on iov before dereferencing iov (bsc#1194869).
- powerpc/powernv/vas: Assign real address to rx_fifo in vas_rx_win_attr (bsc#1194869).
- powerpc/prom_init: Fix kernel config grep (bsc#1194869).
- powerpc/secvar: fix refcount leak in format_show() (bsc#1194869).
- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1194869).
- powerpc: clean vdso32 and vdso64 directories (bsc#1194869).
- powerpc: define get_cycles macro for arch-override (bsc#1194869).
- powerpc: update ppc_save_regs to save current r1 in pt_regs (bsc#1194869).
- pwm: ab8500: Fix error code in probe() (git-fixes).
- pwm: imx-tpm: force 'real_period' to be zero in suspend (git-fixes).
- pwm: sysfs: Do not apply state to already disabled PWMs (git-fixes).
- rpm/check-for-config-changes: ignore also RISCV_ISA_* and DYNAMIC_SIGFRAME They depend on CONFIG_TOOLCHAIN_HAS_*.
- rsi: remove kernel-doc comment marker (git-fixes).
- s390/ap: fix status returned by ap_aqic() (git-fixes bsc#1213259).
- s390/ap: fix status returned by ap_qact() (git-fixes bsc#1213258).
- s390/debug: add _ASM_S390_ prefix to header guard (git-fixes bsc#1213263).
- s390/percpu: add READ_ONCE() to arch_this_cpu_to_op_simple() (git-fixes bsc#1213252).
- s390: define RUNTIME_DISCARD_EXIT to fix link error with GNU ld &amp;lt; 2.36 (git-fixes bsc#1213264).
- s390: discard .interp section (git-fixes bsc#1213247).
- sched/debug: fix dentry leak in update_sched_domain_debugfs (git-fixes)
- sched: Fix DEBUG &amp;&amp; !SCHEDSTATS warn (git-fixes)
- security: keys: Modify mismatched function name (git-fixes).
- selftests: mptcp: depend on SYN_COOKIES (git-fixes).
- selftests: mptcp: sockopt: return error if wrong mark (git-fixes).
- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).
- selftests: tc: add 'ct' action kconfig dep (git-fixes).
- selftests: tc: add ConnTrack procfs kconfig (git-fixes).
- selftests: tc: set timeout to 15 minutes (git-fixes).
- signal/powerpc: On swapcontext failure force SIGSEGV (bsc#1194869).
- signal: Replace force_sigsegv(SIGSEGV) with force_fatal_sig(SIGSEGV) (bsc#1194869).
- smb3: do not reserve too many oplock credits (bsc#1193629).
- smb3: missing null check in SMB2_change_notify (bsc#1193629).
- smb: client: fix broken file attrs with nodfs mounts (bsc#1193629).
- smb: client: fix missed ses refcounting (git-fixes).
- smb: client: fix parsing of source mount option (bsc#1193629).
- smb: client: fix shared DFS root mounts with different prefixes (bsc#1193629).
- smb: client: fix warning in CIFSFindFirst() (bsc#1193629).
- smb: client: fix warning in CIFSFindNext() (bsc#1193629).
- smb: client: fix warning in cifs_match_super() (bsc#1193629).
- smb: client: fix warning in cifs_smb3_do_mount() (bsc#1193629).
- smb: client: fix warning in generic_ip_connect() (bsc#1193629).
- smb: client: improve DFS mount check (bsc#1193629).
- smb: client: remove redundant pointer 'server' (bsc#1193629).
- smb: delete an unnecessary statement (bsc#1193629).
- smb: move client and server files to common directory fs/smb (bsc#1193629).
- smb: remove obsolete comment (bsc#1193629).
- soundwire: qcom: fix storing port config out-of-bounds (git-fixes).
- spi: bcm-qspi: return error if neither hif_mspi nor mspi is available (git-fixes).
- spi: bcm63xx: fix max prepend length (git-fixes).
- tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation (git-fixes).
- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).
- ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).
- ubi: ensure that VID header offset + VID header size &amp;lt;= alloc, size (bsc#1210584).
- udf: Avoid double brelse() in udf_rename() (bsc#1213032).
- udf: Define EFSCORRUPTED error code (bsc#1213038).
- udf: Detect system inodes linked into directory hierarchy (bsc#1213114).
- udf: Discard preallocation before extending file with a hole (bsc#1213036).
- udf: Do not bother looking for prealloc extents if i_lenExtents matches i_size (bsc#1213035).
- udf: Do not bother merging very long extents (bsc#1213040).
- udf: Do not update file length for failed writes to inline files (bsc#1213041).
- udf: Fix error handling in udf_new_inode() (bsc#1213112).
- udf: Fix extending file within last block (bsc#1213037).
- udf: Fix preallocation discarding at indirect extent boundary (bsc#1213034).
- udf: Preserve link count of system files (bsc#1213113).
- udf: Truncate added extents on failed expansion (bsc#1213039).
- wifi: airo: avoid uninitialized warning in airo_get_rate() (git-fixes).
- wifi: ray_cs: Drop useless status variable in parse_addr() (git-fixes).
- wifi: ray_cs: Utilize strnlen() in parse_addr() (git-fixes).
- wifi: rtw89: debug: fix error code in rtw89_debug_priv_send_h2c_set() (git-fixes).
- wl3501_cs: use eth_hw_addr_set() (git-fixes).
- writeback: fix call of incorrect macro (bsc#1213024).
- x86: Fix .brk attribute in linker script (git-fixes).
- xfs: AIL needs asynchronous CIL forcing (bsc#1211811).
- xfs: CIL work is serialised, not pipelined (bsc#1211811).
- xfs: XLOG_STATE_IOERROR must die (bsc#1211811).
- xfs: async CIL flushes need pending pushes to be made stable (bsc#1211811).
- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).
- xfs: clean up the rtbitmap fsmap backend (git-fixes).
- xfs: do not deplete the reserve pool when trying to shrink the fs (git-fixes).
- xfs: do not reverse order of items in bulk AIL insertion (git-fixes).
- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).
- xfs: drop async cache flushes from CIL commits (bsc#1211811).
- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).
- xfs: fix getfsmap reporting past the last rt extent (git-fixes).
- xfs: fix integer overflows in the fsmap rtbitmap and logdev backends (git-fixes).
- xfs: fix interval filtering in multi-step fsmap queries (git-fixes).
- xfs: fix logdev fsmap query result filtering (git-fixes).
- xfs: fix off-by-one error when the last rt extent is in use (git-fixes).
- xfs: fix uninitialized variable access (git-fixes).
- xfs: make fsmap backend function key parameters const (git-fixes).
- xfs: make the record pointer passed to query_range functions const (git-fixes).
- xfs: move the CIL workqueue to the CIL (bsc#1211811).
- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).
- xfs: order CIL checkpoint start records (bsc#1211811).
- xfs: pass a CIL context to xlog_write() (bsc#1211811).
- xfs: pass explicit mount pointer to rtalloc query functions (git-fixes).
- xfs: rework xlog_state_do_callback() (bsc#1211811).
- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).
- xfs: separate out log shutdown callback processing (bsc#1211811).
- xfs: wait iclog complete before tearing down AIL (bsc#1211811).
- xhci: Fix TRB prefetch issue of ZHAOXIN hosts (git-fixes).
- xhci: Fix resume issue of some ZHAOXIN hosts (git-fixes).
- xhci: Show ZHAOXIN xHCI root hub speed correctly (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-03"/>
	<updated date="2023-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150305">SUSE bug 1150305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207894">SUSE bug 1207894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208788">SUSE bug 1208788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210565">SUSE bug 1210565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210584">SUSE bug 1210584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210853">SUSE bug 1210853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211243">SUSE bug 1211243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211811">SUSE bug 1211811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211867">SUSE bug 1211867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212301">SUSE bug 1212301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212846">SUSE bug 1212846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212905">SUSE bug 1212905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213010">SUSE bug 1213010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213011">SUSE bug 1213011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213012">SUSE bug 1213012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213013">SUSE bug 1213013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213014">SUSE bug 1213014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213015">SUSE bug 1213015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213016">SUSE bug 1213016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213017">SUSE bug 1213017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213018">SUSE bug 1213018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213019">SUSE bug 1213019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213020">SUSE bug 1213020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213021">SUSE bug 1213021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213024">SUSE bug 1213024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213025">SUSE bug 1213025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213032">SUSE bug 1213032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213034">SUSE bug 1213034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213035">SUSE bug 1213035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213036">SUSE bug 1213036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213037">SUSE bug 1213037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213038">SUSE bug 1213038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213039">SUSE bug 1213039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213040">SUSE bug 1213040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213041">SUSE bug 1213041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213059">SUSE bug 1213059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213061">SUSE bug 1213061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213087">SUSE bug 1213087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213088">SUSE bug 1213088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213089">SUSE bug 1213089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213090">SUSE bug 1213090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213092">SUSE bug 1213092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213093">SUSE bug 1213093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213094">SUSE bug 1213094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213095">SUSE bug 1213095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213096">SUSE bug 1213096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213098">SUSE bug 1213098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213099">SUSE bug 1213099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213100">SUSE bug 1213100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213102">SUSE bug 1213102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213103">SUSE bug 1213103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213104">SUSE bug 1213104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213105">SUSE bug 1213105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213106">SUSE bug 1213106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213107">SUSE bug 1213107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213108">SUSE bug 1213108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213109">SUSE bug 1213109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213110">SUSE bug 1213110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213111">SUSE bug 1213111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213112">SUSE bug 1213112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213113">SUSE bug 1213113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213114">SUSE bug 1213114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213134">SUSE bug 1213134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213245">SUSE bug 1213245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213247">SUSE bug 1213247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213252">SUSE bug 1213252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213258">SUSE bug 1213258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213259">SUSE bug 1213259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213263">SUSE bug 1213263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213264">SUSE bug 1213264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213523">SUSE bug 1213523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213524">SUSE bug 1213524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213543">SUSE bug 1213543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213705">SUSE bug 1213705</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2985/">CVE-2023-2985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3117/">CVE-2023-3117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3117">CVE-2023-3117 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3390/">CVE-2023-3390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3812/">CVE-2023-3812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776011" comment="kernel-default-5.14.21-150400.24.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776012" comment="kernel-default-base-5.14.21-150400.24.74.1.150400.24.33.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205999" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213128" ref_url="https://bugzilla.suse.com/1213128" source="BUGZILLA"/>
		<reference ref_id="1213131" ref_url="https://bugzilla.suse.com/1213131" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327/" source="CVE"/>
		<reference ref_id="CVE-2023-37328" ref_url="https://www.suse.com/security/cve/CVE-2023-37328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030825.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issues:

- CVE-2023-37327: Fixed GStreamer FLAC File Parsing Integer Overflow (bsc#1213128). 
- CVE-2023-37328: Fixed Heap-based Buffer Overflow in GStreamer PGS (bsc#1213131).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-07"/>
	<updated date="2023-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213128">SUSE bug 1213128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213131">SUSE bug 1213131</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37328/">CVE-2023-37328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37328">CVE-2023-37328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776897" comment="gstreamer-plugins-base-1.20.1-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776898" comment="libgstallocators-1_0-0-1.20.1-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776899" comment="libgstapp-1_0-0-1.20.1-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776900" comment="libgstaudio-1_0-0-1.20.1-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776901" comment="libgstgl-1_0-0-1.20.1-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776902" comment="libgstpbutils-1_0-0-1.20.1-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776903" comment="libgstriff-1_0-0-1.20.1-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776904" comment="libgsttag-1_0-0-1.20.1-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776905" comment="libgstvideo-1_0-0-1.20.1-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206000" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212968" ref_url="https://bugzilla.suse.com/1212968" source="BUGZILLA"/>
		<reference ref_id="1213001" ref_url="https://bugzilla.suse.com/1213001" source="BUGZILLA"/>
		<reference ref_id="1213414" ref_url="https://bugzilla.suse.com/1213414" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2861" ref_url="https://www.suse.com/security/cve/CVE-2023-2861/" source="CVE"/>
		<reference ref_id="CVE-2023-3255" ref_url="https://www.suse.com/security/cve/CVE-2023-3255/" source="CVE"/>
		<reference ref_id="CVE-2023-3301" ref_url="https://www.suse.com/security/cve/CVE-2023-3301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030855.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2023-2861: Fixed improper access control on special files in 9pfs (bsc#1212968).
- CVE-2023-3301: Fixed NULL pointer dereference in vhost_vdpa_get_vhost_net() (bsc#1213414).
- CVE-2023-3255: Fixed infinite loop in inflate_buffer() leads to denial of service (bsc#1213001). 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212968">SUSE bug 1212968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213001">SUSE bug 1213001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213414">SUSE bug 1213414</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2861/">CVE-2023-2861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2861">CVE-2023-2861 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3255/">CVE-2023-3255 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3255">CVE-2023-3255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3301/">CVE-2023-3301 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3301">CVE-2023-3301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777401" comment="qemu-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777182" comment="qemu-accel-tcg-x86-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777183" comment="qemu-arm-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777402" comment="qemu-audio-spice-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777403" comment="qemu-chardev-spice-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777404" comment="qemu-guest-agent-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777405" comment="qemu-hw-display-qxl-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777406" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777407" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777408" comment="qemu-hw-usb-redirect-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777056" comment="qemu-ipxe-1.0.0+-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777195" comment="qemu-s390x-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777064" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777065" comment="qemu-sgabios-8-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777409" comment="qemu-tools-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777410" comment="qemu-ui-opengl-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777411" comment="qemu-ui-spice-core-6.2.0-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777073" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777200" comment="qemu-x86-6.2.0-150400.37.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206001" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1192760" ref_url="https://bugzilla.suse.com/1192760" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41229" ref_url="https://www.suse.com/security/cve/CVE-2021-41229/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030851.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2021-41229: Fix leaking buffers stored in cstates cache. (bsc#1192760)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192760">SUSE bug 1192760</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41229/">CVE-2021-41229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41229">CVE-2021-41229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777400" comment="libbluetooth3-5.62-150400.4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206002" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213853" ref_url="https://bugzilla.suse.com/1213853" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3244-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031150.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value. (bsc#1213853)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778396" comment="libopenssl3-3.0.8-150400.4.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206003" version="1" class="patch">
	<metadata>
		<title>Security update for libyajl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212928" ref_url="https://bugzilla.suse.com/1212928" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33460" ref_url="https://www.suse.com/security/cve/CVE-2023-33460/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030996.html" source="SUSE-SU"/>
		<description>
This update for libyajl fixes the following issues:

  - CVE-2023-33460: Fixed memory leak which could cause out-of-memory in server (bsc#1212928).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-14"/>
	<updated date="2023-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212928">SUSE bug 1212928</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33460/">CVE-2023-33460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33460">CVE-2023-33460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771735" comment="libyajl2-2.1.0-150000.4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206004" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1206418" ref_url="https://bugzilla.suse.com/1206418" source="BUGZILLA"/>
		<reference ref_id="1207129" ref_url="https://bugzilla.suse.com/1207129" source="BUGZILLA"/>
		<reference ref_id="1210627" ref_url="https://bugzilla.suse.com/1210627" source="BUGZILLA"/>
		<reference ref_id="1210780" ref_url="https://bugzilla.suse.com/1210780" source="BUGZILLA"/>
		<reference ref_id="1211131" ref_url="https://bugzilla.suse.com/1211131" source="BUGZILLA"/>
		<reference ref_id="1211738" ref_url="https://bugzilla.suse.com/1211738" source="BUGZILLA"/>
		<reference ref_id="1212502" ref_url="https://bugzilla.suse.com/1212502" source="BUGZILLA"/>
		<reference ref_id="1212604" ref_url="https://bugzilla.suse.com/1212604" source="BUGZILLA"/>
		<reference ref_id="1212901" ref_url="https://bugzilla.suse.com/1212901" source="BUGZILLA"/>
		<reference ref_id="1213167" ref_url="https://bugzilla.suse.com/1213167" source="BUGZILLA"/>
		<reference ref_id="1213272" ref_url="https://bugzilla.suse.com/1213272" source="BUGZILLA"/>
		<reference ref_id="1213287" ref_url="https://bugzilla.suse.com/1213287" source="BUGZILLA"/>
		<reference ref_id="1213304" ref_url="https://bugzilla.suse.com/1213304" source="BUGZILLA"/>
		<reference ref_id="1213585" ref_url="https://bugzilla.suse.com/1213585" source="BUGZILLA"/>
		<reference ref_id="1213586" ref_url="https://bugzilla.suse.com/1213586" source="BUGZILLA"/>
		<reference ref_id="1213588" ref_url="https://bugzilla.suse.com/1213588" source="BUGZILLA"/>
		<reference ref_id="1213620" ref_url="https://bugzilla.suse.com/1213620" source="BUGZILLA"/>
		<reference ref_id="1213653" ref_url="https://bugzilla.suse.com/1213653" source="BUGZILLA"/>
		<reference ref_id="1213713" ref_url="https://bugzilla.suse.com/1213713" source="BUGZILLA"/>
		<reference ref_id="1213715" ref_url="https://bugzilla.suse.com/1213715" source="BUGZILLA"/>
		<reference ref_id="1213747" ref_url="https://bugzilla.suse.com/1213747" source="BUGZILLA"/>
		<reference ref_id="1213756" ref_url="https://bugzilla.suse.com/1213756" source="BUGZILLA"/>
		<reference ref_id="1213759" ref_url="https://bugzilla.suse.com/1213759" source="BUGZILLA"/>
		<reference ref_id="1213777" ref_url="https://bugzilla.suse.com/1213777" source="BUGZILLA"/>
		<reference ref_id="1213810" ref_url="https://bugzilla.suse.com/1213810" source="BUGZILLA"/>
		<reference ref_id="1213812" ref_url="https://bugzilla.suse.com/1213812" source="BUGZILLA"/>
		<reference ref_id="1213842" ref_url="https://bugzilla.suse.com/1213842" source="BUGZILLA"/>
		<reference ref_id="1213856" ref_url="https://bugzilla.suse.com/1213856" source="BUGZILLA"/>
		<reference ref_id="1213857" ref_url="https://bugzilla.suse.com/1213857" source="BUGZILLA"/>
		<reference ref_id="1213863" ref_url="https://bugzilla.suse.com/1213863" source="BUGZILLA"/>
		<reference ref_id="1213867" ref_url="https://bugzilla.suse.com/1213867" source="BUGZILLA"/>
		<reference ref_id="1213870" ref_url="https://bugzilla.suse.com/1213870" source="BUGZILLA"/>
		<reference ref_id="1213871" ref_url="https://bugzilla.suse.com/1213871" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-0459" ref_url="https://www.suse.com/security/cve/CVE-2023-0459/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-21400" ref_url="https://www.suse.com/security/cve/CVE-2023-21400/" source="CVE"/>
		<reference ref_id="CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-31083" ref_url="https://www.suse.com/security/cve/CVE-2023-31083/" source="CVE"/>
		<reference ref_id="CVE-2023-3268" ref_url="https://www.suse.com/security/cve/CVE-2023-3268/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609/" source="CVE"/>
		<reference ref_id="CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).
- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).
- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).
- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).
- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).
- CVE-2023-3609: Fixed reference counter leak leading to  overflow in net/sched (bsc#1213586).
- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).
- CVE-2023-3776: Fixed improper refcount update in  cls_fw leads to use-after-free (bsc#1213588).
- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).

The following non-security bugs were fixed:

- afs: Fix access after dec in put functions (git-fixes).
- afs: Fix afs_getattr() to refetch file status if callback break occurred (git-fixes).
- afs: Fix dynamic root getattr (git-fixes).
- afs: Fix fileserver probe RTT handling (git-fixes).
- afs: Fix infinite loop found by xfstest generic/676 (git-fixes).
- afs: Fix lost servers_outstanding count (git-fixes).
- afs: Fix server-&gt;active leak in afs_put_server (git-fixes).
- afs: Fix setting of mtime when creating a file/dir/symlink (git-fixes).
- afs: Fix updating of i_size with dv jump from server (git-fixes).
- afs: Fix vlserver probe RTT handling (git-fixes).
- afs: Return -EAGAIN, not -EREMOTEIO, when a file already locked (git-fixes).
- afs: Use refcount_t rather than atomic_t (git-fixes).
- afs: Use the operation issue time instead of the reply time for callbacks (git-fixes).
- afs: adjust ack interpretation to try and cope with nat (git-fixes).
- alsa: emu10k1: roll up loops in dsp setup code for audigy (git-fixes).
- alsa: hda/realtek: support asus g713pv laptop (git-fixes).
- alsa: hda/relatek: enable mute led on hp 250 g8 (git-fixes).
- alsa: usb-audio: add quirk for microsoft modern wireless headset (bsc#1207129).
- alsa: usb-audio: update for native dsd support quirks (git-fixes).
- asoc: atmel: fix the 8k sample parameter in i2sc master (git-fixes).
- asoc: codecs: es8316: fix dmic config (git-fixes).
- asoc: da7219: check for failure reading aad irq events (git-fixes).
- asoc: da7219: flush pending aad irq when suspending (git-fixes).
- asoc: fsl_sai: disable bit clock with transmitter (git-fixes).
- asoc: fsl_spdif: silence output on stop (git-fixes).
- asoc: rt5682-sdw: fix for jd event handling in clockstop mode0 (git-fixes).
- asoc: rt711-sdca: fix for jd event handling in clockstop mode0 (git-fixes).
- asoc: rt711: fix for jd event handling in clockstop mode0 (git-fixes).
- asoc: wm8904: fill the cache for wm8904_adc_test_0 register (git-fixes).
- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).
- block, bfq: Fix division by zero error on zero wsum (bsc#1213653).
- block: Fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).
- can: gs_usb: gs_can_close(): add missing set of CAN state to CAN_STATE_STOPPED (git-fixes).
- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).
- coda: Avoid partial allocation of sig_inputArgs (git-fixes).
- dlm: fix missing lkb refcount handling (git-fixes).
- dlm: fix plock invalid read (git-fixes).
- documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).
- drm/amd/display: Disable MPC split by default on special asic (git-fixes).
- drm/amd/display: Keep PHY active for DP displays on DCN31 (git-fixes).
- drm/client: Fix memory leak in drm_client_modeset_probe (git-fixes).
- drm/msm/adreno: Fix snapshot BINDLESS_DATA size (git-fixes).
- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).
- drm/msm: Fix IS_ERR_OR_NULL() vs NULL check in a5xx_submit_in_rb() (git-fixes).
- drm/radeon: Fix integer overflow in radeon_cs_parser_init (git-fixes).
- file: always lock position for FMODE_ATOMIC_POS (bsc#1213759).
- fs: dlm: add midcomms init/start functions (git-fixes).
- fs: dlm: do not set stop rx flag after node reset (git-fixes).
- fs: dlm: filter user dlm messages for kernel locks (git-fixes).
- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).
- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).
- fs: dlm: fix race in lowcomms (git-fixes).
- fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).
- fs: dlm: move sending fin message into state change handling (git-fixes).
- fs: dlm: retry accept() until -EAGAIN or error returns (git-fixes).
- fs: dlm: return positive pid value for F_GETLK (git-fixes).
- fs: dlm: start midcomms before scand (git-fixes).
- fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() (git-fixes).
- fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev (git-fixes).
- fs: jfs: check for read-only mounted filesystem in txbegin (git-fixes).
- fs: jfs: fix null-ptr-deref read in txbegin (git-fixes).
- gve: Set default duplex configuration to full (git-fixes).
- gve: unify driver name usage (git-fixes).
- hwmon: (k10temp) Enable AMD3255 Proc to show negative temperature (git-fixes).
- hwmon: (nct7802) Fix for temp6 (PECI1) processed even if PECI1 disabled (git-fixes).
- iavf: Fix out-of-bounds when setting channels on remove (git-fixes).
- iavf: Fix use-after-free in free_netdev (git-fixes).
- iavf: use internal state to free traffic IRQs (git-fixes).
- igc: Check if hardware TX timestamping is enabled earlier (git-fixes).
- igc: Enable and fix RX hash usage by netstack (git-fixes).
- igc: Fix Kernel Panic during ndo_tx_timeout callback (git-fixes).
- igc: Fix inserting of empty frame for launchtime (git-fixes).
- igc: Fix launchtime before start of cycle (git-fixes).
- igc: Fix race condition in PTP tx code (git-fixes).
- igc: Handle PPS start time programming for past time values (git-fixes).
- igc: Prevent garbled TX queue with XDP ZEROCOPY (git-fixes).
- igc: Remove delay during TX ring configuration (git-fixes).
- igc: Work around HW bug causing missing timestamps (git-fixes).
- igc: set TP bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).
- input: i8042 - add clevo pcx0dx to i8042 quirk table (git-fixes).
- input: iqs269a - do not poll during ati (git-fixes).
- input: iqs269a - do not poll during suspend or resume (git-fixes).
- jffs2: GC deadlock reading a page that is used in jffs2_write_begin() (git-fixes).
- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).
- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).
- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).
- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).
- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).
- jfs: jfs_dmap: Validate db_l2nbperpage while mounting (git-fixes).
- kvm: arm64: do not read a hw interrupt pending state in user context (git-fixes)
- kvm: arm64: warn if accessing timer pending state outside of vcpu (bsc#1213620)
- kvm: do not null dereference ops-&gt;destroy (git-fixes)
- kvm: downgrade two bug_ons to warn_on_once (git-fixes)
- kvm: initialize debugfs_dentry when a vm is created to avoid null (git-fixes)
- kvm: s390: pv: fix index value of replaced asce (git-fixes bsc#1213867).
- kvm: vmx: inject #gp on encls if vcpu has paging disabled (cr0.pg==0) (git-fixes).
- kvm: vmx: inject #gp, not #ud, if sgx2 encls leafs are unsupported (git-fixes).
- kvm: vmx: restore vmx_vmexit alignment (git-fixes).
- kvm: x86: account fastpath-only vm-exits in vcpu stats (git-fixes).
- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).
- media: staging: atomisp: select V4L2_FWNODE (git-fixes).
- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
- net/sched: sch_qfq: reintroduce lmax bound check for MTU (bsc#1213585).
- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).
- net: mana: Batch ringing RX queue doorbell on receiving packets (bsc#1212901).
- net: mana: Use the correct WQE count for ringing RQ doorbell (bsc#1212901).
- net: phy: marvell10g: fix 88x3310 power up (git-fixes).
- nfsd: add encoding of op_recall flag for write delegation (git-fixes).
- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).
- nfsd: fix sparse warning (git-fixes).
- nfsd: remove open coding of string copy (git-fixes).
- nfsv4.1: always send a reclaim_complete after establishing lease (git-fixes).
- nfsv4.1: freeze the session table upon receiving nfs4err_badsession (git-fixes).
- nvme-pci: fix DMA direction of unmapping integrity data (git-fixes).
- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).
- octeontx-af: fix hardware timestamp configuration (git-fixes).
- octeontx2-af: Move validation of ptp pointer before its usage (git-fixes).
- octeontx2-pf: Add additional check for MCAM rules (git-fixes).
- phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).
- pinctrl: amd: Do not show `Invalid config param` errors (git-fixes).
- pinctrl: amd: Use amd_pinconf_set() for all config options (git-fixes).
- platform/x86: msi-laptop: Fix rfkill out-of-sync on MSI Wind U100 (git-fixes).
- rdma/bnxt_re: fix hang during driver unload (git-fixes)
- rdma/bnxt_re: prevent handling any completions after qp destroy (git-fixes)
- rdma/core: update cma destination address on rdma_resolve_addr (git-fixes)
- rdma/irdma: add missing read barriers (git-fixes)
- rdma/irdma: fix data race on cqp completion stats (git-fixes)
- rdma/irdma: fix data race on cqp request done (git-fixes)
- rdma/irdma: fix op_type reporting in cqes (git-fixes)
- rdma/irdma: report correct wc error (git-fixes)
- rdma/mlx4: make check for invalid flags stricter (git-fixes)
- rdma/mthca: fix crash when polling cq for shared qps (git-fixes)
- regmap: Account for register length in SMBus I/O limits (git-fixes).
- regmap: Drop initial version of maximum transfer length fixes (git-fixes).
- revert 'debugfs, coccinelle: check for obsolete define_simple_attribute() usage' (git-fixes).
- revert 'nfsv4: retry lock on old_stateid during delegation return' (git-fixes).
- revert 'usb: dwc3: core: enable autoretry feature in the controller' (git-fixes).
- revert 'usb: gadget: tegra-xudc: fix error check in tegra_xudc_powerdomain_init()' (git-fixes).
- revert 'usb: xhci: tegra: fix error check' (git-fixes).
- revert 'xhci: add quirk for host controllers that do not update endpoint dcs' (git-fixes).
- rxrpc, afs: Fix selection of abort codes (git-fixes).
- s390/bpf: Add expoline to tail calls (git-fixes bsc#1213870).
- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).
- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).
- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).
- s390/qeth: Fix vipa deletion (git-fixes bsc#1213713).
- s390/vmem: fix empty page tables cleanup under KASAN (git-fixes bsc#1213715).
- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).
- scftorture: Count reschedule IPIs (git-fixes).
- scsi: lpfc: Abort outstanding ELS cmds when mailbox timeout error is detected (bsc#1213756).
- scsi: lpfc: Avoid -Wstringop-overflow warning (bsc#1213756).
- scsi: lpfc: Clean up SLI-4 sysfs resource reporting (bsc#1213756).
- scsi: lpfc: Copyright updates for 14.2.0.14 patches (bsc#1213756).
- scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).
- scsi: lpfc: Fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).
- scsi: lpfc: Fix incorrect big endian type assignments in FDMI and VMID paths (bsc#1213756).
- scsi: lpfc: Fix lpfc_name struct packing (bsc#1213756).
- scsi: lpfc: Make fabric zone discovery more robust when handling unsolicited LOGO (bsc#1213756).
- scsi: lpfc: Pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).
- scsi: lpfc: Qualify ndlp discovery state when processing RSCN (bsc#1213756).
- scsi: lpfc: Refactor cpu affinity assignment paths (bsc#1213756).
- scsi: lpfc: Remove extra ndlp kref decrement in FLOGI cmpl for loop topology (bsc#1213756).
- scsi: lpfc: Replace all non-returning strlcpy() with strscpy() (bsc#1213756).
- scsi: lpfc: Replace one-element array with flexible-array member (bsc#1213756).
- scsi: lpfc: Revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).
- scsi: lpfc: Set Establish Image Pair service parameter only for Target Functions (bsc#1213756).
- scsi: lpfc: Simplify fcp_abort transport callback log message (bsc#1213756).
- scsi: lpfc: Update lpfc version to 14.2.0.14 (bsc#1213756).
- scsi: lpfc: Use struct_size() helper (bsc#1213756).
- scsi: qla2xxx: Adjust IOCB resource on qpair create (bsc#1213747).
- scsi: qla2xxx: Array index may go out of bound (bsc#1213747).
- scsi: qla2xxx: Avoid fcport pointer dereference (bsc#1213747).
- scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() (bsc#1213747).
- scsi: qla2xxx: Correct the index of array (bsc#1213747).
- scsi: qla2xxx: Drop useless LIST_HEAD (bsc#1213747).
- scsi: qla2xxx: Fix NULL pointer dereference in target mode (bsc#1213747).
- scsi: qla2xxx: Fix TMF leak through (bsc#1213747).
- scsi: qla2xxx: Fix buffer overrun (bsc#1213747).
- scsi: qla2xxx: Fix command flush during TMF (bsc#1213747).
- scsi: qla2xxx: Fix deletion race condition (bsc#1213747).
- scsi: qla2xxx: Fix end of loop test (bsc#1213747).
- scsi: qla2xxx: Fix erroneous link up failure (bsc#1213747).
- scsi: qla2xxx: Fix error code in qla2x00_start_sp() (bsc#1213747).
- scsi: qla2xxx: Fix potential NULL pointer dereference (bsc#1213747).
- scsi: qla2xxx: Fix session hang in gnl (bsc#1213747).
- scsi: qla2xxx: Limit TMF to 8 per function (bsc#1213747).
- scsi: qla2xxx: Pointer may be dereferenced (bsc#1213747).
- scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue (bsc#1213747).
- scsi: qla2xxx: Replace one-element array with DECLARE_FLEX_ARRAY() helper (bsc#1213747).
- scsi: qla2xxx: Silence a static checker warning (bsc#1213747).
- scsi: qla2xxx: Turn off noisy message log (bsc#1213747).
- scsi: qla2xxx: Update version to 10.02.08.400-k (bsc#1213747).
- scsi: qla2xxx: Update version to 10.02.08.500-k (bsc#1213747).
- scsi: qla2xxx: Use vmalloc_array() and vcalloc() (bsc#1213747).
- scsi: qla2xxx: fix inconsistent TMF timeout (bsc#1213747).
- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).
- serial: sifive: Fix sifive_serial_console_setup() section (git-fixes).
- soundwire: qcom: update status correctly with mask (git-fixes).
- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).
- staging: r8712: Fix memory leak in _r8712_init_xmit_priv() (git-fixes).
- sunrpc: always free ctxt when freeing deferred request (git-fixes).
- sunrpc: double free xprt_ctxt while still in use (git-fixes).
- sunrpc: fix trace_svc_register() call site (git-fixes).
- sunrpc: fix uaf in svc_tcp_listen_data_ready() (git-fixes).
- sunrpc: remove dead code in svc_tcp_release_rqst() (git-fixes).
- sunrpc: remove the maximum number of retries in call_bind_status (git-fixes).
- svcrdma: Prevent page release when nothing was received (git-fixes).
- tpm_tis: Explicitly check for error code (git-fixes).
- tty: n_gsm: fix UAF in gsm_cleanup_mux (git-fixes).
- ubifs: Add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).
- ubifs: Error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).
- ubifs: Fix 'ui-&gt;dirty' race between do_tmpfile() and writeback work (git-fixes).
- ubifs: Fix AA deadlock when setting xattr for encrypted file (git-fixes).
- ubifs: Fix build errors as symbol undefined (git-fixes).
- ubifs: Fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).
- ubifs: Fix memory leak in alloc_wbufs() (git-fixes).
- ubifs: Fix memory leak in do_rename (git-fixes).
- ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).
- ubifs: Fix to add refcount once page is set private (git-fixes).
- ubifs: Fix wrong dirty space budget for dirty inode (git-fixes).
- ubifs: Free memory for tmpfile name (git-fixes).
- ubifs: Rectify space amount budget for mkdir/tmpfile operations (git-fixes).
- ubifs: Rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).
- ubifs: Rectify space budget for ubifs_xrename() (git-fixes).
- ubifs: Rename whiteout atomically (git-fixes).
- ubifs: Reserve one leb for each journal head while doing budget (git-fixes).
- ubifs: do_rename: Fix wrong space budget when target inode's nlink &gt; 1 (git-fixes).
- ubifs: rename_whiteout: Fix double free for whiteout_ui-&gt;data (git-fixes).
- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).
- ubifs: setflags: Make dirtied_ino_d 8 bytes aligned (git-fixes).
- ubifs: ubifs_writepage: Mark page dirty after writing inode failed (git-fixes).
- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).
- usb: dwc3: pci: skip BYT GPIO lookup table for hardwired phy (git-fixes).
- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).
- usb: xhci-mtk: set the dma max_seg_size (git-fixes).
- vhost: support PACKED when setting-getting vring_base (git-fixes).
- vhost_net: revert upend_idx only on retriable error (git-fixes).
- virtio-net: Maintain reverse cleanup order (git-fixes).
- virtio_net: Fix error unwinding of XDP initialization (git-fixes).
- x86/PVH: obtain VGA console info in Dom0 (git-fixes).
- xen/blkfront: Only check REQ_FUA for writes (git-fixes).
- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-14"/>
	<updated date="2023-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207129">SUSE bug 1207129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210780">SUSE bug 1210780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211738">SUSE bug 1211738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212502">SUSE bug 1212502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212604">SUSE bug 1212604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212901">SUSE bug 1212901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213272">SUSE bug 1213272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213287">SUSE bug 1213287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213304">SUSE bug 1213304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213585">SUSE bug 1213585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213586">SUSE bug 1213586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213588">SUSE bug 1213588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213620">SUSE bug 1213620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213653">SUSE bug 1213653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213713">SUSE bug 1213713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213715">SUSE bug 1213715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213747">SUSE bug 1213747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213756">SUSE bug 1213756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213759">SUSE bug 1213759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213777">SUSE bug 1213777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213810">SUSE bug 1213810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213812">SUSE bug 1213812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213856">SUSE bug 1213856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213857">SUSE bug 1213857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213863">SUSE bug 1213863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213867">SUSE bug 1213867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213870">SUSE bug 1213870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213871">SUSE bug 1213871</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0459/">CVE-2023-0459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21400/">CVE-2023-21400 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21400">CVE-2023-21400 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31083/">CVE-2023-31083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31083">CVE-2023-31083 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3268/">CVE-2023-3268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778394" comment="kernel-default-5.14.21-150400.24.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778395" comment="kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206005" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1150305" ref_url="https://bugzilla.suse.com/1150305" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1206418" ref_url="https://bugzilla.suse.com/1206418" source="BUGZILLA"/>
		<reference ref_id="1207129" ref_url="https://bugzilla.suse.com/1207129" source="BUGZILLA"/>
		<reference ref_id="1207894" ref_url="https://bugzilla.suse.com/1207894" source="BUGZILLA"/>
		<reference ref_id="1208788" ref_url="https://bugzilla.suse.com/1208788" source="BUGZILLA"/>
		<reference ref_id="1210565" ref_url="https://bugzilla.suse.com/1210565" source="BUGZILLA"/>
		<reference ref_id="1210584" ref_url="https://bugzilla.suse.com/1210584" source="BUGZILLA"/>
		<reference ref_id="1210627" ref_url="https://bugzilla.suse.com/1210627" source="BUGZILLA"/>
		<reference ref_id="1210780" ref_url="https://bugzilla.suse.com/1210780" source="BUGZILLA"/>
		<reference ref_id="1210853" ref_url="https://bugzilla.suse.com/1210853" source="BUGZILLA"/>
		<reference ref_id="1211131" ref_url="https://bugzilla.suse.com/1211131" source="BUGZILLA"/>
		<reference ref_id="1211243" ref_url="https://bugzilla.suse.com/1211243" source="BUGZILLA"/>
		<reference ref_id="1211738" ref_url="https://bugzilla.suse.com/1211738" source="BUGZILLA"/>
		<reference ref_id="1211811" ref_url="https://bugzilla.suse.com/1211811" source="BUGZILLA"/>
		<reference ref_id="1211867" ref_url="https://bugzilla.suse.com/1211867" source="BUGZILLA"/>
		<reference ref_id="1212301" ref_url="https://bugzilla.suse.com/1212301" source="BUGZILLA"/>
		<reference ref_id="1212502" ref_url="https://bugzilla.suse.com/1212502" source="BUGZILLA"/>
		<reference ref_id="1212604" ref_url="https://bugzilla.suse.com/1212604" source="BUGZILLA"/>
		<reference ref_id="1212846" ref_url="https://bugzilla.suse.com/1212846" source="BUGZILLA"/>
		<reference ref_id="1212901" ref_url="https://bugzilla.suse.com/1212901" source="BUGZILLA"/>
		<reference ref_id="1212905" ref_url="https://bugzilla.suse.com/1212905" source="BUGZILLA"/>
		<reference ref_id="1213010" ref_url="https://bugzilla.suse.com/1213010" source="BUGZILLA"/>
		<reference ref_id="1213011" ref_url="https://bugzilla.suse.com/1213011" source="BUGZILLA"/>
		<reference ref_id="1213012" ref_url="https://bugzilla.suse.com/1213012" source="BUGZILLA"/>
		<reference ref_id="1213013" ref_url="https://bugzilla.suse.com/1213013" source="BUGZILLA"/>
		<reference ref_id="1213014" ref_url="https://bugzilla.suse.com/1213014" source="BUGZILLA"/>
		<reference ref_id="1213015" ref_url="https://bugzilla.suse.com/1213015" source="BUGZILLA"/>
		<reference ref_id="1213016" ref_url="https://bugzilla.suse.com/1213016" source="BUGZILLA"/>
		<reference ref_id="1213017" ref_url="https://bugzilla.suse.com/1213017" source="BUGZILLA"/>
		<reference ref_id="1213018" ref_url="https://bugzilla.suse.com/1213018" source="BUGZILLA"/>
		<reference ref_id="1213019" ref_url="https://bugzilla.suse.com/1213019" source="BUGZILLA"/>
		<reference ref_id="1213020" ref_url="https://bugzilla.suse.com/1213020" source="BUGZILLA"/>
		<reference ref_id="1213021" ref_url="https://bugzilla.suse.com/1213021" source="BUGZILLA"/>
		<reference ref_id="1213024" ref_url="https://bugzilla.suse.com/1213024" source="BUGZILLA"/>
		<reference ref_id="1213025" ref_url="https://bugzilla.suse.com/1213025" source="BUGZILLA"/>
		<reference ref_id="1213032" ref_url="https://bugzilla.suse.com/1213032" source="BUGZILLA"/>
		<reference ref_id="1213034" ref_url="https://bugzilla.suse.com/1213034" source="BUGZILLA"/>
		<reference ref_id="1213035" ref_url="https://bugzilla.suse.com/1213035" source="BUGZILLA"/>
		<reference ref_id="1213036" ref_url="https://bugzilla.suse.com/1213036" source="BUGZILLA"/>
		<reference ref_id="1213037" ref_url="https://bugzilla.suse.com/1213037" source="BUGZILLA"/>
		<reference ref_id="1213038" ref_url="https://bugzilla.suse.com/1213038" source="BUGZILLA"/>
		<reference ref_id="1213039" ref_url="https://bugzilla.suse.com/1213039" source="BUGZILLA"/>
		<reference ref_id="1213040" ref_url="https://bugzilla.suse.com/1213040" source="BUGZILLA"/>
		<reference ref_id="1213041" ref_url="https://bugzilla.suse.com/1213041" source="BUGZILLA"/>
		<reference ref_id="1213059" ref_url="https://bugzilla.suse.com/1213059" source="BUGZILLA"/>
		<reference ref_id="1213061" ref_url="https://bugzilla.suse.com/1213061" source="BUGZILLA"/>
		<reference ref_id="1213087" ref_url="https://bugzilla.suse.com/1213087" source="BUGZILLA"/>
		<reference ref_id="1213088" ref_url="https://bugzilla.suse.com/1213088" source="BUGZILLA"/>
		<reference ref_id="1213089" ref_url="https://bugzilla.suse.com/1213089" source="BUGZILLA"/>
		<reference ref_id="1213090" ref_url="https://bugzilla.suse.com/1213090" source="BUGZILLA"/>
		<reference ref_id="1213092" ref_url="https://bugzilla.suse.com/1213092" source="BUGZILLA"/>
		<reference ref_id="1213093" ref_url="https://bugzilla.suse.com/1213093" source="BUGZILLA"/>
		<reference ref_id="1213094" ref_url="https://bugzilla.suse.com/1213094" source="BUGZILLA"/>
		<reference ref_id="1213095" ref_url="https://bugzilla.suse.com/1213095" source="BUGZILLA"/>
		<reference ref_id="1213096" ref_url="https://bugzilla.suse.com/1213096" source="BUGZILLA"/>
		<reference ref_id="1213098" ref_url="https://bugzilla.suse.com/1213098" source="BUGZILLA"/>
		<reference ref_id="1213099" ref_url="https://bugzilla.suse.com/1213099" source="BUGZILLA"/>
		<reference ref_id="1213100" ref_url="https://bugzilla.suse.com/1213100" source="BUGZILLA"/>
		<reference ref_id="1213102" ref_url="https://bugzilla.suse.com/1213102" source="BUGZILLA"/>
		<reference ref_id="1213103" ref_url="https://bugzilla.suse.com/1213103" source="BUGZILLA"/>
		<reference ref_id="1213104" ref_url="https://bugzilla.suse.com/1213104" source="BUGZILLA"/>
		<reference ref_id="1213105" ref_url="https://bugzilla.suse.com/1213105" source="BUGZILLA"/>
		<reference ref_id="1213106" ref_url="https://bugzilla.suse.com/1213106" source="BUGZILLA"/>
		<reference ref_id="1213107" ref_url="https://bugzilla.suse.com/1213107" source="BUGZILLA"/>
		<reference ref_id="1213108" ref_url="https://bugzilla.suse.com/1213108" source="BUGZILLA"/>
		<reference ref_id="1213109" ref_url="https://bugzilla.suse.com/1213109" source="BUGZILLA"/>
		<reference ref_id="1213110" ref_url="https://bugzilla.suse.com/1213110" source="BUGZILLA"/>
		<reference ref_id="1213111" ref_url="https://bugzilla.suse.com/1213111" source="BUGZILLA"/>
		<reference ref_id="1213112" ref_url="https://bugzilla.suse.com/1213112" source="BUGZILLA"/>
		<reference ref_id="1213113" ref_url="https://bugzilla.suse.com/1213113" source="BUGZILLA"/>
		<reference ref_id="1213114" ref_url="https://bugzilla.suse.com/1213114" source="BUGZILLA"/>
		<reference ref_id="1213134" ref_url="https://bugzilla.suse.com/1213134" source="BUGZILLA"/>
		<reference ref_id="1213167" ref_url="https://bugzilla.suse.com/1213167" source="BUGZILLA"/>
		<reference ref_id="1213245" ref_url="https://bugzilla.suse.com/1213245" source="BUGZILLA"/>
		<reference ref_id="1213247" ref_url="https://bugzilla.suse.com/1213247" source="BUGZILLA"/>
		<reference ref_id="1213252" ref_url="https://bugzilla.suse.com/1213252" source="BUGZILLA"/>
		<reference ref_id="1213258" ref_url="https://bugzilla.suse.com/1213258" source="BUGZILLA"/>
		<reference ref_id="1213259" ref_url="https://bugzilla.suse.com/1213259" source="BUGZILLA"/>
		<reference ref_id="1213263" ref_url="https://bugzilla.suse.com/1213263" source="BUGZILLA"/>
		<reference ref_id="1213264" ref_url="https://bugzilla.suse.com/1213264" source="BUGZILLA"/>
		<reference ref_id="1213272" ref_url="https://bugzilla.suse.com/1213272" source="BUGZILLA"/>
		<reference ref_id="1213286" ref_url="https://bugzilla.suse.com/1213286" source="BUGZILLA"/>
		<reference ref_id="1213287" ref_url="https://bugzilla.suse.com/1213287" source="BUGZILLA"/>
		<reference ref_id="1213304" ref_url="https://bugzilla.suse.com/1213304" source="BUGZILLA"/>
		<reference ref_id="1213523" ref_url="https://bugzilla.suse.com/1213523" source="BUGZILLA"/>
		<reference ref_id="1213524" ref_url="https://bugzilla.suse.com/1213524" source="BUGZILLA"/>
		<reference ref_id="1213543" ref_url="https://bugzilla.suse.com/1213543" source="BUGZILLA"/>
		<reference ref_id="1213585" ref_url="https://bugzilla.suse.com/1213585" source="BUGZILLA"/>
		<reference ref_id="1213586" ref_url="https://bugzilla.suse.com/1213586" source="BUGZILLA"/>
		<reference ref_id="1213588" ref_url="https://bugzilla.suse.com/1213588" source="BUGZILLA"/>
		<reference ref_id="1213620" ref_url="https://bugzilla.suse.com/1213620" source="BUGZILLA"/>
		<reference ref_id="1213653" ref_url="https://bugzilla.suse.com/1213653" source="BUGZILLA"/>
		<reference ref_id="1213705" ref_url="https://bugzilla.suse.com/1213705" source="BUGZILLA"/>
		<reference ref_id="1213713" ref_url="https://bugzilla.suse.com/1213713" source="BUGZILLA"/>
		<reference ref_id="1213715" ref_url="https://bugzilla.suse.com/1213715" source="BUGZILLA"/>
		<reference ref_id="1213747" ref_url="https://bugzilla.suse.com/1213747" source="BUGZILLA"/>
		<reference ref_id="1213756" ref_url="https://bugzilla.suse.com/1213756" source="BUGZILLA"/>
		<reference ref_id="1213759" ref_url="https://bugzilla.suse.com/1213759" source="BUGZILLA"/>
		<reference ref_id="1213777" ref_url="https://bugzilla.suse.com/1213777" source="BUGZILLA"/>
		<reference ref_id="1213810" ref_url="https://bugzilla.suse.com/1213810" source="BUGZILLA"/>
		<reference ref_id="1213812" ref_url="https://bugzilla.suse.com/1213812" source="BUGZILLA"/>
		<reference ref_id="1213856" ref_url="https://bugzilla.suse.com/1213856" source="BUGZILLA"/>
		<reference ref_id="1213857" ref_url="https://bugzilla.suse.com/1213857" source="BUGZILLA"/>
		<reference ref_id="1213863" ref_url="https://bugzilla.suse.com/1213863" source="BUGZILLA"/>
		<reference ref_id="1213867" ref_url="https://bugzilla.suse.com/1213867" source="BUGZILLA"/>
		<reference ref_id="1213870" ref_url="https://bugzilla.suse.com/1213870" source="BUGZILLA"/>
		<reference ref_id="1213871" ref_url="https://bugzilla.suse.com/1213871" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-0459" ref_url="https://www.suse.com/security/cve/CVE-2023-0459/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-21400" ref_url="https://www.suse.com/security/cve/CVE-2023-21400/" source="CVE"/>
		<reference ref_id="CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-2985" ref_url="https://www.suse.com/security/cve/CVE-2023-2985/" source="CVE"/>
		<reference ref_id="CVE-2023-31083" ref_url="https://www.suse.com/security/cve/CVE-2023-31083/" source="CVE"/>
		<reference ref_id="CVE-2023-3117" ref_url="https://www.suse.com/security/cve/CVE-2023-3117/" source="CVE"/>
		<reference ref_id="CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248/" source="CVE"/>
		<reference ref_id="CVE-2023-3268" ref_url="https://www.suse.com/security/cve/CVE-2023-3268/" source="CVE"/>
		<reference ref_id="CVE-2023-3390" ref_url="https://www.suse.com/security/cve/CVE-2023-3390/" source="CVE"/>
		<reference ref_id="CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609/" source="CVE"/>
		<reference ref_id="CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="CVE-2023-3812" ref_url="https://www.suse.com/security/cve/CVE-2023-3812/" source="CVE"/>
		<reference ref_id="CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).
- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).
- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).
- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).
- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
- CVE-2023-3117: Fixed an use-after-free vulnerability in the netfilter subsystem when processing named and anonymous sets in batch requests that could allow a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system (bsc#1213245).
- CVE-2023-31248: Fixed an use-after-free vulnerability in nft_chain_lookup_byid that could allow a local attacker to escalate their privilege (bsc#1213061).
- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).
- CVE-2023-3390: Fixed an use-after-free vulnerability in the netfilter subsystem in net/netfilter/nf_tables_api.c that could allow a local attacker with user access to cause a privilege escalation issue (bsc#1212846).
- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).
- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).
- CVE-2023-3609: Fixed reference counter leak leading to  overflow in net/sched (bsc#1213586).
- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).
- CVE-2023-3776: Fixed improper refcount update in  cls_fw leads to use-after-free (bsc#1213588).
- CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1213543).
- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).

The following non-security bugs were fixed:

- acpi: utils: fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).
- add module_firmware() for firmware_tg357766 (git-fixes).
- afs: adjust ack interpretation to try and cope with nat (git-fixes).
- afs: fix access after dec in put functions (git-fixes).
- afs: fix afs_getattr() to refetch file status if callback break occurred (git-fixes).
- afs: fix dynamic root getattr (git-fixes).
- afs: fix fileserver probe rtt handling (git-fixes).
- afs: fix infinite loop found by xfstest generic/676 (git-fixes).
- afs: fix lost servers_outstanding count (git-fixes).
- afs: fix server-&gt;active leak in afs_put_server (git-fixes).
- afs: fix setting of mtime when creating a file/dir/symlink (git-fixes).
- afs: fix updating of i_size with dv jump from server (git-fixes).
- afs: fix vlserver probe rtt handling (git-fixes).
- afs: return -eagain, not -eremoteio, when a file already locked (git-fixes).
- afs: use refcount_t rather than atomic_t (git-fixes).
- afs: use the operation issue time instead of the reply time for callbacks (git-fixes).
- alsa: emu10k1: roll up loops in dsp setup code for audigy (git-fixes).
- alsa: fireface: make read-only const array for model names static (git-fixes).
- alsa: hda/realtek - remove 3k pull low procedure (git-fixes).
- alsa: hda/realtek: add quirk for asus rog g614jx (git-fixes).
- alsa: hda/realtek: add quirk for asus rog ga402x (git-fixes).
- alsa: hda/realtek: add quirk for asus rog gx650p (git-fixes).
- alsa: hda/realtek: add quirk for asus rog gz301v (git-fixes).
- alsa: hda/realtek: add quirk for clevo npx0snx (git-fixes).
- alsa: hda/realtek: add quirk for clevo ns70au (git-fixes).
- alsa: hda/realtek: add quirks for unis h3c desktop b760 &amp; q760 (git-fixes).
- alsa: hda/realtek: add support for dell oasis 13/14/16 laptops (git-fixes).
- alsa: hda/realtek: amend g634 quirk to enable rear speakers (git-fixes).
- alsa: hda/realtek: enable mute led on hp laptop 15s-eq2xxx (git-fixes).
- alsa: hda/realtek: fix generic fixup definition for cs35l41 amp (git-fixes).
- alsa: hda/realtek: support asus g713pv laptop (git-fixes).
- alsa: hda/realtek: whitespace fix (git-fixes).
- alsa: hda/relatek: enable mute led on hp 250 g8 (git-fixes).
- alsa: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() (git-fixes).
- alsa: oxfw: make read-only const array models static (git-fixes).
- alsa: pcm: fix potential data race at pcm memory allocation helpers (git-fixes).
- alsa: usb-audio: add quirk for microsoft modern wireless headset (bsc#1207129).
- alsa: usb-audio: update for native dsd support quirks (git-fixes).
- apparmor: fix missing error check for rhashtable_insert_fast (git-fixes).
- arm64/mm: mark private vm_fault_x defines as vm_fault_t (git-fixes)
- arm64: dts: microchip: sparx5: do not use psci on reference boards (git-fixes)
- arm64: vdso: pass (void *) to virt_to_page() (git-fixes)
- arm64: xor-neon: mark xor_arm64_neon_*() static (git-fixes)
- asoc: atmel: fix the 8k sample parameter in i2sc master (git-fixes).
- asoc: codecs: es8316: fix dmic config (git-fixes).
- asoc: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).
- asoc: codecs: wcd934x: fix resource leaks on component remove (git-fixes).
- asoc: codecs: wcd938x: fix codec initialisation race (git-fixes).
- asoc: codecs: wcd938x: fix db range for hphl and hphr (git-fixes).
- asoc: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).
- asoc: codecs: wcd938x: fix soundwire initialisation race (git-fixes).
- asoc: da7219: check for failure reading aad irq events (git-fixes).
- asoc: da7219: flush pending aad irq when suspending (git-fixes).
- asoc: fsl_sai: disable bit clock with transmitter (git-fixes).
- asoc: fsl_spdif: silence output on stop (git-fixes).
- asoc: rt5682-sdw: fix for jd event handling in clockstop mode0 (git-fixes).
- asoc: rt711-sdca: fix for jd event handling in clockstop mode0 (git-fixes).
- asoc: rt711: fix for jd event handling in clockstop mode0 (git-fixes).
- asoc: tegra: fix adx byte map (git-fixes).
- asoc: tegra: fix amx byte map (git-fixes).
- asoc: wm8904: fill the cache for wm8904_adc_test_0 register (git-fixes).
- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).
- block, bfq: fix division by zero error on zero wsum (bsc#1213653).
- block: fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).
- can: bcm: fix uaf in bcm_proc_show() (git-fixes).
- can: gs_usb: gs_can_close(): add missing set of can state to can_state_stopped (git-fixes).
- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).
- cifs: add a warning when the in-flight count goes negative (bsc#1193629).
- cifs: address unused variable warning (bsc#1193629).
- cifs: do all necessary checks for credits within or before locking (bsc#1193629).
- cifs: fix lease break oops in xfstest generic/098 (bsc#1193629).
- cifs: fix max_credits implementation (bsc#1193629).
- cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1193629).
- cifs: fix session state check in smb2_find_smb_ses (bsc#1193629).
- cifs: fix session state transition to avoid use-after-free issue (bsc#1193629).
- cifs: fix sockaddr comparison in iface_cmp (bsc#1193629).
- cifs: fix status checks in cifs_tree_connect (bsc#1193629).
- cifs: log session id when a matching ses is not found (bsc#1193629).
- cifs: new dynamic tracepoint to track ses not found errors (bsc#1193629).
- cifs: prevent use-after-free by freeing the cfile later (bsc#1193629).
- cifs: print all credit counters in debugdata (bsc#1193629).
- cifs: print client_guid in debugdata (bsc#1193629).
- cifs: print more detail when invalidate_inode_mapping fails (bsc#1193629).
- cifs: print nosharesock value while dumping mount options (bsc#1193629).
- clk: qcom: camcc-sc7180: add parent dependency to all camera gdscs (git-fixes).
- clk: qcom: gcc-ipq6018: use floor ops for sdcc clocks (git-fixes).
- coda: avoid partial allocation of sig_inputargs (git-fixes).
- codel: fix kernel-doc notation warnings (git-fixes).
- crypto: kpp - add helper to set reqsize (git-fixes).
- crypto: qat - use helper to set reqsize (git-fixes).
- delete suse/memcg-drop-kmem-limit_in_bytes. drop the patch in order to fix bsc#1213705.
- devlink: fix kernel-doc notation warnings (git-fixes).
- dlm: fix missing lkb refcount handling (git-fixes).
- dlm: fix plock invalid read (git-fixes).
- docs: networking: update codeaurora references for rmnet (git-fixes).
- documentation: abi: sysfs-class-net-qmi: pass_through contact update (git-fixes).
- documentation: bonding: fix the doc of peer_notif_delay (git-fixes).
- documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).
- documentation: timers: hrtimers: make hybrid union historical (git-fixes).
- drm/amd/display: correct `dmub_fw_version` macro (git-fixes).
- drm/amd/display: disable mpc split by default on special asic (git-fixes).
- drm/amd/display: keep phy active for dp displays on dcn31 (git-fixes).
- drm/amdgpu: avoid restore process run into dead loop (git-fixes).
- drm/amdgpu: fix clearing mappings for bos that are always valid in vm (git-fixes).
- drm/amdgpu: set vmbo destroy after pt bo is created (git-fixes).
- drm/amdgpu: validate vm ioctl flags (git-fixes).
- drm/atomic: allow vblank-enabled + self-refresh 'disable' (git-fixes).
- drm/atomic: fix potential use-after-free in nonblocking commits (git-fixes).
- drm/bridge: tc358768: add atomic_get_input_bus_fmts() implementation (git-fixes).
- drm/bridge: tc358768: fix tclk_trailcnt computation (git-fixes).
- drm/bridge: tc358768: fix ths_trailcnt computation (git-fixes).
- drm/bridge: tc358768: fix ths_zerocnt computation (git-fixes).
- drm/client: fix memory leak in drm_client_modeset_probe (git-fixes).
- drm/client: fix memory leak in drm_client_target_cloned (git-fixes).
- drm/i915/psr: use hw.adjusted mode when calculating io/fast wake times (git-fixes).
- drm/i915: fix one wrong caching mode enum usage (git-fixes).
- drm/msm/adreno: fix snapshot bindless_data size (git-fixes).
- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).
- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).
- drm/msm/dpu: set dpu_data_hctl_en for in intf_sc7180_mask (git-fixes).
- drm/msm: fix is_err_or_null() vs null check in a5xx_submit_in_rb() (git-fixes).
- drm/panel: simple: add connector_type for innolux_at043tn24 (git-fixes).
- drm/panel: simple: add powertip ph800480t013 drm_display_mode flags (git-fixes).
- drm/radeon: fix integer overflow in radeon_cs_parser_init (git-fixes).
- drm/ttm: do not leak a resource on swapout move error (git-fixes).
- drop amdgpu patches for fixing regression (bsc#1213304,bsc#1213777)
- dt-bindings: phy: brcm,brcmstb-usb-phy: fix error in 'compatible' conditional schema (git-fixes).
- enable nxp snvs rtc driver for i.mx 8mq/8mp (jsc#PED-4758)
- ext4: add ea_inode checking to ext4_iget() (bsc#1213106).
- ext4: add ext4_sb_block_valid() refactored out of ext4_inode_block_valid() (bsc#1213088).
- ext4: add lockdep annotations for i_data_sem for ea_inode's (bsc#1213109).
- ext4: add strict range checks while freeing blocks (bsc#1213089).
- ext4: avoid deadlock in fs reclaim with page writeback (bsc#1213016).
- ext4: bail out of ext4_xattr_ibody_get() fails for any reason (bsc#1213018).
- ext4: block range must be validated before use in ext4_mb_clear_bb() (bsc#1213090).
- ext4: check iomap type only if ext4_iomap_begin() does not fail (bsc#1213103).
- ext4: disallow ea_inodes with extended attributes (bsc#1213108).
- ext4: fail ext4_iget if special inode unallocated (bsc#1213010).
- ext4: fix bug_on in __es_tree_search caused by bad quota inode (bsc#1213111).
- ext4: fix data races when using cached status extents (bsc#1213102).
- ext4: fix deadlock when converting an inline directory in nojournal mode (bsc#1213105).
- ext4: fix i_disksize exceeding i_size problem in paritally written case (bsc#1213015).
- ext4: fix lockdep warning when enabling mmp (bsc#1213100).
- ext4: fix reusing stale buffer heads from last failed mounting (bsc#1213020).
- ext4: fix task hung in ext4_xattr_delete_inode (bsc#1213096).
- ext4: fix to check return value of freeze_bdev() in ext4_shutdown() (bsc#1213021).
- ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline (bsc#1213098).
- ext4: fix warning in ext4_update_inline_data (bsc#1213012).
- ext4: fix warning in mb_find_extent (bsc#1213099).
- ext4: improve error handling from ext4_dirhash() (bsc#1213104).
- ext4: improve error recovery code paths in __ext4_remount() (bsc#1213017).
- ext4: move where set the may_inline_data flag is set (bsc#1213011).
- ext4: only update i_reserved_data_blocks on successful block allocation (bsc#1213019).
- ext4: refactor ext4_free_blocks() to pull out ext4_mb_clear_bb() (bsc#1213087).
- ext4: refuse to create ea block when umounted (bsc#1213093).
- ext4: set lockdep subclass for the ea_inode in ext4_xattr_inode_cache_find() (bsc#1213107).
- ext4: turn quotas off if mount failed after enabling quotas (bsc#1213110).
- ext4: update s_journal_inum if it changes after journal replay (bsc#1213094).
- ext4: use ext4_fc_tl_mem in fast-commit replay path (bsc#1213092).
- ext4: zero i_disksize when initializing the bootloader inode (bsc#1213013).
- fbdev: au1200fb: fix missing irq check in au1200fb_drv_probe (git-fixes).
- fbdev: imxfb: warn about invalid left/right margin (git-fixes).
- file: always lock position for fmode_atomic_pos (bsc#1213759).
- fix documentation of panic_on_warn (git-fixes).
- fs: dlm: add midcomms init/start functions (git-fixes).
- fs: dlm: do not set stop rx flag after node reset (git-fixes).
- fs: dlm: filter user dlm messages for kernel locks (git-fixes).
- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).
- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).
- fs: dlm: fix race in lowcomms (git-fixes).
- fs: dlm: handle -ebusy first in lock arg validation (git-fixes).
- fs: dlm: move sending fin message into state change handling (git-fixes).
- fs: dlm: retry accept() until -eagain or error returns (git-fixes).
- fs: dlm: return positive pid value for f_getlk (git-fixes).
- fs: dlm: start midcomms before scand (git-fixes).
- fs: hfsplus: remove warn_on() from hfsplus_cat_{read,write}_inode() (git-fixes).
- fs: jfs: check for read-only mounted filesystem in txbegin (git-fixes).
- fs: jfs: fix null-ptr-deref read in txbegin (git-fixes).
- fs: jfs: fix ubsan: array-index-out-of-bounds in dballocdmaplev (git-fixes).
- fuse: ioctl: translate enosys in outarg (bsc#1213524).
- fuse: revalidate: do not invalidate if interrupted (bsc#1213523).
- gve: set default duplex configuration to full (git-fixes).
- gve: unify driver name usage (git-fixes).
- hvcs: fix hvcs port reference counting (bsc#1213134 ltc#202861).
- hvcs: get reference to tty in remove (bsc#1213134 ltc#202861).
- hvcs: synchronize hotplug remove with port free (bsc#1213134 ltc#202861).
- hvcs: use dev_groups to manage hvcs device attributes (bsc#1213134 ltc#202861).
- hvcs: use driver groups to manage driver attributes (bsc#1213134 ltc#202861).
- hvcs: use vhangup in hotplug remove (bsc#1213134 ltc#202861).
- hwmon: (adm1275) allow setting sample averaging (git-fixes).
- hwmon: (k10temp) enable amd3255 proc to show negative temperature (git-fixes).
- hwmon: (nct7802) fix for temp6 (peci1) processed even if peci1 disabled (git-fixes).
- hwmon: (pmbus/adm1275) fix problems with temperature monitoring on adm1272 (git-fixes).
- i2c: xiic: defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).
- i2c: xiic: do not try to handle more interrupt events after error (git-fixes).
- iavf: fix out-of-bounds when setting channels on remove (git-fixes).
- iavf: fix use-after-free in free_netdev (git-fixes).
- iavf: use internal state to free traffic irqs (git-fixes).
- ib/hfi1: use bitmap_zalloc() when applicable (git-fixes)
- igc: check if hardware tx timestamping is enabled earlier (git-fixes).
- igc: enable and fix rx hash usage by netstack (git-fixes).
- igc: fix inserting of empty frame for launchtime (git-fixes).
- igc: fix kernel panic during ndo_tx_timeout callback (git-fixes).
- igc: fix launchtime before start of cycle (git-fixes).
- igc: fix race condition in ptp tx code (git-fixes).
- igc: handle pps start time programming for past time values (git-fixes).
- igc: prevent garbled tx queue with xdp zerocopy (git-fixes).
- igc: remove delay during tx ring configuration (git-fixes).
- igc: set tp bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).
- igc: work around hw bug causing missing timestamps (git-fixes).
- inotify: avoid reporting event with invalid wd (bsc#1213025).
- input: i8042 - add clevo pcx0dx to i8042 quirk table (git-fixes).
- input: iqs269a - do not poll during ati (git-fixes).
- input: iqs269a - do not poll during suspend or resume (git-fixes).
- jbd2: fix data missing when reusing bh which is ready to be checkpointed (bsc#1213095).
- jdb2: do not refuse invalidation of already invalidated buffers (bsc#1213014).
- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).
- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).
- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).
- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).
- jffs2: gc deadlock reading a page that is used in jffs2_write_begin() (git-fixes).
- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).
- jfs: jfs_dmap: validate db_l2nbperpage while mounting (git-fixes).
- kabi/severities: add vas symbols changed due to recent fix vas accelerators are directly tied to the architecture, there is no reason to have out-of-tree production drivers
- kabi: do not check external trampolines for signature (kabi bsc#1207894 bsc#1211243).
- kernel-binary.spec.in: remove superfluous %% in supplements fixes: 02b7735e0caf ('rpm/kernel-binary.spec.in: add enhances and supplements tags to in-tree kmps')
- kselftest: vdso: fix accumulation of uninitialized ret when clock_realtime is undefined (git-fixes).
- kvm: arm64: do not read a hw interrupt pending state in user context (git-fixes)
- kvm: arm64: warn if accessing timer pending state outside of vcpu (bsc#1213620)
- kvm: do not null dereference ops-&gt;destroy (git-fixes)
- kvm: downgrade two bug_ons to warn_on_once (git-fixes)
- kvm: initialize debugfs_dentry when a vm is created to avoid null (git-fixes)
- kvm: s390: pv: fix index value of replaced asce (git-fixes bsc#1213867).
- kvm: vmx: inject #gp on encls if vcpu has paging disabled (cr0.pg==0) (git-fixes).
- kvm: vmx: inject #gp, not #ud, if sgx2 encls leafs are unsupported (git-fixes).
- kvm: vmx: restore vmx_vmexit alignment (git-fixes).
- kvm: x86: account fastpath-only vm-exits in vcpu stats (git-fixes).
- leds: trigger: netdev: recheck netdev_led_mode_linkup on dev rename (git-fixes).
- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).
- media: atomisp: gmin_platform: fix out_len in gmin_get_config_dsm_var() (git-fixes).
- media: cec: i2c: ch7322: also select regmap (git-fixes).
- media: i2c: correct format propagation for st-mipid02 (git-fixes).
- media: staging: atomisp: select v4l2_fwnode (git-fixes).
- media: usb: check az6007_read() return value (git-fixes).
- media: usb: siano: fix warning due to null work_func_t function pointer (git-fixes).
- media: venus: helpers: fix align() of non power of two (git-fixes).
- media: videodev2.h: fix struct v4l2_input tuner index comment (git-fixes).
- memcg: drop kmem.limit_in_bytes (bsc#1208788, bsc#1212905).
- mmc: core: disable trim on kingston emmc04g-m627 (git-fixes).
- mmc: sdhci: fix dma configure compatibility issue when 64bit dma mode is used (git-fixes).
- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
- net/sched: sch_qfq: reintroduce lmax bound check for mtu (bsc#1213585).
- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).
- net: mana: add support for vlan tagging (bsc#1212301).
- net: mana: batch ringing rx queue doorbell on receiving packets (bsc#1212901).
- net: mana: use the correct wqe count for ringing rq doorbell (bsc#1212901).
- net: phy: marvell10g: fix 88x3310 power up (git-fixes).
- net: phy: prevent stale pointer dereference in phy_init() (git-fixes).
- nfsd: add encoding of op_recall flag for write delegation (git-fixes).
- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).
- nfsd: fix sparse warning (git-fixes).
- nfsd: remove open coding of string copy (git-fixes).
- nfsv4.1: always send a reclaim_complete after establishing lease (git-fixes).
- nfsv4.1: freeze the session table upon receiving nfs4err_badsession (git-fixes).
- ntb: amd: fix error handling in amd_ntb_pci_driver_init() (git-fixes).
- ntb: idt: fix error handling in idt_pci_driver_init() (git-fixes).
- ntb: intel: fix error handling in intel_ntb_pci_driver_init() (git-fixes).
- ntb: ntb_tool: add check for devm_kcalloc (git-fixes).
- ntb: ntb_transport: fix possible memory leak while device_register() fails (git-fixes).
- nvme-multipath: support io stats on the mpath device (bsc#1210565).
- nvme-pci: fix dma direction of unmapping integrity data (git-fixes).
- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).
- nvme: introduce nvme_start_request (bsc#1210565).
- ocfs2: check new file size on fallocate call (git-fixes).
- ocfs2: fix use-after-free when unmounting read-only filesystem (git-fixes).
- ocfs2: switch to security_inode_init_security() (git-fixes).
- octeontx-af: fix hardware timestamp configuration (git-fixes).
- octeontx2-af: move validation of ptp pointer before its usage (git-fixes).
- octeontx2-pf: add additional check for mcam rules (git-fixes).
- opp: fix use-after-free in lazy_opp_tables after probe deferral (git-fixes).
- pci/pm: avoid putting elopos e2/s2/h2 pcie ports in d3cold (git-fixes).
- pci: add function 1 dma alias quirk for marvell 88se9235 (git-fixes).
- phy: hisilicon: fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).
- phy: revert 'phy: remove soc_exynos4212 dep. from phy_exynos4x12_usb' (git-fixes).
- phy: tegra: xusb: check return value of devm_kzalloc() (git-fixes).
- phy: tegra: xusb: clear the driver reference in usb-phy dev (git-fixes).
- pie: fix kernel-doc notation warning (git-fixes).
- pinctrl: amd: detect internal gpio0 debounce handling (git-fixes).
- pinctrl: amd: do not show `invalid config param` errors (git-fixes).
- pinctrl: amd: fix mistake in handling clearing pins at startup (git-fixes).
- pinctrl: amd: only use special debounce behavior for gpio 0 (git-fixes).
- pinctrl: amd: use amd_pinconf_set() for all config options (git-fixes).
- platform/x86: msi-laptop: fix rfkill out-of-sync on msi wind u100 (git-fixes).
- powerpc/64: only warn if __pa()/__va() called with bad addresses (bsc#1194869).
- powerpc/64s: fix vas mm use after free (bsc#1194869).
- powerpc/book3s64/mm: fix directmap stats in /proc/meminfo (bsc#1194869).
- powerpc/bpf: fix use of user_pt_regs in uapi (bsc#1194869).
- powerpc/ftrace: remove ftrace init tramp once kernel init is complete (bsc#1194869).
- powerpc/interrupt: do not read msr from interrupt_exit_kernel_prepare() (bsc#1194869).
- powerpc/mm/dax: fix the condition when checking if altmap vmemap can cross-boundary (bsc#1150305 ltc#176097 git-fixes).
- powerpc/mm: switch obsolete dssall to .long (bsc#1194869).
- powerpc/powernv/sriov: perform null check on iov before dereferencing iov (bsc#1194869).
- powerpc/powernv/vas: assign real address to rx_fifo in vas_rx_win_attr (bsc#1194869).
- powerpc/prom_init: fix kernel config grep (bsc#1194869).
- powerpc/secvar: fix refcount leak in format_show() (bsc#1194869).
- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1194869).
- powerpc: clean vdso32 and vdso64 directories (bsc#1194869).
- powerpc: define get_cycles macro for arch-override (bsc#1194869).
- powerpc: update ppc_save_regs to save current r1 in pt_regs (bsc#1194869).
- pwm: ab8500: fix error code in probe() (git-fixes).
- pwm: imx-tpm: force 'real_period' to be zero in suspend (git-fixes).
- pwm: sysfs: do not apply state to already disabled pwms (git-fixes).
- rdma/bnxt_re: fix hang during driver unload (git-fixes)
- rdma/bnxt_re: prevent handling any completions after qp destroy (git-fixes)
- rdma/core: update cma destination address on rdma_resolve_addr (git-fixes)
- rdma/irdma: add missing read barriers (git-fixes)
- rdma/irdma: fix data race on cqp completion stats (git-fixes)
- rdma/irdma: fix data race on cqp request done (git-fixes)
- rdma/irdma: fix op_type reporting in cqes (git-fixes)
- rdma/irdma: report correct wc error (git-fixes)
- rdma/mlx4: make check for invalid flags stricter (git-fixes)
- rdma/mthca: fix crash when polling cq for shared qps (git-fixes)
- rdma/rxe: fix access checks in rxe_check_bind_mw (git-fixes)
- regmap: account for register length in smbus i/o limits (git-fixes).
- regmap: drop initial version of maximum transfer length fixes (git-fixes).
- revert 'arm64: dts: zynqmp: add address-cells property to interrupt (git-fixes)
- revert 'debugfs, coccinelle: check for obsolete define_simple_attribute() usage' (git-fixes).
- revert 'drm/amd/display: edp do not add non-edid timings' (git-fixes).
- revert 'nfsv4: retry lock on old_stateid during delegation return' (git-fixes).
- revert 'usb: dwc3: core: enable autoretry feature in the controller' (git-fixes).
- revert 'usb: gadget: tegra-xudc: fix error check in tegra_xudc_powerdomain_init()' (git-fixes).
- revert 'usb: xhci: tegra: fix error check' (git-fixes).
- revert 'xhci: add quirk for host controllers that do not update endpoint dcs' (git-fixes).
- rpm/check-for-config-changes: ignore also riscv_isa_* and dynamic_sigframe they depend on config_toolchain_has_*.
- rpm: update dependency to match current kmod.
- rsi: remove kernel-doc comment marker (git-fixes).
- rxrpc, afs: fix selection of abort codes (git-fixes).
- s390/ap: fix status returned by ap_aqic() (git-fixes bsc#1213259).
- s390/ap: fix status returned by ap_qact() (git-fixes bsc#1213258).
- s390/bpf: add expoline to tail calls (git-fixes bsc#1213870).
- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).
- s390/debug: add _asm_s390_ prefix to header guard (git-fixes bsc#1213263).
- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).
- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).
- s390/percpu: add read_once() to arch_this_cpu_to_op_simple() (git-fixes bsc#1213252).
- s390/qeth: fix vipa deletion (git-fixes bsc#1213713).
- s390/vmem: fix empty page tables cleanup under kasan (git-fixes bsc#1213715).
- s390: define runtime_discard_exit to fix link error with gnu ld &amp;lt; 2.36 (git-fixes bsc#1213264).
- s390: discard .interp section (git-fixes bsc#1213247).
- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).
- scftorture: count reschedule ipis (git-fixes).
- sched/debug: fix dentry leak in update_sched_domain_debugfs (git-fixes)
- sched: fix debug &amp;&amp; !schedstats warn (git-fixes)
- scsi: lpfc: abort outstanding els cmds when mailbox timeout error is detected (bsc#1213756).
- scsi: lpfc: avoid -wstringop-overflow warning (bsc#1213756).
- scsi: lpfc: clean up sli-4 sysfs resource reporting (bsc#1213756).
- scsi: lpfc: copyright updates for 14.2.0.14 patches (bsc#1213756).
- scsi: lpfc: fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).
- scsi: lpfc: fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).
- scsi: lpfc: fix incorrect big endian type assignments in fdmi and vmid paths (bsc#1213756).
- scsi: lpfc: fix lpfc_name struct packing (bsc#1213756).
- scsi: lpfc: make fabric zone discovery more robust when handling unsolicited logo (bsc#1213756).
- scsi: lpfc: pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).
- scsi: lpfc: qualify ndlp discovery state when processing rscn (bsc#1213756).
- scsi: lpfc: refactor cpu affinity assignment paths (bsc#1213756).
- scsi: lpfc: remove extra ndlp kref decrement in flogi cmpl for loop topology (bsc#1213756).
- scsi: lpfc: replace all non-returning strlcpy() with strscpy() (bsc#1213756).
- scsi: lpfc: replace one-element array with flexible-array member (bsc#1213756).
- scsi: lpfc: revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).
- scsi: lpfc: set establish image pair service parameter only for target functions (bsc#1213756).
- scsi: lpfc: simplify fcp_abort transport callback log message (bsc#1213756).
- scsi: lpfc: update lpfc version to 14.2.0.14 (bsc#1213756).
- scsi: lpfc: use struct_size() helper (bsc#1213756).
- scsi: qla2xxx: adjust iocb resource on qpair create (bsc#1213747).
- scsi: qla2xxx: array index may go out of bound (bsc#1213747).
- scsi: qla2xxx: avoid fcport pointer dereference (bsc#1213747).
- scsi: qla2xxx: check valid rport returned by fc_bsg_to_rport() (bsc#1213747).
- scsi: qla2xxx: correct the index of array (bsc#1213747).
- scsi: qla2xxx: drop useless list_head (bsc#1213747).
- scsi: qla2xxx: fix buffer overrun (bsc#1213747).
- scsi: qla2xxx: fix command flush during tmf (bsc#1213747).
- scsi: qla2xxx: fix deletion race condition (bsc#1213747).
- scsi: qla2xxx: fix end of loop test (bsc#1213747).
- scsi: qla2xxx: fix erroneous link up failure (bsc#1213747).
- scsi: qla2xxx: fix error code in qla2x00_start_sp() (bsc#1213747).
- scsi: qla2xxx: fix inconsistent tmf timeout (bsc#1213747).
- scsi: qla2xxx: fix null pointer dereference in target mode (bsc#1213747).
- scsi: qla2xxx: fix potential null pointer dereference (bsc#1213747).
- scsi: qla2xxx: fix session hang in gnl (bsc#1213747).
- scsi: qla2xxx: fix tmf leak through (bsc#1213747).
- scsi: qla2xxx: limit tmf to 8 per function (bsc#1213747).
- scsi: qla2xxx: pointer may be dereferenced (bsc#1213747).
- scsi: qla2xxx: remove unused nvme_ls_waitq wait queue (bsc#1213747).
- scsi: qla2xxx: replace one-element array with declare_flex_array() helper (bsc#1213747).
- scsi: qla2xxx: silence a static checker warning (bsc#1213747).
- scsi: qla2xxx: turn off noisy message log (bsc#1213747).
- scsi: qla2xxx: update version to 10.02.08.400-k (bsc#1213747).
- scsi: qla2xxx: update version to 10.02.08.500-k (bsc#1213747).
- scsi: qla2xxx: use vmalloc_array() and vcalloc() (bsc#1213747).
- security: keys: modify mismatched function name (git-fixes).
- selftests: mptcp: depend on syn_cookies (git-fixes).
- selftests: mptcp: sockopt: return error if wrong mark (git-fixes).
- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).
- selftests: tc: add 'ct' action kconfig dep (git-fixes).
- selftests: tc: add conntrack procfs kconfig (git-fixes).
- selftests: tc: set timeout to 15 minutes (git-fixes).
- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).
- serial: sifive: fix sifive_serial_console_setup() section (git-fixes).
- signal/powerpc: on swapcontext failure force sigsegv (bsc#1194869).
- signal: replace force_sigsegv(sigsegv) with force_fatal_sig(sigsegv) (bsc#1194869).
- smb3: do not reserve too many oplock credits (bsc#1193629).
- smb3: missing null check in smb2_change_notify (bsc#1193629).
- smb: client: fix broken file attrs with nodfs mounts (bsc#1193629).
- smb: client: fix missed ses refcounting (git-fixes).
- smb: client: fix parsing of source mount option (bsc#1193629).
- smb: client: fix shared dfs root mounts with different prefixes (bsc#1193629).
- smb: client: fix warning in cifs_match_super() (bsc#1193629).
- smb: client: fix warning in cifs_smb3_do_mount() (bsc#1193629).
- smb: client: fix warning in cifsfindfirst() (bsc#1193629).
- smb: client: fix warning in cifsfindnext() (bsc#1193629).
- smb: client: fix warning in generic_ip_connect() (bsc#1193629).
- smb: client: improve dfs mount check (bsc#1193629).
- smb: client: remove redundant pointer 'server' (bsc#1193629).
- smb: delete an unnecessary statement (bsc#1193629).
- smb: move client and server files to common directory fs/smb (bsc#1193629).
- smb: remove obsolete comment (bsc#1193629).
- soundwire: qcom: fix storing port config out-of-bounds (git-fixes).
- soundwire: qcom: update status correctly with mask (git-fixes).
- spi: bcm-qspi: return error if neither hif_mspi nor mspi is available (git-fixes).
- spi: bcm63xx: fix max prepend length (git-fixes).
- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).
- staging: r8712: fix memory leak in _r8712_init_xmit_priv() (git-fixes).
- sunrpc: always free ctxt when freeing deferred request (git-fixes).
- sunrpc: double free xprt_ctxt while still in use (git-fixes).
- sunrpc: fix trace_svc_register() call site (git-fixes).
- sunrpc: fix uaf in svc_tcp_listen_data_ready() (git-fixes).
- sunrpc: remove dead code in svc_tcp_release_rqst() (git-fixes).
- sunrpc: remove the maximum number of retries in call_bind_status (git-fixes).
- svcrdma: prevent page release when nothing was received (git-fixes).
- tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation (git-fixes).
- tpm_tis: explicitly check for error code (git-fixes).
- tty: n_gsm: fix uaf in gsm_cleanup_mux (git-fixes).
- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).
- ubi: ensure that vid header offset + vid header size &amp;lt;= alloc, size (bsc#1210584).
- ubi: fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).
- ubifs: add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).
- ubifs: do_rename: fix wrong space budget when target inode's nlink &gt; 1 (git-fixes).
- ubifs: error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).
- ubifs: fix 'ui-&gt;dirty' race between do_tmpfile() and writeback work (git-fixes).
- ubifs: fix aa deadlock when setting xattr for encrypted file (git-fixes).
- ubifs: fix build errors as symbol undefined (git-fixes).
- ubifs: fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).
- ubifs: fix memory leak in alloc_wbufs() (git-fixes).
- ubifs: fix memory leak in do_rename (git-fixes).
- ubifs: fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).
- ubifs: fix to add refcount once page is set private (git-fixes).
- ubifs: fix wrong dirty space budget for dirty inode (git-fixes).
- ubifs: free memory for tmpfile name (git-fixes).
- ubifs: rectify space amount budget for mkdir/tmpfile operations (git-fixes).
- ubifs: rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).
- ubifs: rectify space budget for ubifs_xrename() (git-fixes).
- ubifs: rename whiteout atomically (git-fixes).
- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).
- ubifs: rename_whiteout: fix double free for whiteout_ui-&gt;data (git-fixes).
- ubifs: reserve one leb for each journal head while doing budget (git-fixes).
- ubifs: setflags: make dirtied_ino_d 8 bytes aligned (git-fixes).
- ubifs: ubifs_writepage: mark page dirty after writing inode failed (git-fixes).
- udf: avoid double brelse() in udf_rename() (bsc#1213032).
- udf: define efscorrupted error code (bsc#1213038).
- udf: detect system inodes linked into directory hierarchy (bsc#1213114).
- udf: discard preallocation before extending file with a hole (bsc#1213036).
- udf: do not bother looking for prealloc extents if i_lenextents matches i_size (bsc#1213035).
- udf: do not bother merging very long extents (bsc#1213040).
- udf: do not update file length for failed writes to inline files (bsc#1213041).
- udf: fix error handling in udf_new_inode() (bsc#1213112).
- udf: fix extending file within last block (bsc#1213037).
- udf: fix preallocation discarding at indirect extent boundary (bsc#1213034).
- udf: preserve link count of system files (bsc#1213113).
- udf: truncate added extents on failed expansion (bsc#1213039).
- update config and supported.conf files due to renaming.
- update suse/rdma-mthca-fix-crash-when-polling-cq-for-shared-qps. (git-fixes bsc#1212604). added bug reference.
- usb: dwc2: fix some error handling paths (git-fixes).
- usb: dwc2: platform: improve error reporting for problems during .remove() (git-fixes).
- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).
- usb: dwc3: pci: skip byt gpio lookup table for hardwired phy (git-fixes).
- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).
- usb: gadget: udc: core: offload usb_udc_vbus_handler processing (git-fixes).
- usb: gadget: udc: core: prevent soft_connect_store() race (git-fixes).
- usb: serial: option: add lara-r6 01b pids (git-fixes).
- usb: xhci-mtk: set the dma max_seg_size (git-fixes).
- vhost: support packed when setting-getting vring_base (git-fixes).
- vhost_net: revert upend_idx only on retriable error (git-fixes).
- virtio-net: maintain reverse cleanup order (git-fixes).
- virtio_net: fix error unwinding of xdp initialization (git-fixes).
- wifi: airo: avoid uninitialized warning in airo_get_rate() (git-fixes).
- wifi: ray_cs: drop useless status variable in parse_addr() (git-fixes).
- wifi: ray_cs: utilize strnlen() in parse_addr() (git-fixes).
- wifi: rtw89: debug: fix error code in rtw89_debug_priv_send_h2c_set() (git-fixes).
- wl3501_cs: use eth_hw_addr_set() (git-fixes).
- writeback: fix call of incorrect macro (bsc#1213024).
- x86/pvh: obtain vga console info in dom0 (git-fixes).
- x86: fix .brk attribute in linker script (git-fixes).
- xen/blkfront: only check req_fua for writes (git-fixes).
- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).
- xfs: ail needs asynchronous cil forcing (bsc#1211811).
- xfs: async cil flushes need pending pushes to be made stable (bsc#1211811).
- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).
- xfs: cil work is serialised, not pipelined (bsc#1211811).
- xfs: clean up the rtbitmap fsmap backend (git-fixes).
- xfs: do not deplete the reserve pool when trying to shrink the fs (git-fixes).
- xfs: do not reverse order of items in bulk ail insertion (git-fixes).
- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).
- xfs: drop async cache flushes from cil commits (bsc#1211811).
- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).
- xfs: fix getfsmap reporting past the last rt extent (git-fixes).
- xfs: fix integer overflows in the fsmap rtbitmap and logdev backends (git-fixes).
- xfs: fix interval filtering in multi-step fsmap queries (git-fixes).
- xfs: fix logdev fsmap query result filtering (git-fixes).
- xfs: fix off-by-one error when the last rt extent is in use (git-fixes).
- xfs: fix uninitialized variable access (git-fixes).
- xfs: make fsmap backend function key parameters const (git-fixes).
- xfs: make the record pointer passed to query_range functions const (git-fixes).
- xfs: move the cil workqueue to the cil (bsc#1211811).
- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).
- xfs: order cil checkpoint start records (bsc#1211811).
- xfs: pass a cil context to xlog_write() (bsc#1211811).
- xfs: pass explicit mount pointer to rtalloc query functions (git-fixes).
- xfs: rework xlog_state_do_callback() (bsc#1211811).
- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).
- xfs: separate out log shutdown callback processing (bsc#1211811).
- xfs: wait iclog complete before tearing down ail (bsc#1211811).
- xfs: xlog_state_ioerror must die (bsc#1211811).
- xhci: fix resume issue of some zhaoxin hosts (git-fixes).
- xhci: fix trb prefetch issue of zhaoxin hosts (git-fixes).
- xhci: show zhaoxin xhci root hub speed correctly (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-15"/>
	<updated date="2023-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150305">SUSE bug 1150305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207129">SUSE bug 1207129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207894">SUSE bug 1207894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208788">SUSE bug 1208788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210565">SUSE bug 1210565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210584">SUSE bug 1210584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210780">SUSE bug 1210780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210853">SUSE bug 1210853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211243">SUSE bug 1211243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211738">SUSE bug 1211738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211811">SUSE bug 1211811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211867">SUSE bug 1211867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212301">SUSE bug 1212301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212502">SUSE bug 1212502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212604">SUSE bug 1212604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212846">SUSE bug 1212846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212901">SUSE bug 1212901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212905">SUSE bug 1212905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213010">SUSE bug 1213010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213011">SUSE bug 1213011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213012">SUSE bug 1213012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213013">SUSE bug 1213013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213014">SUSE bug 1213014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213015">SUSE bug 1213015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213016">SUSE bug 1213016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213017">SUSE bug 1213017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213018">SUSE bug 1213018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213019">SUSE bug 1213019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213020">SUSE bug 1213020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213021">SUSE bug 1213021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213024">SUSE bug 1213024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213025">SUSE bug 1213025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213032">SUSE bug 1213032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213034">SUSE bug 1213034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213035">SUSE bug 1213035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213036">SUSE bug 1213036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213037">SUSE bug 1213037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213038">SUSE bug 1213038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213039">SUSE bug 1213039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213040">SUSE bug 1213040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213041">SUSE bug 1213041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213059">SUSE bug 1213059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213061">SUSE bug 1213061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213087">SUSE bug 1213087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213088">SUSE bug 1213088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213089">SUSE bug 1213089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213090">SUSE bug 1213090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213092">SUSE bug 1213092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213093">SUSE bug 1213093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213094">SUSE bug 1213094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213095">SUSE bug 1213095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213096">SUSE bug 1213096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213098">SUSE bug 1213098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213099">SUSE bug 1213099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213100">SUSE bug 1213100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213102">SUSE bug 1213102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213103">SUSE bug 1213103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213104">SUSE bug 1213104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213105">SUSE bug 1213105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213106">SUSE bug 1213106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213107">SUSE bug 1213107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213108">SUSE bug 1213108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213109">SUSE bug 1213109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213110">SUSE bug 1213110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213111">SUSE bug 1213111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213112">SUSE bug 1213112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213113">SUSE bug 1213113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213114">SUSE bug 1213114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213134">SUSE bug 1213134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213245">SUSE bug 1213245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213247">SUSE bug 1213247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213252">SUSE bug 1213252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213258">SUSE bug 1213258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213259">SUSE bug 1213259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213263">SUSE bug 1213263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213264">SUSE bug 1213264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213272">SUSE bug 1213272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213287">SUSE bug 1213287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213304">SUSE bug 1213304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213523">SUSE bug 1213523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213524">SUSE bug 1213524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213543">SUSE bug 1213543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213585">SUSE bug 1213585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213586">SUSE bug 1213586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213588">SUSE bug 1213588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213620">SUSE bug 1213620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213653">SUSE bug 1213653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213705">SUSE bug 1213705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213713">SUSE bug 1213713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213715">SUSE bug 1213715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213747">SUSE bug 1213747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213756">SUSE bug 1213756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213759">SUSE bug 1213759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213777">SUSE bug 1213777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213810">SUSE bug 1213810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213812">SUSE bug 1213812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213856">SUSE bug 1213856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213857">SUSE bug 1213857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213863">SUSE bug 1213863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213867">SUSE bug 1213867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213870">SUSE bug 1213870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213871">SUSE bug 1213871</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0459/">CVE-2023-0459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21400/">CVE-2023-21400 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21400">CVE-2023-21400 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2985/">CVE-2023-2985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31083/">CVE-2023-31083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31083">CVE-2023-31083 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3117/">CVE-2023-3117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3117">CVE-2023-3117 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3268/">CVE-2023-3268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3390/">CVE-2023-3390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3812/">CVE-2023-3812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778154" comment="kernel-rt-5.14.21-150400.15.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206006" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213514" ref_url="https://bugzilla.suse.com/1213514" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41409" ref_url="https://www.suse.com/security/cve/CVE-2022-41409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3327-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031021.html" source="SUSE-SU"/>
		<description>
This update for pcre2 fixes the following issues:

  - CVE-2022-41409: Fixed integer overflow vulnerability in pcre2test that allows attackers to cause a denial of service via negative input (bsc#1213514).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-16"/>
	<updated date="2023-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213514">SUSE bug 1213514</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41409/">CVE-2022-41409 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41409">CVE-2022-41409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774220" comment="libpcre2-8-0-10.39-150400.4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206007" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213287" ref_url="https://bugzilla.suse.com/1213287" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031088.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- CVE-2023-20569: Fixed AMD 19h ucode to mitigate a side channel vulnerability in some of the AMD CPUs. (bsc#1213287)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-18"/>
	<updated date="2023-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213287">SUSE bug 1213287</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777869" comment="kernel-firmware-all-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777870" comment="kernel-firmware-amdgpu-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777871" comment="kernel-firmware-ath10k-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777872" comment="kernel-firmware-ath11k-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777873" comment="kernel-firmware-atheros-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777874" comment="kernel-firmware-bluetooth-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777875" comment="kernel-firmware-bnx2-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777876" comment="kernel-firmware-brcm-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777877" comment="kernel-firmware-chelsio-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777878" comment="kernel-firmware-dpaa2-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777879" comment="kernel-firmware-i915-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777880" comment="kernel-firmware-intel-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777881" comment="kernel-firmware-iwlwifi-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777882" comment="kernel-firmware-liquidio-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777883" comment="kernel-firmware-marvell-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777884" comment="kernel-firmware-media-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777885" comment="kernel-firmware-mediatek-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777886" comment="kernel-firmware-mellanox-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777887" comment="kernel-firmware-mwifiex-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777888" comment="kernel-firmware-network-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777889" comment="kernel-firmware-nfp-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777890" comment="kernel-firmware-nvidia-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777891" comment="kernel-firmware-platform-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777892" comment="kernel-firmware-prestera-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777893" comment="kernel-firmware-qcom-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777894" comment="kernel-firmware-qlogic-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777895" comment="kernel-firmware-radeon-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777896" comment="kernel-firmware-realtek-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777897" comment="kernel-firmware-serial-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777898" comment="kernel-firmware-sound-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777899" comment="kernel-firmware-ti-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777900" comment="kernel-firmware-ueagle-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777901" comment="kernel-firmware-usb-network-20220509-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777902" comment="ucode-amd-20220509-150400.4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206008" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214054" ref_url="https://bugzilla.suse.com/1214054" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36054" ref_url="https://www.suse.com/security/cve/CVE-2023-36054/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015961.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2023-36054: Fixed a DoS that could be triggered by an authenticated remote user. (bsc#1214054)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-18"/>
	<updated date="2023-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214054">SUSE bug 1214054</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36054/">CVE-2023-36054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777843" comment="krb5-1.19.2-150400.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206009" version="1" class="patch">
	<metadata>
		<title>Security update for python-configobj (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210070" ref_url="https://bugzilla.suse.com/1210070" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26112" ref_url="https://www.suse.com/security/cve/CVE-2023-26112/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031116.html" source="SUSE-SU"/>
		<description>
This update for python-configobj fixes the following issues:
  
- CVE-2023-26112: Fixed regular expression denial of service vulnerability in validate.py (bsc#1210070).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-22"/>
	<updated date="2023-08-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1210070">SUSE bug 1210070</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26112/">CVE-2023-26112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26112">CVE-2023-26112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771765" comment="python3-configobj-5.0.6-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206010" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1206418" ref_url="https://bugzilla.suse.com/1206418" source="BUGZILLA"/>
		<reference ref_id="1214099" ref_url="https://bugzilla.suse.com/1214099" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-41804" ref_url="https://www.suse.com/security/cve/CVE-2022-41804/" source="CVE"/>
		<reference ref_id="CVE-2023-23908" ref_url="https://www.suse.com/security/cve/CVE-2023-23908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015993.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20230808 release. (bsc#1214099)
- CVE-2022-40982: Fixed a potential security vulnerability in some Intel? Processors which may allow information disclosure.
- CVE-2023-23908: Fixed a potential security vulnerability in some 3rd Generation Intel? Xeon? Scalable processors which may allow information disclosure.
- CVE-2022-41804: Fixed a potential security vulnerability in some Intel? Xeon? Processors with Intel? Software Guard Extensions (SGX) which may allow escalation of privilege.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214099">SUSE bug 1214099</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41804/">CVE-2022-41804 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-23908/">CVE-2023-23908 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778161" comment="ucode-intel-20230808-150200.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206011" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1213616" ref_url="https://bugzilla.suse.com/1213616" source="BUGZILLA"/>
		<reference ref_id="1214082" ref_url="https://bugzilla.suse.com/1214082" source="BUGZILLA"/>
		<reference ref_id="1214083" ref_url="https://bugzilla.suse.com/1214083" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031153.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-20569: Fixed side channel attack Inception or RAS Poisoning. (bsc#1214082, XSA-434)
- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling'. (bsc#1214083, XSA-435)
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information. (bsc#1213616, XSA-433)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213616">SUSE bug 1213616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214082">SUSE bug 1214082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214083">SUSE bug 1214083</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778685" comment="xen-libs-4.16.5_02-150400.4.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206012" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213517" ref_url="https://bugzilla.suse.com/1213517" source="BUGZILLA"/>
		<reference ref_id="1213853" ref_url="https://bugzilla.suse.com/1213853" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031151.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value. (bsc#1213853)
- Don't pass zero length input to EVP_Cipher because s390x assembler optimized AES cannot handle zero size. (bsc#1213517)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213517">SUSE bug 1213517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777839" comment="libopenssl-1_1-devel-1.1.1l-150400.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777840" comment="libopenssl1_1-1.1.1l-150400.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777841" comment="libopenssl1_1-hmac-1.1.1l-150400.7.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777842" comment="openssl-1_1-1.1.1l-150400.7.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206013" version="1" class="patch">
	<metadata>
		<title>Feature update for LibreOffice and xmlsec1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1198666" ref_url="https://bugzilla.suse.com/1198666" source="BUGZILLA"/>
		<reference ref_id="1200085" ref_url="https://bugzilla.suse.com/1200085" source="BUGZILLA"/>
		<reference ref_id="1204040" ref_url="https://bugzilla.suse.com/1204040" source="BUGZILLA"/>
		<reference ref_id="1209242" ref_url="https://bugzilla.suse.com/1209242" source="BUGZILLA"/>
		<reference ref_id="1210687" ref_url="https://bugzilla.suse.com/1210687" source="BUGZILLA"/>
		<reference ref_id="1211746" ref_url="https://bugzilla.suse.com/1211746" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0950" ref_url="https://www.suse.com/security/cve/CVE-2023-0950/" source="CVE"/>
		<reference ref_id="CVE-2023-2255" ref_url="https://www.suse.com/security/cve/CVE-2023-2255/" source="CVE"/>
		<reference ref_id="SUSE-FU-2023:3413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031163.html" source="SUSE-SU"/>
		<description>
This update for LibreOffice and xmlsec1 fixes the following issue:
    
libreoffice:

- Version update from 7.4.3.2 to 7.5.4.1 (jsc#PED-3561, jsc#PED-3550, jsc#3549):
  * For the highlights of changes of version 7.5 please consult the official release notes:
    https://wiki.documentfoundation.org/ReleaseNotes/7.5
  * Security issues fixed:
    + CVE-2023-0950: Fixed stack underflow in ScInterpreter (bsc#1209242)
    + CVE-2023-2255: Fixed vulnerability where remote documents could be loaded without prompt via IFrame (bsc#1211746)
  * Bug fixes:
    + Fix PPTX shadow effect for table offset (bsc#1204040)
    + Fix ability to set the default tab size for each text object (bsc#1198666)
    + Fix PPTX extra vertical space between different text formats (bsc#1200085)
    + Do not use binutils-gold as the package is unmaintained and will be removed in the future (boo#1210687)
  * Updated bundled dependencies:
    * boost version update from 1_77_0 to 1_80_0
    * curl version update from 7.83.1 to 8.0.1
    * gpgme version update from 1.16.0 to 1.18.0
    * icu4c-data version update from 70_1 to 72_1
    * icu4c version update from 70_1 to 72_1
    * pdfium version update from 4699 to 5408
    * poppler version update from 21.11.0 to 22.12.0

xmlsec1:
    
- Version update from 1.2.28 to 1.2.37 required by LibreOffice 7.5.2.2 (jsc#PED-3561, jsc#PED-3550):
  * Retired the XMLSec mailing list 'xmlsec@aleksey.com' and the XMLSec Online Signature Verifier.
  * Migration to OpenSSL 3.0 API Note that OpenSSL engines are disabled by default when XMLSec library is compiled
    against OpenSSL 3.0.
    To re-enable OpenSSL engines, use `--enable-openssl3-engines` configure flag 
    (there will be a lot of deprecation warnings).
  * The OpenSSL before 1.1.0 and LibreSSL before 2.7.0 are now deprecated and will be removed in the future versions of
    XMLSec Library.
  * Refactored all the integer casts to ensure cast-safety. Fixed all warnings and enabled `-Werror` and `-pedantic` 
    flags on CI builds.
  * Added configure flag to use size_t for xmlSecSize (currently disabled by default for backward compatibility).
  * Support for OpenSSL compiled with OPENSSL_NO_ERR.
  * Full support for LibreSSL 3.5.0 and above
  * Several other small fixes
  * Fix decrypting session key for two recipients 
  * Added `--privkey-openssl-engine` option to enhance openssl engine support
  * Remove MD5 for NSS 3.59 and above
  * Fix PKCS12_parse return code handling
  * Fix OpenSSL lookup
  * xmlSecX509DataGetNodeContent(): don't return 0 for non-empty elements - fix for LibreOffice
  * Unload error strings in OpenSSL shutdown.
  * Make userData available when executing preExecCallback function
  * Add an option to use secure memset.
  * Enabled XML_PARSE_HUGE for all xml parsers.
  * Various build and tests fixes and improvements.
  * Move remaining private header files away from xmlsec/include/`` folder
- Other packaging changes:
  * Relax the crypto policies for the test-suite. It allows the tests using certificates with small key lengths to pass.
  * Pass `--disable-md5` to configure: The cryptographic strength of the MD5 algorithm is sufficiently doubtful that its
    use is discouraged at this time. It is not listed as an algorithm in [XMLDSIG-CORE1]
    https://www.w3.org/TR/xmlsec-algorithms/#bib-XMLDSIG-CORE1
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-24"/>
	<updated date="2023-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198666">SUSE bug 1198666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200085">SUSE bug 1200085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204040">SUSE bug 1204040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209242">SUSE bug 1209242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210687">SUSE bug 1210687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211746">SUSE bug 1211746</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0950/">CVE-2023-0950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0950">CVE-2023-0950 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2255/">CVE-2023-2255 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2255">CVE-2023-2255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780429" comment="libxmlsec1-1-1.2.37-150400.14.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780433" comment="libxmlsec1-openssl1-1.2.37-150400.14.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206014" version="1" class="patch">
	<metadata>
		<title>Security update for gawk (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214025" ref_url="https://bugzilla.suse.com/1214025" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4156" ref_url="https://www.suse.com/security/cve/CVE-2023-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016026.html" source="SUSE-SU"/>
		<description>
This update for gawk fixes the following issues:

- CVE-2023-4156: Fix a heap out of bound read by validating the index into argument list. (bsc#1214025)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214025">SUSE bug 1214025</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4156/">CVE-2023-4156 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4156">CVE-2023-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777837" comment="gawk-4.2.1-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206015" version="1" class="patch">
	<metadata>
		<title>Security update for ca-certificates-mozilla (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214248" ref_url="https://bugzilla.suse.com/1214248" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016029.html" source="SUSE-SU"/>
		<description>
This update for ca-certificates-mozilla fixes the following issues:

- Updated to 2.62 state of Mozilla SSL root CAs (bsc#1214248)
  Added:
  - Atos TrustedRoot Root CA ECC G2 2020
  - Atos TrustedRoot Root CA ECC TLS 2021
  - Atos TrustedRoot Root CA RSA G2 2020
  - Atos TrustedRoot Root CA RSA TLS 2021
  - BJCA Global Root CA1
  - BJCA Global Root CA2
  - LAWtrust Root CA2 (4096)
  - Sectigo Public Email Protection Root E46
  - Sectigo Public Email Protection Root R46
  - Sectigo Public Server Authentication Root E46
  - Sectigo Public Server Authentication Root R46
  - SSL.com Client ECC Root CA 2022
  - SSL.com Client RSA Root CA 2022
  - SSL.com TLS ECC Root CA 2022
  - SSL.com TLS RSA Root CA 2022
  Removed CAs:
  - Chambers of Commerce Root
  - E-Tugra Certification Authority
  - E-Tugra Global Root CA ECC v3
  - E-Tugra Global Root CA RSA v3
  - Hongkong Post Root CA 1
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214248">SUSE bug 1214248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778601" comment="ca-certificates-mozilla-2.62-150200.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206016" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210419" ref_url="https://bugzilla.suse.com/1210419" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2004" ref_url="https://www.suse.com/security/cve/CVE-2023-2004/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016036.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2023-2004: Fixed integer overflow in tt_hvadvance_adjust (bsc#1210419).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210419">SUSE bug 1210419</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2004/">CVE-2023-2004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2004">CVE-2023-2004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779699" comment="libfreetype6-2.10.4-150000.4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206017" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214102" ref_url="https://bugzilla.suse.com/1214102" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40225" ref_url="https://www.suse.com/security/cve/CVE-2023-40225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016041.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2023-40225: Fixed request smuggling with empty content-length header value (bsc#1214102).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-29"/>
	<updated date="2023-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214102">SUSE bug 1214102</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40225/">CVE-2023-40225 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40225">CVE-2023-40225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779189" comment="haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206018" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214290" ref_url="https://bugzilla.suse.com/1214290" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4016" ref_url="https://www.suse.com/security/cve/CVE-2023-4016/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031239.html" source="SUSE-SU"/>
		<description>
This update for procps fixes the following issues:

  - CVE-2023-4016: Fixed ps buffer overflow (bsc#1214290).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-29"/>
	<updated date="2023-08-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214290">SUSE bug 1214290</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4016/">CVE-2023-4016 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778866" comment="libprocps7-3.3.15-150000.7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778867" comment="procps-3.3.15-150000.7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206019" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214566" ref_url="https://bugzilla.suse.com/1214566" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016065.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

- CVE-2023-20900: Fixed SAML token signature bypass vulnerability (bsc#1214566).

This update also ships a open-vm-tools-containerinfo plugin. (jsc#PED-3421)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-31"/>
	<updated date="2023-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214566">SUSE bug 1214566</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781037" comment="libvmtools0-12.2.0-150300.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781038" comment="open-vm-tools-12.2.0-150300.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206020" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210797" ref_url="https://bugzilla.suse.com/1210797" source="BUGZILLA"/>
		<reference ref_id="1212368" ref_url="https://bugzilla.suse.com/1212368" source="BUGZILLA"/>
		<reference ref_id="1213120" ref_url="https://bugzilla.suse.com/1213120" source="BUGZILLA"/>
		<reference ref_id="1213229" ref_url="https://bugzilla.suse.com/1213229" source="BUGZILLA"/>
		<reference ref_id="1213500" ref_url="https://bugzilla.suse.com/1213500" source="BUGZILLA"/>
		<reference ref_id="1214107" ref_url="https://bugzilla.suse.com/1214107" source="BUGZILLA"/>
		<reference ref_id="1214108" ref_url="https://bugzilla.suse.com/1214108" source="BUGZILLA"/>
		<reference ref_id="1214109" ref_url="https://bugzilla.suse.com/1214109" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28840" ref_url="https://www.suse.com/security/cve/CVE-2023-28840/" source="CVE"/>
		<reference ref_id="CVE-2023-28841" ref_url="https://www.suse.com/security/cve/CVE-2023-28841/" source="CVE"/>
		<reference ref_id="CVE-2023-28842" ref_url="https://www.suse.com/security/cve/CVE-2023-28842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016100.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

- Update to Docker 24.0.5-ce.

  See upstream changelong online at
  &lt;https://docs.docker.com/engine/release-notes/24.0/#2405&gt; bsc#1213229 

- Update to Docker 24.0.4-ce.

  See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/24.0/#2404&gt;. bsc#1213500

- Update to Docker 24.0.3-ce.

  See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/24.0/#2403&gt;. bsc#1213120

- Recommend docker-rootless-extras instead of Require(ing) it, given
  it's an additional functionality and not inherently required for
  docker to function.

- Add docker-rootless-extras subpackage (https://docs.docker.com/engine/security/rootless)

- Update to Docker 24.0.2-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/24.0/#2402&gt;. bsc#1212368

  * Includes the upstreamed fix for the mount table pollution issue.
    bsc#1210797

- Add Recommends for docker-buildx, and add /usr/lib/docker/cli-plugins as
  being provided by this package.

- was rebuilt against current GO compiler.

		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210797">SUSE bug 1210797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212368">SUSE bug 1212368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213120">SUSE bug 1213120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213229">SUSE bug 1213229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213500">SUSE bug 1213500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214107">SUSE bug 1214107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214108">SUSE bug 1214108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214109">SUSE bug 1214109</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28840/">CVE-2023-28840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28841/">CVE-2023-28841 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28841">CVE-2023-28841 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28842/">CVE-2023-28842 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28842">CVE-2023-28842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781414" comment="docker-24.0.5_ce-150000.185.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206021" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214527" ref_url="https://bugzilla.suse.com/1214527" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22218" ref_url="https://www.suse.com/security/cve/CVE-2020-22218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031382.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- CVE-2020-22218: Fixed a bug in _libssh2_packet_add() which allows to access out of bounds memory. (bsc#1214527)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-08"/>
	<updated date="2023-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214527">SUSE bug 1214527</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22218/">CVE-2020-22218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22218">CVE-2020-22218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780690" comment="libssh2-1-1.9.0-150000.4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206022" version="1" class="patch">
	<metadata>
		<title>Security update for icu73_2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1030253" ref_url="https://bugzilla.suse.com/1030253" source="BUGZILLA"/>
		<reference ref_id="1095425" ref_url="https://bugzilla.suse.com/1095425" source="BUGZILLA"/>
		<reference ref_id="1103893" ref_url="https://bugzilla.suse.com/1103893" source="BUGZILLA"/>
		<reference ref_id="1112183" ref_url="https://bugzilla.suse.com/1112183" source="BUGZILLA"/>
		<reference ref_id="1146907" ref_url="https://bugzilla.suse.com/1146907" source="BUGZILLA"/>
		<reference ref_id="1158955" ref_url="https://bugzilla.suse.com/1158955" source="BUGZILLA"/>
		<reference ref_id="1159131" ref_url="https://bugzilla.suse.com/1159131" source="BUGZILLA"/>
		<reference ref_id="1161007" ref_url="https://bugzilla.suse.com/1161007" source="BUGZILLA"/>
		<reference ref_id="1162882" ref_url="https://bugzilla.suse.com/1162882" source="BUGZILLA"/>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="1167603" ref_url="https://bugzilla.suse.com/1167603" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1182645" ref_url="https://bugzilla.suse.com/1182645" source="BUGZILLA"/>
		<reference ref_id="1192935" ref_url="https://bugzilla.suse.com/1192935" source="BUGZILLA"/>
		<reference ref_id="1193951" ref_url="https://bugzilla.suse.com/1193951" source="BUGZILLA"/>
		<reference ref_id="354372" ref_url="https://bugzilla.suse.com/354372" source="BUGZILLA"/>
		<reference ref_id="437293" ref_url="https://bugzilla.suse.com/437293" source="BUGZILLA"/>
		<reference ref_id="824262" ref_url="https://bugzilla.suse.com/824262" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="CVE-2020-21913" ref_url="https://www.suse.com/security/cve/CVE-2020-21913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3563-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016928.html" source="SUSE-SU"/>
		<description>
This update for icu73_2 fixes the following issues:

- Update to release 73.2

  * CLDR extends the support for “short” Chinese sort orders to
    cover some additional, required characters for Level 2. This
    is carried over into ICU collation.
  * ICU has a modified character conversion table, mapping some
    GB18030 characters to Unicode characters that were encoded
    after GB18030-2005.

- fixes builds where UCHAR_TYPE is re-defined such as libqt5-qtwebengine

- Update to release 73.1

  * Improved Japanese and Korean short-text line breaking
  * Reduction of C++ memory use in date formatting

- Update to release 72.1

  * Support for Unicode 15, including new characters, scripts,
    emoji, and corresponding API constants.
  * Support for CLDR 42 locale data with various additions and
    corrections.
  * Shift to tzdb 2022e. Pre-1970 data for a number of timezones
    has been removed.

- bump library packagename to libicu71 to match the version.

- update to 71.1:

  * updates to CLDR 41 locale data with various additions and corrections.
  * phrase-based line breaking for Japanese. Existing line breaking methods
    follow standards and conventions for body text but do not work well for
    short Japanese text, such as in titles and headings. This new feature is
    optimized for these use cases.
  * support for Hindi written in Latin letters (hi_Latn). The CLDR data for
    this increasingly popular locale has been significantly revised and
    expanded. Note that based on user expectations, hi_Latn incorporates a
    large amount of English, and can also be referred to as “Hinglish”.
  * time zone data updated to version 2022a. Note that pre-1970 data for a
    number of time zones has been removed, as has been the case in the upstream
    tzdata release since 2021b.

- ICU-21793 Fix ucptrietest golden diff [bsc#1192935]

- Update to release 70.1:

  * Unicode 14 (new characters, scripts, emoji, and API constants)
  * CLDR 40 (many additions and corrections)
  * Fixes for measurement unit formatting
  * Can now be built with up to C++20 compilers

- ICU-21613 Fix undefined behaviour in ComplexUnitsConverter::applyRounder

- Update to release 69.1

  * CLDR 39
  * For Norwegian, 'no' is back to being the canonical code, with
    'nb' treated as equivalent. This aligns handling of Norwegian
    with other macro language codes.
  * Binary prefixes in measurement units (KiB, MiB, etc.)
  * Time zone offsets from local time: New APIs
    BasicTimeZone::getOffsetFromLocal() (C++) and
    ucal_getTimeZoneOffsetFromLocal()

- Backport ICU-21366 (bsc#1182645)

- Update to release 68.2

  * Fix memory problem in FormattedStringBuilder
  * Fix assertion when setKeywordValue w/ long value.
  * Fix UBSan breakage on 8bit of rbbi
  * fix int32_t overflow in listFormat
  * Fix memory handling in MemoryPool::operator=()
  * Fix memory leak in AliasReplacer

- Add back icu.keyring, see https://unicode-org.atlassian.net/browse/ICU-21361 

Update to release 68.1:

  * CLDR 38
  * Measurement unit preferences
  * PluralRules selection for ranges of numbers
  * Locale ID canonicalization now conforms to the CLDR spec
    including edge cases
  * DateIntervalFormat supports output options such as capitalization
  * Measurement units are normalized in skeleton string output
  * Time zone data (tzdata) version 2020d

- Add the provides for libicu to Make .Net core can install 
  successfully. (bsc#1167603, bsc#1161007) 

Update to version 67.1:

  * Unicode 13 (ICU-20893, same as in ICU 66)

    + Total of 5930 new characters
    + 4 new scripts
    + 55 new emoji characters, plus additional new sequences
    + New CJK extension, first characters in plane 3: U+30000..U+3134A

  * CLDR 37

    + New language at Modern coverage: Nigerian Pidgin
    + New languages at Basic coverage: Fulah (Adlam), Maithili,
      Manipuri, Santali, Sindhi (Devanagari), Sundanese
    + Region containment: EU no longer includes GB
    + Unicode 13 root collation data and Chinese data for collation and transliteration
  * DateTimePatternGenerator now obeys the 'hc' preference in the locale identifier (ICU-20442)
  * Various other improvements for ECMA-402 conformance
  * Number skeletons have a new 'concise' form that can be used in MessageFormat strings (ICU-20418)
  * Currency formatting options for formal and other currency display name variants (ICU-20854)
  * ListFormatter: new public API to select the style &amp; type (ICU-12863)
  * ListFormatter now selects the proper “and”/“or” form for Spanish &amp; Hebrew (ICU-21016)
  * Locale ID canonicalization upgraded to implement the complete CLDR spec (ICU-20834, ICU-20272)
  * LocaleMatcher: New option to ignore one-way matches (ICU-20936),
    and other tweaks to the code (ICU-20916, ICU-20917) and data (from CLDR)
  * acceptLanguage() reimplemented via LocaleMatcher (ICU-20700)
  * Data build tool: tzdbNames.res moved from the 'zone_tree' category to the 'zone_supplemental' category (ICU-21073)
  * Fixed uses of u8'literals' broken by the C++20 introduction of the incompatible char8_t type (ICU-20972),
  * and added a few API overloads to reduce the need for reinterpret_cast (ICU-20984).
  * Support for manipulating CLDR 37 unit identifiers in MeasureUnit.
  * Fix potential integer overflow in UnicodeString:doAppend (bsc#1166844, CVE-2020-10531).

Update to version 66.1:

  * Unicode 13 support
  * Fix uses of u8'literals' broken by C++20 introduction of
    incompatible char8_t type. (ICU-20972)
  * use LocalMemory for cmd to prevent use after free
    (bsc#1193951 CVE-2020-21913).

- Remove /usr/lib(64)/icu/current [bsc#1158955].

Update to release 65.1 (jsc#SLE-11118):

  * Updated to CLDR 36 locale data with many additions and
    corrections, and some new measurement units.
  * The Java LocaleMatcher API is improved, and ported to C++.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2023-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1030253">SUSE bug 1030253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095425">SUSE bug 1095425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103893">SUSE bug 1103893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112183">SUSE bug 1112183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146907">SUSE bug 1146907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158955">SUSE bug 1158955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159131">SUSE bug 1159131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161007">SUSE bug 1161007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162882">SUSE bug 1162882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167603">SUSE bug 1167603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182645">SUSE bug 1182645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192935">SUSE bug 1192935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193951">SUSE bug 1193951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/354372">SUSE bug 354372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/437293">SUSE bug 437293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824262">SUSE bug 824262</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21913/">CVE-2020-21913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21913">CVE-2020-21913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781398" comment="libicu73_2-73.2-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781386" comment="libicu73_2-bedata-73.2-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781389" comment="libicu73_2-ledata-73.2-150000.1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206023" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214806" ref_url="https://bugzilla.suse.com/1214806" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4641" ref_url="https://www.suse.com/security/cve/CVE-2023-4641/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016140.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2023-4641: Fixed potential password leak (bsc#1214806).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-13"/>
	<updated date="2023-09-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214806">SUSE bug 1214806</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4641/">CVE-2023-4641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4641">CVE-2023-4641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009791547" comment="login_defs-4.8.1-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791548" comment="shadow-4.8.1-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206024" version="1" class="patch">
	<metadata>
		<title>Security update for gcc12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214052" ref_url="https://bugzilla.suse.com/1214052" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018046.html" source="SUSE-SU"/>
		<description>
This update for gcc12 fixes the following issues:

- CVE-2023-4039: Fixed incorrect stack protector for C99 VLAs on Aarch64 (bsc#1214052).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-18"/>
	<updated date="2023-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796564" comment="libgcc_s1-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796565" comment="libstdc++6-12.3.0+git1204-150000.1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206025" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214768" ref_url="https://bugzilla.suse.com/1214768" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39615" ref_url="https://www.suse.com/security/cve/CVE-2023-39615/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031569.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2023-39615: Fixed crafted xml can cause global buffer overflow (bsc#1214768).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214768">SUSE bug 1214768</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39615/">CVE-2023-39615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">CVE-2023-39615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009782053" comment="libxml2-2-2.9.14-150400.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782054" comment="libxml2-tools-2.9.14-150400.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782055" comment="python3-libxml2-2.9.14-150400.5.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206026" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214254" ref_url="https://bugzilla.suse.com/1214254" source="BUGZILLA"/>
		<reference ref_id="1215204" ref_url="https://bugzilla.suse.com/1215204" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360/" source="CVE"/>
		<reference ref_id="CVE-2023-4504" ref_url="https://www.suse.com/security/cve/CVE-2023-4504/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016253.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2023-4504: Fixed heap overflow in OpenPrinting CUPS Postscript Parsing (bsc#1215204).
- CVE-2023-32360: Fixed Information leak through Cups-Get-Document operation (bsc#1214254).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214254">SUSE bug 1214254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215204">SUSE bug 1215204</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4504/">CVE-2023-4504 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4504">CVE-2023-4504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797298" comment="cups-config-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797299" comment="libcups2-2.2.7-150000.3.51.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206027" version="1" class="patch">
	<metadata>
		<title>Security update for cni (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031750.html" source="SUSE-SU"/>
		<description>

This update of cni fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780980" comment="cni-0.7.1-150100.3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206028" version="1" class="patch">
	<metadata>
		<title>Security update for cni-plugins (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3816-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031749.html" source="SUSE-SU"/>
		<description>

This update of cni-plugins fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780981" comment="cni-plugins-0.8.6-150100.3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206029" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031748.html" source="SUSE-SU"/>
		<description>

This update of containerd fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781300" comment="containerd-1.6.21-150000.95.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206030" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1181477" ref_url="https://bugzilla.suse.com/1181477" source="BUGZILLA"/>
		<reference ref_id="1196933" ref_url="https://bugzilla.suse.com/1196933" source="BUGZILLA"/>
		<reference ref_id="1204942" ref_url="https://bugzilla.suse.com/1204942" source="BUGZILLA"/>
		<reference ref_id="1205533" ref_url="https://bugzilla.suse.com/1205533" source="BUGZILLA"/>
		<reference ref_id="1206402" ref_url="https://bugzilla.suse.com/1206402" source="BUGZILLA"/>
		<reference ref_id="1206608" ref_url="https://bugzilla.suse.com/1206608" source="BUGZILLA"/>
		<reference ref_id="1207543" ref_url="https://bugzilla.suse.com/1207543" source="BUGZILLA"/>
		<reference ref_id="1207598" ref_url="https://bugzilla.suse.com/1207598" source="BUGZILLA"/>
		<reference ref_id="1208928" ref_url="https://bugzilla.suse.com/1208928" source="BUGZILLA"/>
		<reference ref_id="1209979" ref_url="https://bugzilla.suse.com/1209979" source="BUGZILLA"/>
		<reference ref_id="1210015" ref_url="https://bugzilla.suse.com/1210015" source="BUGZILLA"/>
		<reference ref_id="1210950" ref_url="https://bugzilla.suse.com/1210950" source="BUGZILLA"/>
		<reference ref_id="1211598" ref_url="https://bugzilla.suse.com/1211598" source="BUGZILLA"/>
		<reference ref_id="1211599" ref_url="https://bugzilla.suse.com/1211599" source="BUGZILLA"/>
		<reference ref_id="1213127" ref_url="https://bugzilla.suse.com/1213127" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45154" ref_url="https://www.suse.com/security/cve/CVE-2022-45154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031743.html" source="SUSE-SU"/>
		<description>
This update for supportutils fixes the following issues:

Security fixes:

- CVE-2022-45154: Removed iSCSI passwords (bsc#1207598).

Other Fixes:

- Changes in version 3.1.26
  + powerpc plugin to collect the slots and active memory (bsc#1210950)
  + A Cleartext Storage of Sensitive Information vulnerability CVE-2022-45154
  + supportconfig: collect BPF information (pr#154)
  + Added additional iscsi information (pr#155)

- Added run time detection (bsc#1213127)

- Changes for supportutils version 3.1.25
  + Removed iSCSI passwords CVE-2022-45154 (bsc#1207598)
  + powerpc: Collect lsslot,amsstat, and opal elogs (pr#149)
  + powerpc: collect invscout logs (pr#150)
  + powerpc: collect RMC status logs (pr#151)
  + Added missing nvme nbft commands (bsc#1211599)
  + Fixed invalid nvme commands (bsc#1211598)
  + Added missing podman information (PED-1703, bsc#1181477)
  + Removed dependency on sysfstools
  + Check for systool use (bsc#1210015)
  + Added selinux checking (bsc#1209979)
  + Updated SLES_VER matrix

- Fixed missing status detail for apparmor (bsc#1196933)
- Corrected invalid argument list in docker.txt (bsc#1206608)
- Applies limit equally to sar data and text files (bsc#1207543)
- Collects hwinfo hardware logs (bsc#1208928)
- Collects lparnumascore logs (issue#148)

- Add dependency to `numactl` on ppc64le and `s390x`, this enforces
  that `numactl --hardware` data is provided in supportconfigs

- Changes to supportconfig.rc version 3.1.11-35
  + Corrected _sanitize_file to include iscsi.conf and others (bsc#1206402)

- Changes to supportconfig version 3.1.11-46.4
  + Added plymouth_info 

- Changes to getappcore version 1.53.02
  + The location of chkbin was updated earlier. This documents that
    change (bsc#1205533, bsc#1204942)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181477">SUSE bug 1181477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196933">SUSE bug 1196933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204942">SUSE bug 1204942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205533">SUSE bug 1205533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206402">SUSE bug 1206402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206608">SUSE bug 1206608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207543">SUSE bug 1207543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207598">SUSE bug 1207598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208928">SUSE bug 1208928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209979">SUSE bug 1209979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210015">SUSE bug 1210015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210950">SUSE bug 1210950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211598">SUSE bug 1211598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211599">SUSE bug 1211599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213127">SUSE bug 1213127</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-45154/">CVE-2022-45154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45154">CVE-2022-45154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781703" comment="supportutils-3.1.26-150300.7.35.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206031" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215026" ref_url="https://bugzilla.suse.com/1215026" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38039" ref_url="https://www.suse.com/security/cve/CVE-2023-38039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031742.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-38039: Fixed possible DoS when receiving too large HTTP header. (bsc#1215026)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215026">SUSE bug 1215026</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38039/">CVE-2023-38039 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38039">CVE-2023-38039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797300" comment="curl-8.0.1-150400.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797301" comment="libcurl4-8.0.1-150400.5.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206032" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214692" ref_url="https://bugzilla.suse.com/1214692" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031737.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794920" comment="libpython3_6m1_0-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794921" comment="python3-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794922" comment="python3-base-3.6.15-150300.10.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206033" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215145" ref_url="https://bugzilla.suse.com/1215145" source="BUGZILLA"/>
		<reference ref_id="1215474" ref_url="https://bugzilla.suse.com/1215474" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-34322" ref_url="https://www.suse.com/security/cve/CVE-2023-34322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031733.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).
- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215145">SUSE bug 1215145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215474">SUSE bug 1215474</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34322/">CVE-2023-34322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34322">CVE-2023-34322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796977" comment="xen-libs-4.16.5_04-150400.4.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206034" version="1" class="patch">
	<metadata>
		<title>Securitys update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1205927" ref_url="https://bugzilla.suse.com/1205927" source="BUGZILLA"/>
		<reference ref_id="1214850" ref_url="https://bugzilla.suse.com/1214850" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031730.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

Update to 12.3.0 (build 22234872) (bsc#1214850)

- There are no new features in the open-vm-tools 12.3.0 release. This is
  primarily a maintenance release that addresses a few critical problems,
  including:

  - This release integrates CVE-2023-20900 without the need for a patch.
    For more information on this vulnerability and its impact on VMware
    products, see
    https://www.vmware.com/security/advisories/VMSA-2023-0019.html.
  - A tools.conf configuration setting is available to temporaily direct
    Linux quiesced snaphots to restore pre open-vm-tools 12.2.0 behavior
    of ignoring file systems already frozen.
  - Building of the VMware Guest Authentication Service (VGAuth) using
    'xml-security-c' and 'xerces-c' is being deprecated.
  - A number of Coverity reported issues have been addressed.
  - A number of GitHub issues and pull requests have been handled.
    Please see the Resolves Issues section of the Release Notes.
  - For issues resolved in this release, see the Resolved Issues section
    of the Release Notes.
- For complete details, see:
  https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0
- Release Notes are available at
  https://github.com/vmware/open-vm-tools/blob/stable-12.3.0/ReleaseNotes.md
- The granular changes that have gone into the 12.3.0 release are in the
  ChangeLog at
  https://github.com/vmware/open-vm-tools/blob/stable-12.3.0/open-vm-tools/ChangeLog
- Fix (bsc#1205927) - hv_vmbus module is loaded unnecessarily in VMware guests
- jsc#PED-1344 - reinable building containerinfo plugin for SLES 15 SP4.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205927">SUSE bug 1205927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214850">SUSE bug 1214850</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797898" comment="libvmtools0-12.3.0-150300.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797899" comment="open-vm-tools-12.3.0-150300.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206035" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1193948" ref_url="https://bugzilla.suse.com/1193948" source="BUGZILLA"/>
		<reference ref_id="1210994" ref_url="https://bugzilla.suse.com/1210994" source="BUGZILLA"/>
		<reference ref_id="1212794" ref_url="https://bugzilla.suse.com/1212794" source="BUGZILLA"/>
		<reference ref_id="1212844" ref_url="https://bugzilla.suse.com/1212844" source="BUGZILLA"/>
		<reference ref_id="1212855" ref_url="https://bugzilla.suse.com/1212855" source="BUGZILLA"/>
		<reference ref_id="1213257" ref_url="https://bugzilla.suse.com/1213257" source="BUGZILLA"/>
		<reference ref_id="1213441" ref_url="https://bugzilla.suse.com/1213441" source="BUGZILLA"/>
		<reference ref_id="1213630" ref_url="https://bugzilla.suse.com/1213630" source="BUGZILLA"/>
		<reference ref_id="1213960" ref_url="https://bugzilla.suse.com/1213960" source="BUGZILLA"/>
		<reference ref_id="1214796" ref_url="https://bugzilla.suse.com/1214796" source="BUGZILLA"/>
		<reference ref_id="1214797" ref_url="https://bugzilla.suse.com/1214797" source="BUGZILLA"/>
		<reference ref_id="1215489" ref_url="https://bugzilla.suse.com/1215489" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20897" ref_url="https://www.suse.com/security/cve/CVE-2023-20897/" source="CVE"/>
		<reference ref_id="CVE-2023-20898" ref_url="https://www.suse.com/security/cve/CVE-2023-20898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031794.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Security issues fixed:

- CVE-2023-20897: Fixed DOS in minion return. (bsc#1214796, bsc#1213441)
- CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base
  name. (bsc#1214797, bsc#1193948)

Bugs fixed:

- Create minion_id with reproducible mtime
- Fix broken tests to make them running in the testsuite
- Fix detection of Salt codename by 'salt_version' execution module
- Fix inconsistency in reported version by egg-info metadata (bsc#1215489)
- Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844)
- Fix the regression of user.present state when group is unset (bsc#1212855)
- Fix utf8 handling in 'pass' renderer and make it more robust
- Fix zypper repositories always being reconfigured
- Make sure configured user is properly set by Salt (bsc#1210994)
- Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794)
- Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated responses
  (bsc#1213960, bsc#1213630, bsc#1213257)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-28"/>
	<updated date="2023-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193948">SUSE bug 1193948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210994">SUSE bug 1210994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212794">SUSE bug 1212794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212844">SUSE bug 1212844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212855">SUSE bug 1212855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213257">SUSE bug 1213257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213441">SUSE bug 1213441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213630">SUSE bug 1213630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213960">SUSE bug 1213960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214796">SUSE bug 1214796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214797">SUSE bug 1214797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215489">SUSE bug 1215489</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-20897/">CVE-2023-20897 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20897">CVE-2023-20897 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20898/">CVE-2023-20898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20898">CVE-2023-20898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797702" comment="python3-salt-3006.0-150400.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797703" comment="salt-3006.0-150400.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797704" comment="salt-minion-3006.0-150400.8.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797705" comment="salt-transactional-update-3006.0-150400.8.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206036" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016489.html" source="SUSE-SU"/>
		<description>

This update of runc fixes the following issues:

- Update to runc v1.1.8.

  Upstream changelog is available from
  &lt;https://github.com/opencontainers/runc/releases/tag/v1.1.8&gt;.

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781397" comment="runc-1.1.8-150000.49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206037" version="1" class="patch">
	<metadata>
		<title>Security update for mdadm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214244" ref_url="https://bugzilla.suse.com/1214244" source="BUGZILLA"/>
		<reference ref_id="1214245" ref_url="https://bugzilla.suse.com/1214245" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28736" ref_url="https://www.suse.com/security/cve/CVE-2023-28736/" source="CVE"/>
		<reference ref_id="CVE-2023-28938" ref_url="https://www.suse.com/security/cve/CVE-2023-28938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016488.html" source="SUSE-SU"/>
		<description>
This update for mdadm fixes the following issues:

- CVE-2023-28736: Fixed a buffer overflow (bsc#1214244).
- CVE-2023-28938: Fixed uncontrolled resource consumption (bsc#1214245).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214244">SUSE bug 1214244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214245">SUSE bug 1214245</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-28736/">CVE-2023-28736 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28736">CVE-2023-28736 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28938/">CVE-2023-28938 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28938">CVE-2023-28938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782049" comment="mdadm-4.1-150300.24.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206038" version="1" class="patch">
	<metadata>
		<title>Security update for libeconf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211078" ref_url="https://bugzilla.suse.com/1211078" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22652" ref_url="https://www.suse.com/security/cve/CVE-2023-22652/" source="CVE"/>
		<reference ref_id="CVE-2023-30078" ref_url="https://www.suse.com/security/cve/CVE-2023-30078/" source="CVE"/>
		<reference ref_id="CVE-2023-30079" ref_url="https://www.suse.com/security/cve/CVE-2023-30079/" source="CVE"/>
		<reference ref_id="CVE-2023-32181" ref_url="https://www.suse.com/security/cve/CVE-2023-32181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<description>
This update for libeconf fixes the following issues:

Update to version 0.5.2.

- CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in 'econf_writeFile' function (bsc#1211078).
- CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in 'read_file' function. (bsc#1211078)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22652/">CVE-2023-22652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22652">CVE-2023-22652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30078/">CVE-2023-30078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30078">CVE-2023-30078 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30079/">CVE-2023-30079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30079">CVE-2023-30079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32181/">CVE-2023-32181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32181">CVE-2023-32181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791545" comment="libeconf0-0.5.2-150400.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206039" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214922" ref_url="https://bugzilla.suse.com/1214922" source="BUGZILLA"/>
		<reference ref_id="1214924" ref_url="https://bugzilla.suse.com/1214924" source="BUGZILLA"/>
		<reference ref_id="1214925" ref_url="https://bugzilla.suse.com/1214925" source="BUGZILLA"/>
		<reference ref_id="1215004" ref_url="https://bugzilla.suse.com/1215004" source="BUGZILLA"/>
		<reference ref_id="1215006" ref_url="https://bugzilla.suse.com/1215006" source="BUGZILLA"/>
		<reference ref_id="1215033" ref_url="https://bugzilla.suse.com/1215033" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4733" ref_url="https://www.suse.com/security/cve/CVE-2023-4733/" source="CVE"/>
		<reference ref_id="CVE-2023-4734" ref_url="https://www.suse.com/security/cve/CVE-2023-4734/" source="CVE"/>
		<reference ref_id="CVE-2023-4735" ref_url="https://www.suse.com/security/cve/CVE-2023-4735/" source="CVE"/>
		<reference ref_id="CVE-2023-4738" ref_url="https://www.suse.com/security/cve/CVE-2023-4738/" source="CVE"/>
		<reference ref_id="CVE-2023-4752" ref_url="https://www.suse.com/security/cve/CVE-2023-4752/" source="CVE"/>
		<reference ref_id="CVE-2023-4781" ref_url="https://www.suse.com/security/cve/CVE-2023-4781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Security fixes:

- CVE-2023-4733: Fixed use-after-free in function buflist_altfpos (bsc#1215004). 
- CVE-2023-4734: Fixed segmentation fault in function f_fullcommand (bsc#1214925). 
- CVE-2023-4735: Fixed out of bounds write in ops.c (bsc#1214924). 
- CVE-2023-4738: Fixed heap buffer overflow in vim_regsub_both (bsc#1214922). 
- CVE-2023-4752: Fixed heap use-after-free in function ins_compl_get_exp (bsc#1215006). 
- CVE-2023-4781: Fixed heap buffer overflow in function vim_regsub_both (bsc#1215033).

Other fixes:

- Update to version 9.0 with patch level 1894,
  for the complete list of changes see https://github.com/vim/vim/compare/v9.0.1443...v9.0.1894
- Use app icons generated from vimlogo.eps in the source tarball;
  add higher resolution icons of sizes 128x128, 256x256, and 512x512 as png sources
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214922">SUSE bug 1214922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214924">SUSE bug 1214924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214925">SUSE bug 1214925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215004">SUSE bug 1215004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215006">SUSE bug 1215006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215033">SUSE bug 1215033</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4733/">CVE-2023-4733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4733">CVE-2023-4733 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4734/">CVE-2023-4734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4734">CVE-2023-4734 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4735/">CVE-2023-4735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4735">CVE-2023-4735 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4738/">CVE-2023-4738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4738">CVE-2023-4738 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4752/">CVE-2023-4752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4752">CVE-2023-4752 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4781/">CVE-2023-4781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4781">CVE-2023-4781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796768" comment="vim-data-common-9.0.1894-150000.5.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797297" comment="vim-small-9.0.1894-150000.5.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206040" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215683" ref_url="https://bugzilla.suse.com/1215683" source="BUGZILLA"/>
		<reference ref_id="1215684" ref_url="https://bugzilla.suse.com/1215684" source="BUGZILLA"/>
		<reference ref_id="1215685" ref_url="https://bugzilla.suse.com/1215685" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43785" ref_url="https://www.suse.com/security/cve/CVE-2023-43785/" source="CVE"/>
		<reference ref_id="CVE-2023-43786" ref_url="https://www.suse.com/security/cve/CVE-2023-43786/" source="CVE"/>
		<reference ref_id="CVE-2023-43787" ref_url="https://www.suse.com/security/cve/CVE-2023-43787/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031904.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2023-43786: Fixed stack exhaustion from infinite recursion in PutSubImage() (bsc#1215684).
- CVE-2023-43787: Fixed integer overflow in XCreateImage() leading to a heap overflow (bsc#1215685).
- CVE-2023-43785: Fixed out-of-bounds memory access in _XkbReadKeySyms() (bsc#1215683).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2023-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215683">SUSE bug 1215683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215684">SUSE bug 1215684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215685">SUSE bug 1215685</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43785/">CVE-2023-43785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43785">CVE-2023-43785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43786/">CVE-2023-43786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43786">CVE-2023-43786 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-43787/">CVE-2023-43787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43787">CVE-2023-43787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799872" comment="libX11-6-1.6.5-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799824" comment="libX11-data-1.6.5-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799873" comment="libX11-xcb1-1.6.5-150000.3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206041" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1120059" ref_url="https://bugzilla.suse.com/1120059" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1208902" ref_url="https://bugzilla.suse.com/1208902" source="BUGZILLA"/>
		<reference ref_id="1208949" ref_url="https://bugzilla.suse.com/1208949" source="BUGZILLA"/>
		<reference ref_id="1209284" ref_url="https://bugzilla.suse.com/1209284" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1210048" ref_url="https://bugzilla.suse.com/1210048" source="BUGZILLA"/>
		<reference ref_id="1210448" ref_url="https://bugzilla.suse.com/1210448" source="BUGZILLA"/>
		<reference ref_id="1212091" ref_url="https://bugzilla.suse.com/1212091" source="BUGZILLA"/>
		<reference ref_id="1212142" ref_url="https://bugzilla.suse.com/1212142" source="BUGZILLA"/>
		<reference ref_id="1212526" ref_url="https://bugzilla.suse.com/1212526" source="BUGZILLA"/>
		<reference ref_id="1212857" ref_url="https://bugzilla.suse.com/1212857" source="BUGZILLA"/>
		<reference ref_id="1212873" ref_url="https://bugzilla.suse.com/1212873" source="BUGZILLA"/>
		<reference ref_id="1213026" ref_url="https://bugzilla.suse.com/1213026" source="BUGZILLA"/>
		<reference ref_id="1213123" ref_url="https://bugzilla.suse.com/1213123" source="BUGZILLA"/>
		<reference ref_id="1213546" ref_url="https://bugzilla.suse.com/1213546" source="BUGZILLA"/>
		<reference ref_id="1213580" ref_url="https://bugzilla.suse.com/1213580" source="BUGZILLA"/>
		<reference ref_id="1213601" ref_url="https://bugzilla.suse.com/1213601" source="BUGZILLA"/>
		<reference ref_id="1213666" ref_url="https://bugzilla.suse.com/1213666" source="BUGZILLA"/>
		<reference ref_id="1213757" ref_url="https://bugzilla.suse.com/1213757" source="BUGZILLA"/>
		<reference ref_id="1213759" ref_url="https://bugzilla.suse.com/1213759" source="BUGZILLA"/>
		<reference ref_id="1213916" ref_url="https://bugzilla.suse.com/1213916" source="BUGZILLA"/>
		<reference ref_id="1213921" ref_url="https://bugzilla.suse.com/1213921" source="BUGZILLA"/>
		<reference ref_id="1213927" ref_url="https://bugzilla.suse.com/1213927" source="BUGZILLA"/>
		<reference ref_id="1213946" ref_url="https://bugzilla.suse.com/1213946" source="BUGZILLA"/>
		<reference ref_id="1213968" ref_url="https://bugzilla.suse.com/1213968" source="BUGZILLA"/>
		<reference ref_id="1213970" ref_url="https://bugzilla.suse.com/1213970" source="BUGZILLA"/>
		<reference ref_id="1213971" ref_url="https://bugzilla.suse.com/1213971" source="BUGZILLA"/>
		<reference ref_id="1214000" ref_url="https://bugzilla.suse.com/1214000" source="BUGZILLA"/>
		<reference ref_id="1214019" ref_url="https://bugzilla.suse.com/1214019" source="BUGZILLA"/>
		<reference ref_id="1214120" ref_url="https://bugzilla.suse.com/1214120" source="BUGZILLA"/>
		<reference ref_id="1214149" ref_url="https://bugzilla.suse.com/1214149" source="BUGZILLA"/>
		<reference ref_id="1214180" ref_url="https://bugzilla.suse.com/1214180" source="BUGZILLA"/>
		<reference ref_id="1214238" ref_url="https://bugzilla.suse.com/1214238" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1214297" ref_url="https://bugzilla.suse.com/1214297" source="BUGZILLA"/>
		<reference ref_id="1214299" ref_url="https://bugzilla.suse.com/1214299" source="BUGZILLA"/>
		<reference ref_id="1214350" ref_url="https://bugzilla.suse.com/1214350" source="BUGZILLA"/>
		<reference ref_id="1214368" ref_url="https://bugzilla.suse.com/1214368" source="BUGZILLA"/>
		<reference ref_id="1214370" ref_url="https://bugzilla.suse.com/1214370" source="BUGZILLA"/>
		<reference ref_id="1214371" ref_url="https://bugzilla.suse.com/1214371" source="BUGZILLA"/>
		<reference ref_id="1214372" ref_url="https://bugzilla.suse.com/1214372" source="BUGZILLA"/>
		<reference ref_id="1214380" ref_url="https://bugzilla.suse.com/1214380" source="BUGZILLA"/>
		<reference ref_id="1214386" ref_url="https://bugzilla.suse.com/1214386" source="BUGZILLA"/>
		<reference ref_id="1214392" ref_url="https://bugzilla.suse.com/1214392" source="BUGZILLA"/>
		<reference ref_id="1214393" ref_url="https://bugzilla.suse.com/1214393" source="BUGZILLA"/>
		<reference ref_id="1214397" ref_url="https://bugzilla.suse.com/1214397" source="BUGZILLA"/>
		<reference ref_id="1214428" ref_url="https://bugzilla.suse.com/1214428" source="BUGZILLA"/>
		<reference ref_id="1214451" ref_url="https://bugzilla.suse.com/1214451" source="BUGZILLA"/>
		<reference ref_id="1214635" ref_url="https://bugzilla.suse.com/1214635" source="BUGZILLA"/>
		<reference ref_id="1214659" ref_url="https://bugzilla.suse.com/1214659" source="BUGZILLA"/>
		<reference ref_id="1214661" ref_url="https://bugzilla.suse.com/1214661" source="BUGZILLA"/>
		<reference ref_id="1214729" ref_url="https://bugzilla.suse.com/1214729" source="BUGZILLA"/>
		<reference ref_id="1214742" ref_url="https://bugzilla.suse.com/1214742" source="BUGZILLA"/>
		<reference ref_id="1214743" ref_url="https://bugzilla.suse.com/1214743" source="BUGZILLA"/>
		<reference ref_id="1214756" ref_url="https://bugzilla.suse.com/1214756" source="BUGZILLA"/>
		<reference ref_id="1215522" ref_url="https://bugzilla.suse.com/1215522" source="BUGZILLA"/>
		<reference ref_id="1215523" ref_url="https://bugzilla.suse.com/1215523" source="BUGZILLA"/>
		<reference ref_id="1215552" ref_url="https://bugzilla.suse.com/1215552" source="BUGZILLA"/>
		<reference ref_id="1215553" ref_url="https://bugzilla.suse.com/1215553" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2007" ref_url="https://www.suse.com/security/cve/CVE-2023-2007/" source="CVE"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-34319" ref_url="https://www.suse.com/security/cve/CVE-2023-34319/" source="CVE"/>
		<reference ref_id="CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4133" ref_url="https://www.suse.com/security/cve/CVE-2023-4133/" source="CVE"/>
		<reference ref_id="CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134/" source="CVE"/>
		<reference ref_id="CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147/" source="CVE"/>
		<reference ref_id="CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194/" source="CVE"/>
		<reference ref_id="CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273/" source="CVE"/>
		<reference ref_id="CVE-2023-4387" ref_url="https://www.suse.com/security/cve/CVE-2023-4387/" source="CVE"/>
		<reference ref_id="CVE-2023-4459" ref_url="https://www.suse.com/security/cve/CVE-2023-4459/" source="CVE"/>
		<reference ref_id="CVE-2023-4569" ref_url="https://www.suse.com/security/cve/CVE-2023-4569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<description>
 The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel (bsc#1210448).
- CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality (bsc#1213927).
- CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in xen/netback (XSA-432) (bsc#1213546).
- CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580).
- CVE-2023-37453: Fixed oversight in SuperSpeed initialization  (bsc#1213123).
- CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service (bsc#1213666).
- CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local that allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).
- CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue (bsc#1214149).
- CVE-2023-4133: Fixed use after free bugs caused by circular dependency problem in cxgb4 (bsc#1213970).
- CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work() (bsc#1213971).
- CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1213968).
- CVE-2023-4194: Fixed a type confusion in net tun_chr_open() (bsc#1214019).
- CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214120).
- CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that could allow a local attacker to crash the system due to a double-free (bsc#1214350).
- CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup that may have allowed a local attacker with normal user privilege to cause a denial of service (bsc#1214451).
- CVE-2023-4569: Fixed information leak in nft_set_catchall_flush in net/netfilter/nf_tables_api.c (bsc#1214729).

The following non-security bugs were fixed:

- Drop amdgpu patch causing spamming (bsc#1215523)
- acpi: processor: perflib: avoid updating frequency qos unnecessarily (git-fixes).
- acpi: processor: perflib: use the 'no limit' frequency qos (git-fixes).
- acpi: x86: s2idle: fix a logic error parsing amd constraints table (git-fixes).
- alsa: ac97: fix possible error value of *rac97 (git-fixes).
- alsa: hda/cs8409: support new dell dolphin variants (git-fixes).
- alsa: hda/realtek - remodified 3k pull low procedure (git-fixes).
- alsa: hda/realtek: add quirk for hp victus 16-d1xxx to enable mute led (git-fixes).
- alsa: hda/realtek: add quirk for mute leds on hp envy x360 15-eu0xxx (git-fixes).
- alsa: hda/realtek: add quirks for hp g11 laptops (git-fixes).
- alsa: hda/realtek: switch dell oasis models to use spi (git-fixes).
- alsa: pcm: fix missing fixup call in compat hw_refine ioctl (git-fixes).
- alsa: usb-audio: add support for mythware xa001au capture and playback interfaces (git-fixes).
- alsa: usb-audio: fix init call orders for uac1 (git-fixes).
- alsa: ymfpci: fix the missing snd_card_free() call at probe error (git-fixes).
- amba: bus: fix refcount leak (git-fixes).
- arm64: dts: imx8mn-var-som: add missing pull-up for onboard phy reset pinmux (git-fixes).
- arm64: dts: qcom: qrb5165-rb5: fix thermal zone conflict (git-fixes).
- arm64: dts: rockchip: disable hs400 for emmc on rock pi 4 (git-fixes).
- arm: dts: imx6dl: prtrvt, prtvt7, prti6q, prtwd2: fix usb related warnings (git-fixes).
- arm: dts: imx6sll: fixup of operating points (git-fixes).
- arm: spear: do not use timer namespace for timer_shutdown() function (bsc#1213970).
- asoc: lower 'no backend dais enabled for ... port' log severity (git-fixes).
- asoc: meson: axg-tdm-formatter: fix channel slot allocation (git-fixes).
- asoc: rt5665: add missed regulator_bulk_disable (git-fixes).
- asoc: sof: intel: fix soundwire/hdaudio mutual exclusion (git-fixes).
- asoc: stac9766: fix build errors with regmap_ac97 (git-fixes).
- asoc: tegra: fix sfc conversion for few rates (git-fixes).
- audit: fix possible soft lockup in __audit_inode_child() (git-fixes).
- backlight/bd6107: compare against struct fb_info.device (git-fixes).
- backlight/gpio_backlight: compare against struct fb_info.device (git-fixes).
- backlight/lv5207lp: compare against struct fb_info.device (git-fixes).
- batman-adv: do not get eth header before batadv_check_management_packet (git-fixes).
- batman-adv: do not increase mtu when set by user (git-fixes).
- batman-adv: fix batadv_v_ogm_aggr_send memory leak (git-fixes).
- batman-adv: fix tt global entry leak when client roamed back (git-fixes).
- batman-adv: hold rtnl lock during mtu update via netlink (git-fixes).
- batman-adv: trigger events for auto adjusted mtu (git-fixes).
- bluetooth: btusb: add mt7922 bluetooth id for the asus ally (git-fixes).
- bluetooth: btusb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- bluetooth: fix potential use-after-free when clear keys (git-fixes).
- bluetooth: l2cap: fix use-after-free (git-fixes).
- bluetooth: l2cap: fix use-after-free in l2cap_sock_ready_cb (git-fixes).
- bluetooth: nokia: fix value check in nokia_bluetooth_serdev_probe() (git-fixes).
- bluetooth: remove unused declaration amp_read_loc_info() (git-fixes).
- bnx2x: fix page fault following eeh recovery (bsc#1214299).
- bpf: disable preemption in bpf_event_output (git-fixes).
- bus: ti-sysc: fix build warning for 64-bit build (git-fixes).
- bus: ti-sysc: fix cast to enum warning (git-fixes).
- bus: ti-sysc: flush posted write on enable before reset (git-fixes).
- can: gs_usb: gs_usb_receive_bulk_callback(): count rx overflow errors also in case of oom (git-fixes).
- ceph: defer stopping mdsc delayed_work (bsc#1214392).
- ceph: do not check for quotas on mds stray dirs (bsc#1214238).
- ceph: never send metrics if disable_send_metrics is set (bsc#1214180).
- check-for-config-changes: ignore builtin_return_address_strips_pac (bsc#1214380). gcc7 on sle 15 does not support this while later gcc does.
- cifs: add missing return value check for cifs_sb_tlink (bsc#1193629).
- cifs: allow dumping keys for directories too (bsc#1193629).
- cifs: fix mid leak during reconnection after timeout threshold (git-fixes).
- cifs: if deferred close is disabled then close files immediately (git-fixes).
- cifs: is_network_name_deleted should return a bool (bsc#1193629).
- cifs: update internal module version number for cifs.ko (bsc#1193629).
- clk: fix slab-out-of-bounds error in devm_clk_release() (git-fixes).
- clk: fix undefined reference to `clk_rate_exclusive_{get,put}' (git-fixes).
- clk: imx8mp: fix sai4 clock (git-fixes).
- clk: imx: composite-8m: fix clock pauses when set_rate would be a no-op (git-fixes).
- clk: imx: pll14xx: dynamically configure pll for 393216000/361267200hz (git-fixes).
- clk: qcom: camcc-sc7180: fix async resume during probe (git-fixes).
- clk: qcom: gcc-mdm9615: use proper parent for pll0_vote clock (git-fixes).
- clk: qcom: gcc-sc7180: fix up gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: gcc-sm8250: fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: sunxi-ng: modify mismatched function name (git-fixes).
- clocksource/drivers/arm_arch_timer: do not use timer namespace for timer_shutdown() function (bsc#1213970).
- clocksource/drivers/sp804: do not use timer namespace for timer_shutdown() function (bsc#1213970).
- config_nvme_verbose_errors=y     gone with a82baa8083b
- config_printk_safe_log_buf_shift=13  gone with 7e152d55123
- cpu/smt: allow enabling partial smt states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/smt: create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/smt: move smt prototypes into cpu_smt.h (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/smt: move smt/control simple exit cases earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/smt: remove topology_smt_supported() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/smt: store the current/max number of threads (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpufreq: fix the race condition while updating the transition_task of policy (git-fixes).
- cpufreq: intel_pstate: adjust balance_performance epp for sapphire rapids (bsc#1214659).
- cpufreq: intel_pstate: enable hwp io boost for all servers (bsc#1208949 jsc#ped-6003 jsc#ped-6004).
- cpufreq: intel_pstate: fix scaling for hybrid-capable systems with disabled e-cores (bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
- cpufreq: intel_pstate: hybrid: rework hwp calibration (bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
- cpufreq: intel_pstate: hybrid: use known scaling factor for p-cores (bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
- cpufreq: intel_pstate: read all msrs on the target cpu (bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
- created new preempt kernel flavor configs are cloned from the respective $arch/default configs. all changed configs appart from config_preempt-&gt;y are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. tree_rcu has been also changed to preempt_rcu which is the default implementation for preempt kernel.
- crypto: caam - fix unchecked return value error (git-fixes).
- crypto: stm32 - properly handle pm_runtime_get failing (git-fixes).
- dma-buf/sw_sync: avoid recursive lock during fence signal (git-fixes).
- dma-buf/sync_file: fix docs syntax (git-fixes).
- dmaengine: idxd: modify the dependence of attribute pasid_enabled (git-fixes).
- dmaengine: mcf-edma: fix a potential un-allocated memory access (git-fixes).
- dmaengine: pl330: return dma_paused when transaction is paused (git-fixes).
- dmaengine: ste_dma40: add missing irq check in d40_probe (git-fixes).
- docs/process/howto: replace c89 with c11 (bsc#1214756).
- docs: kernel-parameters: refer to the correct bitmap function (git-fixes).
- docs: networking: replace skb_hwtstamp_tx with skb_tstamp_tx (git-fixes).
- docs: printk-formats: fix hex printing of signed values (git-fixes).
- documentation: devices.txt: fix minors for ttycpm* (git-fixes).
- documentation: devices.txt: remove ttyioc* (git-fixes).
- documentation: devices.txt: remove ttysioc* (git-fixes).
- driver core: test_async: fix an error code (git-fixes).
- drivers: clk: keystone: fix parameter judgment in _of_pll_clk_init() (git-fixes).
- drivers: usb: smsusb: fix error handling code in smsusb_init_device (git-fixes).
- drm/amd/display: check attr flag before set cursor degamma on dcn3+ (git-fixes).
- drm/amd/display: check tg is non-null before checking if enabled (git-fixes).
- drm/amd/display: do not wait for mpc idle if tg is disabled (git-fixes).
- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).
- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).
- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).
- drm/amd/pm: fix variable dereferenced issue in amdgpu_device_attr_create() (git-fixes).
- drm/amd: flush any delayed gfxoff on suspend entry (git-fixes).
- drm/amdgpu: avoid integer overflow warning in amdgpu_device_resize_fb_bar() (git-fixes).
- drm/amdgpu: fix potential fence use-after-free v2 (git-fixes).
- drm/amdgpu: install stub fence into potential unused fence pointers (git-fixes).
- drm/amdgpu: use rmw accessors for changing lnkctl (git-fixes).
- drm/armada: fix off-by-one error in armada_overlay_get_property() (git-fixes).
- drm/ast: fix dram init on ast2200 (git-fixes).
- drm/atomic-helper: update reference to drm_crtc_force_disable_all() (git-fixes).
- drm/bridge: anx7625: drop device lock before drm_helper_hpd_irq_event() (git-fixes).
- drm/bridge: fix -wunused-const-variable= warning (git-fixes).
- drm/bridge: tc358764: fix debug print parameter order (git-fixes).
- drm/etnaviv: fix dumping of active mmu context (git-fixes).
- drm/mediatek: fix dereference before null check (git-fixes).
- drm/mediatek: fix potential memory leak if vmap() fail (git-fixes).
- drm/msm/a2xx: call adreno_gpu_init() earlier (git-fixes).
- drm/msm/mdp5: do not leak some plane state (git-fixes).
- drm/msm: update dev core dump to not print backwards (git-fixes).
- drm/nouveau/disp: revert a null check inside nouveau_connector_get_modes (git-fixes).
- drm/nouveau/gr: enable memory loads on helper invocation on all channels (git-fixes).
- drm/panel: simple: add missing connector type and pixel format for auo t215hvn01 (git-fixes).
- drm/panel: simple: fix auo g121ean01 panel timings according to the docs (git-fixes).
- drm/qxl: fix uaf on handle creation (git-fixes).
- drm/radeon: use rmw accessors for changing lnkctl (git-fixes).
- drm/rockchip: do not spam logs in atomic check (git-fixes).
- drm/shmem-helper: reset vma-&gt;vm_ops before calling dma_buf_mmap() (git-fixes).
- drm/tegra: dpaux: fix incorrect return value of platform_get_irq (git-fixes).
- drm/ttm: check null pointer before accessing when swapping (git-fixes).
- drm/ttm: never consider pinned bos for eviction&amp;swap (git-fixes).
- drm/vmwgfx: fix shader stage validation (git-fixes).
- drm: adv7511: fix low refresh rate register for adv7533/5 (git-fixes).
- drm: xlnx: zynqmp_dpsub: add missing check for dma_set_mask (git-fixes).
- drop cfg80211 lock fix patches that caused a regression (bsc#1213757)
- drop rtsx patch that caused a regression (bsc#1214397,bsc#1214428)
- dt-bindings: clock: xlnx,versal-clk: drop select:false (git-fixes).
- dt-bindings: clocks: imx8mp: make sai4 a dummy clock (git-fixes).
- dt-bindings: crypto: ti,sa2ul: make power-domains conditional (git-fixes).
- e1000: fix typos in comments (jsc#ped-5738).
- e1000: remove unnecessary use of kmap_atomic() (jsc#ped-5738).
- e1000: switch to napi_build_skb() (jsc#ped-5738).
- e1000: switch to napi_consume_skb() (jsc#ped-5738).
- enable analog devices industrial ethernet phy driver (jsc#ped-4759)
- exfat: fix unexpected eof while reading dir (bsc#1214000).
- exfat: release s_lock before calling dir_emit() (bsc#1214000).
- exfat_iterate(): do not open-code file_inode(file) (bsc#1214000).
- fbdev/ep93xx-fb: do not assign to struct fb_info.dev (git-fixes).
- fbdev: fix potential oob read in fast_imageblit() (git-fixes).
- fbdev: fix sys_imageblit() for arbitrary image widths (git-fixes).
- fbdev: improve performance of sys_imageblit() (git-fixes).
- fbdev: mmp: fix value check in mmphw_probe() (git-fixes).
- file: reinstate f_pos locking optimization for regular files (bsc#1213759).
- firmware: arm_scmi: drop of node reference in the transport channel setup (git-fixes).
- firmware: cs_dsp: fix new control name check (git-fixes).
- firmware: meson_sm: fix to avoid potential null pointer dereference (git-fixes).
- firmware: stratix10-svc: fix an null vs is_err() bug in probe (git-fixes).
- fs/sysv: null check to prevent null-ptr-deref bug (git-fixes).
- ftrace: fix possible warning on checking all pages used in ftrace_process_locs() (git-fixes).
- gpio: mvebu: fix irq domain leak (git-fixes).
- gpio: mvebu: make use of devm_pwmchip_add (git-fixes).
- gpio: tps68470: make tps68470_gpio_output() always set the initial value (git-fixes).
- hid: add quirk for 03f0:464a hp elite presenter mouse (git-fixes).
- hid: logitech-dj: fix error handling in logi_dj_recv_switch_to_dj_mode() (git-fixes).
- hid: logitech-hidpp: add usb and bluetooth ids for the logitech g915 tkl keyboard (git-fixes).
- hid: multitouch: correct devm device reference for hidinput input_dev name (git-fixes).
- hid: wacom: remove the battery when the ekr is off (git-fixes).
- hwmon: (pmbus/bel-pfe) enable pmbus_skip_status_check for pfe1100 (git-fixes).
- hwmon: (tmp513) fix the channel number in tmp51x_is_visible() (git-fixes).
- hwpoison: offline support: fix spelling in documentation/abi/ (git-fixes).
- hwrng: iproc-rng200 - implement suspend and resume calls (git-fixes).
- hwrng: nomadik - keep clock enabled while hwrng is registered (git-fixes).
- hwrng: pic32 - use devm_clk_get_enabled (git-fixes).
- i2c: bcm-iproc: fix bcm_iproc_i2c_isr deadlock issue (git-fixes).
- i2c: delete error messages for failed memory allocations (git-fixes).
- i2c: designware: correct length byte validation logic (git-fixes).
- i2c: designware: handle invalid smbus block data response length value (git-fixes).
- i2c: hisi: only handle the interrupt of the driver's transfer (git-fixes).
- i2c: improve size determinations (git-fixes).
- i2c: nomadik: remove a useless call in the remove function (git-fixes).
- i2c: nomadik: remove unnecessary goto label (git-fixes).
- i2c: nomadik: use devm_clk_get_enabled() (git-fixes).
- i40e: fix an null vs is_err() bug for debugfs_create_dir() (git-fixes).
- iavf: fix potential races for fdir filters (git-fixes).
- ib/hfi1: fix possible panic during hotplug remove (git-fixes)
- ib/uverbs: fix an potential error pointer dereference (git-fixes)
- ice: fix crash by keep old cfg when update tcs more than queues (git-fixes).
- ice: fix max_rate check while configuring tx rate limits (git-fixes).
- ice: fix memory management in ice_ethtool_fdir.c (git-fixes).
- ice: fix rdma vsi removal during queue rebuild (git-fixes).
- iio: adc: ina2xx: avoid null pointer dereference on of device match (git-fixes).
- iio: adc: stx104: implement and utilize register structures (git-fixes).
- iio: adc: stx104: utilize iomap interface (git-fixes).
- iio: cros_ec: fix the allocation size for cros_ec_command (git-fixes).
- input: exc3000 - properly stop timer on shutdown (git-fixes).
- intel/e1000:fix repeated words in comments (jsc#ped-5738).
- intel: remove unused macros (jsc#ped-5738).
- iommu/amd: add pci segment support for ivrs_ commands (git-fixes).
- iommu/amd: fix compile warning in init code (git-fixes).
- iommu/amd: fix ill-formed ivrs_ioapic, ivrs_hpet and ivrs_acpihid options (git-fixes).
- iommu/amd: fix ivrs_acpihid cmdline parsing code (git-fixes).
- iommu/amd: fix pci device refcount leak in ppr_notifier() (git-fixes).
- iommu/amd: use full 64-bit value in build_completion_wait() (git-fixes).
- iommu/arm-smmu-v3: check return value after calling platform_get_resource() (git-fixes).
- iommu/arm-smmu-v3: fix event handling soft lockup (git-fixes).
- iommu/arm-smmu-v3: make default domain type of hisilicon ptt device to identity (git-fixes).
- iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() (git-fixes).
- iommu/dart: initialize dart_streams_enable (git-fixes).
- iommu/dma: fix incorrect error return on iommu deferred attach (git-fixes).
- iommu/dma: fix iova map result check bug (git-fixes).
- iommu/dma: return error code from iommu_dma_map_sg() (git-fixes).
- iommu/fsl_pamu: fix resource leak in fsl_pamu_probe() (git-fixes).
- iommu/io-pgtable-arm-v7s: add a quirk to allow pgtable pa up to 35bit (git-fixes).
- iommu/iova: fix module config properly (git-fixes).
- iommu/omap: fix buffer overflow in debugfs (git-fixes).
- iommu/rockchip: fix permission bits in page table entries v2 (git-fixes).
- iommu/sun50i: consider all fault sources for reset (git-fixes).
- iommu/sun50i: fix flush size (git-fixes).
- iommu/sun50i: fix r/w permission check (git-fixes).
- iommu/sun50i: fix reset release (git-fixes).
- iommu/sun50i: implement .iotlb_sync_map (git-fixes).
- iommu/sun50i: remove iommu_domain_identity (git-fixes).
- iommu/vt-d: add rpls to quirk list to skip te disabling (git-fixes).
- iommu/vt-d: check correct capability for sagaw determination (git-fixes).
- iommu/vt-d: clean up si_domain in the init_dmars() error path (git-fixes).
- iommu/vt-d: correctly calculate sagaw value of iommu (git-fixes).
- iommu/vt-d: fix kdump kernels boot failure with scalable mode (git-fixes).
- iommu/vt-d: fix pci device refcount leak in dmar_dev_scope_init() (git-fixes).
- iommu/vt-d: fix pci device refcount leak in has_external_pci() (git-fixes).
- iommu/vt-d: preset access bit for iova in fl non-leaf paging entries (git-fixes).
- iommu/vt-d: set sre bit only when hardware has srs cap (git-fixes).
- ipmi:ssif: add check for kstrdup (git-fixes).
- ipmi:ssif: fix a memory leak when scanning for an adapter (git-fixes).
- ipmi_si: fix a memleak in try_smi_init() (git-fixes).
- jffs2: correct logic when creating a hole in jffs2_write_begin (git-fixes).
- kabi/severities: ignore newly added srso mitigation functions
- kabi: allow extra bugsints (bsc#1213927).
- kbuild: add -wno-shift-negative-value where -wextra is used (bsc#1214756).
- kbuild: move to -std=gnu11 (bsc#1214756).
- kernel-binary: common dependencies cleanup common dependencies are copied to a subpackage, there is no need for copying defines or build dependencies there.
- kernel-binary: drop code for kerntypes support kerntypes was a suse-specific feature dropped before sle 12.
- kunit: make kunit_test_timeout compatible with comment (git-fixes).
- kvm: s390: fix sthyi error handling (git-fixes bsc#1214370).
- leds: fix bug_on check for led_color_id_multi that is always false (git-fixes).
- leds: multicolor: use rounded division when calculating color components (git-fixes).
- leds: pwm: fix error code in led_pwm_create_fwnode() (git-fixes).
- leds: trigger: tty: do not use led_on/off constants, use led_blink_set_oneshot instead (git-fixes).
- leds: turris-omnia: drop unnecessary mutex locking (git-fixes).
- lib/test_meminit: allocate pages up to order max_order (git-fixes).
- lib/test_meminit: destroy cache in kmem_cache_alloc_bulk() test (git-fixes).
- libceph: fix potential hang in ceph_osdc_notify() (bsc#1214393).
- md/raid0: factor out helper for mapping and submitting a bio (bsc#1213916).
- md/raid0: fix performance regression for large sequential writes (bsc#1213916).
- media: ad5820: drop unsupported ad5823 from i2c_ and of_device_id tables (git-fixes).
- media: cx24120: add retval check for cx24120_message_send() (git-fixes).
- media: dib7000p: fix potential division by zero (git-fixes).
- media: dvb-usb: m920x: fix a potential memory leak in m920x_i2c_xfer() (git-fixes).
- media: go7007: remove redundant if statement (git-fixes).
- media: i2c: ccs: check rules is non-null (git-fixes).
- media: i2c: rdacm21: fix uninitialized value (git-fixes).
- media: i2c: tvp5150: check return value of devm_kasprintf() (git-fixes).
- media: ov2680: add ov2680_fill_format() helper function (git-fixes).
- media: ov2680: do not take the lock for try_fmt calls (git-fixes).
- media: ov2680: fix ov2680_bayer_order() (git-fixes).
- media: ov2680: fix ov2680_set_fmt() which == v4l2_subdev_format_try not working (git-fixes).
- media: ov2680: fix regulators being left enabled on ov2680_power_on() errors (git-fixes).
- media: ov2680: fix vflip / hflip set functions (git-fixes).
- media: ov2680: remove video_v4l2_subdev_api ifdef-s (git-fixes).
- media: ov5640: enable mipi interface in ov5640_set_power_mipi() (git-fixes).
- media: rkvdec: increase max supported height for h.264 (git-fixes).
- media: v4l2-core: fix a potential resource leak in v4l2_fwnode_parse_link() (git-fixes).
- media: v4l2-mem2mem: add lock to protect parameter num_rdy (git-fixes).
- media: venus: hfi_venus: only consider sys_idle_indicator on v1 (git-fixes).
- media: venus: hfi_venus: write to vidc_ctrl_init after unmasking interrupts (git-fixes).
- misc: rtsx: judge aspm mode to set petxcfg reg (git-fixes).
- mkspec: allow unsupported kmps (bsc#1214386)
- mlxsw: pci: add shutdown method in pci driver (git-fixes).
- mmc: block: fix in_flight[issue_type] value error (git-fixes).
- mmc: moxart: read scr register without changing byte order (git-fixes).
- mmc: wbsd: fix double mmc_free_host() in wbsd_init() (git-fixes).
- module: avoid allocation if module is already present and ready (bsc#1213921).
- module: extract patient module check into helper (bsc#1213921).
- module: move check_modinfo() early to early_mod_check() (bsc#1213921).
- module: move early sanity checks into a helper (bsc#1213921).
- move upstreamed powerpc patches into sorted section
- mtd: rawnand: brcmnand: fix crash during the panic_write (git-fixes).
- mtd: rawnand: brcmnand: fix mtd oobsize (git-fixes).
- mtd: rawnand: brcmnand: fix potential false time out warning (git-fixes).
- mtd: rawnand: brcmnand: fix potential out-of-bounds access in oob write (git-fixes).
- mtd: rawnand: fsl_upm: fix an off-by one test in fun_exec_op() (git-fixes).
- mtd: rawnand: fsmc: handle clk prepare error in fsmc_nand_resume() (git-fixes).
- mtd: rawnand: omap_elm: fix incorrect type in assignment (git-fixes).
- mtd: rawnand: rockchip: align hwecc vs. raw page helper layouts (git-fixes).
- mtd: rawnand: rockchip: fix oobfree offset and description (git-fixes).
- mtd: spi-nor: check bus width while setting qe bit (git-fixes).
- mtd: spinand: toshiba: fix ecc_get_status (git-fixes).
- n_tty: rename tail to old_tail in n_tty_read() (git-fixes).
- net: hns3: fix wrong bw weight of disabled tc issue (git-fixes).
- net: ieee802154: at86rf230: stop leaking skb's (git-fixes).
- net: mana: fix mana vf unload when hardware is unresponsive (git-fixes).
- net: phy: at803x: remove set/get wol callbacks for ar8032 (git-fixes).
- net: phy: broadcom: stub c45 read/write for 54810 (git-fixes).
- net: phy: fix irq-based wake-on-lan over hibernate / power off (git-fixes).
- net: usb: lan78xx: reorder cleanup operations to avoid uaf bugs (git-fixes).
- net: usbnet: fix warning in usbnet_start_xmit/usb_submit_urb (git-fixes).
- netfs: fix lockdep warning from taking sb_writers whilst holding mmap_lock (bsc#1214742).
- netfs: fix missing xas_retry() calls in xarray iteration (bsc#1213946).
- netfs: fix parameter of cleanup() (bsc#1214743).
- nfsd: remove incorrect check in nfsd4_validate_stateid (git-fixes).
- nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput (git-fixes).
- nilfs2: fix warning in mark_buffer_dirty due to discarded buffer reuse (git-fixes).
- nvme-rdma: fix potential unbalanced freeze &amp; unfreeze (bsc#1208902).
- nvme-tcp: fix potential unbalanced freeze &amp; unfreeze (bsc#1208902).
- objtool/x86: fix srso mess (git-fixes).
- objtool/x86: fixup frame-pointer vs rethunk (git-fixes).
- objtool: union instruction::{call_dest,jump_table} (git-fixes).
- old-flavors: drop 2.6 kernels. 2.6 based kernels are eol, upgrading from them is no longer suported.
- pci/aspm: avoid link retraining race (git-fixes).
- pci/aspm: factor out pcie_wait_for_retrain() (git-fixes).
- pci/aspm: return 0 or -etimedout from pcie_retrain_link() (git-fixes).
- pci: acpiphp: reassign resources on bridge if necessary (git-fixes).
- pci: acpiphp: use pci_assign_unassigned_bridge_resources() only for non-root bus (git-fixes).
- pci: mark nvidia t4 gpus to avoid bus reset (git-fixes).
- pci: meson: remove cast between incompatible function type (git-fixes).
- pci: microchip: correct the ded and sec interrupt bit offsets (git-fixes).
- pci: microchip: remove cast between incompatible function type (git-fixes).
- pci: pciehp: use rmw accessors for changing lnkctl (git-fixes).
- pci: rockchip: remove writes to unused registers (git-fixes).
- pci: s390: fix use-after-free of pci resources with per-function hotplug (git-fixes).
- pci: tegra194: fix possible array out of bounds access (git-fixes).
- pcmcia: rsrc_nonstatic: fix memory leak in nonstatic_release_resource_db() (git-fixes).
- phy/rockchip: inno-hdmi: do not power on rk3328 post pll on reg write (git-fixes).
- phy/rockchip: inno-hdmi: round fractal pixclock in rk3328 recalc_rate (git-fixes).
- phy/rockchip: inno-hdmi: use correct vco_div_5 macro on rk3328 (git-fixes).
- phy: qcom-snps-femto-v2: keep cfg_ahb_clk enabled during runtime suspend (git-fixes).
- phy: qcom-snps-femto-v2: properly enable ref clock (git-fixes).
- phy: qcom-snps: correct struct qcom_snps_hsphy kerneldoc (git-fixes).
- phy: qcom-snps: use dev_err_probe() to simplify code (git-fixes).
- pinctrl: cherryview: fix address_space_handler() argument (git-fixes).
- pinctrl: mcp23s08: check return value of devm_kasprintf() (git-fixes).
- pinctrl: renesas: rza2: add lock around pinctrl_generic{{add,remove}_group,{add,remove}_function} (git-fixes).
- platform/x86: dell-sysman: fix reference leak (git-fixes).
- pm / devfreq: fix leak in devfreq_dev_release() (git-fixes).
- powerpc/64e: fix kexec build error (bsc#1212091 ltc#199106).
- powerpc/iommu: do not set failed sg dma_address to dma_mapping_error (bsc#1212091 ltc#199106).
- powerpc/iommu: fix iommu_table_in_use for a small default dma window case (bsc#1212091 ltc#199106).
- powerpc/iommu: incorrect ddw table is referenced for sr-iov device (bsc#1212091 ltc#199106).
- powerpc/iommu: return error code from .map_sg() ops (bsc#1212091 ltc#199106).
- powerpc/iommu: tces are incorrectly manipulated with dlpar add/remove of memory (bsc#1212091 ltc#199106).
- powerpc/kernel/iommu: add new iommu_table_in_use() helper (bsc#1212091 ltc#199106).
- powerpc/kexec: fix build failure from uninitialised variable (bsc#1212091 ltc#199106).
- powerpc/mm/altmap: fix altmap boundary check (bsc#1120059 git-fixes).
- powerpc/pseries/ddw: do not try direct mapping with persistent memory and one window (bsc#1212091 ltc#199106).
- powerpc/pseries/ddw: simplify enable_ddw() (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: add ddw_list_new_entry() helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: add ddw_property_create() and refactor enable_ddw() (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: add iommu_pseries_alloc_table() helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: add of_node_put() before break (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: allow ddw windows starting at 0x00 (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: check if the default window in use before removing it (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: create huge dma window if no mmio32 is present (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: find existing ddw with given property name (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: make use of ddw for indirect mapping (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: print ibm,query-pe-dma-windows parameters (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: rename 'direct window' to 'dma window' (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: reorganize iommu_table_setparms*() with new helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: replace hard-coded page shift (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: update remove_dma_window() to accept property name (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: use correct vfree for it_map (bsc#1212091 ltc#199106).
- powerpc/pseries: add __init attribute to eligible functions (bsc#1212091 ltc#199106).
- powerpc/pseries: honour current smt state when dlpar onlining cpus (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/pseries: initialise cpu hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/rtas: block error injection when locked down (bsc#1023051).
- powerpc/rtas: enture rtas_call is called with mmu enabled (bsc#1023051).
- powerpc/rtas_flash: allow user copy to flash block cache objects (bsc#1194869).
- powerpc/security: fix speculation_store_bypass reporting on power10 (bsc#1188885 ltc#193722 git-fixes).
- powerpc: add hotplug_smt support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). update config files.
- powerpc: fix typos in comments (bsc#1212091 ltc#199106).
- powerpc: move dma64_propname define to a header (bsc#1214297 ltc#197503).
- pseries/iommu/ddw: fix kdump to work in absence of ibm,dma-window (bsc#1214297 ltc#197503).
- pstore/ram: check start of empty przs during init (git-fixes).
- pwm: add a stub for devm_pwmchip_add() (git-fixes).
- pwm: meson: fix handling of period/duty if greater than uint_max (git-fixes).
- pwm: meson: simplify duplicated per-channel tracking (git-fixes).
- qed: fix scheduling in a tasklet while getting stats (git-fixes).
- rdma/bnxt_re: fix error handling in probe failure path (git-fixes)
- rdma/bnxt_re: fix max_qp count for virtual functions (git-fixes)
- rdma/efa: fix wrong resources deallocation order (git-fixes)
- rdma/hns: fix cq and qp cache affinity (git-fixes)
- rdma/hns: fix incorrect post-send with direct wqe of wr-list (git-fixes)
- rdma/hns: fix port active speed (git-fixes)
- rdma/irdma: prevent zero-length stag registration (git-fixes)
- rdma/irdma: replace one-element array with flexible-array member (git-fixes)
- rdma/mlx5: return the firmware result upon destroying qp/rq (git-fixes)
- rdma/qedr: remove a duplicate assignment in irdma_query_ah() (git-fixes)
- rdma/siw: balance the reference of cep-&gt;kref in the error path (git-fixes)
- rdma/siw: correct wrong debug message (git-fixes)
- rdma/umem: set iova in odp flow (git-fixes)
- readme.branch: add miroslav franc as a sle15-sp4 co-maintainer.
- regmap: rbtree: use alloc_flags for memory allocations (git-fixes).
- revert 'ib/isert: fix incorrect release of isert connection' (git-fixes)
- revert 'tracing: add '(fault)' name injection to kernel probes' (git-fixes).
- ring-buffer: do not swap cpu_buffer during resize process (git-fixes).
- ring-buffer: fix deadloop issue on reading trace_pipe (git-fixes).
- ring-buffer: fix wrong stat of cpu_buffer-&gt;read (git-fixes).
- rpmsg: glink: add check for kstrdup (git-fixes).
- s390/purgatory: disable branch profiling (git-fixes bsc#1214372).
- sched/fair: fix inaccurate tally of ttwu_move_affine (git fixes).
- sched/fair: use recent_used_cpu to test p-&gt;cpus_ptr (git fixes).
- sched/psi: use kernfs polling functions for psi trigger polling (bsc#1209799).
- scsi: bsg: increase number of devices (bsc#1210048).
- scsi: core: do not wait for quiesce in scsi_device_block() (bsc#1209284).
- scsi: core: do not wait for quiesce in scsi_stop_queue() (bsc#1209284).
- scsi: core: improve warning message in scsi_device_block() (bsc#1209284).
- scsi: core: merge scsi_internal_device_block() and device_block() (bsc#1209284).
- scsi: rdma/srp: fix residual handling (git-fixes)
- scsi: sg: increase number of devices (bsc#1210048).
- scsi: storvsc: always set no_report_opcodes (git-fixes).
- scsi: storvsc: fix handling of virtual fibre channel timeouts (git-fixes).
- scsi: storvsc: handle srb status value 0x30 (git-fixes).
- scsi: storvsc: limit max_sectors for virtual fibre channel devices (git-fixes).
- scsi: zfcp: defer fc_rport blocking until after adisc response (git-fixes bsc#1214371).
- selftests/futex: order calls to futex_lock_pi (git-fixes).
- selftests/harness: actually report skip for signal tests (git-fixes).
- selftests/resctrl: close perf value read fd on errors (git-fixes).
- selftests/resctrl: do not leak buffer in fill_cache() (git-fixes).
- selftests/resctrl: unmount resctrl fs if child fails to run benchmark (git-fixes).
- selftests/rseq: check if libc rseq support is registered (git-fixes).
- selftests: forwarding: add a helper to skip test when using veth pairs (git-fixes).
- selftests: forwarding: ethtool: skip when using veth pairs (git-fixes).
- selftests: forwarding: ethtool_extended_state: skip when using veth pairs (git-fixes).
- selftests: forwarding: skip test when no interfaces are specified (git-fixes).
- selftests: forwarding: switch off timeout (git-fixes).
- selftests: forwarding: tc_actions: cleanup temporary files when test is aborted (git-fixes).
- selftests: forwarding: tc_actions: use ncat instead of nc (git-fixes).
- selftests: forwarding: tc_flower: relax success criterion (git-fixes).
- selftests: mirror_gre_changes: tighten up the ttl test match (git-fixes).
- serial: sc16is7xx: fix broken port 0 uart init (git-fixes).
- serial: sc16is7xx: fix bug when first setting gpio direction (git-fixes).
- serial: sprd: assign sprd_port after initialized to avoid wrong access (git-fixes).
- serial: sprd: fix dma buffer leak issue (git-fixes).
- serial: tegra: handle clk prepare error in tegra_uart_hw_init() (git-fixes).
- sfc: fix crash when reading stats while nic is resetting (git-fixes).
- smb3: do not send lease break acknowledgment if all file handles have been closed (git-fixes).
- smb3: do not set ntlmssp_version flag for negotiate not auth request (bsc#1193629).
- smb: client: fix -wstringop-overflow issues (bsc#1193629).
- smb: client: fix dfs link mount against w2k8 (bsc#1212142).
- smb: client: fix null auth (git-fixes).
- soc: aspeed: socinfo: add kfree for kstrdup (git-fixes).
- soundwire: bus: pm_runtime_request_resume on peripheral attachment (git-fixes).
- soundwire: fix enumeration completion (git-fixes).
- spi: tegra20-sflash: fix to check return value of platform_get_irq() in tegra_sflash_probe() (git-fixes).
- supported.conf: fix typos for -!optional markers
- target: compare and write backend driver sense handling (bsc#1177719 bsc#1213026).
- target_core_rbd: fix leak and reduce kmalloc calls (bsc#1212873).
- target_core_rbd: fix rbd_img_request.snap_id assignment (bsc#1212857).
- target_core_rbd: remove snapshot existence validation code (bsc#1212857).
- thunderbolt: read retimer nvm authentication status prior tb_retimer_set_inbound_sbtx() (git-fixes).
- timers: add shutdown mechanism to the internal functions (bsc#1213970).
- timers: provide timer_shutdown[_sync]() (bsc#1213970).
- timers: rename del_timer() to timer_delete() (bsc#1213970).
- timers: rename del_timer_sync() to timer_delete_sync() (bsc#1213970).
- timers: replace bug_on()s (bsc#1213970).
- timers: silently ignore timers with a null function (bsc#1213970).
- timers: split [try_to_]del_timer[_sync]() to prepare for shutdown mode (bsc#1213970).
- timers: update kernel-doc for various functions (bsc#1213970).
- timers: use del_timer_sync() even on up (bsc#1213970).
- tracing/histograms: add histograms to hist_vars if they have referenced variables (git-fixes).
- tracing/histograms: return an error if we fail to add histogram to hist_vars list (git-fixes).
- tracing/probes: fix not to count error code to total length (git-fixes).
- tracing/probes: fix to avoid double count of the string length on the array (git-fixes).
- tracing/probes: fix to record 0-length data_loc in fetch_store_string*() if fails (git-fixes).
- tracing/probes: fix to update dynamic data counter if fetcharg uses it (git-fixes).
- tracing: fix cpu buffers unavailable due to 'record_disabled' missed (git-fixes).
- tracing: fix memleak due to race between current_tracer and trace (git-fixes).
- tracing: fix memory leak of iter-&gt;temp when reading trace_pipe (git-fixes).
- tracing: fix null pointer dereference in tracing_err_log_open() (git-fixes).
- tracing: fix warning in trace_buffered_event_disable() (git-fixes).
- tty: fix hang on tty device with no_room set (git-fixes).
- tty: n_gsm: fix the uaf caused by race condition in gsm_cleanup_mux (git-fixes).
- tty: serial: fsl_lpuart: add i.mxrt1050 support (git-fixes).
- tty: serial: fsl_lpuart: clear the error flags by writing 1 for lpuart32 platforms (git-fixes).
- tty: serial: fsl_lpuart: make rx_watermark configurable for different platforms (git-fixes).
- tty: serial: fsl_lpuart: reduce rx watermark to 0 on ls1028a (git-fixes).
- ubifs: fix memleak when insert_old_idx() failed (git-fixes).
- update patches.suse/cpufreq-intel_pstate-fix-cpu-pstate.turbo_freq-initi (git-fixes bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
- usb-storage: alauda: fix uninit-value in alauda_check_media() (git-fixes).
- usb: chipidea: imx: add missing usb phy dpdm wakeup setting (git-fixes).
- usb: chipidea: imx: do not request qos for imx8ulp (git-fixes).
- usb: chipidea: imx: improve logic if samsung,picophy-* parameter is 0 (git-fixes).
- usb: common: usb-conn-gpio: prevent bailing out if initial role is none (git-fixes).
- usb: dwc3: fix typos in gadget.c (git-fixes).
- usb: dwc3: meson-g12a: do post init to fix broken usb after resumption (git-fixes).
- usb: dwc3: properly handle processing of pending events (git-fixes).
- usb: gadget: f_mass_storage: fix unused variable warning (git-fixes).
- usb: gadget: fix the memory leak in raw_gadget driver (git-fixes).
- usb: gadget: u_serial: avoid spinlock recursion in __gs_console_push (git-fixes).
- usb: ohci-at91: fix the unhandle interrupt when resume (git-fixes).
- usb: phy: mxs: fix getting wrong state with mxs_phy_is_otg_host() (git-fixes).
- usb: quirks: add quirk for focusrite scarlett (git-fixes).
- usb: serial: option: add quectel ec200a module support (git-fixes).
- usb: serial: option: support quectel em060k_128 (git-fixes).
- usb: serial: simple: add kaufmann rks+can vcp (git-fixes).
- usb: serial: simple: sort driver entries (git-fixes).
- usb: typec: altmodes/displayport: signal hpd when configuring pin assignment (git-fixes).
- usb: typec: tcpm: fix response to vsafe0v event (git-fixes).
- usb: typec: tcpm: set initial svdm version based on pd revision (git-fixes).
- usb: zaurus: add id for a-300/b-500/c-700 (git-fixes).
- watchdog: sp5100_tco: support hygon fch/sch (server controller hub) (git-fixes).
- wifi: ath10k: use rmw accessors for changing lnkctl (git-fixes).
- wifi: ath11k: use rmw accessors for changing lnkctl (git-fixes).
- wifi: ath9k: fix races between ath9k_wmi_cmd and ath9k_wmi_ctrl_rx (git-fixes).
- wifi: ath9k: protect wmi command response buffer replacement with a lock (git-fixes).
- wifi: ath9k: use is_err() with debugfs_create_dir() (git-fixes).
- wifi: cfg80211: fix return value in scan logic (git-fixes).
- wifi: cfg80211: fix sband iftype data lookup for ap_vlan (git-fixes).
- wifi: mt76: mt7615: do not advertise 5 ghz on first phy of mt7615d (dbdc) (git-fixes).
- wifi: mt76: mt7915: fix power-limits while chan_switch (git-fixes).
- wifi: mt76: mt7921: do not support one stream on secondary antenna only (git-fixes).
- wifi: mt76: testmode: add nla_policy for mt76_tm_attr_tx_length (git-fixes).
- wifi: mwifiex: avoid possible null skb pointer dereference (git-fixes).
- wifi: mwifiex: fix error recovery in pcie buffer descriptor management (git-fixes).
- wifi: mwifiex: fix memory leak in mwifiex_histogram_read() (git-fixes).
- wifi: mwifiex: fix missed return in oob checks failed path (git-fixes).
- wifi: mwifiex: fix oob and integer underflow when rx packets (git-fixes).
- wifi: nl80211/cfg80211: add forgotten nla_policy for bss color attribute (git-fixes).
- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
- wifi: rtw89: debug: fix error handling in rtw89_debug_priv_btc_manual_set() (git-fixes).
- x86/alternative: make custom return thunk unconditional (git-fixes).
- x86/cpu/amd: disable xsaves on amd family 0x17 (git-fixes).
- x86/cpu/kvm: provide untrain_ret_vm (git-fixes).
- x86/cpu: clean up srso return thunk mess (git-fixes).
- x86/cpu: cleanup the untrain mess (git-fixes).
- x86/cpu: fix __x86_return_thunk symbol type (git-fixes).
- x86/cpu: fix up srso_safe_ret() and __x86_return_thunk() (git-fixes).
- x86/cpu: rename original retbleed methods (git-fixes).
- x86/cpu: rename srso_(.*)_alias to srso_alias_\1 (git-fixes).
- x86/mce: make sure logged mces are processed after sysfs update (git-fixes).
- x86/retpoline,kprobes: fix position of thunk sections with config_lto_clang (git-fixes).
- x86/retpoline,kprobes: skip optprobe check for indirect jumps with retpolines and ibt (git-fixes).
- x86/retpoline: do not clobber rflags during srso_safe_ret() (git-fixes).
- x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).
- x86/speculation: add cpu_show_gds() prototype (git-fixes).
- x86/speculation: mark all skylake cpus as vulnerable to gds (git-fixes).
- x86/srso: correct the mitigation status when smt is disabled (git-fixes).
- x86/srso: disable the mitigation on unaffected configurations (git-fixes).
- x86/srso: explain the untraining sequences a bit more (git-fixes).
- x86/srso: fix build breakage with the llvm linker (git-fixes).
- x86/srso: fix return thunks in generated code (git-fixes).
- x86/static_call: fix __static_call_fixup() (git-fixes).
- xfs: fix sb write verify for lazysbcount (bsc#1214661).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2023-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120059">SUSE bug 1120059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208902">SUSE bug 1208902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208949">SUSE bug 1208949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209284">SUSE bug 1209284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210048">SUSE bug 1210048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210448">SUSE bug 1210448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212091">SUSE bug 1212091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212142">SUSE bug 1212142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212526">SUSE bug 1212526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212857">SUSE bug 1212857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212873">SUSE bug 1212873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213026">SUSE bug 1213026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213546">SUSE bug 1213546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213601">SUSE bug 1213601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213757">SUSE bug 1213757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213759">SUSE bug 1213759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213916">SUSE bug 1213916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213921">SUSE bug 1213921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213927">SUSE bug 1213927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213946">SUSE bug 1213946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213968">SUSE bug 1213968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213970">SUSE bug 1213970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213971">SUSE bug 1213971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214000">SUSE bug 1214000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214019">SUSE bug 1214019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214120">SUSE bug 1214120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214149">SUSE bug 1214149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214180">SUSE bug 1214180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214238">SUSE bug 1214238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214297">SUSE bug 1214297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214299">SUSE bug 1214299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214350">SUSE bug 1214350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214368">SUSE bug 1214368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214370">SUSE bug 1214370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214371">SUSE bug 1214371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214372">SUSE bug 1214372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214380">SUSE bug 1214380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214386">SUSE bug 1214386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214392">SUSE bug 1214392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214393">SUSE bug 1214393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214397">SUSE bug 1214397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214428">SUSE bug 1214428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214451">SUSE bug 1214451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214635">SUSE bug 1214635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214659">SUSE bug 1214659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214661">SUSE bug 1214661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214729">SUSE bug 1214729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214742">SUSE bug 1214742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214743">SUSE bug 1214743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214756">SUSE bug 1214756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215522">SUSE bug 1215522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215523">SUSE bug 1215523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215552">SUSE bug 1215552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215553">SUSE bug 1215553</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2007/">CVE-2023-2007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2007">CVE-2023-2007 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34319/">CVE-2023-34319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4133/">CVE-2023-4133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4387/">CVE-2023-4387 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4459/">CVE-2023-4459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4569/">CVE-2023-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798885" comment="kernel-rt-5.14.21-150400.15.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206042" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1120059" ref_url="https://bugzilla.suse.com/1120059" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1208902" ref_url="https://bugzilla.suse.com/1208902" source="BUGZILLA"/>
		<reference ref_id="1208949" ref_url="https://bugzilla.suse.com/1208949" source="BUGZILLA"/>
		<reference ref_id="1209284" ref_url="https://bugzilla.suse.com/1209284" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1210048" ref_url="https://bugzilla.suse.com/1210048" source="BUGZILLA"/>
		<reference ref_id="1210448" ref_url="https://bugzilla.suse.com/1210448" source="BUGZILLA"/>
		<reference ref_id="1212091" ref_url="https://bugzilla.suse.com/1212091" source="BUGZILLA"/>
		<reference ref_id="1212142" ref_url="https://bugzilla.suse.com/1212142" source="BUGZILLA"/>
		<reference ref_id="1212526" ref_url="https://bugzilla.suse.com/1212526" source="BUGZILLA"/>
		<reference ref_id="1212857" ref_url="https://bugzilla.suse.com/1212857" source="BUGZILLA"/>
		<reference ref_id="1212873" ref_url="https://bugzilla.suse.com/1212873" source="BUGZILLA"/>
		<reference ref_id="1213026" ref_url="https://bugzilla.suse.com/1213026" source="BUGZILLA"/>
		<reference ref_id="1213123" ref_url="https://bugzilla.suse.com/1213123" source="BUGZILLA"/>
		<reference ref_id="1213546" ref_url="https://bugzilla.suse.com/1213546" source="BUGZILLA"/>
		<reference ref_id="1213580" ref_url="https://bugzilla.suse.com/1213580" source="BUGZILLA"/>
		<reference ref_id="1213601" ref_url="https://bugzilla.suse.com/1213601" source="BUGZILLA"/>
		<reference ref_id="1213666" ref_url="https://bugzilla.suse.com/1213666" source="BUGZILLA"/>
		<reference ref_id="1213757" ref_url="https://bugzilla.suse.com/1213757" source="BUGZILLA"/>
		<reference ref_id="1213759" ref_url="https://bugzilla.suse.com/1213759" source="BUGZILLA"/>
		<reference ref_id="1213916" ref_url="https://bugzilla.suse.com/1213916" source="BUGZILLA"/>
		<reference ref_id="1213921" ref_url="https://bugzilla.suse.com/1213921" source="BUGZILLA"/>
		<reference ref_id="1213927" ref_url="https://bugzilla.suse.com/1213927" source="BUGZILLA"/>
		<reference ref_id="1213946" ref_url="https://bugzilla.suse.com/1213946" source="BUGZILLA"/>
		<reference ref_id="1213968" ref_url="https://bugzilla.suse.com/1213968" source="BUGZILLA"/>
		<reference ref_id="1213970" ref_url="https://bugzilla.suse.com/1213970" source="BUGZILLA"/>
		<reference ref_id="1213971" ref_url="https://bugzilla.suse.com/1213971" source="BUGZILLA"/>
		<reference ref_id="1214000" ref_url="https://bugzilla.suse.com/1214000" source="BUGZILLA"/>
		<reference ref_id="1214019" ref_url="https://bugzilla.suse.com/1214019" source="BUGZILLA"/>
		<reference ref_id="1214120" ref_url="https://bugzilla.suse.com/1214120" source="BUGZILLA"/>
		<reference ref_id="1214149" ref_url="https://bugzilla.suse.com/1214149" source="BUGZILLA"/>
		<reference ref_id="1214180" ref_url="https://bugzilla.suse.com/1214180" source="BUGZILLA"/>
		<reference ref_id="1214238" ref_url="https://bugzilla.suse.com/1214238" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1214297" ref_url="https://bugzilla.suse.com/1214297" source="BUGZILLA"/>
		<reference ref_id="1214299" ref_url="https://bugzilla.suse.com/1214299" source="BUGZILLA"/>
		<reference ref_id="1214350" ref_url="https://bugzilla.suse.com/1214350" source="BUGZILLA"/>
		<reference ref_id="1214368" ref_url="https://bugzilla.suse.com/1214368" source="BUGZILLA"/>
		<reference ref_id="1214370" ref_url="https://bugzilla.suse.com/1214370" source="BUGZILLA"/>
		<reference ref_id="1214371" ref_url="https://bugzilla.suse.com/1214371" source="BUGZILLA"/>
		<reference ref_id="1214372" ref_url="https://bugzilla.suse.com/1214372" source="BUGZILLA"/>
		<reference ref_id="1214380" ref_url="https://bugzilla.suse.com/1214380" source="BUGZILLA"/>
		<reference ref_id="1214386" ref_url="https://bugzilla.suse.com/1214386" source="BUGZILLA"/>
		<reference ref_id="1214392" ref_url="https://bugzilla.suse.com/1214392" source="BUGZILLA"/>
		<reference ref_id="1214393" ref_url="https://bugzilla.suse.com/1214393" source="BUGZILLA"/>
		<reference ref_id="1214397" ref_url="https://bugzilla.suse.com/1214397" source="BUGZILLA"/>
		<reference ref_id="1214428" ref_url="https://bugzilla.suse.com/1214428" source="BUGZILLA"/>
		<reference ref_id="1214451" ref_url="https://bugzilla.suse.com/1214451" source="BUGZILLA"/>
		<reference ref_id="1214635" ref_url="https://bugzilla.suse.com/1214635" source="BUGZILLA"/>
		<reference ref_id="1214659" ref_url="https://bugzilla.suse.com/1214659" source="BUGZILLA"/>
		<reference ref_id="1214661" ref_url="https://bugzilla.suse.com/1214661" source="BUGZILLA"/>
		<reference ref_id="1214729" ref_url="https://bugzilla.suse.com/1214729" source="BUGZILLA"/>
		<reference ref_id="1214742" ref_url="https://bugzilla.suse.com/1214742" source="BUGZILLA"/>
		<reference ref_id="1214743" ref_url="https://bugzilla.suse.com/1214743" source="BUGZILLA"/>
		<reference ref_id="1214756" ref_url="https://bugzilla.suse.com/1214756" source="BUGZILLA"/>
		<reference ref_id="1215522" ref_url="https://bugzilla.suse.com/1215522" source="BUGZILLA"/>
		<reference ref_id="1215523" ref_url="https://bugzilla.suse.com/1215523" source="BUGZILLA"/>
		<reference ref_id="1215552" ref_url="https://bugzilla.suse.com/1215552" source="BUGZILLA"/>
		<reference ref_id="1215553" ref_url="https://bugzilla.suse.com/1215553" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2007" ref_url="https://www.suse.com/security/cve/CVE-2023-2007/" source="CVE"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-34319" ref_url="https://www.suse.com/security/cve/CVE-2023-34319/" source="CVE"/>
		<reference ref_id="CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4133" ref_url="https://www.suse.com/security/cve/CVE-2023-4133/" source="CVE"/>
		<reference ref_id="CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134/" source="CVE"/>
		<reference ref_id="CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147/" source="CVE"/>
		<reference ref_id="CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194/" source="CVE"/>
		<reference ref_id="CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273/" source="CVE"/>
		<reference ref_id="CVE-2023-4387" ref_url="https://www.suse.com/security/cve/CVE-2023-4387/" source="CVE"/>
		<reference ref_id="CVE-2023-4459" ref_url="https://www.suse.com/security/cve/CVE-2023-4459/" source="CVE"/>
		<reference ref_id="CVE-2023-4569" ref_url="https://www.suse.com/security/cve/CVE-2023-4569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel (bsc#1210448).
- CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality (bsc#1213927).
- CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in xen/netback (XSA-432) (bsc#1213546).
- CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580).
- CVE-2023-37453: Fixed oversight in SuperSpeed initialization  (bsc#1213123).
- CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service (bsc#1213666).
- CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local that allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).
- CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue (bsc#1214149).
- CVE-2023-4133: Fixed use after free bugs caused by circular dependency problem in cxgb4 (bsc#1213970).
- CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work() (bsc#1213971).
- CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1213968).
- CVE-2023-4194: Fixed a type confusion in net tun_chr_open() (bsc#1214019).
- CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214120).
- CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that could allow a local attacker to crash the system due to a double-free (bsc#1214350).
- CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup that may have allowed a local attacker with normal user privilege to cause a denial of service (bsc#1214451).
- CVE-2023-4569: Fixed information leak in nft_set_catchall_flush in net/netfilter/nf_tables_api.c (bsc#1214729).

The following non-security bugs were fixed:

- Drop amdgpu patch causing spamming (bsc#1215523)
- acpi: processor: perflib: avoid updating frequency qos unnecessarily (git-fixes).
- acpi: processor: perflib: use the 'no limit' frequency qos (git-fixes).
- acpi: x86: s2idle: fix a logic error parsing amd constraints table (git-fixes).
- alsa: ac97: fix possible error value of *rac97 (git-fixes).
- alsa: hda/cs8409: support new dell dolphin variants (git-fixes).
- alsa: hda/realtek - remodified 3k pull low procedure (git-fixes).
- alsa: hda/realtek: add quirk for hp victus 16-d1xxx to enable mute led (git-fixes).
- alsa: hda/realtek: add quirk for mute leds on hp envy x360 15-eu0xxx (git-fixes).
- alsa: hda/realtek: add quirks for hp g11 laptops (git-fixes).
- alsa: hda/realtek: switch dell oasis models to use spi (git-fixes).
- alsa: pcm: fix missing fixup call in compat hw_refine ioctl (git-fixes).
- alsa: usb-audio: add support for mythware xa001au capture and playback interfaces (git-fixes).
- alsa: usb-audio: fix init call orders for uac1 (git-fixes).
- alsa: ymfpci: fix the missing snd_card_free() call at probe error (git-fixes).
- amba: bus: fix refcount leak (git-fixes).
- arm64: dts: imx8mn-var-som: add missing pull-up for onboard phy reset pinmux (git-fixes).
- arm64: dts: qcom: qrb5165-rb5: fix thermal zone conflict (git-fixes).
- arm64: dts: rockchip: disable hs400 for emmc on rock pi 4 (git-fixes).
- arm: dts: imx6dl: prtrvt, prtvt7, prti6q, prtwd2: fix usb related warnings (git-fixes).
- arm: dts: imx6sll: fixup of operating points (git-fixes).
- arm: spear: do not use timer namespace for timer_shutdown() function (bsc#1213970).
- asoc: lower 'no backend dais enabled for ... port' log severity (git-fixes).
- asoc: meson: axg-tdm-formatter: fix channel slot allocation (git-fixes).
- asoc: rt5665: add missed regulator_bulk_disable (git-fixes).
- asoc: sof: intel: fix soundwire/hdaudio mutual exclusion (git-fixes).
- asoc: stac9766: fix build errors with regmap_ac97 (git-fixes).
- asoc: tegra: fix sfc conversion for few rates (git-fixes).
- audit: fix possible soft lockup in __audit_inode_child() (git-fixes).
- backlight/bd6107: compare against struct fb_info.device (git-fixes).
- backlight/gpio_backlight: compare against struct fb_info.device (git-fixes).
- backlight/lv5207lp: compare against struct fb_info.device (git-fixes).
- batman-adv: do not get eth header before batadv_check_management_packet (git-fixes).
- batman-adv: do not increase mtu when set by user (git-fixes).
- batman-adv: fix batadv_v_ogm_aggr_send memory leak (git-fixes).
- batman-adv: fix tt global entry leak when client roamed back (git-fixes).
- batman-adv: trigger events for auto adjusted mtu (git-fixes).
- bluetooth: btusb: add mt7922 bluetooth id for the asus ally (git-fixes).
- bluetooth: btusb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- bluetooth: fix potential use-after-free when clear keys (git-fixes).
- bluetooth: l2cap: fix use-after-free (git-fixes).
- bluetooth: l2cap: fix use-after-free in l2cap_sock_ready_cb (git-fixes).
- bluetooth: nokia: fix value check in nokia_bluetooth_serdev_probe() (git-fixes).
- bluetooth: remove unused declaration amp_read_loc_info() (git-fixes).
- bnx2x: fix page fault following eeh recovery (bsc#1214299).
- bpf: disable preemption in bpf_event_output (git-fixes).
- bus: ti-sysc: fix build warning for 64-bit build (git-fixes).
- bus: ti-sysc: fix cast to enum warning (git-fixes).
- bus: ti-sysc: flush posted write on enable before reset (git-fixes).
- can: gs_usb: gs_usb_receive_bulk_callback(): count rx overflow errors also in case of oom (git-fixes).
- ceph: defer stopping mdsc delayed_work (bsc#1214392).
- ceph: do not check for quotas on mds stray dirs (bsc#1214238).
- ceph: never send metrics if disable_send_metrics is set (bsc#1214180).
- check-for-config-changes: ignore builtin_return_address_strips_pac (bsc#1214380). gcc7 on sle 15 does not support this while later gcc does.
- cifs: add missing return value check for cifs_sb_tlink (bsc#1193629).
- cifs: allow dumping keys for directories too (bsc#1193629).
- cifs: fix mid leak during reconnection after timeout threshold (git-fixes).
- cifs: if deferred close is disabled then close files immediately (git-fixes).
- cifs: is_network_name_deleted should return a bool (bsc#1193629).
- cifs: update internal module version number for cifs.ko (bsc#1193629).
- clk: fix slab-out-of-bounds error in devm_clk_release() (git-fixes).
- clk: fix undefined reference to `clk_rate_exclusive_{get,put}' (git-fixes).
- clk: imx8mp: fix sai4 clock (git-fixes).
- clk: imx: composite-8m: fix clock pauses when set_rate would be a no-op (git-fixes).
- clk: imx: pll14xx: dynamically configure pll for 393216000/361267200hz (git-fixes).
- clk: qcom: camcc-sc7180: fix async resume during probe (git-fixes).
- clk: qcom: gcc-mdm9615: use proper parent for pll0_vote clock (git-fixes).
- clk: qcom: gcc-sc7180: fix up gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: gcc-sm8250: fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: sunxi-ng: modify mismatched function name (git-fixes).
- clocksource/drivers/arm_arch_timer: do not use timer namespace for timer_shutdown() function (bsc#1213970).
- clocksource/drivers/sp804: do not use timer namespace for timer_shutdown() function (bsc#1213970).
- config_nvme_verbose_errors=y     gone with a82baa8083b
- config_printk_safe_log_buf_shift=13  gone with 7e152d55123
- cpu/smt: allow enabling partial smt states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/smt: create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/smt: move smt prototypes into cpu_smt.h (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/smt: move smt/control simple exit cases earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/smt: remove topology_smt_supported() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/smt: store the current/max number of threads (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpufreq: fix the race condition while updating the transition_task of policy (git-fixes).
- cpufreq: intel_pstate: adjust balance_performance epp for sapphire rapids (bsc#1214659).
- cpufreq: intel_pstate: enable hwp io boost for all servers (bsc#1208949 jsc#ped-6003 jsc#ped-6004).
- cpufreq: intel_pstate: fix scaling for hybrid-capable systems with disabled e-cores (bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
- cpufreq: intel_pstate: hybrid: rework hwp calibration (bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
- cpufreq: intel_pstate: hybrid: use known scaling factor for p-cores (bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
- cpufreq: intel_pstate: read all msrs on the target cpu (bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
- created new preempt kernel flavor configs are cloned from the respective $arch/default configs. all changed configs appart from config_preempt-&gt;y are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. tree_rcu has been also changed to preempt_rcu which is the default implementation for preempt kernel.
- crypto: caam - fix unchecked return value error (git-fixes).
- crypto: stm32 - properly handle pm_runtime_get failing (git-fixes).
- dma-buf/sw_sync: avoid recursive lock during fence signal (git-fixes).
- dma-buf/sync_file: fix docs syntax (git-fixes).
- dmaengine: idxd: modify the dependence of attribute pasid_enabled (git-fixes).
- dmaengine: mcf-edma: fix a potential un-allocated memory access (git-fixes).
- dmaengine: pl330: return dma_paused when transaction is paused (git-fixes).
- dmaengine: ste_dma40: add missing irq check in d40_probe (git-fixes).
- docs/process/howto: replace c89 with c11 (bsc#1214756).
- docs: kernel-parameters: refer to the correct bitmap function (git-fixes).
- docs: networking: replace skb_hwtstamp_tx with skb_tstamp_tx (git-fixes).
- docs: printk-formats: fix hex printing of signed values (git-fixes).
- documentation: devices.txt: fix minors for ttycpm* (git-fixes).
- documentation: devices.txt: remove ttyioc* (git-fixes).
- documentation: devices.txt: remove ttysioc* (git-fixes).
- driver core: test_async: fix an error code (git-fixes).
- drivers: clk: keystone: fix parameter judgment in _of_pll_clk_init() (git-fixes).
- drivers: usb: smsusb: fix error handling code in smsusb_init_device (git-fixes).
- drm/amd/display: check attr flag before set cursor degamma on dcn3+ (git-fixes).
- drm/amd/display: check tg is non-null before checking if enabled (git-fixes).
- drm/amd/display: do not wait for mpc idle if tg is disabled (git-fixes).
- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).
- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).
- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).
- drm/amd/pm: fix variable dereferenced issue in amdgpu_device_attr_create() (git-fixes).
- drm/amd: flush any delayed gfxoff on suspend entry (git-fixes).
- drm/amdgpu: avoid integer overflow warning in amdgpu_device_resize_fb_bar() (git-fixes).
- drm/amdgpu: fix potential fence use-after-free v2 (git-fixes).
- drm/amdgpu: install stub fence into potential unused fence pointers (git-fixes).
- drm/amdgpu: use rmw accessors for changing lnkctl (git-fixes).
- drm/armada: fix off-by-one error in armada_overlay_get_property() (git-fixes).
- drm/ast: fix dram init on ast2200 (git-fixes).
- drm/bridge: anx7625: drop device lock before drm_helper_hpd_irq_event() (git-fixes).
- drm/bridge: fix -wunused-const-variable= warning (git-fixes).
- drm/bridge: tc358764: fix debug print parameter order (git-fixes).
- drm/etnaviv: fix dumping of active mmu context (git-fixes).
- drm/mediatek: fix dereference before null check (git-fixes).
- drm/mediatek: fix potential memory leak if vmap() fail (git-fixes).
- drm/msm/a2xx: call adreno_gpu_init() earlier (git-fixes).
- drm/msm/mdp5: do not leak some plane state (git-fixes).
- drm/nouveau/disp: revert a null check inside nouveau_connector_get_modes (git-fixes).
- drm/nouveau/gr: enable memory loads on helper invocation on all channels (git-fixes).
- drm/panel: simple: add missing connector type and pixel format for auo t215hvn01 (git-fixes).
- drm/panel: simple: fix auo g121ean01 panel timings according to the docs (git-fixes).
- drm/qxl: fix uaf on handle creation (git-fixes).
- drm/radeon: use rmw accessors for changing lnkctl (git-fixes).
- drm/rockchip: do not spam logs in atomic check (git-fixes).
- drm/shmem-helper: reset vma-&gt;vm_ops before calling dma_buf_mmap() (git-fixes).
- drm/tegra: dpaux: fix incorrect return value of platform_get_irq (git-fixes).
- drm/ttm: check null pointer before accessing when swapping (git-fixes).
- drm/ttm: never consider pinned bos for eviction&amp;swap (git-fixes).
- drm/vmwgfx: fix shader stage validation (git-fixes).
- drm: xlnx: zynqmp_dpsub: add missing check for dma_set_mask (git-fixes).
- drop cfg80211 lock fix patches that caused a regression (bsc#1213757)
- drop rtsx patch that caused a regression (bsc#1214397,bsc#1214428)
- dt-bindings: clock: xlnx,versal-clk: drop select:false (git-fixes).
- dt-bindings: clocks: imx8mp: make sai4 a dummy clock (git-fixes).
- dt-bindings: crypto: ti,sa2ul: make power-domains conditional (git-fixes).
- e1000: fix typos in comments (jsc#ped-5738).
- e1000: remove unnecessary use of kmap_atomic() (jsc#ped-5738).
- e1000: switch to napi_build_skb() (jsc#ped-5738).
- e1000: switch to napi_consume_skb() (jsc#ped-5738).
- enable analog devices industrial ethernet phy driver (jsc#ped-4759)
- exfat: fix unexpected eof while reading dir (bsc#1214000).
- exfat: release s_lock before calling dir_emit() (bsc#1214000).
- exfat_iterate(): do not open-code file_inode(file) (bsc#1214000).
- fbdev/ep93xx-fb: do not assign to struct fb_info.dev (git-fixes).
- fbdev: fix potential oob read in fast_imageblit() (git-fixes).
- fbdev: fix sys_imageblit() for arbitrary image widths (git-fixes).
- fbdev: improve performance of sys_imageblit() (git-fixes).
- fbdev: mmp: fix value check in mmphw_probe() (git-fixes).
- file: reinstate f_pos locking optimization for regular files (bsc#1213759).
- firmware: arm_scmi: drop of node reference in the transport channel setup (git-fixes).
- firmware: cs_dsp: fix new control name check (git-fixes).
- firmware: meson_sm: fix to avoid potential null pointer dereference (git-fixes).
- firmware: stratix10-svc: fix an null vs is_err() bug in probe (git-fixes).
- fs/sysv: null check to prevent null-ptr-deref bug (git-fixes).
- ftrace: fix possible warning on checking all pages used in ftrace_process_locs() (git-fixes).
- gpio: mvebu: fix irq domain leak (git-fixes).
- gpio: mvebu: make use of devm_pwmchip_add (git-fixes).
- gpio: tps68470: make tps68470_gpio_output() always set the initial value (git-fixes).
- hid: add quirk for 03f0:464a hp elite presenter mouse (git-fixes).
- hid: logitech-dj: fix error handling in logi_dj_recv_switch_to_dj_mode() (git-fixes).
- hid: logitech-hidpp: add usb and bluetooth ids for the logitech g915 tkl keyboard (git-fixes).
- hid: multitouch: correct devm device reference for hidinput input_dev name (git-fixes).
- hid: wacom: remove the battery when the ekr is off (git-fixes).
- hwmon: (pmbus/bel-pfe) enable pmbus_skip_status_check for pfe1100 (git-fixes).
- hwmon: (tmp513) fix the channel number in tmp51x_is_visible() (git-fixes).
- hwpoison: offline support: fix spelling in documentation/abi/ (git-fixes).
- hwrng: iproc-rng200 - implement suspend and resume calls (git-fixes).
- hwrng: nomadik - keep clock enabled while hwrng is registered (git-fixes).
- hwrng: pic32 - use devm_clk_get_enabled (git-fixes).
- i2c: bcm-iproc: fix bcm_iproc_i2c_isr deadlock issue (git-fixes).
- i2c: designware: correct length byte validation logic (git-fixes).
- i2c: designware: handle invalid smbus block data response length value (git-fixes).
- i2c: hisi: only handle the interrupt of the driver's transfer (git-fixes).
- i2c: improve size determinations (git-fixes).
- i2c: nomadik: remove a useless call in the remove function (git-fixes).
- i2c: nomadik: remove unnecessary goto label (git-fixes).
- i2c: nomadik: use devm_clk_get_enabled() (git-fixes).
- i40e: fix an null vs is_err() bug for debugfs_create_dir() (git-fixes).
- iavf: fix potential races for fdir filters (git-fixes).
- ib/hfi1: fix possible panic during hotplug remove (git-fixes)
- ib/uverbs: fix an potential error pointer dereference (git-fixes)
- ice: fix max_rate check while configuring tx rate limits (git-fixes).
- ice: fix memory management in ice_ethtool_fdir.c (git-fixes).
- ice: fix rdma vsi removal during queue rebuild (git-fixes).
- iio: adc: ina2xx: avoid null pointer dereference on of device match (git-fixes).
- iio: adc: stx104: implement and utilize register structures (git-fixes).
- iio: adc: stx104: utilize iomap interface (git-fixes).
- iio: cros_ec: fix the allocation size for cros_ec_command (git-fixes).
- input: exc3000 - properly stop timer on shutdown (git-fixes).
- intel/e1000:fix repeated words in comments (jsc#ped-5738).
- intel: remove unused macros (jsc#ped-5738).
- iommu/amd: add pci segment support for ivrs_ commands (git-fixes).
- iommu/amd: fix compile warning in init code (git-fixes).
- iommu/amd: fix ill-formed ivrs_ioapic, ivrs_hpet and ivrs_acpihid options (git-fixes).
- iommu/amd: fix ivrs_acpihid cmdline parsing code (git-fixes).
- iommu/amd: fix pci device refcount leak in ppr_notifier() (git-fixes).
- iommu/amd: use full 64-bit value in build_completion_wait() (git-fixes).
- iommu/arm-smmu-v3: check return value after calling platform_get_resource() (git-fixes).
- iommu/arm-smmu-v3: fix event handling soft lockup (git-fixes).
- iommu/arm-smmu-v3: make default domain type of hisilicon ptt device to identity (git-fixes).
- iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() (git-fixes).
- iommu/dart: initialize dart_streams_enable (git-fixes).
- iommu/dma: fix incorrect error return on iommu deferred attach (git-fixes).
- iommu/dma: fix iova map result check bug (git-fixes).
- iommu/dma: return error code from iommu_dma_map_sg() (git-fixes).
- iommu/fsl_pamu: fix resource leak in fsl_pamu_probe() (git-fixes).
- iommu/io-pgtable-arm-v7s: add a quirk to allow pgtable pa up to 35bit (git-fixes).
- iommu/iova: fix module config properly (git-fixes).
- iommu/omap: fix buffer overflow in debugfs (git-fixes).
- iommu/rockchip: fix permission bits in page table entries v2 (git-fixes).
- iommu/sun50i: consider all fault sources for reset (git-fixes).
- iommu/sun50i: fix flush size (git-fixes).
- iommu/sun50i: fix r/w permission check (git-fixes).
- iommu/sun50i: fix reset release (git-fixes).
- iommu/sun50i: implement .iotlb_sync_map (git-fixes).
- iommu/sun50i: remove iommu_domain_identity (git-fixes).
- iommu/vt-d: add rpls to quirk list to skip te disabling (git-fixes).
- iommu/vt-d: check correct capability for sagaw determination (git-fixes).
- iommu/vt-d: clean up si_domain in the init_dmars() error path (git-fixes).
- iommu/vt-d: correctly calculate sagaw value of iommu (git-fixes).
- iommu/vt-d: fix kdump kernels boot failure with scalable mode (git-fixes).
- iommu/vt-d: fix pci device refcount leak in dmar_dev_scope_init() (git-fixes).
- iommu/vt-d: fix pci device refcount leak in has_external_pci() (git-fixes).
- iommu/vt-d: preset access bit for iova in fl non-leaf paging entries (git-fixes).
- iommu/vt-d: set sre bit only when hardware has srs cap (git-fixes).
- ipmi:ssif: add check for kstrdup (git-fixes).
- ipmi:ssif: fix a memory leak when scanning for an adapter (git-fixes).
- ipmi_si: fix a memleak in try_smi_init() (git-fixes).
- jffs2: correct logic when creating a hole in jffs2_write_begin (git-fixes).
- kabi/severities: ignore newly added srso mitigation functions
- kabi: allow extra bugsints (bsc#1213927).
- kbuild: add -wno-shift-negative-value where -wextra is used (bsc#1214756).
- kbuild: move to -std=gnu11 (bsc#1214756).
- kernel-binary: common dependencies cleanup common dependencies are copied to a subpackage, there is no need for copying defines or build dependencies there.
- kernel-binary: drop code for kerntypes support kerntypes was a suse-specific feature dropped before sle 12.
- kunit: make kunit_test_timeout compatible with comment (git-fixes).
- kvm: s390: fix sthyi error handling (git-fixes bsc#1214370).
- leds: fix bug_on check for led_color_id_multi that is always false (git-fixes).
- leds: multicolor: use rounded division when calculating color components (git-fixes).
- leds: pwm: fix error code in led_pwm_create_fwnode() (git-fixes).
- leds: trigger: tty: do not use led_on/off constants, use led_blink_set_oneshot instead (git-fixes).
- leds: turris-omnia: drop unnecessary mutex locking (git-fixes).
- lib/test_meminit: allocate pages up to order max_order (git-fixes).
- lib/test_meminit: destroy cache in kmem_cache_alloc_bulk() test (git-fixes).
- libceph: fix potential hang in ceph_osdc_notify() (bsc#1214393).
- md/raid0: factor out helper for mapping and submitting a bio (bsc#1213916).
- md/raid0: fix performance regression for large sequential writes (bsc#1213916).
- media: ad5820: drop unsupported ad5823 from i2c_ and of_device_id tables (git-fixes).
- media: cx24120: add retval check for cx24120_message_send() (git-fixes).
- media: dib7000p: fix potential division by zero (git-fixes).
- media: dvb-usb: m920x: fix a potential memory leak in m920x_i2c_xfer() (git-fixes).
- media: go7007: remove redundant if statement (git-fixes).
- media: i2c: ccs: check rules is non-null (git-fixes).
- media: i2c: rdacm21: fix uninitialized value (git-fixes).
- media: i2c: tvp5150: check return value of devm_kasprintf() (git-fixes).
- media: ov2680: add ov2680_fill_format() helper function (git-fixes).
- media: ov2680: do not take the lock for try_fmt calls (git-fixes).
- media: ov2680: fix ov2680_bayer_order() (git-fixes).
- media: ov2680: fix ov2680_set_fmt() which == v4l2_subdev_format_try not working (git-fixes).
- media: ov2680: fix regulators being left enabled on ov2680_power_on() errors (git-fixes).
- media: ov2680: fix vflip / hflip set functions (git-fixes).
- media: ov2680: remove video_v4l2_subdev_api ifdef-s (git-fixes).
- media: ov5640: enable mipi interface in ov5640_set_power_mipi() (git-fixes).
- media: rkvdec: increase max supported height for h.264 (git-fixes).
- media: v4l2-core: fix a potential resource leak in v4l2_fwnode_parse_link() (git-fixes).
- media: v4l2-mem2mem: add lock to protect parameter num_rdy (git-fixes).
- media: venus: hfi_venus: only consider sys_idle_indicator on v1 (git-fixes).
- media: venus: hfi_venus: write to vidc_ctrl_init after unmasking interrupts (git-fixes).
- misc: rtsx: judge aspm mode to set petxcfg reg (git-fixes).
- mkspec: allow unsupported kmps (bsc#1214386)
- mlxsw: pci: add shutdown method in pci driver (git-fixes).
- mmc: block: fix in_flight[issue_type] value error (git-fixes).
- mmc: moxart: read scr register without changing byte order (git-fixes).
- mmc: wbsd: fix double mmc_free_host() in wbsd_init() (git-fixes).
- module: avoid allocation if module is already present and ready (bsc#1213921).
- module: extract patient module check into helper (bsc#1213921).
- module: move check_modinfo() early to early_mod_check() (bsc#1213921).
- module: move early sanity checks into a helper (bsc#1213921).
- move upstreamed hid patch into sorted section
- move upstreamed powerpc patches into sorted section
- mtd: rawnand: brcmnand: fix crash during the panic_write (git-fixes).
- mtd: rawnand: brcmnand: fix mtd oobsize (git-fixes).
- mtd: rawnand: brcmnand: fix potential false time out warning (git-fixes).
- mtd: rawnand: brcmnand: fix potential out-of-bounds access in oob write (git-fixes).
- mtd: rawnand: fsl_upm: fix an off-by one test in fun_exec_op() (git-fixes).
- mtd: rawnand: fsmc: handle clk prepare error in fsmc_nand_resume() (git-fixes).
- mtd: rawnand: omap_elm: fix incorrect type in assignment (git-fixes).
- mtd: rawnand: rockchip: align hwecc vs. raw page helper layouts (git-fixes).
- mtd: rawnand: rockchip: fix oobfree offset and description (git-fixes).
- mtd: spi-nor: check bus width while setting qe bit (git-fixes).
- mtd: spinand: toshiba: fix ecc_get_status (git-fixes).
- n_tty: rename tail to old_tail in n_tty_read() (git-fixes).
- net: hns3: fix wrong bw weight of disabled tc issue (git-fixes).
- net: ieee802154: at86rf230: stop leaking skb's (git-fixes).
- net: mana: fix mana vf unload when hardware is unresponsive (git-fixes).
- net: phy: at803x: remove set/get wol callbacks for ar8032 (git-fixes).
- net: phy: broadcom: stub c45 read/write for 54810 (git-fixes).
- net: phy: fix irq-based wake-on-lan over hibernate / power off (git-fixes).
- net: usb: lan78xx: reorder cleanup operations to avoid uaf bugs (git-fixes).
- net: usbnet: fix warning in usbnet_start_xmit/usb_submit_urb (git-fixes).
- netfs: fix lockdep warning from taking sb_writers whilst holding mmap_lock (bsc#1214742).
- netfs: fix missing xas_retry() calls in xarray iteration (bsc#1213946).
- netfs: fix parameter of cleanup() (bsc#1214743).
- nfsd: remove incorrect check in nfsd4_validate_stateid (git-fixes).
- nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput (git-fixes).
- nilfs2: fix warning in mark_buffer_dirty due to discarded buffer reuse (git-fixes).
- nvme-rdma: fix potential unbalanced freeze &amp; unfreeze (bsc#1208902).
- nvme-tcp: fix potential unbalanced freeze &amp; unfreeze (bsc#1208902).
- objtool/x86: fix srso mess (git-fixes).
- objtool/x86: fixup frame-pointer vs rethunk (git-fixes).
- objtool: union instruction::{call_dest,jump_table} (git-fixes).
- old-flavors: drop 2.6 kernels. 2.6 based kernels are eol, upgrading from them is no longer suported.
- pci/aspm: avoid link retraining race (git-fixes).
- pci/aspm: factor out pcie_wait_for_retrain() (git-fixes).
- pci/aspm: return 0 or -etimedout from pcie_retrain_link() (git-fixes).
- pci: acpiphp: reassign resources on bridge if necessary (git-fixes).
- pci: acpiphp: use pci_assign_unassigned_bridge_resources() only for non-root bus (git-fixes).
- pci: mark nvidia t4 gpus to avoid bus reset (git-fixes).
- pci: meson: remove cast between incompatible function type (git-fixes).
- pci: microchip: correct the ded and sec interrupt bit offsets (git-fixes).
- pci: microchip: remove cast between incompatible function type (git-fixes).
- pci: pciehp: use rmw accessors for changing lnkctl (git-fixes).
- pci: rockchip: remove writes to unused registers (git-fixes).
- pci: s390: fix use-after-free of pci resources with per-function hotplug (git-fixes).
- pci: tegra194: fix possible array out of bounds access (git-fixes).
- pcmcia: rsrc_nonstatic: fix memory leak in nonstatic_release_resource_db() (git-fixes).
- phy/rockchip: inno-hdmi: do not power on rk3328 post pll on reg write (git-fixes).
- phy/rockchip: inno-hdmi: round fractal pixclock in rk3328 recalc_rate (git-fixes).
- phy/rockchip: inno-hdmi: use correct vco_div_5 macro on rk3328 (git-fixes).
- phy: qcom-snps-femto-v2: keep cfg_ahb_clk enabled during runtime suspend (git-fixes).
- phy: qcom-snps-femto-v2: properly enable ref clock (git-fixes).
- phy: qcom-snps: correct struct qcom_snps_hsphy kerneldoc (git-fixes).
- phy: qcom-snps: use dev_err_probe() to simplify code (git-fixes).
- pinctrl: cherryview: fix address_space_handler() argument (git-fixes).
- pinctrl: mcp23s08: check return value of devm_kasprintf() (git-fixes).
- pinctrl: renesas: rza2: add lock around pinctrl_generic{{add,remove}_group,{add,remove}_function} (git-fixes).
- platform/x86: dell-sysman: fix reference leak (git-fixes).
- pm / devfreq: fix leak in devfreq_dev_release() (git-fixes).
- powerpc/64e: fix kexec build error (bsc#1212091 ltc#199106).
- powerpc/iommu: do not set failed sg dma_address to dma_mapping_error (bsc#1212091 ltc#199106).
- powerpc/iommu: fix iommu_table_in_use for a small default dma window case (bsc#1212091 ltc#199106).
- powerpc/iommu: incorrect ddw table is referenced for sr-iov device (bsc#1212091 ltc#199106).
- powerpc/iommu: return error code from .map_sg() ops (bsc#1212091 ltc#199106).
- powerpc/iommu: tces are incorrectly manipulated with dlpar add/remove of memory (bsc#1212091 ltc#199106).
- powerpc/kernel/iommu: add new iommu_table_in_use() helper (bsc#1212091 ltc#199106).
- powerpc/kexec: fix build failure from uninitialised variable (bsc#1212091 ltc#199106).
- powerpc/mm/altmap: fix altmap boundary check (bsc#1120059 git-fixes).
- powerpc/pseries/ddw: do not try direct mapping with persistent memory and one window (bsc#1212091 ltc#199106).
- powerpc/pseries/ddw: simplify enable_ddw() (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: add ddw_list_new_entry() helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: add ddw_property_create() and refactor enable_ddw() (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: add iommu_pseries_alloc_table() helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: add of_node_put() before break (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: allow ddw windows starting at 0x00 (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: check if the default window in use before removing it (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: create huge dma window if no mmio32 is present (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: find existing ddw with given property name (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: make use of ddw for indirect mapping (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: print ibm,query-pe-dma-windows parameters (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: rename 'direct window' to 'dma window' (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: reorganize iommu_table_setparms*() with new helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: replace hard-coded page shift (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: update remove_dma_window() to accept property name (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: use correct vfree for it_map (bsc#1212091 ltc#199106).
- powerpc/pseries: add __init attribute to eligible functions (bsc#1212091 ltc#199106).
- powerpc/pseries: honour current smt state when dlpar onlining cpus (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/pseries: initialise cpu hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/rtas: block error injection when locked down (bsc#1023051).
- powerpc/rtas: enture rtas_call is called with mmu enabled (bsc#1023051).
- powerpc/rtas_flash: allow user copy to flash block cache objects (bsc#1194869).
- powerpc/security: fix speculation_store_bypass reporting on power10 (bsc#1188885 ltc#193722 git-fixes).
- powerpc: add hotplug_smt support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). update config files.
- powerpc: fix typos in comments (bsc#1212091 ltc#199106).
- powerpc: move dma64_propname define to a header (bsc#1214297 ltc#197503).
- pseries/iommu/ddw: fix kdump to work in absence of ibm,dma-window (bsc#1214297 ltc#197503).
- pstore/ram: check start of empty przs during init (git-fixes).
- pwm: add a stub for devm_pwmchip_add() (git-fixes).
- pwm: meson: fix handling of period/duty if greater than uint_max (git-fixes).
- pwm: meson: simplify duplicated per-channel tracking (git-fixes).
- qed: fix scheduling in a tasklet while getting stats (git-fixes).
- rdma/bnxt_re: fix error handling in probe failure path (git-fixes)
- rdma/bnxt_re: fix max_qp count for virtual functions (git-fixes)
- rdma/efa: fix wrong resources deallocation order (git-fixes)
- rdma/hns: fix cq and qp cache affinity (git-fixes)
- rdma/hns: fix incorrect post-send with direct wqe of wr-list (git-fixes)
- rdma/hns: fix port active speed (git-fixes)
- rdma/irdma: prevent zero-length stag registration (git-fixes)
- rdma/irdma: replace one-element array with flexible-array member (git-fixes)
- rdma/mlx5: return the firmware result upon destroying qp/rq (git-fixes)
- rdma/qedr: remove a duplicate assignment in irdma_query_ah() (git-fixes)
- rdma/siw: balance the reference of cep-&gt;kref in the error path (git-fixes)
- rdma/siw: correct wrong debug message (git-fixes)
- rdma/umem: set iova in odp flow (git-fixes)
- readme.branch: add miroslav franc as a sle15-sp4 co-maintainer.
- regmap: rbtree: use alloc_flags for memory allocations (git-fixes).
- revert 'ib/isert: fix incorrect release of isert connection' (git-fixes)
- revert 'tracing: add '(fault)' name injection to kernel probes' (git-fixes).
- ring-buffer: do not swap cpu_buffer during resize process (git-fixes).
- ring-buffer: fix deadloop issue on reading trace_pipe (git-fixes).
- ring-buffer: fix wrong stat of cpu_buffer-&gt;read (git-fixes).
- rpmsg: glink: add check for kstrdup (git-fixes).
- s390/purgatory: disable branch profiling (git-fixes bsc#1214372).
- sched/fair: fix inaccurate tally of ttwu_move_affine (git fixes).
- sched/fair: use recent_used_cpu to test p-&gt;cpus_ptr (git fixes).
- sched/psi: use kernfs polling functions for psi trigger polling (bsc#1209799).
- scsi: bsg: increase number of devices (bsc#1210048).
- scsi: core: do not wait for quiesce in scsi_device_block() (bsc#1209284).
- scsi: core: do not wait for quiesce in scsi_stop_queue() (bsc#1209284).
- scsi: core: improve warning message in scsi_device_block() (bsc#1209284).
- scsi: core: merge scsi_internal_device_block() and device_block() (bsc#1209284).
- scsi: rdma/srp: fix residual handling (git-fixes)
- scsi: sg: increase number of devices (bsc#1210048).
- scsi: storvsc: always set no_report_opcodes (git-fixes).
- scsi: storvsc: fix handling of virtual fibre channel timeouts (git-fixes).
- scsi: storvsc: handle srb status value 0x30 (git-fixes).
- scsi: storvsc: limit max_sectors for virtual fibre channel devices (git-fixes).
- scsi: zfcp: defer fc_rport blocking until after adisc response (git-fixes bsc#1214371).
- selftests/futex: order calls to futex_lock_pi (git-fixes).
- selftests/harness: actually report skip for signal tests (git-fixes).
- selftests/resctrl: close perf value read fd on errors (git-fixes).
- selftests/resctrl: do not leak buffer in fill_cache() (git-fixes).
- selftests/resctrl: unmount resctrl fs if child fails to run benchmark (git-fixes).
- selftests/rseq: check if libc rseq support is registered (git-fixes).
- selftests: forwarding: add a helper to skip test when using veth pairs (git-fixes).
- selftests: forwarding: ethtool: skip when using veth pairs (git-fixes).
- selftests: forwarding: ethtool_extended_state: skip when using veth pairs (git-fixes).
- selftests: forwarding: skip test when no interfaces are specified (git-fixes).
- selftests: forwarding: switch off timeout (git-fixes).
- selftests: forwarding: tc_actions: cleanup temporary files when test is aborted (git-fixes).
- selftests: forwarding: tc_actions: use ncat instead of nc (git-fixes).
- selftests: forwarding: tc_flower: relax success criterion (git-fixes).
- selftests: mirror_gre_changes: tighten up the ttl test match (git-fixes).
- serial: sc16is7xx: fix broken port 0 uart init (git-fixes).
- serial: sc16is7xx: fix bug when first setting gpio direction (git-fixes).
- serial: sprd: assign sprd_port after initialized to avoid wrong access (git-fixes).
- serial: sprd: fix dma buffer leak issue (git-fixes).
- serial: tegra: handle clk prepare error in tegra_uart_hw_init() (git-fixes).
- sfc: fix crash when reading stats while nic is resetting (git-fixes).
- smb3: do not send lease break acknowledgment if all file handles have been closed (git-fixes).
- smb3: do not set ntlmssp_version flag for negotiate not auth request (bsc#1193629).
- smb: client: fix -wstringop-overflow issues (bsc#1193629).
- smb: client: fix dfs link mount against w2k8 (bsc#1212142).
- smb: client: fix null auth (git-fixes).
- soc: aspeed: socinfo: add kfree for kstrdup (git-fixes).
- soundwire: bus: pm_runtime_request_resume on peripheral attachment (git-fixes).
- soundwire: fix enumeration completion (git-fixes).
- spi: tegra20-sflash: fix to check return value of platform_get_irq() in tegra_sflash_probe() (git-fixes).
- supported.conf: fix typos for -!optional markers
- target: compare and write backend driver sense handling (bsc#1177719 bsc#1213026).
- target_core_rbd: fix leak and reduce kmalloc calls (bsc#1212873).
- target_core_rbd: fix rbd_img_request.snap_id assignment (bsc#1212857).
- target_core_rbd: remove snapshot existence validation code (bsc#1212857).
- thunderbolt: read retimer nvm authentication status prior tb_retimer_set_inbound_sbtx() (git-fixes).
- timers: add shutdown mechanism to the internal functions (bsc#1213970).
- timers: provide timer_shutdown[_sync]() (bsc#1213970).
- timers: rename del_timer() to timer_delete() (bsc#1213970).
- timers: rename del_timer_sync() to timer_delete_sync() (bsc#1213970).
- timers: replace bug_on()s (bsc#1213970).
- timers: silently ignore timers with a null function (bsc#1213970).
- timers: split [try_to_]del_timer[_sync]() to prepare for shutdown mode (bsc#1213970).
- timers: update kernel-doc for various functions (bsc#1213970).
- timers: use del_timer_sync() even on up (bsc#1213970).
- tracing/histograms: add histograms to hist_vars if they have referenced variables (git-fixes).
- tracing/histograms: return an error if we fail to add histogram to hist_vars list (git-fixes).
- tracing/probes: fix not to count error code to total length (git-fixes).
- tracing/probes: fix to avoid double count of the string length on the array (git-fixes).
- tracing/probes: fix to record 0-length data_loc in fetch_store_string*() if fails (git-fixes).
- tracing: fix cpu buffers unavailable due to 'record_disabled' missed (git-fixes).
- tracing: fix memleak due to race between current_tracer and trace (git-fixes).
- tracing: fix memory leak of iter-&gt;temp when reading trace_pipe (git-fixes).
- tracing: fix null pointer dereference in tracing_err_log_open() (git-fixes).
- tracing: fix warning in trace_buffered_event_disable() (git-fixes).
- tty: fix hang on tty device with no_room set (git-fixes).
- tty: n_gsm: fix the uaf caused by race condition in gsm_cleanup_mux (git-fixes).
- tty: serial: fsl_lpuart: add i.mxrt1050 support (git-fixes).
- tty: serial: fsl_lpuart: clear the error flags by writing 1 for lpuart32 platforms (git-fixes).
- tty: serial: fsl_lpuart: make rx_watermark configurable for different platforms (git-fixes).
- tty: serial: fsl_lpuart: reduce rx watermark to 0 on ls1028a (git-fixes).
- ubifs: fix memleak when insert_old_idx() failed (git-fixes).
- update cpufreq-intel_pstate-fix-cpu-pstate.turbo_freq-initi (git-fixes bsc#1212526 bsc#1214368 jsc#ped-4927 jsc#ped-4929).
- usb-storage: alauda: fix uninit-value in alauda_check_media() (git-fixes).
- usb: chipidea: imx: add missing usb phy dpdm wakeup setting (git-fixes).
- usb: chipidea: imx: do not request qos for imx8ulp (git-fixes).
- usb: chipidea: imx: improve logic if samsung,picophy-* parameter is 0 (git-fixes).
- usb: common: usb-conn-gpio: prevent bailing out if initial role is none (git-fixes).
- usb: dwc3: fix typos in gadget.c (git-fixes).
- usb: dwc3: meson-g12a: do post init to fix broken usb after resumption (git-fixes).
- usb: dwc3: properly handle processing of pending events (git-fixes).
- usb: gadget: f_mass_storage: fix unused variable warning (git-fixes).
- usb: gadget: fix the memory leak in raw_gadget driver (git-fixes).
- usb: gadget: u_serial: avoid spinlock recursion in __gs_console_push (git-fixes).
- usb: ohci-at91: fix the unhandle interrupt when resume (git-fixes).
- usb: phy: mxs: fix getting wrong state with mxs_phy_is_otg_host() (git-fixes).
- usb: quirks: add quirk for focusrite scarlett (git-fixes).
- usb: serial: option: add quectel ec200a module support (git-fixes).
- usb: serial: option: support quectel em060k_128 (git-fixes).
- usb: serial: simple: add kaufmann rks+can vcp (git-fixes).
- usb: serial: simple: sort driver entries (git-fixes).
- usb: typec: altmodes/displayport: signal hpd when configuring pin assignment (git-fixes).
- usb: typec: tcpm: fix response to vsafe0v event (git-fixes).
- usb: typec: tcpm: set initial svdm version based on pd revision (git-fixes).
- usb: zaurus: add id for a-300/b-500/c-700 (git-fixes).
- watchdog: sp5100_tco: support hygon fch/sch (server controller hub) (git-fixes).
- wifi: ath10k: use rmw accessors for changing lnkctl (git-fixes).
- wifi: ath11k: use rmw accessors for changing lnkctl (git-fixes).
- wifi: ath9k: fix races between ath9k_wmi_cmd and ath9k_wmi_ctrl_rx (git-fixes).
- wifi: ath9k: protect wmi command response buffer replacement with a lock (git-fixes).
- wifi: ath9k: use is_err() with debugfs_create_dir() (git-fixes).
- wifi: cfg80211: fix return value in scan logic (git-fixes).
- wifi: cfg80211: fix sband iftype data lookup for ap_vlan (git-fixes).
- wifi: mt76: mt7615: do not advertise 5 ghz on first phy of mt7615d (dbdc) (git-fixes).
- wifi: mt76: mt7915: fix power-limits while chan_switch (git-fixes).
- wifi: mt76: mt7921: do not support one stream on secondary antenna only (git-fixes).
- wifi: mt76: testmode: add nla_policy for mt76_tm_attr_tx_length (git-fixes).
- wifi: mwifiex: avoid possible null skb pointer dereference (git-fixes).
- wifi: mwifiex: fix error recovery in pcie buffer descriptor management (git-fixes).
- wifi: mwifiex: fix memory leak in mwifiex_histogram_read() (git-fixes).
- wifi: mwifiex: fix missed return in oob checks failed path (git-fixes).
- wifi: mwifiex: fix oob and integer underflow when rx packets (git-fixes).
- wifi: nl80211/cfg80211: add forgotten nla_policy for bss color attribute (git-fixes).
- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
- wifi: rtw89: debug: fix error handling in rtw89_debug_priv_btc_manual_set() (git-fixes).
- x86/alternative: make custom return thunk unconditional (git-fixes).
- x86/cpu/amd: disable xsaves on amd family 0x17 (git-fixes).
- x86/cpu/kvm: provide untrain_ret_vm (git-fixes).
- x86/cpu: clean up srso return thunk mess (git-fixes).
- x86/cpu: cleanup the untrain mess (git-fixes).
- x86/cpu: fix __x86_return_thunk symbol type (git-fixes).
- x86/cpu: fix up srso_safe_ret() and __x86_return_thunk() (git-fixes).
- x86/cpu: rename original retbleed methods (git-fixes).
- x86/cpu: rename srso_(.*)_alias to srso_alias_\1 (git-fixes).
- x86/mce: make sure logged mces are processed after sysfs update (git-fixes).
- x86/retpoline,kprobes: fix position of thunk sections with config_lto_clang (git-fixes).
- x86/retpoline,kprobes: skip optprobe check for indirect jumps with retpolines and ibt (git-fixes).
- x86/retpoline: do not clobber rflags during srso_safe_ret() (git-fixes).
- x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).
- x86/speculation: add cpu_show_gds() prototype (git-fixes).
- x86/speculation: mark all skylake cpus as vulnerable to gds (git-fixes).
- x86/srso: correct the mitigation status when smt is disabled (git-fixes).
- x86/srso: disable the mitigation on unaffected configurations (git-fixes).
- x86/srso: explain the untraining sequences a bit more (git-fixes).
- x86/srso: fix build breakage with the llvm linker (git-fixes).
- x86/srso: fix return thunks in generated code (git-fixes).
- x86/static_call: fix __static_call_fixup() (git-fixes).
- xfs: fix sb write verify for lazysbcount (bsc#1214661).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2023-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120059">SUSE bug 1120059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208902">SUSE bug 1208902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208949">SUSE bug 1208949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209284">SUSE bug 1209284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210048">SUSE bug 1210048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210448">SUSE bug 1210448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212091">SUSE bug 1212091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212142">SUSE bug 1212142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212526">SUSE bug 1212526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212857">SUSE bug 1212857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212873">SUSE bug 1212873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213026">SUSE bug 1213026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213546">SUSE bug 1213546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213601">SUSE bug 1213601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213757">SUSE bug 1213757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213759">SUSE bug 1213759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213916">SUSE bug 1213916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213921">SUSE bug 1213921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213927">SUSE bug 1213927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213946">SUSE bug 1213946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213968">SUSE bug 1213968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213970">SUSE bug 1213970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213971">SUSE bug 1213971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214000">SUSE bug 1214000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214019">SUSE bug 1214019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214120">SUSE bug 1214120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214149">SUSE bug 1214149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214180">SUSE bug 1214180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214238">SUSE bug 1214238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214297">SUSE bug 1214297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214299">SUSE bug 1214299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214350">SUSE bug 1214350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214368">SUSE bug 1214368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214370">SUSE bug 1214370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214371">SUSE bug 1214371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214372">SUSE bug 1214372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214380">SUSE bug 1214380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214386">SUSE bug 1214386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214392">SUSE bug 1214392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214393">SUSE bug 1214393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214397">SUSE bug 1214397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214428">SUSE bug 1214428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214451">SUSE bug 1214451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214635">SUSE bug 1214635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214659">SUSE bug 1214659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214661">SUSE bug 1214661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214729">SUSE bug 1214729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214742">SUSE bug 1214742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214743">SUSE bug 1214743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214756">SUSE bug 1214756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215522">SUSE bug 1215522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215523">SUSE bug 1215523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215552">SUSE bug 1215552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215553">SUSE bug 1215553</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2007/">CVE-2023-2007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2007">CVE-2023-2007 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34319/">CVE-2023-34319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4133/">CVE-2023-4133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4387/">CVE-2023-4387 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4459/">CVE-2023-4459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4569/">CVE-2023-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798105" comment="kernel-default-5.14.21-150400.24.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798106" comment="kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206043" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215713" ref_url="https://bugzilla.suse.com/1215713" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-35945" ref_url="https://www.suse.com/security/cve/CVE-2023-35945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016564.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

- CVE-2023-35945: Fixed memory leak when PUSH_PROMISE or HEADERS frame cannot be sent (bsc#1215713).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-06"/>
	<updated date="2023-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215713">SUSE bug 1215713</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35945/">CVE-2023-35945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35945">CVE-2023-35945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798971" comment="libnghttp2-14-1.40.0-150200.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206044" version="1" class="patch">
	<metadata>
		<title>Security update for conmon (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215806" ref_url="https://bugzilla.suse.com/1215806" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016624.html" source="SUSE-SU"/>
		<description>
This update for conmon fixes the following issues:

conmon was rebuilt using go1.21 (bsc#1215806)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-10"/>
	<updated date="2023-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215806">SUSE bug 1215806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800353" comment="conmon-2.1.7-150400.3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206045" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215888" ref_url="https://bugzilla.suse.com/1215888" source="BUGZILLA"/>
		<reference ref_id="1215889" ref_url="https://bugzilla.suse.com/1215889" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545/" source="CVE"/>
		<reference ref_id="CVE-2023-38546" ref_url="https://www.suse.com/security/cve/CVE-2023-38546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032069.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-38545: Fixed a heap buffer overflow in SOCKS5. (bsc#1215888)
- CVE-2023-38546: Fixed a cookie injection with none file. (bsc#1215889)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2023-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215888">SUSE bug 1215888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215889">SUSE bug 1215889</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-38546/">CVE-2023-38546 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801459" comment="curl-8.0.1-150400.5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801460" comment="libcurl4-8.0.1-150400.5.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206046" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215744" ref_url="https://bugzilla.suse.com/1215744" source="BUGZILLA"/>
		<reference ref_id="1215746" ref_url="https://bugzilla.suse.com/1215746" source="BUGZILLA"/>
		<reference ref_id="1215747" ref_url="https://bugzilla.suse.com/1215747" source="BUGZILLA"/>
		<reference ref_id="1215748" ref_url="https://bugzilla.suse.com/1215748" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34323" ref_url="https://www.suse.com/security/cve/CVE-2023-34323/" source="CVE"/>
		<reference ref_id="CVE-2023-34325" ref_url="https://www.suse.com/security/cve/CVE-2023-34325/" source="CVE"/>
		<reference ref_id="CVE-2023-34326" ref_url="https://www.suse.com/security/cve/CVE-2023-34326/" source="CVE"/>
		<reference ref_id="CVE-2023-34327" ref_url="https://www.suse.com/security/cve/CVE-2023-34327/" source="CVE"/>
		<reference ref_id="CVE-2023-34328" ref_url="https://www.suse.com/security/cve/CVE-2023-34328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-34323: A transaction conflict can crash C Xenstored (XSA-440, bsc#1215744)
- CVE-2023-34326: Missing IOMMU TLB flushing (XSA-442, bsc#1215746)
- CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443, bsc#1215747)
- CVE-2023-34327: Debug Mask handling (XSA-444, bsc#1215748)
- CVE-2023-34328: Debug Mask handling (XSA-444, bsc#1215748)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-12"/>
	<updated date="2023-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215744">SUSE bug 1215744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215746">SUSE bug 1215746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215747">SUSE bug 1215747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215748">SUSE bug 1215748</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34323/">CVE-2023-34323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34323">CVE-2023-34323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-34325/">CVE-2023-34325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34325">CVE-2023-34325 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34326/">CVE-2023-34326 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34326">CVE-2023-34326 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34327/">CVE-2023-34327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34327">CVE-2023-34327 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34328/">CVE-2023-34328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34328">CVE-2023-34328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801299" comment="xen-libs-4.16.5_06-150400.4.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206047" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1179993" ref_url="https://bugzilla.suse.com/1179993" source="BUGZILLA"/>
		<reference ref_id="1181740" ref_url="https://bugzilla.suse.com/1181740" source="BUGZILLA"/>
		<reference ref_id="1188609" ref_url="https://bugzilla.suse.com/1188609" source="BUGZILLA"/>
		<reference ref_id="1190011" ref_url="https://bugzilla.suse.com/1190011" source="BUGZILLA"/>
		<reference ref_id="1207205" ref_url="https://bugzilla.suse.com/1207205" source="BUGZILLA"/>
		<reference ref_id="1212850" ref_url="https://bugzilla.suse.com/1212850" source="BUGZILLA"/>
		<reference ref_id="1213663" ref_url="https://bugzilla.suse.com/1213663" source="BUGZILLA"/>
		<reference ref_id="1213925" ref_url="https://bugzilla.suse.com/1213925" source="BUGZILLA"/>
		<reference ref_id="1215311" ref_url="https://bugzilla.suse.com/1215311" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3638" ref_url="https://www.suse.com/security/cve/CVE-2021-3638/" source="CVE"/>
		<reference ref_id="CVE-2021-3750" ref_url="https://www.suse.com/security/cve/CVE-2021-3750/" source="CVE"/>
		<reference ref_id="CVE-2023-0330" ref_url="https://www.suse.com/security/cve/CVE-2023-0330/" source="CVE"/>
		<reference ref_id="CVE-2023-3180" ref_url="https://www.suse.com/security/cve/CVE-2023-3180/" source="CVE"/>
		<reference ref_id="CVE-2023-3354" ref_url="https://www.suse.com/security/cve/CVE-2023-3354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2023-3180: Fixed a buffer overflow in the virtio-crypto device
  (bsc#1213925).
- CVE-2021-3750: Fixed a DMA reentrancy in the USB EHCI device that
  could lead to use-after-free (bsc#1190011).
- CVE-2021-3638: Fixed a buffer overflow in the ati-vga device
  (bsc#1188609).
- CVE-2023-3354: Fixed an issue when performing a TLS handshake that
  could lead to remote denial of service via VNC connection
  (bsc#1212850).
- CVE-2023-0330: Fixed a DMA reentrancy issue in the lsi53c895a device
  that could lead to a stack overflow (bsc#1207205).

Non-security fixes:

- Fixed a potential build issue in the librm subcomponent
  (bsc#1215311).
- Fixed a potential crash during VM migration (bsc#1213663).
- Fixed potential issues during installation on a Xen host
  (bsc#1179993, bsc#1181740).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-12"/>
	<updated date="2023-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179993">SUSE bug 1179993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181740">SUSE bug 1181740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190011">SUSE bug 1190011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207205">SUSE bug 1207205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212850">SUSE bug 1212850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213663">SUSE bug 1213663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213925">SUSE bug 1213925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215311">SUSE bug 1215311</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3638/">CVE-2021-3638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3638">CVE-2021-3638 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3750/">CVE-2021-3750 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3750">CVE-2021-3750 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0330/">CVE-2023-0330 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0330">CVE-2023-0330 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3180/">CVE-2023-3180 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3180">CVE-2023-3180 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3354/">CVE-2023-3354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3354">CVE-2023-3354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800600" comment="qemu-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800547" comment="qemu-accel-tcg-x86-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800548" comment="qemu-arm-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800601" comment="qemu-audio-spice-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800602" comment="qemu-chardev-spice-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800603" comment="qemu-guest-agent-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800604" comment="qemu-hw-display-qxl-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800605" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800606" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800607" comment="qemu-hw-usb-redirect-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800518" comment="qemu-ipxe-1.0.0+-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800560" comment="qemu-s390x-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800526" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800527" comment="qemu-sgabios-8-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800608" comment="qemu-tools-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800609" comment="qemu-ui-opengl-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800610" comment="qemu-ui-spice-core-6.2.0-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800535" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800565" comment="qemu-x86-6.2.0-150400.37.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206048" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213940" ref_url="https://bugzilla.suse.com/1213940" source="BUGZILLA"/>
		<reference ref_id="1215904" ref_url="https://bugzilla.suse.com/1215904" source="BUGZILLA"/>
		<reference ref_id="1215905" ref_url="https://bugzilla.suse.com/1215905" source="BUGZILLA"/>
		<reference ref_id="1215908" ref_url="https://bugzilla.suse.com/1215908" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4091" ref_url="https://www.suse.com/security/cve/CVE-2023-4091/" source="CVE"/>
		<reference ref_id="CVE-2023-4154" ref_url="https://www.suse.com/security/cve/CVE-2023-4154/" source="CVE"/>
		<reference ref_id="CVE-2023-42669" ref_url="https://www.suse.com/security/cve/CVE-2023-42669/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016646.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2023-4091: Fixed a bug where a client can truncate file with read-only permissions. (bsc#1215904)
- CVE-2023-42669: Fixed a bug in 'rpcecho' development server which allows Denial of Service via sleep() call on AD DC. (bso#1215905)
- CVE-2023-4154: Fixed a bug in dirsync which allows SYSTEM access with only 'GUID_DRS_GET_CHANGES' right. (bsc#1215908)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-12"/>
	<updated date="2023-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213940">SUSE bug 1213940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215904">SUSE bug 1215904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215905">SUSE bug 1215905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215908">SUSE bug 1215908</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4091/">CVE-2023-4091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4154/">CVE-2023-4154 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4154">CVE-2023-4154 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42669/">CVE-2023-42669 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42669">CVE-2023-42669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801461" comment="samba-client-libs-4.15.13+git.691.3d3cea0641-150400.3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801462" comment="samba-libs-4.15.13+git.691.3d3cea0641-150400.3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206049" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1202845" ref_url="https://bugzilla.suse.com/1202845" source="BUGZILLA"/>
		<reference ref_id="1213808" ref_url="https://bugzilla.suse.com/1213808" source="BUGZILLA"/>
		<reference ref_id="1214928" ref_url="https://bugzilla.suse.com/1214928" source="BUGZILLA"/>
		<reference ref_id="1214940" ref_url="https://bugzilla.suse.com/1214940" source="BUGZILLA"/>
		<reference ref_id="1214941" ref_url="https://bugzilla.suse.com/1214941" source="BUGZILLA"/>
		<reference ref_id="1214942" ref_url="https://bugzilla.suse.com/1214942" source="BUGZILLA"/>
		<reference ref_id="1214943" ref_url="https://bugzilla.suse.com/1214943" source="BUGZILLA"/>
		<reference ref_id="1214944" ref_url="https://bugzilla.suse.com/1214944" source="BUGZILLA"/>
		<reference ref_id="1214950" ref_url="https://bugzilla.suse.com/1214950" source="BUGZILLA"/>
		<reference ref_id="1214951" ref_url="https://bugzilla.suse.com/1214951" source="BUGZILLA"/>
		<reference ref_id="1214954" ref_url="https://bugzilla.suse.com/1214954" source="BUGZILLA"/>
		<reference ref_id="1214957" ref_url="https://bugzilla.suse.com/1214957" source="BUGZILLA"/>
		<reference ref_id="1214986" ref_url="https://bugzilla.suse.com/1214986" source="BUGZILLA"/>
		<reference ref_id="1214988" ref_url="https://bugzilla.suse.com/1214988" source="BUGZILLA"/>
		<reference ref_id="1214992" ref_url="https://bugzilla.suse.com/1214992" source="BUGZILLA"/>
		<reference ref_id="1214993" ref_url="https://bugzilla.suse.com/1214993" source="BUGZILLA"/>
		<reference ref_id="1215322" ref_url="https://bugzilla.suse.com/1215322" source="BUGZILLA"/>
		<reference ref_id="1215877" ref_url="https://bugzilla.suse.com/1215877" source="BUGZILLA"/>
		<reference ref_id="1215894" ref_url="https://bugzilla.suse.com/1215894" source="BUGZILLA"/>
		<reference ref_id="1215895" ref_url="https://bugzilla.suse.com/1215895" source="BUGZILLA"/>
		<reference ref_id="1215896" ref_url="https://bugzilla.suse.com/1215896" source="BUGZILLA"/>
		<reference ref_id="1215911" ref_url="https://bugzilla.suse.com/1215911" source="BUGZILLA"/>
		<reference ref_id="1215915" ref_url="https://bugzilla.suse.com/1215915" source="BUGZILLA"/>
		<reference ref_id="1215916" ref_url="https://bugzilla.suse.com/1215916" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206/" source="CVE"/>
		<reference ref_id="CVE-2023-1859" ref_url="https://www.suse.com/security/cve/CVE-2023-1859/" source="CVE"/>
		<reference ref_id="CVE-2023-2177" ref_url="https://www.suse.com/security/cve/CVE-2023-2177/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-39194" ref_url="https://www.suse.com/security/cve/CVE-2023-39194/" source="CVE"/>
		<reference ref_id="CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-4389" ref_url="https://www.suse.com/security/cve/CVE-2023-4389/" source="CVE"/>
		<reference ref_id="CVE-2023-4563" ref_url="https://www.suse.com/security/cve/CVE-2023-4563/" source="CVE"/>
		<reference ref_id="CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-4563: Fixed an use-after-free flaw in the nftables sub-component. This vulnerability could allow a local attacker to crash the system or lead to a kernel information leak problem. (bsc#1214727)
- CVE-2023-39194: Fixed a flaw in the processing of state filters which could allow a local attackers to disclose sensitive information. (bsc#1215861)
- CVE-2023-39193: Fixed a flaw in the processing of state filters which could allow a local attackers to disclose sensitive information. (bsc#1215860)
- CVE-2023-39192: Fixed a flaw in the u32_match_it function which could allow a local attackers to disclose sensitive information. (bsc#1215858)
- CVE-2023-42754: Fixed a null pointer dereference in ipv4_link_failure which could lead an authenticated attacker to trigger a DoS. (bsc#1215467)
- CVE-2023-5345: fixed an use-after-free vulnerability in the fs/smb/client component which could be exploited to achieve local privilege escalation. (bsc#1215899)
- CVE-2023-4155: Fixed a flaw in KVM AMD Secure Encrypted Virtualization (SEV). An attacker can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages. (bsc#1214022)
- CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that could be exploited in order to leak internal kernel information or crash the system (bsc#1214351).
- CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1215150).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95% (bsc#1212703).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalatio (bsc#1215275).
- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system (bsc#1210643).
- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).

The following non-security bugs were fixed:

- ALSA: hda/cirrus: Fix broken audio on hardware with two CS42L42 codecs (git-fixes).
- ALSA: hda/realtek: Splitting the UX3402 into two separate models (git-fixes).
- ARM: pxa: remove use of symbol_get() (git-fixes).
- arm64: csum: Fix OoB access in IP checksum code for negative lengths (git-fixes).
- arm64: module-plts: inline linux/moduleloader.h (git-fixes)
- arm64: module: Use module_init_layout_section() to spot init sections (git-fixes)
- arm64: sdei: abort running SDEI handlers during crash (git-fixes)
- arm64: tegra: Update AHUB clock parent and rate (git-fixes)
- arm64/fpsimd: Only provide the length to cpufeature for xCR registers (git-fixes)
- ASoC: imx-audmix: Fix return error with devm_clk_get() (git-fixes).
- ASoC: meson: spdifin: start hw on dai probe (git-fixes).
- ASoC: soc-utils: Export snd_soc_dai_is_dummy() symbol (git-fixes).
- ASoC: tegra: Fix redundant PLLA and PLLA_OUT0 updates (git-fixes).
- ata: libata: disallow dev-initiated LPM transitions to unsupported states (git-fixes).
- ata: pata_falcon: fix IO base selection for Q40 (git-fixes).
- ata: pata_ftide010: Add missing MODULE_DESCRIPTION (git-fixes).
- ata: sata_gemini: Add missing MODULE_DESCRIPTION (git-fixes).
- backlight: gpio_backlight: Drop output GPIO direction check for initial power state (git-fixes).
- blk-iocost: fix divide by 0 error in calc_lcoefs() (bsc#1214986).
- blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost (bsc#1214992).
- block/mq-deadline: use correct way to throttling write requests (bsc#1214993).
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition (git-fixes).
- bnx2x: new flag for track HW resource allocation (bsc#1202845 bsc#1215322).
- bpf: Clear the probe_addr for uprobe (git-fixes).
- btrfs: do not hold CPU for too long when defragging a file (bsc#1214988).
- drm: gm12u320: Fix the timeout usage for usb_bulk_msg() (git-fixes).
- drm/amd/display: fix the white screen issue when &gt;= 64GB DRAM (git-fixes).
- drm/amd/display: prevent potential division by zero errors (git-fixes).
- drm/display: Do not assume dual mode adaptors support i2c sub-addressing (bsc#1213808).
- drm/i915: mark requests for GuC virtual engines to avoid use-after-free (git-fixes).
- drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt() (git-fixes).
- drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling (git-fixes).
- drm/virtio: Use appropriate atomic state in virtio_gpu_plane_cleanup_fb() (git-fixes).
- ext4: avoid potential data overflow in next_linear_group (bsc#1214951).
- ext4: correct inline offset when handling xattrs in inode body (bsc#1214950).
- ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954).
- ext4: fix wrong unit use in ext4_mb_clear_bb (bsc#1214943).
- ext4: fix wrong unit use in ext4_mb_new_blocks (bsc#1214944).
- ext4: get block from bh in ext4_free_blocks for fast commit replay (bsc#1214942).
- ext4: reflect error codes from ext4_multi_mount_protect() to its callers (bsc#1214941).
- ext4: Remove ext4 locking of moved directory (bsc#1214957).
- ext4: set goal start correctly in ext4_mb_normalize_request (bsc#1214940).
- fs: do not update freeing inode i_io_list (bsc#1214813).
- fs: Establish locking order for unrelated directories (bsc#1214958).
- fs: Lock moved directories (bsc#1214959).
- fs: lockd: avoid possible wrong NULL parameter (git-fixes).
- fs: no need to check source (bsc#1215752).
- fs: record I_DIRTY_TIME even if inode already has I_DIRTY_INODE (bsc#1214813).
- fuse: nlookup missing decrement in fuse_direntplus_link (bsc#1215581).
- gve: Add AF_XDP zero-copy support for GQI-QPL format (bsc#1214479).
- gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479).
- gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479).
- gve: Changes to add new TX queues (bsc#1214479).
- gve: Control path for DQO-QPL (bsc#1214479).
- gve: fix frag_list chaining (bsc#1214479).
- gve: Fix gve interrupt names (bsc#1214479).
- gve: RX path for DQO-QPL (bsc#1214479).
- gve: trivial spell fix Recive to Receive (bsc#1214479).
- gve: Tx path for DQO-QPL (bsc#1214479).
- gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479).
- gve: use vmalloc_array and vcalloc (bsc#1214479).
- gve: XDP support GQI-QPL: helper function changes (bsc#1214479).
- hwrng: virtio - add an internal buffer (git-fixes).
- hwrng: virtio - always add a pending request (git-fixes).
- hwrng: virtio - do not wait on cleanup (git-fixes).
- hwrng: virtio - do not waste entropy (git-fixes).
- hwrng: virtio - Fix race on data_avail and actual data (git-fixes).
- i2c: aspeed: Reset the i2c controller when timeout occurs (git-fixes).
- i3c: master: svc: fix probe failure when no i3c device exist (git-fixes).
- idr: fix param name in idr_alloc_cyclic() doc (git-fixes).
- Input: tca6416-keypad - fix interrupt enable disbalance (git-fixes).
- iommu/virtio: Detach domain on endpoint release (git-fixes).
- jbd2: check 'jh-&gt;b_transaction' before removing it from checkpoint (bsc#1214953).
- jbd2: correct the end of the journal recovery scan range (bsc#1214955).
- jbd2: fix a race when checking checkpoint buffer busy (bsc#1214949).
- jbd2: fix checkpoint cleanup performance regression (bsc#1214952).
- jbd2: Fix wrongly judgement for buffer head removing while doing checkpoint (bsc#1214948).
- jbd2: recheck chechpointing non-dirty buffer (bsc#1214945).
- jbd2: remove journal_clean_one_cp_list() (bsc#1214947).
- jbd2: remove t_checkpoint_io_list (bsc#1214946).
- jbd2: restore t_checkpoint_io_list to maintain kABI (bsc#1214946).
- kabi/severities: ignore mlx4 internal symbols
- kconfig: fix possible buffer overflow (git-fixes).
- kernel-binary: Move build-time definitions together Move source list and build architecture to buildrequires to aid in future reorganization of the spec template.
- kernel-binary: python3 is needed for build At least scripts/bpf_helpers_doc.py requires python3 since Linux 4.18 Other simimlar scripts may exist.
- kselftest/runner.sh: Propagate SIGTERM to runner child (git-fixes).
- KVM: s390: fix KVM_S390_GET_CMMA_BITS for GFNs in memslot holes (git-fixes bsc#1215915).
- KVM: s390: interrupt: use READ_ONCE() before cmpxchg() (git-fixes bsc#1215896).
- KVM: s390: pv: fix external interruption loop not always detected (git-fixes bsc#1215916).
- KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field (git-fixes bsc#1215894).
- KVM: s390: vsie: fix the length of APCB bitmap (git-fixes bsc#1215895).
- KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler (git-fixes bsc#1215911).
- KVM: SVM: Remove a duplicate definition of VMCB_AVIC_APIC_BAR_MASK (git-fixes).
- KVM: VMX: Fix header file dependency of asm/vmx.h (git-fixes).
- KVM: x86: Fix KVM_CAP_SYNC_REGS's sync_regs() TOCTOU issues (git-fixes).
- KVM: x86/mmu: Include mmu.h in spte.h (git-fixes).
- loop: Fix use-after-free issues (bsc#1214991).
- loop: loop_set_status_from_info() check before assignment (bsc#1214990).
- mlx4: Avoid resetting MLX4_INTFF_BONDING per driver (bsc#1187236).
- mlx4: Connect the ethernet part to the auxiliary bus (bsc#1187236).
- mlx4: Connect the infiniband part to the auxiliary bus (bsc#1187236).
- mlx4: Delete custom device management logic (bsc#1187236).
- mlx4: Get rid of the mlx4_interface.activate callback (bsc#1187236).
- mlx4: Get rid of the mlx4_interface.get_dev callback (bsc#1187236).
- mlx4: Move the bond work to the core driver (bsc#1187236).
- mlx4: Register mlx4 devices to an auxiliary virtual bus (bsc#1187236).
- mlx4: Rename member mlx4_en_dev.nb to netdev_nb (bsc#1187236).
- mlx4: Replace the mlx4_interface.event callback with a notifier (bsc#1187236).
- mlx4: Use 'void *' as the event param of mlx4_dispatch_event() (bsc#1187236).
- module: Expose module_init_layout_section() (git-fixes)
- net: do not allow gso_size to be set to GSO_BY_FRAGS (git-fixes).
- net: mana: Add page pool for RX buffers (bsc#1214040).
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: phy: micrel: Correct bit assignments for phy_device flags (git-fixes).
- net: usb: qmi_wwan: add Quectel EM05GV2 (git-fixes).
- net/mlx4: Remove many unnecessary NULL values (bsc#1187236).
- NFS: Guard against READDIR loop when entry names exceed MAXNAMELEN (git-fixes).
- NFS/blocklayout: Use the passed in gfp flags (git-fixes).
- NFS/pNFS: Fix assignment of xprtdata.cred (git-fixes).
- NFS/pNFS: Report EINVAL errors from connect() to the server (git-fixes).
- NFSD: da_addr_body field missing in some GETDEVICEINFO replies (git-fixes).
- NFSD: fix change_info in NFSv4 RENAME replies (git-fixes).
- NFSD: Fix race to FREE_STATEID and cl_revoked (git-fixes).
- NFSv4: Fix dropped lock for racing OPEN and delegation return (git-fixes).
- NFSv4: fix out path in __nfs4_get_acl_uncached (git-fixes).
- NFSv4.2: fix error handling in nfs42_proc_getxattr (git-fixes).
- NFSv4.2: fix handling of COPY ERR_OFFLOAD_NO_REQ (git-fixes).
- NFSv4/pNFS: minor fix for cleanup path in nfs4_get_device_info (git-fixes).
- ntb: Clean up tx tail index on link down (git-fixes).
- ntb: Drop packets when qp link is down (git-fixes).
- ntb: Fix calculation ntb_transport_tx_free_entry() (git-fixes).
- nvme-auth: use chap-&gt;s2 to indicate bidirectional authentication (bsc#1214543).
- nvme-tcp: add recovery_delay to sysfs (bsc#1201284).
- nvme-tcp: delay error recovery until the next KATO interval (bsc#1201284).
- nvme-tcp: Do not terminate commands when in RESETTING (bsc#1201284).
- nvme-tcp: make 'err_work' a delayed work (bsc#1201284).
- PCI: Free released resource after coalescing (git-fixes).
- platform/mellanox: mlxbf-pmc: Fix potential buffer overflows (git-fixes).
- platform/mellanox: mlxbf-pmc: Fix reading of unprogrammed events (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Drop jumbo frames (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Drop the Rx packet if no more descriptors (git-fixes).
- platform/x86: intel_scu_ipc: Check status after timeout in busy_loop() (git-fixes).
- platform/x86: intel_scu_ipc: Check status upon timeout in ipc_wait_for_interrupt() (git-fixes).
- platform/x86: intel_scu_ipc: Do not override scu in intel_scu_ipc_dev_simple_command() (git-fixes).
- platform/x86: intel_scu_ipc: Fail IPC send if still busy (git-fixes).
- powerpc/fadump: make is_kdump_kernel() return false when fadump is active (bsc#1212639 ltc#202582).
- powerpc/iommu: Fix notifiers being shared by PCI and VIO buses (bsc#1065729).
- powerpc/rtas: mandate RTAS syscall filtering (bsc#1023051).
- powerpc/xics: Remove unnecessary endian conversion (bsc#1065729).
- printk: ringbuffer: Fix truncating buffer size min_t cast (bsc#1215875).
- pwm: lpc32xx: Remove handling of PWM channels (git-fixes).
- quota: add new helper dquot_active() (bsc#1214998).
- quota: factor out dquot_write_dquot() (bsc#1214995).
- quota: fix dqput() to follow the guarantees dquot_srcu should provide (bsc#1214963).
- quota: fix warning in dqgrab() (bsc#1214962).
- quota: Properly disable quotas when add_dquot_ref() fails (bsc#1214961).
- quota: rename dquot_active() to inode_quota_active() (bsc#1214997).
- s390/qeth: Do not call dev_close/dev_open (DOWN/UP) (bsc#1214873 git-fixes).
- s390/zcrypt: do not leak memory if dev_set_name() fails (git-fixes bsc#1215148).
- scsi: 3w-xxxx: Add error handling for initialization failure in tw_probe() (git-fixes).
- scsi: 53c700: Check that command slot is not NULL (git-fixes).
- scsi: core: Fix legacy /proc parsing buffer overflow (git-fixes).
- scsi: core: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: fnic: Replace return codes in fnic_clean_pending_aborts() (git-fixes).
- scsi: lpfc: Do not abuse UUID APIs and LPFC_COMPRESS_VMID_SIZE (git-fixes).
- scsi: lpfc: Early return after marking final NLP_DROPPED flag in dev_loss_tmo (git-fixes).
- scsi: lpfc: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- scsi: lpfc: Modify when a node should be put in device recovery mode during RSCN (git-fixes).
- scsi: lpfc: Prevent use-after-free during rmmod with mapped NVMe rports (git-fixes).
- scsi: lpfc: Remove reftag check in DIF paths (git-fixes).
- scsi: qedf: Add synchronization between I/O completions and abort (bsc#1210658).
- scsi: qedf: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qedf: Fix NULL dereference in error handling (git-fixes).
- scsi: qedi: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qla2xxx: Add logs for SFP temperature monitoring (bsc#1214928).
- scsi: qla2xxx: Allow 32-byte CDBs (bsc#1214928).
- scsi: qla2xxx: Error code did not return to upper layer (bsc#1214928).
- scsi: qla2xxx: Fix firmware resource tracking (bsc#1214928).
- scsi: qla2xxx: Fix NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- scsi: qla2xxx: Fix smatch warn for qla_init_iocb_limit() (bsc#1214928).
- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1214928).
- scsi: qla2xxx: Move resource to allow code reuse (bsc#1214928).
- scsi: qla2xxx: Remove unsupported ql2xenabledif option (bsc#1214928).
- scsi: qla2xxx: Remove unused declarations (bsc#1214928).
- scsi: qla2xxx: Remove unused variables in qla24xx_build_scsi_type_6_iocbs() (bsc#1214928).
- scsi: qla2xxx: Update version to 10.02.09.100-k (bsc#1214928).
- scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() (git-fixes).
- scsi: scsi_debug: Remove dead code (git-fixes).
- scsi: snic: Fix double free in snic_tgt_create() (git-fixes).
- scsi: snic: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: storvsc: Handle additional SRB status values (git-fixes).
- scsi: zfcp: Fix a double put in zfcp_port_enqueue() (git-fixes bsc#1215941).
- selftests: tracing: Fix to unmount tracefs for recovering environment (git-fixes).
- SUNRPC: Mark the cred for revalidation if the server rejects it (git-fixes).
- tcpm: Avoid soft reset when partner does not support get_status (git-fixes).
- tracing: Fix race issue between cpu buffer write and swap (git-fixes).
- tracing: Remove extra space at the end of hwlat_detector/mode (git-fixes).
- tracing: Remove unnecessary copying of tr-&gt;current_trace (git-fixes).
- uapi: stddef.h: Fix __DECLARE_FLEX_ARRAY for C++ (git-fixes).
- udf: Fix extension of the last extent in the file (bsc#1214964).
- udf: Fix file corruption when appending just after end of preallocated extent (bsc#1214965).
- udf: Fix off-by-one error when discarding preallocation (bsc#1214966).
- udf: Fix uninitialized array access for some pathnames (bsc#1214967).
- uprobes/x86: Allow to probe a NOP instruction with 0x66 prefix (git-fixes).
- usb: ehci: add workaround for chipidea PORTSC.PEC bug (git-fixes).
- usb: ehci: move new member has_ci_pec_bug into hole (git-fixes).
- usb: serial: option: add FOXCONN T99W368/T99W373 product (git-fixes).
- usb: serial: option: add Quectel EM05G variant (0x030e) (git-fixes).
- usb: typec: tcpci: clear the fault status bit (git-fixes).
- usb: typec: tcpci: move tcpci.h to include/linux/usb/ (git-fixes).
- vhost_vdpa: fix the crash in unmap a large memory (git-fixes).
- vhost-scsi: unbreak any layout for response (git-fixes).
- vhost: allow batching hint without size (git-fixes).
- vhost: fix hung thread due to erroneous iotlb entries (git-fixes).
- vhost: handle error while adding split ranges to iotlb (git-fixes).
- virtio_net: add checking sq is full inside xdp xmit (git-fixes).
- virtio_net: Fix probe failed when modprobe virtio_net (git-fixes).
- virtio_net: reorder some funcs (git-fixes).
- virtio_net: separate the logic of checking whether sq is full (git-fixes).
- virtio_ring: fix avail_wrap_counter in virtqueue_add_packed (git-fixes).
- virtio-mmio: do not break lifecycle of vm_dev (git-fixes).
- virtio-net: fix race between set queues and probe (git-fixes).
- virtio-net: set queues after driver_ok (git-fixes).
- virtio-rng: make device ready before making request (git-fixes).
- virtio: acknowledge all features before access (git-fixes).
- vmcore: remove dependency with is_kdump_kernel() for exporting vmcore (bsc#1212639 ltc#202582).
- watchdog: intel-mid_wdt: add MODULE_ALIAS() to allow auto-load (git-fixes).
- word-at-a-time: use the same return type for has_zero regardless of endianness (bsc#1065729).
- x86/alternative: Fix race in try_get_desc() (git-fixes).
- x86/boot/e820: Fix typo in e820.c comment (git-fixes).
- x86/bugs: Reset speculation control settings on init (git-fixes).
- x86/cpu: Add Lunar Lake M (git-fixes).
- x86/cpu: Add model number for Intel Arrow Lake processor (git-fixes).
- x86/fpu: Take task_struct* in copy_sigframe_from_user_to_xstate() (git-fixes).
- x86/head/64: Switch to KERNEL_CS as soon as new GDT is installed (git-fixes).
- x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL (git-fixes).
- x86/ioapic: Do not return 0 from arch_dynirq_lower_bound() (git-fixes).
- x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).
- x86/mce: Retrieve poison range from hardware (git-fixes).
- x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build (git-fixes).
- x86/mm: Avoid incomplete Global INVLPG flushes (git-fixes).
- x86/mm: Do not shuffle CPU entry areas without KASLR (git-fixes).
- x86/purgatory: remove PGO flags (git-fixes).
- x86/PVH: avoid 32-bit build warning when obtaining VGA console info (git-fixes).
- x86/reboot: Disable virtualization in an emergency if SVM is supported (git-fixes).
- x86/resctl: fix scheduler confusion with 'current' (git-fixes).
- x86/resctrl: Fix task CLOSID/RMID update race (git-fixes).
- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).
- x86/rtc: Remove __init for runtime functions (git-fixes).
- x86/sgx: Reduce delay and interference of enclave release (git-fixes).
- x86/srso: Do not probe microcode in a guest (git-fixes).
- x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes).
- x86/srso: Fix srso_show_state() side effect (git-fixes).
- x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes).
- x86/virt: Force GIF=1 prior to disabling SVM (for reboot flows) (git-fixes).
- xen: remove a confusing comment on auto-translated guest I/O (git-fixes).
- xprtrdma: Remap Receive buffers after a reconnect (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2023-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202845">SUSE bug 1202845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213808">SUSE bug 1213808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214928">SUSE bug 1214928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214940">SUSE bug 1214940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214941">SUSE bug 1214941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214942">SUSE bug 1214942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214943">SUSE bug 1214943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214944">SUSE bug 1214944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214950">SUSE bug 1214950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214951">SUSE bug 1214951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214954">SUSE bug 1214954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214957">SUSE bug 1214957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214986">SUSE bug 1214986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214988">SUSE bug 1214988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214992">SUSE bug 1214992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214993">SUSE bug 1214993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215322">SUSE bug 1215322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215877">SUSE bug 1215877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215894">SUSE bug 1215894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215895">SUSE bug 1215895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215896">SUSE bug 1215896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215911">SUSE bug 1215911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215915">SUSE bug 1215915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215916">SUSE bug 1215916</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1859/">CVE-2023-1859 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2177/">CVE-2023-2177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39194/">CVE-2023-39194 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-4389/">CVE-2023-4389 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4389">CVE-2023-4389 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4563/">CVE-2023-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800972" comment="kernel-default-5.14.21-150400.24.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800973" comment="kernel-default-base-5.14.21-150400.24.92.1.150400.24.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206050" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215761" ref_url="https://bugzilla.suse.com/1215761" source="BUGZILLA"/>
		<reference ref_id="1215762" ref_url="https://bugzilla.suse.com/1215762" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40660" ref_url="https://www.suse.com/security/cve/CVE-2023-40660/" source="CVE"/>
		<reference ref_id="CVE-2023-40661" ref_url="https://www.suse.com/security/cve/CVE-2023-40661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016692.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2023-40660: Fixed a PIN bypass that could be triggered when
  cards tracked their own login state (bsc#1215762).
- CVE-2023-40661: Fixed several memory safety issues that could happen
  during the card enrollment process using pkcs15-init (bsc#1215761).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-16"/>
	<updated date="2023-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215761">SUSE bug 1215761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215762">SUSE bug 1215762</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40660/">CVE-2023-40660 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40660">CVE-2023-40660 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-40661/">CVE-2023-40661 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40661">CVE-2023-40661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801458" comment="opensc-0.22.0-150400.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206051" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1202845" ref_url="https://bugzilla.suse.com/1202845" source="BUGZILLA"/>
		<reference ref_id="1213808" ref_url="https://bugzilla.suse.com/1213808" source="BUGZILLA"/>
		<reference ref_id="1214928" ref_url="https://bugzilla.suse.com/1214928" source="BUGZILLA"/>
		<reference ref_id="1214940" ref_url="https://bugzilla.suse.com/1214940" source="BUGZILLA"/>
		<reference ref_id="1214941" ref_url="https://bugzilla.suse.com/1214941" source="BUGZILLA"/>
		<reference ref_id="1214942" ref_url="https://bugzilla.suse.com/1214942" source="BUGZILLA"/>
		<reference ref_id="1214943" ref_url="https://bugzilla.suse.com/1214943" source="BUGZILLA"/>
		<reference ref_id="1214944" ref_url="https://bugzilla.suse.com/1214944" source="BUGZILLA"/>
		<reference ref_id="1214950" ref_url="https://bugzilla.suse.com/1214950" source="BUGZILLA"/>
		<reference ref_id="1214951" ref_url="https://bugzilla.suse.com/1214951" source="BUGZILLA"/>
		<reference ref_id="1214954" ref_url="https://bugzilla.suse.com/1214954" source="BUGZILLA"/>
		<reference ref_id="1214957" ref_url="https://bugzilla.suse.com/1214957" source="BUGZILLA"/>
		<reference ref_id="1214986" ref_url="https://bugzilla.suse.com/1214986" source="BUGZILLA"/>
		<reference ref_id="1214988" ref_url="https://bugzilla.suse.com/1214988" source="BUGZILLA"/>
		<reference ref_id="1214992" ref_url="https://bugzilla.suse.com/1214992" source="BUGZILLA"/>
		<reference ref_id="1214993" ref_url="https://bugzilla.suse.com/1214993" source="BUGZILLA"/>
		<reference ref_id="1215322" ref_url="https://bugzilla.suse.com/1215322" source="BUGZILLA"/>
		<reference ref_id="1215877" ref_url="https://bugzilla.suse.com/1215877" source="BUGZILLA"/>
		<reference ref_id="1215894" ref_url="https://bugzilla.suse.com/1215894" source="BUGZILLA"/>
		<reference ref_id="1215895" ref_url="https://bugzilla.suse.com/1215895" source="BUGZILLA"/>
		<reference ref_id="1215896" ref_url="https://bugzilla.suse.com/1215896" source="BUGZILLA"/>
		<reference ref_id="1215911" ref_url="https://bugzilla.suse.com/1215911" source="BUGZILLA"/>
		<reference ref_id="1215915" ref_url="https://bugzilla.suse.com/1215915" source="BUGZILLA"/>
		<reference ref_id="1215916" ref_url="https://bugzilla.suse.com/1215916" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206/" source="CVE"/>
		<reference ref_id="CVE-2023-1859" ref_url="https://www.suse.com/security/cve/CVE-2023-1859/" source="CVE"/>
		<reference ref_id="CVE-2023-2177" ref_url="https://www.suse.com/security/cve/CVE-2023-2177/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-39194" ref_url="https://www.suse.com/security/cve/CVE-2023-39194/" source="CVE"/>
		<reference ref_id="CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-4389" ref_url="https://www.suse.com/security/cve/CVE-2023-4389/" source="CVE"/>
		<reference ref_id="CVE-2023-4563" ref_url="https://www.suse.com/security/cve/CVE-2023-4563/" source="CVE"/>
		<reference ref_id="CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
- CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).
- CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that could be exploited in order to leak internal kernel information or crash the system (bsc#1214351).
- CVE-2023-5345: fixed an use-after-free vulnerability in the fs/smb/client component which could be exploited to achieve local privilege escalation. (bsc#1215899)
- CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1215150).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95% (bsc#1212703).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalatio (bsc#1215275).
- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2023-4155: Fixed a flaw in KVM AMD Secure Encrypted Virtualization (SEV). An attacker can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages. (bsc#1214022)
- CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system (bsc#1210643).
- CVE-2023-4563: Fixed an use-after-free flaw in the nftables sub-component. This vulnerability could allow a local attacker to crash the system or lead to a kernel information leak problem. (bsc#1214727)
- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).

The following non-security bugs were fixed:

- ALSA: hda/cirrus: Fix broken audio on hardware with two CS42L42 codecs (git-fixes).
- ALSA: hda/realtek: Splitting the UX3402 into two separate models (git-fixes).
- ARM: pxa: remove use of symbol_get() (git-fixes).
- arm64: csum: Fix OoB access in IP checksum code for negative lengths (git-fixes).
- arm64: module-plts: inline linux/moduleloader.h (git-fixes)
- arm64: module: Use module_init_layout_section() to spot init sections (git-fixes)
- arm64: sdei: abort running SDEI handlers during crash (git-fixes)
- arm64: tegra: Update AHUB clock parent and rate (git-fixes)
- arm64/fpsimd: Only provide the length to cpufeature for xCR registers (git-fixes)
- ASoC: imx-audmix: Fix return error with devm_clk_get() (git-fixes).
- ASoC: meson: spdifin: start hw on dai probe (git-fixes).
- ASoC: soc-utils: Export snd_soc_dai_is_dummy() symbol (git-fixes).
- ASoC: tegra: Fix redundant PLLA and PLLA_OUT0 updates (git-fixes).
- ata: libata: disallow dev-initiated LPM transitions to unsupported states (git-fixes).
- ata: pata_falcon: fix IO base selection for Q40 (git-fixes).
- ata: pata_ftide010: Add missing MODULE_DESCRIPTION (git-fixes).
- ata: sata_gemini: Add missing MODULE_DESCRIPTION (git-fixes).
- backlight: gpio_backlight: Drop output GPIO direction check for initial power state (git-fixes).
- blk-iocost: fix divide by 0 error in calc_lcoefs() (bsc#1214986).
- blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost (bsc#1214992).
- block/mq-deadline: use correct way to throttling write requests (bsc#1214993).
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition (git-fixes).
- bnx2x: new flag for track HW resource allocation (bsc#1202845 bsc#1215322).
- bpf: Clear the probe_addr for uprobe (git-fixes).
- btrfs: do not hold CPU for too long when defragging a file (bsc#1214988).
- drm: gm12u320: Fix the timeout usage for usb_bulk_msg() (git-fixes).
- drm/amd/display: fix the white screen issue when &gt;= 64GB DRAM (git-fixes).
- drm/amd/display: prevent potential division by zero errors (git-fixes).
- drm/display: Do not assume dual mode adaptors support i2c sub-addressing (bsc#1213808).
- drm/i915: mark requests for GuC virtual engines to avoid use-after-free (git-fixes).
- drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt() (git-fixes).
- drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling (git-fixes).
- drm/virtio: Use appropriate atomic state in virtio_gpu_plane_cleanup_fb() (git-fixes).
- ext4: avoid potential data overflow in next_linear_group (bsc#1214951).
- ext4: correct inline offset when handling xattrs in inode body (bsc#1214950).
- ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954).
- ext4: fix wrong unit use in ext4_mb_clear_bb (bsc#1214943).
- ext4: fix wrong unit use in ext4_mb_new_blocks (bsc#1214944).
- ext4: get block from bh in ext4_free_blocks for fast commit replay (bsc#1214942).
- ext4: reflect error codes from ext4_multi_mount_protect() to its callers (bsc#1214941).
- ext4: Remove ext4 locking of moved directory (bsc#1214957).
- ext4: set goal start correctly in ext4_mb_normalize_request (bsc#1214940).
- fs: do not update freeing inode i_io_list (bsc#1214813).
- fs: Establish locking order for unrelated directories (bsc#1214958).
- fs: Lock moved directories (bsc#1214959).
- fs: lockd: avoid possible wrong NULL parameter (git-fixes).
- fs: no need to check source (bsc#1215752).
- fs: record I_DIRTY_TIME even if inode already has I_DIRTY_INODE (bsc#1214813).
- fuse: nlookup missing decrement in fuse_direntplus_link (bsc#1215581).
- gve: Add AF_XDP zero-copy support for GQI-QPL format (bsc#1214479).
- gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479).
- gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479).
- gve: Changes to add new TX queues (bsc#1214479).
- gve: Control path for DQO-QPL (bsc#1214479).
- gve: fix frag_list chaining (bsc#1214479).
- gve: Fix gve interrupt names (bsc#1214479).
- gve: RX path for DQO-QPL (bsc#1214479).
- gve: trivial spell fix Recive to Receive (bsc#1214479).
- gve: Tx path for DQO-QPL (bsc#1214479).
- gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479).
- gve: use vmalloc_array and vcalloc (bsc#1214479).
- gve: XDP support GQI-QPL: helper function changes (bsc#1214479).
- hwrng: virtio - add an internal buffer (git-fixes).
- hwrng: virtio - always add a pending request (git-fixes).
- hwrng: virtio - do not wait on cleanup (git-fixes).
- hwrng: virtio - do not waste entropy (git-fixes).
- hwrng: virtio - Fix race on data_avail and actual data (git-fixes).
- i2c: aspeed: Reset the i2c controller when timeout occurs (git-fixes).
- i3c: master: svc: fix probe failure when no i3c device exist (git-fixes).
- idr: fix param name in idr_alloc_cyclic() doc (git-fixes).
- Input: tca6416-keypad - fix interrupt enable disbalance (git-fixes).
- iommu/virtio: Detach domain on endpoint release (git-fixes).
- jbd2: check 'jh-&gt;b_transaction' before removing it from checkpoint (bsc#1214953).
- jbd2: correct the end of the journal recovery scan range (bsc#1214955).
- jbd2: fix a race when checking checkpoint buffer busy (bsc#1214949).
- jbd2: fix checkpoint cleanup performance regression (bsc#1214952).
- jbd2: Fix wrongly judgement for buffer head removing while doing checkpoint (bsc#1214948).
- jbd2: recheck chechpointing non-dirty buffer (bsc#1214945).
- jbd2: remove journal_clean_one_cp_list() (bsc#1214947).
- jbd2: remove t_checkpoint_io_list (bsc#1214946).
- jbd2: restore t_checkpoint_io_list to maintain kABI (bsc#1214946).
- kabi/severities: ignore mlx4 internal symbols
- kconfig: fix possible buffer overflow (git-fixes).
- kernel-binary: Move build-time definitions together Move source list and build architecture to buildrequires to aid in future reorganization of the spec template.
- kernel-binary: python3 is needed for build At least scripts/bpf_helpers_doc.py requires python3 since Linux 4.18 Other simimlar scripts may exist.
- kselftest/runner.sh: Propagate SIGTERM to runner child (git-fixes).
- KVM: s390: fix KVM_S390_GET_CMMA_BITS for GFNs in memslot holes (git-fixes bsc#1215915).
- KVM: s390: interrupt: use READ_ONCE() before cmpxchg() (git-fixes bsc#1215896).
- KVM: s390: pv: fix external interruption loop not always detected (git-fixes bsc#1215916).
- KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field (git-fixes bsc#1215894).
- KVM: s390: vsie: fix the length of APCB bitmap (git-fixes bsc#1215895).
- KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler (git-fixes bsc#1215911).
- KVM: SVM: Remove a duplicate definition of VMCB_AVIC_APIC_BAR_MASK (git-fixes).
- KVM: VMX: Fix header file dependency of asm/vmx.h (git-fixes).
- KVM: x86: Fix KVM_CAP_SYNC_REGS's sync_regs() TOCTOU issues (git-fixes).
- KVM: x86/mmu: Include mmu.h in spte.h (git-fixes).
- loop: Fix use-after-free issues (bsc#1214991).
- loop: loop_set_status_from_info() check before assignment (bsc#1214990).
- mlx4: Avoid resetting MLX4_INTFF_BONDING per driver (bsc#1187236).
- mlx4: Connect the ethernet part to the auxiliary bus (bsc#1187236).
- mlx4: Connect the infiniband part to the auxiliary bus (bsc#1187236).
- mlx4: Delete custom device management logic (bsc#1187236).
- mlx4: Get rid of the mlx4_interface.activate callback (bsc#1187236).
- mlx4: Get rid of the mlx4_interface.get_dev callback (bsc#1187236).
- mlx4: Move the bond work to the core driver (bsc#1187236).
- mlx4: Register mlx4 devices to an auxiliary virtual bus (bsc#1187236).
- mlx4: Rename member mlx4_en_dev.nb to netdev_nb (bsc#1187236).
- mlx4: Replace the mlx4_interface.event callback with a notifier (bsc#1187236).
- mlx4: Use 'void *' as the event param of mlx4_dispatch_event() (bsc#1187236).
- net: do not allow gso_size to be set to GSO_BY_FRAGS (git-fixes).
- net: mana: Add page pool for RX buffers (bsc#1214040).
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: phy: micrel: Correct bit assignments for phy_device flags (git-fixes).
- net: usb: qmi_wwan: add Quectel EM05GV2 (git-fixes).
- net/mlx4: Remove many unnecessary NULL values (bsc#1187236).
- NFS: Guard against READDIR loop when entry names exceed MAXNAMELEN (git-fixes).
- NFS/blocklayout: Use the passed in gfp flags (git-fixes).
- NFS/pNFS: Report EINVAL errors from connect() to the server (git-fixes).
- NFSD: da_addr_body field missing in some GETDEVICEINFO replies (git-fixes).
- NFSD: fix change_info in NFSv4 RENAME replies (git-fixes).
- NFSD: Fix race to FREE_STATEID and cl_revoked (git-fixes).
- NFSv4: Fix dropped lock for racing OPEN and delegation return (git-fixes).
- NFSv4: fix out path in __nfs4_get_acl_uncached (git-fixes).
- NFSv4.2: fix error handling in nfs42_proc_getxattr (git-fixes).
- NFSv4.2: fix handling of COPY ERR_OFFLOAD_NO_REQ (git-fixes).
- NFSv4/pnfs: minor fix for cleanup path in nfs4_get_device_info (git-fixes).
- ntb: Clean up tx tail index on link down (git-fixes).
- ntb: Drop packets when qp link is down (git-fixes).
- ntb: Fix calculation ntb_transport_tx_free_entry() (git-fixes).
- nvme-auth: use chap-&gt;s2 to indicate bidirectional authentication (bsc#1214543).
- nvme-tcp: add recovery_delay to sysfs (bsc#1201284).
- nvme-tcp: delay error recovery until the next KATO interval (bsc#1201284).
- nvme-tcp: Do not terminate commands when in RESETTING (bsc#1201284).
- nvme-tcp: make 'err_work' a delayed work (bsc#1201284).
- PCI: Free released resource after coalescing (git-fixes).
- platform/mellanox: mlxbf-pmc: Fix potential buffer overflows (git-fixes).
- platform/mellanox: mlxbf-pmc: Fix reading of unprogrammed events (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Drop jumbo frames (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Drop the Rx packet if no more descriptors (git-fixes).
- platform/x86: intel_scu_ipc: Check status after timeout in busy_loop() (git-fixes).
- platform/x86: intel_scu_ipc: Check status upon timeout in ipc_wait_for_interrupt() (git-fixes).
- platform/x86: intel_scu_ipc: Do not override scu in intel_scu_ipc_dev_simple_command() (git-fixes).
- platform/x86: intel_scu_ipc: Fail IPC send if still busy (git-fixes).
- pNFS: Fix assignment of xprtdata.cred (git-fixes).
- powerpc/fadump: make is_kdump_kernel() return false when fadump is active (bsc#1212639 ltc#202582).
- powerpc/iommu: Fix notifiers being shared by PCI and VIO buses (bsc#1065729).
- powerpc/rtas: mandate RTAS syscall filtering (bsc#1023051).
- powerpc/xics: Remove unnecessary endian conversion (bsc#1065729).
- printk: ringbuffer: Fix truncating buffer size min_t cast (bsc#1215875).
- pwm: lpc32xx: Remove handling of PWM channels (git-fixes).
- quota: add new helper dquot_active() (bsc#1214998).
- quota: factor out dquot_write_dquot() (bsc#1214995).
- quota: fix dqput() to follow the guarantees dquot_srcu should provide (bsc#1214963).
- quota: fix warning in dqgrab() (bsc#1214962).
- quota: Properly disable quotas when add_dquot_ref() fails (bsc#1214961).
- quota: rename dquot_active() to inode_quota_active() (bsc#1214997).
- s390/zcrypt: do not leak memory if dev_set_name() fails (git-fixes bsc#1215148).
- scsi: 3w-xxxx: Add error handling for initialization failure in tw_probe() (git-fixes).
- scsi: 53c700: Check that command slot is not NULL (git-fixes).
- scsi: core: Fix legacy /proc parsing buffer overflow (git-fixes).
- scsi: core: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: fnic: Replace return codes in fnic_clean_pending_aborts() (git-fixes).
- scsi: lpfc: Do not abuse UUID APIs and LPFC_COMPRESS_VMID_SIZE (git-fixes).
- scsi: lpfc: Early return after marking final NLP_DROPPED flag in dev_loss_tmo (git-fixes).
- scsi: lpfc: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- scsi: lpfc: Modify when a node should be put in device recovery mode during RSCN (git-fixes).
- scsi: lpfc: Prevent use-after-free during rmmod with mapped NVMe rports (git-fixes).
- scsi: lpfc: Remove reftag check in DIF paths (git-fixes).
- scsi: qedf: Add synchronization between I/O completions and abort (bsc#1210658).
- scsi: qedf: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qedf: Fix NULL dereference in error handling (git-fixes).
- scsi: qedi: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qla2xxx: Add logs for SFP temperature monitoring (bsc#1214928).
- scsi: qla2xxx: Allow 32-byte CDBs (bsc#1214928).
- scsi: qla2xxx: Error code did not return to upper layer (bsc#1214928).
- scsi: qla2xxx: Fix firmware resource tracking (bsc#1214928).
- scsi: qla2xxx: Fix NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- scsi: qla2xxx: Fix smatch warn for qla_init_iocb_limit() (bsc#1214928).
- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1214928).
- scsi: qla2xxx: Move resource to allow code reuse (bsc#1214928).
- scsi: qla2xxx: Remove unsupported ql2xenabledif option (bsc#1214928).
- scsi: qla2xxx: Remove unused declarations (bsc#1214928).
- scsi: qla2xxx: Remove unused variables in qla24xx_build_scsi_type_6_iocbs() (bsc#1214928).
- scsi: qla2xxx: Update version to 10.02.09.100-k (bsc#1214928).
- scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() (git-fixes).
- scsi: scsi_debug: Remove dead code (git-fixes).
- scsi: snic: Fix double free in snic_tgt_create() (git-fixes).
- scsi: snic: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: storvsc: Handle additional SRB status values (git-fixes).
- scsi: zfcp: Fix a double put in zfcp_port_enqueue() (git-fixes bsc#1215941).
- selftests: tracing: Fix to unmount tracefs for recovering environment (git-fixes).
- SUNRPC: Mark the cred for revalidation if the server rejects it (git-fixes).
- tcpm: Avoid soft reset when partner does not support get_status (git-fixes).
- tracing: Fix race issue between cpu buffer write and swap (git-fixes).
- tracing: Remove extra space at the end of hwlat_detector/mode (git-fixes).
- tracing: Remove unnecessary copying of tr-&gt;current_trace (git-fixes).
- uapi: stddef.h: Fix __DECLARE_FLEX_ARRAY for C++ (git-fixes).
- udf: Fix extension of the last extent in the file (bsc#1214964).
- udf: Fix file corruption when appending just after end of preallocated extent (bsc#1214965).
- udf: Fix off-by-one error when discarding preallocation (bsc#1214966).
- udf: Fix uninitialized array access for some pathnames (bsc#1214967).
- uprobes/x86: Allow to probe a NOP instruction with 0x66 prefix (git-fixes).
- usb: ehci: add workaround for chipidea PORTSC.PEC bug (git-fixes).
- usb: ehci: move new member has_ci_pec_bug into hole (git-fixes).
- usb: serial: option: add FOXCONN T99W368/T99W373 product (git-fixes).
- usb: serial: option: add Quectel EM05G variant (0x030e) (git-fixes).
- usb: typec: tcpci: clear the fault status bit (git-fixes).
- usb: typec: tcpci: move tcpci.h to include/linux/usb/ (git-fixes).
- vhost_vdpa: fix the crash in unmap a large memory (git-fixes).
- vhost-scsi: unbreak any layout for response (git-fixes).
- vhost: allow batching hint without size (git-fixes).
- vhost: fix hung thread due to erroneous iotlb entries (git-fixes).
- vhost: handle error while adding split ranges to iotlb (git-fixes).
- virtio_net: add checking sq is full inside xdp xmit (git-fixes).
- virtio_net: Fix probe failed when modprobe virtio_net (git-fixes).
- virtio_net: reorder some funcs (git-fixes).
- virtio_net: separate the logic of checking whether sq is full (git-fixes).
- virtio_ring: fix avail_wrap_counter in virtqueue_add_packed (git-fixes).
- virtio-mmio: do not break lifecycle of vm_dev (git-fixes).
- virtio-net: fix race between set queues and probe (git-fixes).
- virtio-net: set queues after driver_ok (git-fixes).
- virtio-rng: make device ready before making request (git-fixes).
- virtio: acknowledge all features before access (git-fixes).
- vmcore: remove dependency with is_kdump_kernel() for exporting vmcore (bsc#1212639 ltc#202582).
- watchdog: intel-mid_wdt: add MODULE_ALIAS() to allow auto-load (git-fixes).
- word-at-a-time: use the same return type for has_zero regardless of endianness (bsc#1065729).
- x86/alternative: Fix race in try_get_desc() (git-fixes).
- x86/boot/e820: Fix typo in e820.c comment (git-fixes).
- x86/bugs: Reset speculation control settings on init (git-fixes).
- x86/cpu: Add Lunar Lake M (git-fixes).
- x86/cpu: Add model number for Intel Arrow Lake processor (git-fixes).
- x86/fpu: Take task_struct* in copy_sigframe_from_user_to_xstate() (git-fixes).
- x86/head/64: Switch to KERNEL_CS as soon as new GDT is installed (git-fixes).
- x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL (git-fixes).
- x86/ioapic: Do not return 0 from arch_dynirq_lower_bound() (git-fixes).
- x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).
- x86/mce: Retrieve poison range from hardware (git-fixes).
- x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build (git-fixes).
- x86/mm: Avoid incomplete Global INVLPG flushes (git-fixes).
- x86/mm: Do not shuffle CPU entry areas without KASLR (git-fixes).
- x86/purgatory: remove PGO flags (git-fixes).
- x86/PVH: avoid 32-bit build warning when obtaining VGA console info (git-fixes).
- x86/reboot: Disable virtualization in an emergency if SVM is supported (git-fixes).
- x86/resctl: fix scheduler confusion with 'current' (git-fixes).
- x86/resctrl: Fix task CLOSID/RMID update race (git-fixes).
- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).
- x86/rtc: Remove __init for runtime functions (git-fixes).
- x86/sgx: Reduce delay and interference of enclave release (git-fixes).
- x86/srso: Do not probe microcode in a guest (git-fixes).
- x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes).
- x86/srso: Fix srso_show_state() side effect (git-fixes).
- x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes).
- x86/virt: Force GIF=1 prior to disabling SVM (for reboot flows) (git-fixes).
- xen: remove a confusing comment on auto-translated guest I/O (git-fixes).
- xprtrdma: Remap Receive buffers after a reconnect (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2023-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202845">SUSE bug 1202845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213808">SUSE bug 1213808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214928">SUSE bug 1214928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214940">SUSE bug 1214940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214941">SUSE bug 1214941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214942">SUSE bug 1214942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214943">SUSE bug 1214943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214944">SUSE bug 1214944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214950">SUSE bug 1214950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214951">SUSE bug 1214951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214954">SUSE bug 1214954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214957">SUSE bug 1214957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214986">SUSE bug 1214986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214988">SUSE bug 1214988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214992">SUSE bug 1214992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214993">SUSE bug 1214993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215322">SUSE bug 1215322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215877">SUSE bug 1215877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215894">SUSE bug 1215894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215895">SUSE bug 1215895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215896">SUSE bug 1215896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215911">SUSE bug 1215911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215915">SUSE bug 1215915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215916">SUSE bug 1215916</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1859/">CVE-2023-1859 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2177/">CVE-2023-2177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39194/">CVE-2023-39194 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-4389/">CVE-2023-4389 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4389">CVE-2023-4389 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4563/">CVE-2023-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800648" comment="kernel-rt-5.14.21-150400.15.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206052" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215968" ref_url="https://bugzilla.suse.com/1215968" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032213.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-43804: Fixed a potential cookie leak via HTTP redirect if
  the user manually set the corresponding header (bsc#1215968).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-18"/>
	<updated date="2023-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215968">SUSE bug 1215968</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800538" comment="python3-urllib3-1.25.10-150300.4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206053" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215286" ref_url="https://bugzilla.suse.com/1215286" source="BUGZILLA"/>
		<reference ref_id="1215891" ref_url="https://bugzilla.suse.com/1215891" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4813" ref_url="https://www.suse.com/security/cve/CVE-2023-4813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016723.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931)

Also a regression from a previous update was fixed:

- elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-18"/>
	<updated date="2023-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215286">SUSE bug 1215286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215891">SUSE bug 1215891</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4813/">CVE-2023-4813 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4813">CVE-2023-4813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800217" comment="glibc-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800218" comment="glibc-devel-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800219" comment="glibc-locale-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800220" comment="glibc-locale-base-2.31-150300.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206054" version="1" class="patch">
	<metadata>
		<title>Security update for cni (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1216006" ref_url="https://bugzilla.suse.com/1216006" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016749.html" source="SUSE-SU"/>
		<description>

This update of cni fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2023-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216006">SUSE bug 1216006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801450" comment="cni-0.7.1-150100.3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206055" version="1" class="patch">
	<metadata>
		<title>Security update for cni-plugins (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1216006" ref_url="https://bugzilla.suse.com/1216006" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016748.html" source="SUSE-SU"/>
		<description>

This update of cni-plugins fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2023-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216006">SUSE bug 1216006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801451" comment="cni-plugins-0.8.6-150100.3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206056" version="1" class="patch">
	<metadata>
		<title>Security update for suse-module-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1205767" ref_url="https://bugzilla.suse.com/1205767" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016758.html" source="SUSE-SU"/>
		<description>
This update for suse-module-tools fixes the following issues:

- Updated to version 15.4.18:

  - CVE-2023-1829: Blacklisted the Linux kernel tcindex classifier
    module (bsc#1210335).
  - CVE-2023-23559: Blacklisted the Linux kernel RNDIS modules
    (bsc#1205767, jsc#PED-5731).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2023-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205767">SUSE bug 1205767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802309" comment="suse-module-tools-15.4.18-150400.3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206057" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1201300" ref_url="https://bugzilla.suse.com/1201300" source="BUGZILLA"/>
		<reference ref_id="1215935" ref_url="https://bugzilla.suse.com/1215935" source="BUGZILLA"/>
		<reference ref_id="1215936" ref_url="https://bugzilla.suse.com/1215936" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4692" ref_url="https://www.suse.com/security/cve/CVE-2023-4692/" source="CVE"/>
		<reference ref_id="CVE-2023-4693" ref_url="https://www.suse.com/security/cve/CVE-2023-4693/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016766.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

Security fixes:
- CVE-2023-4692: Fixed an out-of-bounds write at fs/ntfs.c which may lead to unsigned code execution. (bsc#1215935)
- CVE-2023-4693: Fixed an out-of-bounds read at fs/ntfs.c which may lead to leak sensitive information. (bsc#1215936)

Other fixes:
- Fix a boot delay issue in PowerPC PXE boot (bsc#1201300)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-20"/>
	<updated date="2023-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201300">SUSE bug 1201300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215935">SUSE bug 1215935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215936">SUSE bug 1215936</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4692/">CVE-2023-4692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4693/">CVE-2023-4693 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801457" comment="grub2-2.06-150400.11.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801065" comment="grub2-arm64-efi-2.06-150400.11.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801070" comment="grub2-i386-pc-2.06-150400.11.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801077" comment="grub2-s390x-emu-2.06-150400.11.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801080" comment="grub2-snapper-plugin-2.06-150400.11.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801082" comment="grub2-x86_64-efi-2.06-150400.11.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801085" comment="grub2-x86_64-xen-2.06-150400.11.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206058" version="1" class="patch">
	<metadata>
		<title>Security update for gcc13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1206480" ref_url="https://bugzilla.suse.com/1206480" source="BUGZILLA"/>
		<reference ref_id="1206684" ref_url="https://bugzilla.suse.com/1206684" source="BUGZILLA"/>
		<reference ref_id="1210557" ref_url="https://bugzilla.suse.com/1210557" source="BUGZILLA"/>
		<reference ref_id="1211427" ref_url="https://bugzilla.suse.com/1211427" source="BUGZILLA"/>
		<reference ref_id="1212101" ref_url="https://bugzilla.suse.com/1212101" source="BUGZILLA"/>
		<reference ref_id="1213915" ref_url="https://bugzilla.suse.com/1213915" source="BUGZILLA"/>
		<reference ref_id="1214052" ref_url="https://bugzilla.suse.com/1214052" source="BUGZILLA"/>
		<reference ref_id="1214460" ref_url="https://bugzilla.suse.com/1214460" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016811.html" source="SUSE-SU"/>
		<description>
This update for gcc13 fixes the following issues:

This update ship the GCC 13.2 compiler suite and its base libraries.

The compiler base libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 12 ones.

The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.

The Go, D, Ada and Modula 2 language compiler parts are available
unsupported via the PackageHub repositories.

To use gcc13 compilers use:

- install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.
- override your Makefile to use CC=gcc13, CXX=g++13 and similar overrides for the other languages.

For a full changelog with all new GCC13 features, check out

        https://gcc.gnu.org/gcc-13/changes.html


Detailed changes:


* CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable
  length stack allocations.  (bsc#1214052)

- Turn cross compiler to s390x to a glibc cross. [bsc#1214460]

- Also handle -static-pie in the default-PIE specs
- Fixed missed optimization in Skia resulting in Firefox crashes when
  building with LTO.  [bsc#1212101]
- Make libstdc++6-devel packages own their directories since they
  can be installed standalone.  [bsc#1211427]
- Add new x86-related intrinsics (amxcomplexintrin.h).
- RISC-V: Add support for inlining subword atomic operations
- Use --enable-link-serialization rather that --enable-link-mutex,
  the benefit of the former one is that the linker jobs are not
  holding tokens of the make's jobserver.
- Add cross-bpf packages.  See https://gcc.gnu.org/wiki/BPFBackEnd
  for the general state of BPF with GCC.
- Add bootstrap conditional to allow --without=bootstrap to be
  specified to speed up local builds for testing.
- Bump included newlib to version 4.3.0. 
- Also package libhwasan_preinit.o on aarch64.
- Configure external timezone database provided by the timezone
  package.  Make libstdc++6 recommend timezone to get a fully
  working std::chrono.  Install timezone when running the testsuite.
- Package libhwasan_preinit.o on x86_64.
- Fixed unwinding on aarch64 with pointer signing.  [bsc#1206684]
- Enable PRU flavour for gcc13
- update floatn fixinclude pickup to check each header separately (bsc#1206480)
- Redo floatn fixinclude pick-up to simply keep what is there. 
- Bump libgo SONAME to libgo22.
- Do not package libhwasan for biarch (32-bit architecture)
  as the extension depends on 64-bit pointers.
- Adjust floatn fixincludes guard to work with SLE12 and earlier
  SLE15.
- Depend on at least LLVM 13 for GCN cross compiler.
- Update embedded newlib to version 4.2.0
- Allow cross-pru-gcc12-bootstrap for armv7l architecture.
  PRU architecture is used for real-time MCUs embedded into TI
  armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for
  armv7l in order to build both host applications and PRU firmware
  during the same build.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-23"/>
	<updated date="2023-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206480">SUSE bug 1206480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206684">SUSE bug 1206684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210557">SUSE bug 1210557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211427">SUSE bug 1211427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212101">SUSE bug 1212101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213915">SUSE bug 1213915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214460">SUSE bug 1214460</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801901" comment="libgcc_s1-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801902" comment="libstdc++6-13.2.1+git7813-150000.1.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206059" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213853" ref_url="https://bugzilla.suse.com/1213853" source="BUGZILLA"/>
		<reference ref_id="1216163" ref_url="https://bugzilla.suse.com/1216163" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<reference ref_id="CVE-2023-5363" ref_url="https://www.suse.com/security/cve/CVE-2023-5363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016835.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-5363: Incorrect cipher key and IV length processing. (bsc#1216163)
- CVE-2023-3817: Add test of DH_check() with q = p + 1. (bsc#1213853)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-25"/>
	<updated date="2023-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216163">SUSE bug 1216163</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5363/">CVE-2023-5363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5363">CVE-2023-5363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803274" comment="libopenssl3-3.0.8-150400.4.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206060" version="1" class="patch">
	<metadata>
		<title>Recommended update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-RU-2023:4192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032381.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Upgrade to version 1.11.0 in SLE-15: [jsc#PED-7040]

Update to 1.11.0:

  * Enhancements and bugfixes

    - Adds support for encrypt-then-mac (ETM) MACs
    - Adds support for AES-GCM crypto protocols
    - Adds support for sk-ecdsa-sha2-nistp256 and sk-ssh-ed25519 keys
    - Adds support for RSA certificate authentication
    - Adds FIDO support with *_sk() functions
    - Adds RSA-SHA2 key upgrading to OpenSSL, WinCNG, mbedTLS, OS400 backends
    - Adds Agent Forwarding and libssh2_agent_sign()
    - Adds support for Channel Signal message libssh2_channel_signal_ex()
    - Adds support to get the user auth banner message libssh2_userauth_banner()
    - Adds LIBSSH2_NO_{MD5, HMAC_RIPEMD, DSA, RSA, RSA_SHA1, ECDSA, ED25519,
      AES_CBC, AES_CTR, BLOWFISH, RC4, CAST, 3DES} options
    - Adds direct stream UNIX sockets with libssh2_channel_direct_streamlocal_ex()
    - Adds wolfSSL support to CMake file
    - Adds mbedTLS 3.x support
    - Adds LibreSSL 3.5 support
    - Adds support for CMake 'unity' builds
    - Adds CMake support for building shared and static libs in a single pass
    - Adds symbol hiding support to CMake
    - Adds support for libssh2.rc for all build tools
    - Adds .zip, .tar.xz and .tar.bz2 release tarballs
    - Enables ed25519 key support for LibreSSL 3.7.0 or higher
    - Improves OpenSSL 1.1 and 3 compatibility
    - Now requires OpenSSL 1.0.2 or newer
    - Now requires CMake 3.1 or newer
    - SFTP: Adds libssh2_sftp_open_ex_r() and libssh2_sftp_open_r() extended APIs
    - SFTP: No longer has a packet limit when reading a directory
    - SFTP: now parses attribute extensions if they exist
    - SFTP: no longer will busy loop if SFTP fails to initialize
    - SFTP: now clear various errors as expected
    - SFTP: no longer skips files if the line buffer is too small
    - SCP: add option to not quote paths
    - SCP: Enables 64-bit offset support unconditionally
    - Now skips leading \r and \n characters in banner_receive()
    - Enables secure memory zeroing with all build tools on all platforms
    - No longer logs SSH_MSG_REQUEST_FAILURE packets from keepalive
    - Speed up base64 encoding by 7x
    - Assert if there is an attempt to write a value that is too large
    - WinCNG: fix memory leak in _libssh2_dh_secret()
    - Added protection against possible null pointer dereferences
    - Agent now handles overly large comment lengths
    - Now ensure KEX replies don't include extra bytes
    - Fixed possible buffer overflow when receiving SSH_MSG_USERAUTH_BANNER
    - Fixed possible buffer overflow in keyboard interactive code path
    - Fixed overlapping memcpy()
    - Fixed Windows UWP builds
    - Fixed DLL import name
    - Renamed local RANDOM_PADDING macro to avoid unexpected define on Windows
    - Support for building with gcc versions older than 8
    - Improvements to CMake, Makefile, NMakefile, GNUmakefile, autoreconf files
    - Restores ANSI C89 compliance
    - Enabled new compiler warnings and fixed/silenced them
    - Improved error messages
    - Now uses CIFuzz
    - Numerous minor code improvements
    - Improvements to CI builds
    - Improvements to unit tests
    - Improvements to doc files
    - Improvements to example files
    - Removed 'old gex' build option
    - Removed no-encryption/no-mac builds
    - Removed support for NetWare and Watcom wmake build files

- Bump to version 1.10.0

  * Enhancements and bugfixes:

      * support ECDSA certificate authentication
      * fix detailed _libssh2_error being overwritten by generic errors
      * unified error handling
      * fix _libssh2_random() silently discarding errors
      * don't error if using keys without RSA
      * avoid OpenSSL latent error in FIPS mode
      * fix EVP_Cipher interface change in openssl 3
      * fix potential overwrite of buffer when reading stdout of command
      * use string_buf in ecdh_sha2_nistp() to avoid attempting to parse malformed data
      * correct a typo which may lead to stack overflow
      * fix random big number generation to match openssl
      * added key exchange group16-sha512 and group18-sha512.
      * add support for an OSS Fuzzer fuzzing target
      * adds support for ECDSA for both key exchange and host key algorithms
      * clean up curve25519 code
      * update the min, preferred and max DH group values based on RFC 8270.
      * changed type of LIBSSH2_FX_* constants to unsigned long
      * added diffie-hellman-group14-sha256 kex
      * fix for use of uninitialized aes_ctr_cipher.key_len when using HAVE_OPAQUE_STRUCTS, regression
      * fixes memory leaks and use after free AES EVP_CIPHER contexts when using OpenSSL 1.0.x.
      * fixes crash with delayed compression option using Bitvise server.
      * adds support for PKIX key reading
      * use new API to parse data in packet_x11_open() for better bounds checking.
      * double the static buffer size when reading and writing known hosts
      * improved bounds checking in packet_queue_listener
      * improve message parsing (CVE-2019-17498)
      * improve bounds checking in kex_agree_methods()
      * adding SSH agent forwarding.
      * fix agent forwarding message, updated example.
      * added integration test code and cmake target. Added example to cmake list.
      * don't call `libssh2_crypto_exit()` until `_libssh2_initialized` count is down to zero.
      * add an EWOULDBLOCK check for better portability
      * fix off by one error when loading public keys with no id
      * fix use-after-free crash on reinitialization of openssl backend
      * preserve error info from agent_list_identities()
      * make sure the error code is set in _libssh2_channel_open()
      * fixed misspellings
      * fix potential typecast error for `_libssh2_ecdsa_key_get_curve_type`
      * rename _libssh2_ecdsa_key_get_curve_type to _libssh2_ecdsa_get_curve_type
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-25"/>
	<updated date="2023-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803273" comment="libssh2-1-1.11.0-150000.4.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206061" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216123" ref_url="https://bugzilla.suse.com/1216123" source="BUGZILLA"/>
		<reference ref_id="1216174" ref_url="https://bugzilla.suse.com/1216174" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016846.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

- CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack. (bsc#1216174)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-25"/>
	<updated date="2023-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216123">SUSE bug 1216123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216174">SUSE bug 1216174</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802970" comment="libnghttp2-14-1.40.0-150200.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206062" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216378" ref_url="https://bugzilla.suse.com/1216378" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45853" ref_url="https://www.suse.com/security/cve/CVE-2023-45853/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016850.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2023-45853: Fixed an integer overflow that would lead to a
  buffer overflow in the minizip subcomponent (bsc#1216378).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2023-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216378">SUSE bug 1216378</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45853/">CVE-2023-45853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802971" comment="libz1-1.2.11-150000.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802972" comment="zlib-devel-1.2.11-150000.3.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206063" version="1" class="patch">
	<metadata>
		<title>Security update for zchunk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216268" ref_url="https://bugzilla.suse.com/1216268" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46228" ref_url="https://www.suse.com/security/cve/CVE-2023-46228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016891.html" source="SUSE-SU"/>
		<description>
This update for zchunk fixes the following issues:

- CVE-2023-46228: Fixed a handle overflow errors in malformed zchunk files. (bsc#1216268)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2023-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216268">SUSE bug 1216268</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46228/">CVE-2023-46228 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46228">CVE-2023-46228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802976" comment="libzck1-1.1.16-150400.3.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206064" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216432" ref_url="https://bugzilla.suse.com/1216432" source="BUGZILLA"/>
		<reference ref_id="1216433" ref_url="https://bugzilla.suse.com/1216433" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34058" ref_url="https://www.suse.com/security/cve/CVE-2023-34058/" source="CVE"/>
		<reference ref_id="CVE-2023-34059" ref_url="https://www.suse.com/security/cve/CVE-2023-34059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016890.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

- CVE-2023-34058: Fixed a SAML token signature bypass issue
  (bsc#1216432).
- CVE-2023-34059: Fixed a privilege escalation issue through
  vmware-user-suid-wrapper (bsc#1216433).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2023-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216432">SUSE bug 1216432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34058/">CVE-2023-34058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34059/">CVE-2023-34059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803782" comment="libvmtools0-12.3.0-150300.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803783" comment="open-vm-tools-12.3.0-150300.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206065" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211307" ref_url="https://bugzilla.suse.com/1211307" source="BUGZILLA"/>
		<reference ref_id="1212423" ref_url="https://bugzilla.suse.com/1212423" source="BUGZILLA"/>
		<reference ref_id="1213772" ref_url="https://bugzilla.suse.com/1213772" source="BUGZILLA"/>
		<reference ref_id="1215955" ref_url="https://bugzilla.suse.com/1215955" source="BUGZILLA"/>
		<reference ref_id="1216062" ref_url="https://bugzilla.suse.com/1216062" source="BUGZILLA"/>
		<reference ref_id="1216512" ref_url="https://bugzilla.suse.com/1216512" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2163" ref_url="https://www.suse.com/security/cve/CVE-2023-2163/" source="CVE"/>
		<reference ref_id="CVE-2023-31085" ref_url="https://www.suse.com/security/cve/CVE-2023-31085/" source="CVE"/>
		<reference ref_id="CVE-2023-34324" ref_url="https://www.suse.com/security/cve/CVE-2023-34324/" source="CVE"/>
		<reference ref_id="CVE-2023-3777" ref_url="https://www.suse.com/security/cve/CVE-2023-3777/" source="CVE"/>
		<reference ref_id="CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189/" source="CVE"/>
		<reference ref_id="CVE-2023-45862" ref_url="https://www.suse.com/security/cve/CVE-2023-45862/" source="CVE"/>
		<reference ref_id="CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813/" source="CVE"/>
		<reference ref_id="CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)
- CVE-2023-46813: Fixed a local privilege escalation with user-space programs that have access to MMIO regions (bsc#1212649).
- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd-&gt;erasesize) that could cause a local DoS. (bsc#1210778)
- CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)
- CVE-2023-5178: Fixed an UAF in queue intialization setup.  (bsc#1215768)
- CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518)
- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)

The following non-security bugs were fixed:

- 9p: virtio: make sure 'offs' is initialized in zc_request (git-fixes).
- ACPI: irq: Fix incorrect return value in acpi_register_gsi() (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CBA (git-fixes).
- ALSA: hda/realtek: Change model for Intel RVP board (git-fixes).
- ALSA: hda: Disable power save for solving pop issue on Lenovo ThinkCentre M70q (git-fixes).
- ALSA: usb-audio: Fix microphone sound on Opencomm2 Headset (git-fixes).
- ASoC: codecs: wcd938x-sdw: fix runtime PM imbalance on probe errors (git-fixes).
- ASoC: codecs: wcd938x-sdw: fix use after free on driver unbind (git-fixes).
- ASoC: codecs: wcd938x: drop bogus bind error handling (git-fixes).
- ASoC: codecs: wcd938x: fix unbind tear down order (git-fixes).
- ASoC: fsl: imx-pcm-rpmsg: Add SNDRV_PCM_INFO_BATCH flag (git-fixes).
- ASoC: imx-rpmsg: Set ignore_pmdown_time for dai_link (git-fixes).
- ASoC: pxa: fix a memory leak in probe() (git-fixes).
- Bluetooth: Avoid redundant authentication (git-fixes).
- Bluetooth: Fix a refcnt underflow problem for hci_conn (git-fixes).
- Bluetooth: Reject connection with the device which has same BD_ADDR (git-fixes).
- Bluetooth: avoid memcmp() out of bounds warning (git-fixes).
- Bluetooth: btusb: add shutdown function for QCA6174 (git-fixes).
- Bluetooth: hci_event: Fix coding style (git-fixes).
- Bluetooth: hci_event: Fix using memcmp when comparing keys (git-fixes).
- Bluetooth: hci_event: Ignore NULL link key (git-fixes).
- Bluetooth: hci_sock: Correctly bounds check and pad HCI_MON_NEW_INDEX name (git-fixes).
- Bluetooth: hci_sock: fix slab oob read in create_monitor_event (git-fixes).
- Bluetooth: vhci: Fix race when opening vhci device (git-fixes).
- Documentation: qat: change kernel version (PED-6401).
- Documentation: qat: rewrite description (PED-6401).
- Drivers: hv: vmbus: Call hv_synic_free() if hv_synic_alloc() fails (git-fixes).
- Drivers: hv: vmbus: Fix vmbus_wait_for_unload() to scan present CPUs (git-fixes).
- Fix metadata references
- HID: holtek: fix slab-out-of-bounds Write in holtek_kbd_input_event (git-fixes).
- HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit (git-fixes).
- HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect (git-fixes).
- HID: multitouch: Add required quirk for Synaptics 0xcd7e device (git-fixes).
- HID: sony: Fix a potential memory leak in sony_probe() (git-fixes).
- HID: sony: remove duplicate NULL check before calling usb_free_urb() (git-fixes).
- IB/mlx4: Fix the size of a buffer in add_port_entries() (git-fixes)
- Input: goodix - ensure int GPIO is in input for gpio_count == 1 &amp;&amp; gpio_int_idx == 0 case (git-fixes).
- Input: powermate - fix use-after-free in powermate_config_complete (git-fixes).
- Input: psmouse - fix fast_reconnect function for PS/2 mode (git-fixes).
- Input: xpad - add PXN V900 support (git-fixes).
- KVM: SVM: Do not kill SEV guest if SMAP erratum triggers in usermode (git-fixes).
- KVM: s390: fix gisa destroy operation might lead to cpu stalls (git-fixes bsc#1216512).
- KVM: x86/mmu: Reconstruct shadow page root if the guest PDPTEs is changed (git-fixes).
- KVM: x86: Fix clang -Wimplicit-fallthrough in do_host_cpuid() (git-fixes).
- KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code (bsc#1213772).
- KVM: x86: Propagate the AMD Automatic IBRS feature to the guest (bsc#1213772).
- KVM: x86: add support for CPUID leaf 0x80000021 (bsc#1213772).
- KVM: x86: synthesize CPUID leaf 0x80000021h if useful (bsc#1213772).
- KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes).
- RDMA/cma: Fix truncation compilation warning in make_cma_ports (git-fixes)
- RDMA/cma: Initialize ib_sa_multicast structure to 0 when join (git-fixes)
- RDMA/core: Require admin capabilities to set system parameters (git-fixes)
- RDMA/cxgb4: Check skb value for failure to allocate (git-fixes)
- RDMA/mlx5: Fix NULL string error (git-fixes)
- RDMA/siw: Fix connection failure handling (git-fixes)
- RDMA/srp: Do not call scsi_done() from srp_abort() (git-fixes)
- RDMA/uverbs: Fix typo of sizeof argument (git-fixes)
- Revert 'pinctrl: avoid unsafe code pattern in find_pinctrl()' (git-fixes).
- Revert 'tty: n_gsm: fix UAF in gsm_cleanup_mux' (git-fixes).
- USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).
- USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).
- USB: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).
- ata: libata-core: Do not register PM operations for SAS ports (git-fixes).
- ata: libata-core: Fix ata_port_request_pm() locking (git-fixes).
- ata: libata-core: Fix port and device removal (git-fixes).
- ata: libata-sata: increase PMP SRST timeout to 10s (git-fixes).
- ata: libata-scsi: ignore reserved bits for REPORT SUPPORTED OPERATION CODES (git-fixes).
- blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init (bsc#1216062).
- blk-cgroup: support to track if policy is online (bsc#1216062).
- bpf: propagate precision in ALU/ALU64 operations (git-fixes).
- bus: ti-sysc: Fix missing AM35xx SoC matching (git-fixes).
- bus: ti-sysc: Use fsleep() instead of usleep_range() in sysc_reset() (git-fixes).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (bsc#1215955).
- cgroup: Remove duplicates in cgroup v1 tasks file (bsc#1211307).
- clk: tegra: fix error return case for recalc_rate (git-fixes).
- counter: microchip-tcb-capture: Fix the use of internal GCLK logic (git-fixes).
- crypto: qat - Include algapi.h for low-level Crypto API (PED-6401).
- crypto: qat - Remove unused function declarations (PED-6401).
- crypto: qat - add fw_counters debugfs file (PED-6401).
- crypto: qat - add heartbeat counters check (PED-6401).
- crypto: qat - add heartbeat feature (PED-6401).
- crypto: qat - add internal timer for qat 4xxx (PED-6401).
- crypto: qat - add measure clock frequency (PED-6401).
- crypto: qat - add missing function declaration in adf_dbgfs.h (PED-6401).
- crypto: qat - add qat_zlib_deflate (PED-6401).
- crypto: qat - add support for 402xx devices (PED-6401).
- crypto: qat - change value of default idle filter (PED-6401).
- crypto: qat - delay sysfs initialization (PED-6401).
- crypto: qat - do not export adf_init_admin_pm() (PED-6401).
- crypto: qat - drop log level of msg in get_instance_node() (PED-6401).
- crypto: qat - drop obsolete heartbeat interface (PED-6401).
- crypto: qat - drop redundant adf_enable_aer() (PED-6401).
- crypto: qat - expose pm_idle_enabled through sysfs (PED-6401).
- crypto: qat - extend buffer list logic interface (PED-6401).
- crypto: qat - extend configuration for 4xxx (PED-6401).
- crypto: qat - fix apply custom thread-service mapping for dc service (PED-6401).
- crypto: qat - fix concurrency issue when device state changes (PED-6401).
- crypto: qat - fix crypto capability detection for 4xxx (PED-6401).
- crypto: qat - fix spelling mistakes from 'bufer' to 'buffer' (PED-6401).
- crypto: qat - make fw images name constant (PED-6401).
- crypto: qat - make state machine functions static (PED-6401).
- crypto: qat - move dbgfs init to separate file (PED-6401).
- crypto: qat - move returns to default case (PED-6401).
- crypto: qat - refactor device restart logic (PED-6401).
- crypto: qat - refactor fw config logic for 4xxx (PED-6401).
- crypto: qat - remove ADF_STATUS_PF_RUNNING flag from probe (PED-6401).
- crypto: qat - replace state machine calls (PED-6401).
- crypto: qat - replace the if statement with min() (PED-6401).
- crypto: qat - set deprecated capabilities as reserved (PED-6401).
- crypto: qat - unmap buffer before free for DH (PED-6401).
- crypto: qat - unmap buffers before free for RSA (PED-6401).
- crypto: qat - update slice mask for 4xxx devices (PED-6401).
- crypto: qat - use kfree_sensitive instead of memset/kfree() (PED-6401).
- dmaengine: idxd: use spin_lock_irqsave before wait_event_lock_irq (git-fixes).
- dmaengine: mediatek: Fix deadlock caused by synchronize_irq() (git-fixes).
- dmaengine: stm32-mdma: abort resume if no ongoing transfer (git-fixes).
- drm/amd/display: Do not check registers, if using AUX BL control (git-fixes).
- drm/amd/display: Do not set dpms_off for seamless boot (git-fixes).
- drm/amdgpu: Handle null atom context in VBIOS info ioctl (git-fixes).
- drm/amdgpu: add missing NULL check (git-fixes).
- drm/i915: Retry gtt fault when out of fence registers (git-fixes).
- drm/msm/dp: do not reinitialize phy unless retry during link training (git-fixes).
- drm/msm/dpu: change _dpu_plane_calc_bw() to use u64 to avoid overflow (git-fixes).
- drm/msm/dsi: fix irq_of_parse_and_map() error checking (git-fixes).
- drm/msm/dsi: skip the wait for video mode done if not applicable (git-fixes).
- drm/vmwgfx: fix typo of sizeof argument (git-fixes).
- drm: panel-orientation-quirks: Add quirk for One Mix 2S (git-fixes).
- firmware: arm_ffa: Do not set the memory region attributes for MEM_LEND (git-fixes).
- firmware: imx-dsp: Fix an error handling path in imx_dsp_setup_channels() (git-fixes).
- gpio: aspeed: fix the GPIO number passed to pinctrl_gpio_set_config() (git-fixes).
- gpio: pmic-eic-sprd: Add can_sleep flag for PMIC EIC chip (git-fixes).
- gpio: pxa: disable pinctrl calls for MMP_GPIO (git-fixes).
- gpio: tb10x: Fix an error handling path in tb10x_gpio_probe() (git-fixes).
- gpio: timberdale: Fix potential deadlock on &amp;tgpio-&gt;lock (git-fixes).
- gpio: vf610: set value before the direction to avoid a glitch (git-fixes).
- gve: Do not fully free QPL pages on prefill errors (git-fixes).
- i2c: i801: unregister tco_pdev in i801_probe() error path (git-fixes).
- i2c: mux: Avoid potential false error message in i2c_mux_add_adapter (git-fixes).
- i2c: mux: demux-pinctrl: check the return value of devm_kstrdup() (git-fixes).
- i2c: mux: gpio: Add missing fwnode_handle_put() (git-fixes).
- i2c: mux: gpio:?Replace custom acpi_get_local_address() (git-fixes).
- i2c: npcm7xx: Fix callback completion ordering (git-fixes).
- ieee802154: ca8210: Fix a potential UAF in ca8210_probe (git-fixes).
- iio: pressure: bmp280: Fix NULL pointer exception (git-fixes).
- iio: pressure: dps310: Adjust Timeout Settings (git-fixes).
- iio: pressure: ms5611: ms5611_prom_is_valid false negative bug (git-fixes).
- iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support (bsc#1212423).
- kabi: blkcg_policy_data fix KABI (bsc#1216062).
- kabi: workaround for enum nft_trans_phase (bsc#1215104).
- kprobes: Prohibit probing on CFI preamble symbol (git-fixes).
- leds: Drop BUG_ON check for LED_COLOR_ID_MULTI (git-fixes).
- mm, memcg: reconsider kmem.limit_in_bytes deprecation (bsc#1208788 bsc#1213705).
- mmc: core: Capture correct oemid-bits for eMMC cards (git-fixes).
- mmc: core: sdio: hold retuning if sdio in 1-bit mode (git-fixes).
- mmc: mtk-sd: Use readl_poll_timeout_atomic in msdc_reset_hw (git-fixes).
- mtd: physmap-core: Restore map_rom fallback (git-fixes).
- mtd: rawnand: arasan: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: marvell: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: pl353: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: qcom: Unmap the right resource upon probe failure (git-fixes).
- mtd: spinand: micron: correct bitmask for ecc status (git-fixes).
- net/sched: fix netdevice reference leaks in attach_default_qdiscs() (git-fixes).
- net: mana: Fix TX CQE error handling (bsc#1215986).
- net: mana: Fix oversized sge0 for GSO packets (bsc#1215986).
- net: nfc: llcp: Add lock when modifying device list (git-fixes).
- net: rfkill: gpio: prevent value glitch during probe (git-fixes).
- net: sched: add barrier to fix packet stuck problem for lockless qdisc (bsc#1216345).
- net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (bsc#1216345).
- net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read (git-fixes).
- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-fixes).
- net: usb: smsc95xx: Fix an error code in smsc95xx_reset() (git-fixes).
- netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain (git-fixes).
- netfilter: nf_tables: unbind non-anonymous set if rule construction fails (git-fixes).
- nfc: nci: assert requested protocol is valid (git-fixes).
- nfc: nci: fix possible NULL pointer dereference in send_acknowledge() (git-fixes).
- nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() (git-fixes).
- nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() (bsc#1214842).
- phy: mapphone-mdm6600: Fix pinctrl_pm handling for sleep pins (git-fixes).
- phy: mapphone-mdm6600: Fix runtime PM for remove (git-fixes).
- phy: mapphone-mdm6600: Fix runtime disable on probe (git-fixes).
- pinctrl: avoid unsafe code pattern in find_pinctrl() (git-fixes).
- pinctrl: renesas: rzn1: Enable missing PINMUX (git-fixes).
- platform/surface: platform_profile: Propagate error if profile registration fails (git-fixes).
- platform/x86: asus-wmi: Change ASUS_WMI_BRN_DOWN code from 0x20 to 0x2e (git-fixes).
- platform/x86: asus-wmi: Map 0x2a code, Ignore 0x2b and 0x2c events (git-fixes).
- platform/x86: think-lmi: Fix reference leak (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Positivo C4128B (git-fixes).
- power: supply: ucs1002: fix error code in ucs1002_get_property() (git-fixes).
- quota: Fix slow quotaoff (bsc#1216621).
- r8152: check budget for r8152_poll() (git-fixes).
- regmap: fix NULL deref on lookup (git-fixes).
- regmap: rbtree: Fix wrong register marked as in-cache when creating new node (git-fixes).
- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).
- ring-buffer: Do not attempt to read past 'commit' (git-fixes).
- ring-buffer: Fix bytes info in per_cpu buffer stats (git-fixes).
- ring-buffer: Update 'shortest_full' in polling (git-fixes).
- s390/cio: fix a memleak in css_alloc_subchannel (git-fixes bsc#1216510).
- s390/pci: fix iommu bitmap allocation (git-fixes bsc#1216511).
- s390: add z16 elf platform (git-fixes LTC#203789 bsc#1215956 LTC#203788 bsc#1215957).
- sched/cpuset: Bring back cpuset_mutex (bsc#1215955).
- sched/deadline,rt: Remove unused parameter from pick_next_[rt|dl]_entity() (git fixes (sched)).
- sched/rt: Fix live lock between select_fallback_rq() and RT push (git fixes (sched)).
- sched/rt: Fix sysctl_sched_rr_timeslice intial value (git fixes (sched)).
- serial: 8250_port: Check IRQ data before use (git-fixes).
- soc: imx8m: Enable OCOTP clock for imx8mm before reading registers (git-fixes).
- spi: nxp-fspi: reset the FLSHxCR1 registers (git-fixes).
- spi: stm32: add a delay before SPI disable (git-fixes).
- spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain (git-fixes).
- spi: sun6i: reduce DMA RX transfer width to single byte (git-fixes).
- thunderbolt: Check that lane 1 is in CL0 before enabling lane bonding (git-fixes).
- thunderbolt: Workaround an IOMMU fault on certain systems with Intel Maple Ridge (git-fixes).
- tracing: Have current_trace inc the trace array ref count (git-fixes).
- tracing: Have event inject files inc the trace array ref count (git-fixes).
- tracing: Have option files inc the trace array ref count (git-fixes).
- tracing: Have tracing_max_latency inc the trace array ref count (git-fixes).
- tracing: Increase trace array ref count on enable and filter files (git-fixes).
- tracing: Make trace_marker{,_raw} stream-like (git-fixes).
- usb: cdnsp: Fixes issue with dequeuing not queued requests (git-fixes).
- usb: dwc3: Soft reset phy on probe for host (git-fixes).
- usb: gadget: ncm: Handle decoding of multiple NTB's in unwrap call (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: musb: Get the musb_qh poniter after musb_giveback (git-fixes).
- usb: musb: Modify the 'HWVers' register address (git-fixes).
- usb: typec: altmodes/displayport: Signal hpd low when exiting mode (git-fixes).
- usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).
- vmbus_testing: fix wrong python syntax for integer value comparison (git-fixes).
- vringh: do not use vringh_kiov_advance() in vringh_iov_xfer() (git-fixes).
- watchdog: iTCO_wdt: No need to stop the timer in probe (git-fixes).
- watchdog: iTCO_wdt: Set NO_REBOOT if the watchdog is not already running (git-fixes).
- wifi: cfg80211: Fix 6GHz scan configuration (git-fixes).
- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
- wifi: iwlwifi: Ensure ack flag is properly cleared (git-fixes).
- wifi: iwlwifi: dbg_ini: fix structure packing (git-fixes).
- wifi: iwlwifi: mvm: Fix a memory corruption issue (git-fixes).
- wifi: mac80211: allow transmitting EAPOL frames with tainted key (git-fixes).
- wifi: mt76: mt76x02: fix MT76x0 external LNA gain handling (git-fixes).
- wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet (git-fixes).
- wifi: mwifiex: Fix tlv_buf_left calculation (git-fixes).
- wifi: mwifiex: Sanity check tlv_len and tlv_bitmap_len (git-fixes).
- x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature (bsc#1213772).
- x86/cpu, kvm: Add the Null Selector Clears Base feature (bsc#1213772).
- x86/cpu, kvm: Add the SMM_CTL MSR not present feature (bsc#1213772).
- x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf (bsc#1213772).
- x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled (bsc#1213772).
- x86/cpu: Support AMD Automatic IBRS (bsc#1213772).
- x86/sev: Check IOBM for IOIO exceptions from user-space (bsc#1212649).
- x86/sev: Check for user-space IOIO pointing to kernel space (bsc#1212649).
- x86/sev: Disable MMIO emulation from user mode (bsc#1212649).
- xen-netback: use default TX queue size for vifs (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-02"/>
	<updated date="2023-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211307">SUSE bug 1211307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212423">SUSE bug 1212423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213772">SUSE bug 1213772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215955">SUSE bug 1215955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216062">SUSE bug 1216062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216512">SUSE bug 1216512</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2163/">CVE-2023-2163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31085/">CVE-2023-31085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34324/">CVE-2023-34324 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3777/">CVE-2023-3777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45862/">CVE-2023-45862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45862">CVE-2023-45862 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808417" comment="kernel-rt-5.14.21-150400.15.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206066" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="SUSE-SU-2023:4357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032593.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container fixes the following issues:

kubevirt is rebuilt against the current GO security release.

- Set cache mode on hotplugged disks
- Delete VMI prior to NFS server pod in tests
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2023-11-03"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804076" comment="kubevirt-manifests-0.54.0-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804083" comment="kubevirt-virtctl-0.54.0-150400.3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206067" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212535" ref_url="https://bugzilla.suse.com/1212535" source="BUGZILLA"/>
		<reference ref_id="1212881" ref_url="https://bugzilla.suse.com/1212881" source="BUGZILLA"/>
		<reference ref_id="1212883" ref_url="https://bugzilla.suse.com/1212883" source="BUGZILLA"/>
		<reference ref_id="1212888" ref_url="https://bugzilla.suse.com/1212888" source="BUGZILLA"/>
		<reference ref_id="1213273" ref_url="https://bugzilla.suse.com/1213273" source="BUGZILLA"/>
		<reference ref_id="1213274" ref_url="https://bugzilla.suse.com/1213274" source="BUGZILLA"/>
		<reference ref_id="1213589" ref_url="https://bugzilla.suse.com/1213589" source="BUGZILLA"/>
		<reference ref_id="1213590" ref_url="https://bugzilla.suse.com/1213590" source="BUGZILLA"/>
		<reference ref_id="1214574" ref_url="https://bugzilla.suse.com/1214574" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18768" ref_url="https://www.suse.com/security/cve/CVE-2020-18768/" source="CVE"/>
		<reference ref_id="CVE-2023-25433" ref_url="https://www.suse.com/security/cve/CVE-2023-25433/" source="CVE"/>
		<reference ref_id="CVE-2023-26966" ref_url="https://www.suse.com/security/cve/CVE-2023-26966/" source="CVE"/>
		<reference ref_id="CVE-2023-2908" ref_url="https://www.suse.com/security/cve/CVE-2023-2908/" source="CVE"/>
		<reference ref_id="CVE-2023-3316" ref_url="https://www.suse.com/security/cve/CVE-2023-3316/" source="CVE"/>
		<reference ref_id="CVE-2023-3576" ref_url="https://www.suse.com/security/cve/CVE-2023-3576/" source="CVE"/>
		<reference ref_id="CVE-2023-3618" ref_url="https://www.suse.com/security/cve/CVE-2023-3618/" source="CVE"/>
		<reference ref_id="CVE-2023-38288" ref_url="https://www.suse.com/security/cve/CVE-2023-38288/" source="CVE"/>
		<reference ref_id="CVE-2023-38289" ref_url="https://www.suse.com/security/cve/CVE-2023-38289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-38289: Fixed a NULL pointer dereference in raw2tiff
  (bsc#1213589).
- CVE-2023-38288: Fixed an integer overflow in raw2tiff (bsc#1213590).
- CVE-2023-3576: Fixed a memory leak in tiffcrop (bsc#1213273).
- CVE-2020-18768: Fixed an out of bounds read in tiffcp (bsc#1214574).
- CVE-2023-26966: Fixed an out of bounds read when transforming a
  little-endian file to a big-endian output (bsc#1212881)
- CVE-2023-3618: Fixed a NULL pointer dereference while encoding FAX3
  files (bsc#1213274).
- CVE-2023-2908: Fixed an undefined behavior issue when doing pointer
  arithmetic on a NULL pointer (bsc#1212888).
- CVE-2023-3316: Fixed a NULL pointer dereference while opening a file
  in an inaccessible path (bsc#1212535).
- CVE-2023-25433: Fixed a buffer overflow in tiffcrop (bsc#1212883).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-06"/>
	<updated date="2023-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212535">SUSE bug 1212535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212881">SUSE bug 1212881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212883">SUSE bug 1212883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212888">SUSE bug 1212888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213273">SUSE bug 1213273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213274">SUSE bug 1213274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213589">SUSE bug 1213589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213590">SUSE bug 1213590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214574">SUSE bug 1214574</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18768/">CVE-2020-18768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18768">CVE-2020-18768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25433/">CVE-2023-25433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25433">CVE-2023-25433 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-26966/">CVE-2023-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26966">CVE-2023-26966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2908/">CVE-2023-2908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2908">CVE-2023-2908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3316/">CVE-2023-3316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3316">CVE-2023-3316 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3576/">CVE-2023-3576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3576">CVE-2023-3576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3618/">CVE-2023-3618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3618">CVE-2023-3618 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38288/">CVE-2023-38288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38288">CVE-2023-38288 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38289/">CVE-2023-38289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38289">CVE-2023-38289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206068" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208788" ref_url="https://bugzilla.suse.com/1208788" source="BUGZILLA"/>
		<reference ref_id="1210778" ref_url="https://bugzilla.suse.com/1210778" source="BUGZILLA"/>
		<reference ref_id="1211307" ref_url="https://bugzilla.suse.com/1211307" source="BUGZILLA"/>
		<reference ref_id="1212423" ref_url="https://bugzilla.suse.com/1212423" source="BUGZILLA"/>
		<reference ref_id="1212649" ref_url="https://bugzilla.suse.com/1212649" source="BUGZILLA"/>
		<reference ref_id="1213705" ref_url="https://bugzilla.suse.com/1213705" source="BUGZILLA"/>
		<reference ref_id="1213772" ref_url="https://bugzilla.suse.com/1213772" source="BUGZILLA"/>
		<reference ref_id="1214842" ref_url="https://bugzilla.suse.com/1214842" source="BUGZILLA"/>
		<reference ref_id="1215095" ref_url="https://bugzilla.suse.com/1215095" source="BUGZILLA"/>
		<reference ref_id="1215104" ref_url="https://bugzilla.suse.com/1215104" source="BUGZILLA"/>
		<reference ref_id="1215518" ref_url="https://bugzilla.suse.com/1215518" source="BUGZILLA"/>
		<reference ref_id="1215955" ref_url="https://bugzilla.suse.com/1215955" source="BUGZILLA"/>
		<reference ref_id="1215956" ref_url="https://bugzilla.suse.com/1215956" source="BUGZILLA"/>
		<reference ref_id="1215957" ref_url="https://bugzilla.suse.com/1215957" source="BUGZILLA"/>
		<reference ref_id="1215986" ref_url="https://bugzilla.suse.com/1215986" source="BUGZILLA"/>
		<reference ref_id="1216062" ref_url="https://bugzilla.suse.com/1216062" source="BUGZILLA"/>
		<reference ref_id="1216345" ref_url="https://bugzilla.suse.com/1216345" source="BUGZILLA"/>
		<reference ref_id="1216510" ref_url="https://bugzilla.suse.com/1216510" source="BUGZILLA"/>
		<reference ref_id="1216511" ref_url="https://bugzilla.suse.com/1216511" source="BUGZILLA"/>
		<reference ref_id="1216512" ref_url="https://bugzilla.suse.com/1216512" source="BUGZILLA"/>
		<reference ref_id="1216621" ref_url="https://bugzilla.suse.com/1216621" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2163" ref_url="https://www.suse.com/security/cve/CVE-2023-2163/" source="CVE"/>
		<reference ref_id="CVE-2023-31085" ref_url="https://www.suse.com/security/cve/CVE-2023-31085/" source="CVE"/>
		<reference ref_id="CVE-2023-34324" ref_url="https://www.suse.com/security/cve/CVE-2023-34324/" source="CVE"/>
		<reference ref_id="CVE-2023-3777" ref_url="https://www.suse.com/security/cve/CVE-2023-3777/" source="CVE"/>
		<reference ref_id="CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518)
- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)
- CVE-2023-5178: Fixed an UAF in queue intialization setup.  (bsc#1215768)
- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd-&gt;erasesize) that could cause a local DoS. (bsc#1210778)
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)

The following non-security bugs were fixed:

- 9p: virtio: make sure 'offs' is initialized in zc_request (git-fixes).
- ACPI: irq: Fix incorrect return value in acpi_register_gsi() (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CBA (git-fixes).
- ALSA: hda: Disable power save for solving pop issue on Lenovo ThinkCentre M70q (git-fixes).
- ALSA: hda/realtek: Change model for Intel RVP board (git-fixes).
- ALSA: usb-audio: Fix microphone sound on Opencomm2 Headset (git-fixes).
- ASoC: codecs: wcd938x-sdw: fix runtime PM imbalance on probe errors (git-fixes).
- ASoC: codecs: wcd938x-sdw: fix use after free on driver unbind (git-fixes).
- ASoC: codecs: wcd938x: drop bogus bind error handling (git-fixes).
- ASoC: codecs: wcd938x: fix unbind tear down order (git-fixes).
- ASoC: fsl: imx-pcm-rpmsg: Add SNDRV_PCM_INFO_BATCH flag (git-fixes).
- ASoC: imx-rpmsg: Set ignore_pmdown_time for dai_link (git-fixes).
- ASoC: pxa: fix a memory leak in probe() (git-fixes).
- ata: libata-core: Do not register PM operations for SAS ports (git-fixes).
- ata: libata-core: Fix ata_port_request_pm() locking (git-fixes).
- ata: libata-core: Fix port and device removal (git-fixes).
- ata: libata-sata: increase PMP SRST timeout to 10s (git-fixes).
- ata: libata-scsi: ignore reserved bits for REPORT SUPPORTED OPERATION CODES (git-fixes).
- blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init (bsc#1216062).
- blk-cgroup: support to track if policy is online (bsc#1216062).
- Bluetooth: avoid memcmp() out of bounds warning (git-fixes).
- Bluetooth: Avoid redundant authentication (git-fixes).
- Bluetooth: btusb: add shutdown function for QCA6174 (git-fixes).
- Bluetooth: Fix a refcnt underflow problem for hci_conn (git-fixes).
- Bluetooth: hci_event: Fix coding style (git-fixes).
- Bluetooth: hci_event: Fix using memcmp when comparing keys (git-fixes).
- Bluetooth: hci_event: Ignore NULL link key (git-fixes).
- Bluetooth: hci_sock: Correctly bounds check and pad HCI_MON_NEW_INDEX name (git-fixes).
- Bluetooth: hci_sock: fix slab oob read in create_monitor_event (git-fixes).
- Bluetooth: Reject connection with the device which has same BD_ADDR (git-fixes).
- Bluetooth: vhci: Fix race when opening vhci device (git-fixes).
- bpf: propagate precision in ALU/ALU64 operations (git-fixes).
- bus: ti-sysc: Fix missing AM35xx SoC matching (git-fixes).
- bus: ti-sysc: Use fsleep() instead of usleep_range() in sysc_reset() (git-fixes).
- cgroup: Remove duplicates in cgroup v1 tasks file (bsc#1211307).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (bsc#1215955).
- clk: tegra: fix error return case for recalc_rate (git-fixes).
- counter: microchip-tcb-capture: Fix the use of internal GCLK logic (git-fixes).
- crypto: qat - add fw_counters debugfs file (PED-6401).
- crypto: qat - add heartbeat counters check (PED-6401).
- crypto: qat - add heartbeat feature (PED-6401).
- crypto: qat - add internal timer for qat 4xxx (PED-6401).
- crypto: qat - add measure clock frequency (PED-6401).
- crypto: qat - add missing function declaration in adf_dbgfs.h (PED-6401).
- crypto: qat - add qat_zlib_deflate (PED-6401).
- crypto: qat - add support for 402xx devices (PED-6401).
- crypto: qat - change value of default idle filter (PED-6401).
- crypto: qat - delay sysfs initialization (PED-6401).
- crypto: qat - do not export adf_init_admin_pm() (PED-6401).
- crypto: qat - drop log level of msg in get_instance_node() (PED-6401).
- crypto: qat - drop obsolete heartbeat interface (PED-6401).
- crypto: qat - drop redundant adf_enable_aer() (PED-6401).
- crypto: qat - expose pm_idle_enabled through sysfs (PED-6401).
- crypto: qat - extend buffer list logic interface (PED-6401).
- crypto: qat - extend configuration for 4xxx (PED-6401).
- crypto: qat - fix apply custom thread-service mapping for dc service (PED-6401).
- crypto: qat - fix concurrency issue when device state changes (PED-6401).
- crypto: qat - fix crypto capability detection for 4xxx (PED-6401).
- crypto: qat - fix spelling mistakes from 'bufer' to 'buffer' (PED-6401).
- crypto: qat - Include algapi.h for low-level Crypto API (PED-6401).
- crypto: qat - make fw images name constant (PED-6401).
- crypto: qat - make state machine functions static (PED-6401).
- crypto: qat - move dbgfs init to separate file (PED-6401).
- crypto: qat - move returns to default case (PED-6401).
- crypto: qat - refactor device restart logic (PED-6401).
- crypto: qat - refactor fw config logic for 4xxx (PED-6401).
- crypto: qat - remove ADF_STATUS_PF_RUNNING flag from probe (PED-6401).
- crypto: qat - Remove unused function declarations (PED-6401).
- crypto: qat - replace state machine calls (PED-6401).
- crypto: qat - replace the if statement with min() (PED-6401).
- crypto: qat - set deprecated capabilities as reserved (PED-6401).
- crypto: qat - unmap buffer before free for DH (PED-6401).
- crypto: qat - unmap buffers before free for RSA (PED-6401).
- crypto: qat - update slice mask for 4xxx devices (PED-6401).
- crypto: qat - use kfree_sensitive instead of memset/kfree() (PED-6401).
- dmaengine: idxd: use spin_lock_irqsave before wait_event_lock_irq (git-fixes).
- dmaengine: mediatek: Fix deadlock caused by synchronize_irq() (git-fixes).
- dmaengine: stm32-mdma: abort resume if no ongoing transfer (git-fixes).
- Documentation: qat: change kernel version (PED-6401).
- Documentation: qat: rewrite description (PED-6401).
- Drivers: hv: vmbus: Call hv_synic_free() if hv_synic_alloc() fails (git-fixes).
- Drivers: hv: vmbus: Fix vmbus_wait_for_unload() to scan present CPUs (git-fixes).
- drm: panel-orientation-quirks: Add quirk for One Mix 2S (git-fixes).
- drm/amd/display: Do not check registers, if using AUX BL control (git-fixes).
- drm/amd/display: Do not set dpms_off for seamless boot (git-fixes).
- drm/amdgpu: add missing NULL check (git-fixes).
- drm/amdgpu: Handle null atom context in VBIOS info ioctl (git-fixes).
- drm/i915: Retry gtt fault when out of fence registers (git-fixes).
- drm/msm/dp: do not reinitialize phy unless retry during link training (git-fixes).
- drm/msm/dpu: change _dpu_plane_calc_bw() to use u64 to avoid overflow (git-fixes).
- drm/msm/dsi: fix irq_of_parse_and_map() error checking (git-fixes).
- drm/msm/dsi: skip the wait for video mode done if not applicable (git-fixes).
- drm/vmwgfx: fix typo of sizeof argument (git-fixes).
- firmware: arm_ffa: Do not set the memory region attributes for MEM_LEND (git-fixes).
- firmware: imx-dsp: Fix an error handling path in imx_dsp_setup_channels() (git-fixes).
- gpio: aspeed: fix the GPIO number passed to pinctrl_gpio_set_config() (git-fixes).
- gpio: pmic-eic-sprd: Add can_sleep flag for PMIC EIC chip (git-fixes).
- gpio: pxa: disable pinctrl calls for MMP_GPIO (git-fixes).
- gpio: tb10x: Fix an error handling path in tb10x_gpio_probe() (git-fixes).
- gpio: timberdale: Fix potential deadlock on &amp;tgpio-&gt;lock (git-fixes).
- gpio: vf610: set value before the direction to avoid a glitch (git-fixes).
- gve: Do not fully free QPL pages on prefill errors (git-fixes).
- HID: holtek: fix slab-out-of-bounds Write in holtek_kbd_input_event (git-fixes).
- HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit (git-fixes).
- HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect (git-fixes).
- HID: multitouch: Add required quirk for Synaptics 0xcd7e device (git-fixes).
- HID: sony: Fix a potential memory leak in sony_probe() (git-fixes).
- HID: sony: remove duplicate NULL check before calling usb_free_urb() (git-fixes).
- i2c: i801: unregister tco_pdev in i801_probe() error path (git-fixes).
- i2c: mux: Avoid potential false error message in i2c_mux_add_adapter (git-fixes).
- i2c: mux: demux-pinctrl: check the return value of devm_kstrdup() (git-fixes).
- i2c: mux: gpio: Add missing fwnode_handle_put() (git-fixes).
- i2c: mux: gpio:?Replace custom acpi_get_local_address() (git-fixes).
- i2c: npcm7xx: Fix callback completion ordering (git-fixes).
- IB/mlx4: Fix the size of a buffer in add_port_entries() (git-fixes)
- ieee802154: ca8210: Fix a potential UAF in ca8210_probe (git-fixes).
- iio: pressure: bmp280: Fix NULL pointer exception (git-fixes).
- iio: pressure: dps310: Adjust Timeout Settings (git-fixes).
- iio: pressure: ms5611: ms5611_prom_is_valid false negative bug (git-fixes).
- Input: goodix - ensure int GPIO is in input for gpio_count == 1 &amp;&amp; gpio_int_idx == 0 case (git-fixes).
- Input: powermate - fix use-after-free in powermate_config_complete (git-fixes).
- Input: psmouse - fix fast_reconnect function for PS/2 mode (git-fixes).
- Input: xpad - add PXN V900 support (git-fixes).
- iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support (bsc#1212423).
- iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback (bsc#1212423).
- kabi: blkcg_policy_data fix KABI (bsc#1216062).
- kabi: workaround for enum nft_trans_phase (bsc#1215104).
- kprobes: Prohibit probing on CFI preamble symbol (git-fixes).
- KVM: s390: fix gisa destroy operation might lead to cpu stalls (git-fixes bsc#1216512).
- KVM: SVM: Do not kill SEV guest if SMAP erratum triggers in usermode (git-fixes).
- KVM: x86: add support for CPUID leaf 0x80000021 (bsc#1213772).
- KVM: x86: Fix clang -Wimplicit-fallthrough in do_host_cpuid() (git-fixes).
- KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code (bsc#1213772).
- KVM: x86: Propagate the AMD Automatic IBRS feature to the guest (bsc#1213772).
- KVM: x86: synthesize CPUID leaf 0x80000021h if useful (bsc#1213772).
- KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes).
- KVM: x86/mmu: Reconstruct shadow page root if the guest PDPTEs is changed (git-fixes).
- leds: Drop BUG_ON check for LED_COLOR_ID_MULTI (git-fixes).
- mm, memcg: reconsider kmem.limit_in_bytes deprecation (bsc#1208788 bsc#1213705).
- mmc: core: Capture correct oemid-bits for eMMC cards (git-fixes).
- mmc: core: sdio: hold retuning if sdio in 1-bit mode (git-fixes).
- mmc: mtk-sd: Use readl_poll_timeout_atomic in msdc_reset_hw (git-fixes).
- mtd: physmap-core: Restore map_rom fallback (git-fixes).
- mtd: rawnand: arasan: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: marvell: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: pl353: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: qcom: Unmap the right resource upon probe failure (git-fixes).
- mtd: spinand: micron: correct bitmask for ecc status (git-fixes).
- net: mana: Fix oversized sge0 for GSO packets (bsc#1215986).
- net: mana: Fix TX CQE error handling (bsc#1215986).
- net: nfc: llcp: Add lock when modifying device list (git-fixes).
- net: rfkill: gpio: prevent value glitch during probe (git-fixes).
- net: sched: add barrier to fix packet stuck problem for lockless qdisc (bsc#1216345).
- net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (bsc#1216345).
- net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read (git-fixes).
- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-fixes).
- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-fixes).
- net: usb: smsc95xx: Fix an error code in smsc95xx_reset() (git-fixes).
- net/sched: fix netdevice reference leaks in attach_default_qdiscs() (git-fixes).
- netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain (git-fixes).
- netfilter: nf_tables: unbind non-anonymous set if rule construction fails (git-fixes).
- nfc: nci: assert requested protocol is valid (git-fixes).
- nfc: nci: fix possible NULL pointer dereference in send_acknowledge() (git-fixes).
- nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() (git-fixes).
- nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() (bsc#1214842).
- phy: mapphone-mdm6600: Fix pinctrl_pm handling for sleep pins (git-fixes).
- phy: mapphone-mdm6600: Fix runtime disable on probe (git-fixes).
- phy: mapphone-mdm6600: Fix runtime PM for remove (git-fixes).
- pinctrl: avoid unsafe code pattern in find_pinctrl() (git-fixes).
- pinctrl: renesas: rzn1: Enable missing PINMUX (git-fixes).
- platform/surface: platform_profile: Propagate error if profile registration fails (git-fixes).
- platform/x86: asus-wmi: Change ASUS_WMI_BRN_DOWN code from 0x20 to 0x2e (git-fixes).
- platform/x86: asus-wmi: Map 0x2a code, Ignore 0x2b and 0x2c events (git-fixes).
- platform/x86: think-lmi: Fix reference leak (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Positivo C4128B (git-fixes).
- power: supply: ucs1002: fix error code in ucs1002_get_property() (git-fixes).
- r8152: check budget for r8152_poll() (git-fixes).
- RDMA/cma: Fix truncation compilation warning in make_cma_ports (git-fixes)
- RDMA/cma: Initialize ib_sa_multicast structure to 0 when join (git-fixes)
- RDMA/core: Require admin capabilities to set system parameters (git-fixes)
- RDMA/cxgb4: Check skb value for failure to allocate (git-fixes)
- RDMA/mlx5: Fix NULL string error (git-fixes)
- RDMA/siw: Fix connection failure handling (git-fixes)
- RDMA/srp: Do not call scsi_done() from srp_abort() (git-fixes)
- RDMA/uverbs: Fix typo of sizeof argument (git-fixes)
- regmap: fix NULL deref on lookup (git-fixes).
- regmap: rbtree: Fix wrong register marked as in-cache when creating new node (git-fixes).
- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).
- ring-buffer: Do not attempt to read past 'commit' (git-fixes).
- ring-buffer: Fix bytes info in per_cpu buffer stats (git-fixes).
- ring-buffer: Update 'shortest_full' in polling (git-fixes).
- s390: add z16 elf platform (git-fixes LTC#203789 bsc#1215956 LTC#203788 bsc#1215957).
- s390/cio: fix a memleak in css_alloc_subchannel (git-fixes bsc#1216510).
- s390/pci: fix iommu bitmap allocation (git-fixes bsc#1216511).
- sched/cpuset: Bring back cpuset_mutex (bsc#1215955).
- sched/deadline,rt: Remove unused parameter from pick_next_[rt|dl]_entity() (git fixes (sched)).
- sched/rt: Fix live lock between select_fallback_rq() and RT push (git fixes (sched)).
- sched/rt: Fix sysctl_sched_rr_timeslice intial value (git fixes (sched)).
- serial: 8250_port: Check IRQ data before use (git-fixes).
- soc: imx8m: Enable OCOTP clock for imx8mm before reading registers (git-fixes).
- spi: nxp-fspi: reset the FLSHxCR1 registers (git-fixes).
- spi: stm32: add a delay before SPI disable (git-fixes).
- spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain (git-fixes).
- spi: sun6i: reduce DMA RX transfer width to single byte (git-fixes).
- thunderbolt: Check that lane 1 is in CL0 before enabling lane bonding (git-fixes).
- thunderbolt: Workaround an IOMMU fault on certain systems with Intel Maple Ridge (git-fixes).
- tracing: Have current_trace inc the trace array ref count (git-fixes).
- tracing: Have event inject files inc the trace array ref count (git-fixes).
- tracing: Have option files inc the trace array ref count (git-fixes).
- tracing: Have tracing_max_latency inc the trace array ref count (git-fixes).
- tracing: Increase trace array ref count on enable and filter files (git-fixes).
- tracing: Make trace_marker{,_raw} stream-like (git-fixes).
- usb: cdnsp: Fixes issue with dequeuing not queued requests (git-fixes).
- usb: dwc3: Soft reset phy on probe for host (git-fixes).
- usb: gadget: ncm: Handle decoding of multiple NTB's in unwrap call (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: musb: Get the musb_qh poniter after musb_giveback (git-fixes).
- usb: musb: Modify the 'HWVers' register address (git-fixes).
- usb: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).
- usb: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).
- usb: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).
- usb: typec: altmodes/displayport: Signal hpd low when exiting mode (git-fixes).
- usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).
- vmbus_testing: fix wrong python syntax for integer value comparison (git-fixes).
- vringh: do not use vringh_kiov_advance() in vringh_iov_xfer() (git-fixes).
- watchdog: iTCO_wdt: No need to stop the timer in probe (git-fixes).
- watchdog: iTCO_wdt: Set NO_REBOOT if the watchdog is not already running (git-fixes).
- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
- wifi: cfg80211: Fix 6GHz scan configuration (git-fixes).
- wifi: iwlwifi: dbg_ini: fix structure packing (git-fixes).
- wifi: iwlwifi: Ensure ack flag is properly cleared (git-fixes).
- wifi: iwlwifi: mvm: Fix a memory corruption issue (git-fixes).
- wifi: mac80211: allow transmitting EAPOL frames with tainted key (git-fixes).
- wifi: mt76: mt76x02: fix MT76x0 external LNA gain handling (git-fixes).
- wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet (git-fixes).
- wifi: mwifiex: Fix tlv_buf_left calculation (git-fixes).
- wifi: mwifiex: Sanity check tlv_len and tlv_bitmap_len (git-fixes).
- x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature (bsc#1213772).
- x86/cpu, kvm: Add the Null Selector Clears Base feature (bsc#1213772).
- x86/cpu, kvm: Add the SMM_CTL MSR not present feature (bsc#1213772).
- x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf (bsc#1213772).
- x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled (bsc#1213772).
- x86/cpu: Support AMD Automatic IBRS (bsc#1213772).
- x86/sev: Check for user-space IOIO pointing to kernel space (bsc#1212649).
- x86/sev: Check IOBM for IOIO exceptions from user-space (bsc#1212649).
- x86/sev: Disable MMIO emulation from user mode (bsc#1212649).
- xen-netback: use default TX queue size for vifs (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-06"/>
	<updated date="2023-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208788">SUSE bug 1208788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210778">SUSE bug 1210778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211307">SUSE bug 1211307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212423">SUSE bug 1212423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212649">SUSE bug 1212649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213705">SUSE bug 1213705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213772">SUSE bug 1213772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214842">SUSE bug 1214842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215095">SUSE bug 1215095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215104">SUSE bug 1215104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215518">SUSE bug 1215518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215955">SUSE bug 1215955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215956">SUSE bug 1215956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215957">SUSE bug 1215957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215986">SUSE bug 1215986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216062">SUSE bug 1216062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216345">SUSE bug 1216345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216510">SUSE bug 1216510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216511">SUSE bug 1216511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216512">SUSE bug 1216512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216621">SUSE bug 1216621</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2163/">CVE-2023-2163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31085/">CVE-2023-31085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34324/">CVE-2023-34324 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3777/">CVE-2023-3777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808713" comment="kernel-default-5.14.21-150400.24.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808714" comment="kernel-default-base-5.14.21-150400.24.97.1.150400.24.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206069" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213293" ref_url="https://bugzilla.suse.com/1213293" source="BUGZILLA"/>
		<reference ref_id="1213518" ref_url="https://bugzilla.suse.com/1213518" source="BUGZILLA"/>
		<reference ref_id="1214477" ref_url="https://bugzilla.suse.com/1214477" source="BUGZILLA"/>
		<reference ref_id="1215157" ref_url="https://bugzilla.suse.com/1215157" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34049" ref_url="https://www.suse.com/security/cve/CVE-2023-34049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017013.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Security issues fixed:

- CVE-2023-34049: arbitrary code execution via symlink attack (bsc#1215157)

Bugs fixed:

- Fix optimization_order opt to prevent testsuite fails
- Improve salt.utils.json.find_json to avoid fails (bsc#1213293)
- Use salt-call from salt bundle with transactional_update
- Only call native_str on curl_debug message in tornado when needed
- Implement the calling for batch async from the salt CLI
- Fix calculation of SLS context vars when trailing dots
  on targetted sls/state (bsc#1213518)
- Rename salt-tests to python3-salt-testsuite
- Allow all primitive grain types for autosign_grains (bsc#1214477)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-09"/>
	<updated date="2023-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213293">SUSE bug 1213293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213518">SUSE bug 1213518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214477">SUSE bug 1214477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215157">SUSE bug 1215157</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34049/">CVE-2023-34049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34049">CVE-2023-34049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809295" comment="python3-salt-3006.0-150400.8.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809296" comment="salt-3006.0-150400.8.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809297" comment="salt-minion-3006.0-150400.8.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809298" comment="salt-transactional-update-3006.0-150400.8.49.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206070" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213293" ref_url="https://bugzilla.suse.com/1213293" source="BUGZILLA"/>
		<reference ref_id="1213518" ref_url="https://bugzilla.suse.com/1213518" source="BUGZILLA"/>
		<reference ref_id="1214477" ref_url="https://bugzilla.suse.com/1214477" source="BUGZILLA"/>
		<reference ref_id="1215157" ref_url="https://bugzilla.suse.com/1215157" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34049" ref_url="https://www.suse.com/security/cve/CVE-2023-34049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017012.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Security issues fixed:

- CVE-2023-34049: arbitrary code execution via symlink attack (bsc#1215157)

Bugs fixed:

- Fix optimization_order opt to prevent testsuite fails
- Improve salt.utils.json.find_json to avoid fails (bsc#1213293)
- Use salt-call from salt bundle with transactional_update
- Only call native_str on curl_debug message in tornado when needed
- Implement the calling for batch async from the salt CLI
- Fix calculation of SLS context vars when trailing dots
  on targetted sls/state (bsc#1213518)
- Rename salt-tests to python3-salt-testsuite
- Allow all primitive grain types for autosign_grains (bsc#1214477)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-09"/>
	<updated date="2023-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213293">SUSE bug 1213293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213518">SUSE bug 1213518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214477">SUSE bug 1214477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215157">SUSE bug 1215157</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34049/">CVE-2023-34049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34049">CVE-2023-34049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809291" comment="python3-simplejson-3.17.2-150300.3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206071" version="1" class="patch">
	<metadata>
		<title>Security update for containerized-data-importer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="SUSE-RU-2023:4416-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032651.html" source="SUSE-SU"/>
		<description>

This update for containerized-data-importer fixes the following issue:

- rebuild with current go compiler
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-13"/>
	<updated date="2023-11-13"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809868" comment="containerized-data-importer-manifests-1.51.0-150400.4.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206072" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216826" ref_url="https://bugzilla.suse.com/1216826" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31022" ref_url="https://www.suse.com/security/cve/CVE-2023-31022/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017028.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues:

Security issues fixed:

- CVE-2023-31022: Fixed NULL ptr deref in kernel module layer


Changes in kernel-firmware-nvidia-gspx-G06:

- update firmware to version 535.129.03

Changes in nvidia-open-driver-G06-signed:

- Update to version 535.129.03
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-13"/>
	<updated date="2023-11-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216826">SUSE bug 1216826</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31022/">CVE-2023-31022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31022">CVE-2023-31022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808381" comment="kernel-firmware-nvidia-gspx-G06-535.129.03-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808387" comment="nvidia-open-driver-G06-signed-kmp-default-535.129.03_k5.14.21_150400.24.92-150400.9.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206073" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215278" ref_url="https://bugzilla.suse.com/1215278" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23583" ref_url="https://www.suse.com/security/cve/CVE-2023-23583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017037.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20231114 pre-release (labeled 20231113). (bsc#1215278)
- CVE-2023-23583: Fixed potential CPU deadlocks or privilege escalation. (bsc#1215278)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2023-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215278">SUSE bug 1215278</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23583/">CVE-2023-23583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810296" comment="ucode-intel-20231113-150200.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206074" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216377" ref_url="https://bugzilla.suse.com/1216377" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017052.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-45803: Fix a request body leak that could occur when
  receiving a 303 HTTP response (bsc#1216377).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216377">SUSE bug 1216377</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803402" comment="python3-urllib3-1.25.10-150300.4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206075" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1215145" ref_url="https://bugzilla.suse.com/1215145" source="BUGZILLA"/>
		<reference ref_id="1215474" ref_url="https://bugzilla.suse.com/1215474" source="BUGZILLA"/>
		<reference ref_id="1215746" ref_url="https://bugzilla.suse.com/1215746" source="BUGZILLA"/>
		<reference ref_id="1215747" ref_url="https://bugzilla.suse.com/1215747" source="BUGZILLA"/>
		<reference ref_id="1215748" ref_url="https://bugzilla.suse.com/1215748" source="BUGZILLA"/>
		<reference ref_id="1216654" ref_url="https://bugzilla.suse.com/1216654" source="BUGZILLA"/>
		<reference ref_id="1216807" ref_url="https://bugzilla.suse.com/1216807" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-34322" ref_url="https://www.suse.com/security/cve/CVE-2023-34322/" source="CVE"/>
		<reference ref_id="CVE-2023-34325" ref_url="https://www.suse.com/security/cve/CVE-2023-34325/" source="CVE"/>
		<reference ref_id="CVE-2023-34326" ref_url="https://www.suse.com/security/cve/CVE-2023-34326/" source="CVE"/>
		<reference ref_id="CVE-2023-34327" ref_url="https://www.suse.com/security/cve/CVE-2023-34327/" source="CVE"/>
		<reference ref_id="CVE-2023-34328" ref_url="https://www.suse.com/security/cve/CVE-2023-34328/" source="CVE"/>
		<reference ref_id="CVE-2023-46835" ref_url="https://www.suse.com/security/cve/CVE-2023-46835/" source="CVE"/>
		<reference ref_id="CVE-2023-46836" ref_url="https://www.suse.com/security/cve/CVE-2023-46836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-20588: AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).
- CVE-2023-34322: top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).
- CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443) (bsc#1215747).
- CVE-2023-34326: x86/AMD: missing IOMMU TLB flushing (XSA-442) (bsc#1215746).
- CVE-2023-34327,CVE-2023-34328: x86/AMD: Debug Mask handling (XSA-444) (bsc#1215748).
- CVE-2023-46835: x86/AMD: mismatch in IOMMU quarantine page table levels (XSA-445) (bsc#1216654).
- CVE-2023-46836: x86: BTC/SRSO fixes not fully effective (XSA-446) (bsc#1216807). 

- Upstream bug fixes (bsc#1027519) 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-17"/>
	<updated date="2023-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215145">SUSE bug 1215145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215474">SUSE bug 1215474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215746">SUSE bug 1215746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215747">SUSE bug 1215747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215748">SUSE bug 1215748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216654">SUSE bug 1216654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216807">SUSE bug 1216807</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34322/">CVE-2023-34322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34322">CVE-2023-34322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-34325/">CVE-2023-34325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34325">CVE-2023-34325 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34326/">CVE-2023-34326 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34326">CVE-2023-34326 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34327/">CVE-2023-34327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34327">CVE-2023-34327 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34328/">CVE-2023-34328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34328">CVE-2023-34328 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46835/">CVE-2023-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46835">CVE-2023-46835 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46836/">CVE-2023-46836 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46836">CVE-2023-46836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810588" comment="xen-libs-4.16.5_08-150400.4.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206076" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215278" ref_url="https://bugzilla.suse.com/1215278" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23583" ref_url="https://www.suse.com/security/cve/CVE-2023-23583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017131.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20231114 release. (bsc#1215278)
- CVE-2023-23583: Fixed potential CPU deadlocks or privilege escalation. (bsc#1215278)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215278">SUSE bug 1215278</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23583/">CVE-2023-23583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810835" comment="ucode-intel-20231114-150200.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206077" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215947" ref_url="https://bugzilla.suse.com/1215947" source="BUGZILLA"/>
		<reference ref_id="1216419" ref_url="https://bugzilla.suse.com/1216419" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38470" ref_url="https://www.suse.com/security/cve/CVE-2023-38470/" source="CVE"/>
		<reference ref_id="CVE-2023-38473" ref_url="https://www.suse.com/security/cve/CVE-2023-38473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017144.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-38470: Ensure each label is at least one byte long (bsc#1215947).
- CVE-2023-38473: Fixed a reachable assertion when parsing a host name (bsc#1216419).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215947">SUSE bug 1215947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216419">SUSE bug 1216419</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38470/">CVE-2023-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38470">CVE-2023-38470 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38473/">CVE-2023-38473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38473">CVE-2023-38473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810251" comment="avahi-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810252" comment="libavahi-client3-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810253" comment="libavahi-common3-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810254" comment="libavahi-core7-0.8-150400.7.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206078" version="1" class="patch">
	<metadata>
		<title>Security update for python3-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1206667" ref_url="https://bugzilla.suse.com/1206667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017152.html" source="SUSE-SU"/>
		<description>
This update for python3-setuptools fixes the following issues:

- CVE-2022-40897: Fixed Regular Expression Denial of Service (ReDoS) in package_index.py (bsc#1206667).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810448" comment="python3-setuptools-44.1.1-150400.9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206079" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216922" ref_url="https://bugzilla.suse.com/1216922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017145.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810699" comment="libopenssl-1_1-devel-1.1.1l-150400.7.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810700" comment="libopenssl1_1-1.1.1l-150400.7.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810701" comment="libopenssl1_1-hmac-1.1.1l-150400.7.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810702" comment="openssl-1_1-1.1.1l-150400.7.60.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206080" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216129" ref_url="https://bugzilla.suse.com/1216129" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45322" ref_url="https://www.suse.com/security/cve/CVE-2023-45322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017191.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2023-45322: Fixed a use-after-free in xmlUnlinkNode() in tree.c (bsc#1216129).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-23"/>
	<updated date="2023-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216129">SUSE bug 1216129</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45322/">CVE-2023-45322 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810408" comment="libxml2-2-2.9.14-150400.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810409" comment="libxml2-tools-2.9.14-150400.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810410" comment="python3-libxml2-2.9.14-150400.5.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206081" version="1" class="patch">
	<metadata>
		<title>Security update for fdo-client (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216293" ref_url="https://bugzilla.suse.com/1216293" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017201.html" source="SUSE-SU"/>
		<description>
This update for fdo-client fixes the following issues:

- Removed build key via utils/keys_gen.sh. (bsc#1216293)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-24"/>
	<updated date="2023-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216293">SUSE bug 1216293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811883" comment="fdo-client-1.0.0+git20210816.baa09b5-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811884" comment="fdo-client-devel-1.0.0+git20210816.baa09b5-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206082" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215940" ref_url="https://bugzilla.suse.com/1215940" source="BUGZILLA"/>
		<reference ref_id="1216001" ref_url="https://bugzilla.suse.com/1216001" source="BUGZILLA"/>
		<reference ref_id="1216167" ref_url="https://bugzilla.suse.com/1216167" source="BUGZILLA"/>
		<reference ref_id="1216696" ref_url="https://bugzilla.suse.com/1216696" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46246" ref_url="https://www.suse.com/security/cve/CVE-2023-46246/" source="CVE"/>
		<reference ref_id="CVE-2023-5344" ref_url="https://www.suse.com/security/cve/CVE-2023-5344/" source="CVE"/>
		<reference ref_id="CVE-2023-5441" ref_url="https://www.suse.com/security/cve/CVE-2023-5441/" source="CVE"/>
		<reference ref_id="CVE-2023-5535" ref_url="https://www.suse.com/security/cve/CVE-2023-5535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017239.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2023-5344: Heap-based Buffer Overflow in vim prior to 9.0.1969 (bsc#1215940)                                                                                                             
- CVE-2023-5441: segfault in exmode when redrawing (bsc#1216001)                                                                                                                               
- CVE-2023-5535: use-after-free from buf_contents_changed() (bsc#1216167)                                                                                                                      
- CVE-2023-46246: Integer Overflow in :history command (bsc#1216696)                                                                                                                           
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-27"/>
	<updated date="2023-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215940">SUSE bug 1215940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216001">SUSE bug 1216001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216167">SUSE bug 1216167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216696">SUSE bug 1216696</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46246/">CVE-2023-46246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46246">CVE-2023-46246 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5344/">CVE-2023-5344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5344">CVE-2023-5344 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5441/">CVE-2023-5441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5441">CVE-2023-5441 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5535/">CVE-2023-5535 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5535">CVE-2023-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812201" comment="vim-data-common-9.0.2103-150000.5.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812851" comment="vim-small-9.0.2103-150000.5.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206083" version="1" class="patch">
	<metadata>
		<title>Security update for squashfs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1189936" ref_url="https://bugzilla.suse.com/1189936" source="BUGZILLA"/>
		<reference ref_id="1190531" ref_url="https://bugzilla.suse.com/1190531" source="BUGZILLA"/>
		<reference ref_id="935380" ref_url="https://bugzilla.suse.com/935380" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4645" ref_url="https://www.suse.com/security/cve/CVE-2015-4645/" source="CVE"/>
		<reference ref_id="CVE-2015-4646" ref_url="https://www.suse.com/security/cve/CVE-2015-4646/" source="CVE"/>
		<reference ref_id="CVE-2021-40153" ref_url="https://www.suse.com/security/cve/CVE-2021-40153/" source="CVE"/>
		<reference ref_id="CVE-2021-41072" ref_url="https://www.suse.com/security/cve/CVE-2021-41072/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<description>
This update for squashfs fixes the following issues:

- CVE-2015-4645,CVE-2015-4646: Multiple buffer overflows fixed in squashfs-tools (bsc#935380)
- CVE-2021-40153: Fixed an issue where an attacker might have been able to write a file outside of destination (bsc#1189936)
- CVE-2021-41072: Fixed an issue where an attacker might have been
  able to write a file outside the destination directory via a
  symlink (bsc#1190531).

update to 4.6.1:

  * Race condition which can cause corruption of the 'fragment
    table' fixed.  This is a regression introduced in August 2022,
    and it has been seen when tailend packing is used (-tailends option).
  * Fix build failure when the tools are being built without
    extended attribute (XATTRs) support.
  * Fix XATTR error message when an unrecognised prefix is
    found
  * Fix incorrect free of pointer when an unrecognised XATTR
    prefix is found.
  * Major improvements in extended attribute handling,
    pseudo file handling, and miscellaneous new options and
    improvements
  * Extended attribute handling improved in Mksquashfs and
    Sqfstar
  * New Pseudo file xattr definition to add extended
    attributes to files.
  * New xattrs-add Action to add extended attributes to files
  * Extended attribute handling improved in Unsquashfs
  * Other major improvements
  * Unsquashfs can now output Pseudo files to standard out.
  * Mksquashfs can now input Pseudo files from standard in.
  * Squashfs filesystems can now be converted (different
    block size compression etc) without unpacking to an
    intermediate filesystem or mounting, by piping the output of
    Unsquashfs to Mksquashfs.
  * Pseudo files are now supported by Sqfstar.
  * 'Non-anchored' excludes are now supported by Unsquashfs.

update to 4.5.1 (bsc#1190531, CVE-2021-41072):

  * This release adds Manpages for Mksquashfs(1), Unsquashfs(1),
    Sqfstar(1) and Sqfscat(1).
  * The -help text output from the utilities has been improved
    and extended as well (but the Manpages are now more
    comprehensive).
  * CVE-2021-41072 which is a writing outside of destination
    exploit, has been fixed.
  * The number of hard-links in the filesystem is now also
    displayed by Mksquashfs in the output summary.
  * The number of hard-links written by Unsquashfs is now
    also displayed in the output summary.
  * Unsquashfs will now write to a pre-existing destination
    directory, rather than aborting.
  * Unsquashfs now allows '.' to used as the destination, to
    extract to the current directory.
  * The Unsquashfs progress bar now tracks empty files and
    hardlinks, in addition to data blocks.
  * -no-hardlinks option has been implemented for Sqfstar.
  * More sanity checking for 'corrupted' filesystems, including
    checks for multiply linked directories and directory loops.
  * Options that may cause filesystems to be unmountable have
    been moved into a new 'experts' category in the Mksquashfs
    help text (and Manpage).
  * Maximum cpiostyle filename limited to PATH_MAX.  This
    prevents attempts to overflow the stack, or cause system
    calls to fail with a too long pathname.
  * Don't always use 'max open file limit' when calculating
    length of queues, as a very large file limit can cause
    Unsquashfs to abort.  Instead use the smaller of max open
    file limit and cache size.
  * Fix Mksquashfs silently ignoring Pseudo file definitions
    when appending.
  * Don't abort if no XATTR support has been built in, and
    there's XATTRs in the filesystem.  This is a regression
    introduced in 2019 in Version 4.4.
  * Fix duplicate check when the last file block is sparse.

update to 4.5:

  * Mksquashfs now supports 'Actions'.
  * New sqfstar command which will create a Squashfs image from a tar archive.
  * Tar style handling of source pathnames in Mksquashfs.
  * Cpio style handling of source pathnames in Mksquashfs.
  * New option to throttle the amount of CPU and I/O.
  * Mksquashfs now allows no source directory to be specified.
  * New Pseudo file 'R' definition which allows a Regular file
    o be created with data stored within the Pseudo file.
  * Symbolic links are now followed in extract files
  * Unsquashfs now supports 'exclude' files.
  * Max depth traversal option added.
  * Unsquashfs can now output a 'Pseudo file' representing the
    input Squashfs filesystem.
  * New -one-file-system option in Mksquashfs.
  * New -no-hardlinks option in Mksquashfs.
  * Exit code in Unsquashfs changed to distinguish between
    non-fatal errors (exit 2), and fatal errors (exit 1).
  * Xattr id count added in Unsquashfs '-stat' output.
  * Unsquashfs 'write outside directory' exploit fixed.
  * Error handling in Unsquashfs writer thread fixed.
  * Fix failure to truncate destination if appending aborted.
  * Prevent Mksquashfs reading the destination file. 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-27"/>
	<updated date="2023-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189936">SUSE bug 1189936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190531">SUSE bug 1190531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935380">SUSE bug 935380</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4645/">CVE-2015-4645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4645">CVE-2015-4645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4646/">CVE-2015-4646 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4646">CVE-2015-4646 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40153/">CVE-2021-40153 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41072/">CVE-2021-41072 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803949" comment="squashfs-4.6.1-150300.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206084" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210660" ref_url="https://bugzilla.suse.com/1210660" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2137" ref_url="https://www.suse.com/security/cve/CVE-2023-2137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032971.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2023-2137: Fixed heap buffer overflow (bsc#1210660).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2023-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210660">SUSE bug 1210660</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2137/">CVE-2023-2137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2137">CVE-2023-2137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813076" comment="libsqlite3-0-3.44.0-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813077" comment="sqlite3-tcl-3.44.0-150000.3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206085" version="1" class="patch">
	<metadata>
		<title>Security update for traceroute (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216591" ref_url="https://bugzilla.suse.com/1216591" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46316" ref_url="https://www.suse.com/security/cve/CVE-2023-46316/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017265.html" source="SUSE-SU"/>
		<description>
This update for traceroute fixes the following issues:

- CVE-2023-46316: wrapper scripts do not properly parse command lines (bsc#1216591).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2023-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216591">SUSE bug 1216591</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46316/">CVE-2023-46316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813366" comment="traceroute-2.0.21-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206086" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1217653" ref_url="https://bugzilla.suse.com/1217653" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45539" ref_url="https://www.suse.com/security/cve/CVE-2023-45539/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017410.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2023-45539: Fixed misinterpretation of a path_end rule with # as part of the URI component (bsc#1217653).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217653">SUSE bug 1217653</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45539/">CVE-2023-45539 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45539">CVE-2023-45539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814269" comment="haproxy-2.4.22+git0.f8e3218e2-150400.3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206087" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1194187" ref_url="https://bugzilla.suse.com/1194187" source="BUGZILLA"/>
		<reference ref_id="1207472" ref_url="https://bugzilla.suse.com/1207472" source="BUGZILLA"/>
		<reference ref_id="1216922" ref_url="https://bugzilla.suse.com/1216922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L36X5ULOS5QNIFLF2MJDCWBUWN5DSPKV/#L36X5ULOS5QNIFLF2MJDCWBUWN5DSPKV" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922).

Bug fixes:

- The default /etc/ssl/openssl3.cnf file will include any configuration files that
  other packages might place into /etc/ssl/engines3.d/ and
  /etc/ssl/engdef3.d/.
- Create the two new necessary directores for the above. [bsc#1194187, bsc#1207472]
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194187">SUSE bug 1194187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207472">SUSE bug 1207472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813365" comment="libopenssl3-3.0.8-150400.4.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206088" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1217573" ref_url="https://bugzilla.suse.com/1217573" source="BUGZILLA"/>
		<reference ref_id="1217574" ref_url="https://bugzilla.suse.com/1217574" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46218" ref_url="https://www.suse.com/security/cve/CVE-2023-46218/" source="CVE"/>
		<reference ref_id="CVE-2023-46219" ref_url="https://www.suse.com/security/cve/CVE-2023-46219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033029.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-46218: Fixed cookie mixed case PSL bypass (bsc#1217573).
- CVE-2023-46219: HSTS long file name clears contents (bsc#1217574).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217573">SUSE bug 1217573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217574">SUSE bug 1217574</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-46218/">CVE-2023-46218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46219/">CVE-2023-46219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46219">CVE-2023-46219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815364" comment="curl-8.0.1-150400.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815365" comment="libcurl4-8.0.1-150400.5.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206089" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215823" ref_url="https://bugzilla.suse.com/1215823" source="BUGZILLA"/>
		<reference ref_id="1215831" ref_url="https://bugzilla.suse.com/1215831" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26345" ref_url="https://www.suse.com/security/cve/CVE-2021-26345/" source="CVE"/>
		<reference ref_id="CVE-2021-46766" ref_url="https://www.suse.com/security/cve/CVE-2021-46766/" source="CVE"/>
		<reference ref_id="CVE-2021-46774" ref_url="https://www.suse.com/security/cve/CVE-2021-46774/" source="CVE"/>
		<reference ref_id="CVE-2022-23820" ref_url="https://www.suse.com/security/cve/CVE-2022-23820/" source="CVE"/>
		<reference ref_id="CVE-2022-23830" ref_url="https://www.suse.com/security/cve/CVE-2022-23830/" source="CVE"/>
		<reference ref_id="CVE-2023-20519" ref_url="https://www.suse.com/security/cve/CVE-2023-20519/" source="CVE"/>
		<reference ref_id="CVE-2023-20521" ref_url="https://www.suse.com/security/cve/CVE-2023-20521/" source="CVE"/>
		<reference ref_id="CVE-2023-20526" ref_url="https://www.suse.com/security/cve/CVE-2023-20526/" source="CVE"/>
		<reference ref_id="CVE-2023-20533" ref_url="https://www.suse.com/security/cve/CVE-2023-20533/" source="CVE"/>
		<reference ref_id="CVE-2023-20566" ref_url="https://www.suse.com/security/cve/CVE-2023-20566/" source="CVE"/>
		<reference ref_id="CVE-2023-20592" ref_url="https://www.suse.com/security/cve/CVE-2023-20592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

Update AMD ucode to 20231030 (bsc#1215831):

- CVE-2022-23820: Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.
- CVE-2021-46774: Insufficient input validation in ABL may enable a privileged attacker to perform arbitrary DRAM writes, potentially resulting in code execution and privilege escalation.
- CVE-2023-20533: Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker using DMA to read/write from/to invalid DRAM address potentially resulting in denial-of-service.
0 CVE-2023-20519: A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
- CVE-2023-20566: Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
- CVE-2023-20521: TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
- CVE-2021-46766: Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.
- CVE-2022-23830: SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
- CVE-2023-20526: Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.
- CVE-2021-26345: Failure to validate the value in APCB may allow an attacker with physical access to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
- CVE-2023-20592: Issue with INVD instruction aka CacheWarpAttack (bsc#1215823).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215823">SUSE bug 1215823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26345/">CVE-2021-26345 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26345">CVE-2021-26345 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46766/">CVE-2021-46766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46766">CVE-2021-46766 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-46774/">CVE-2021-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46774">CVE-2021-46774 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23820/">CVE-2022-23820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23820">CVE-2022-23820 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23830/">CVE-2022-23830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23830">CVE-2022-23830 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20519/">CVE-2023-20519 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20519">CVE-2023-20519 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-20521/">CVE-2023-20521 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20521">CVE-2023-20521 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20526/">CVE-2023-20526 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20526">CVE-2023-20526 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-20533/">CVE-2023-20533 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20533">CVE-2023-20533 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20566/">CVE-2023-20566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20566">CVE-2023-20566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20592/">CVE-2023-20592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20592">CVE-2023-20592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815105" comment="kernel-firmware-all-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815106" comment="kernel-firmware-amdgpu-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815107" comment="kernel-firmware-ath10k-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815108" comment="kernel-firmware-ath11k-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815109" comment="kernel-firmware-atheros-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815110" comment="kernel-firmware-bluetooth-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815111" comment="kernel-firmware-bnx2-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815112" comment="kernel-firmware-brcm-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815113" comment="kernel-firmware-chelsio-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815114" comment="kernel-firmware-dpaa2-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815115" comment="kernel-firmware-i915-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815116" comment="kernel-firmware-intel-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815117" comment="kernel-firmware-iwlwifi-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815118" comment="kernel-firmware-liquidio-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815119" comment="kernel-firmware-marvell-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815120" comment="kernel-firmware-media-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815121" comment="kernel-firmware-mediatek-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815122" comment="kernel-firmware-mellanox-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815123" comment="kernel-firmware-mwifiex-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815124" comment="kernel-firmware-network-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815125" comment="kernel-firmware-nfp-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815126" comment="kernel-firmware-nvidia-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815127" comment="kernel-firmware-platform-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815128" comment="kernel-firmware-prestera-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815129" comment="kernel-firmware-qcom-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815130" comment="kernel-firmware-qlogic-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815131" comment="kernel-firmware-radeon-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815132" comment="kernel-firmware-realtek-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815133" comment="kernel-firmware-serial-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815134" comment="kernel-firmware-sound-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815135" comment="kernel-firmware-ti-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815136" comment="kernel-firmware-ueagle-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815137" comment="kernel-firmware-usb-network-20220509-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815138" comment="ucode-amd-20220509-150400.4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206090" version="1" class="patch">
	<metadata>
		<title>Security update for suse-build-key (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216410" ref_url="https://bugzilla.suse.com/1216410" source="BUGZILLA"/>
		<reference ref_id="1217215" ref_url="https://bugzilla.suse.com/1217215" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033022.html" source="SUSE-SU"/>
		<description>
This update for suse-build-key fixes the following issues:

This update runs a import-suse-build-key script.

The previous libzypp-post-script based installation is replaced
with a systemd timer and service (bsc#1217215 bsc#1216410 jsc#PED-2777).
  - suse-build-key-import.service
  - suse-build-key-import.timer

It imports the future SUSE Linux Enterprise 15 4096 bit RSA key primary and reserve keys.
After successful import the timer is disabled.

To manually import them you can also run:

# rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-3fa1d6ce-63c9481c.asc
# rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-d588dc46-63c939db.asc
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216410">SUSE bug 1216410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217215">SUSE bug 1217215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813335" comment="suse-build-key-12.0-150000.8.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206091" version="1" class="patch">
	<metadata>
		<title>Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="SUSE-SU-2023:4689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017292.html" source="SUSE-SU"/>
		<description>
This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer fixes the following issues:

This update rebuilds containerized-data-importer and its containers against updated
GO and updated base images.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2023-12-07"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813780" comment="containerized-data-importer-manifests-1.51.0-150400.4.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206092" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="SUSE-SU-2023:4693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017295.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container fixes the following issues:

Kubevirt is rebuilt against updated dependencies to fix security issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2023-12-07"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813767" comment="kubevirt-manifests-0.54.0-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813774" comment="kubevirt-virtctl-0.54.0-150400.3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206093" version="1" class="patch">
	<metadata>
		<title>Security update for catatonit, containerd, runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1200528" ref_url="https://bugzilla.suse.com/1200528" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033070.html" source="SUSE-SU"/>
		<description>

This update of runc and containerd fixes the following issues:

containerd:

- Update to containerd v1.7.8. Upstream release notes:
  https://github.com/containerd/containerd/releases/tag/v1.7.8

    * CVE-2022-1996: Fixed CORS bypass in go-restful (bsc#1200528)

catatonit:

- Update to catatonit v0.2.0.
  * Change license to GPL-2.0-or-later.

- Update to catatont v0.1.7
  * This release adds the ability for catatonit to be used as the only
    process in a pause container, by passing the -P flag (in this mode no
    subprocess is spawned and thus no signal forwarding is done).

- Update to catatonit v0.1.6, which fixes a few bugs -- mainly ones related to
  socket activation or features somewhat adjacent to socket activation (such as
  passing file descriptors).

runc:

- Update to runc v1.1.10. Upstream changelog is available from
  https://github.com/opencontainers/runc/releases/tag/v1.1.10

		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-12"/>
	<updated date="2023-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200528">SUSE bug 1200528</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813859" comment="containerd-1.7.8-150000.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813861" comment="runc-1.1.10-150000.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206094" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1084909" ref_url="https://bugzilla.suse.com/1084909" source="BUGZILLA"/>
		<reference ref_id="1189998" ref_url="https://bugzilla.suse.com/1189998" source="BUGZILLA"/>
		<reference ref_id="1210447" ref_url="https://bugzilla.suse.com/1210447" source="BUGZILLA"/>
		<reference ref_id="1214286" ref_url="https://bugzilla.suse.com/1214286" source="BUGZILLA"/>
		<reference ref_id="1214976" ref_url="https://bugzilla.suse.com/1214976" source="BUGZILLA"/>
		<reference ref_id="1215124" ref_url="https://bugzilla.suse.com/1215124" source="BUGZILLA"/>
		<reference ref_id="1215292" ref_url="https://bugzilla.suse.com/1215292" source="BUGZILLA"/>
		<reference ref_id="1215420" ref_url="https://bugzilla.suse.com/1215420" source="BUGZILLA"/>
		<reference ref_id="1215458" ref_url="https://bugzilla.suse.com/1215458" source="BUGZILLA"/>
		<reference ref_id="1215710" ref_url="https://bugzilla.suse.com/1215710" source="BUGZILLA"/>
		<reference ref_id="1216058" ref_url="https://bugzilla.suse.com/1216058" source="BUGZILLA"/>
		<reference ref_id="1216105" ref_url="https://bugzilla.suse.com/1216105" source="BUGZILLA"/>
		<reference ref_id="1216259" ref_url="https://bugzilla.suse.com/1216259" source="BUGZILLA"/>
		<reference ref_id="1216584" ref_url="https://bugzilla.suse.com/1216584" source="BUGZILLA"/>
		<reference ref_id="1216693" ref_url="https://bugzilla.suse.com/1216693" source="BUGZILLA"/>
		<reference ref_id="1216759" ref_url="https://bugzilla.suse.com/1216759" source="BUGZILLA"/>
		<reference ref_id="1216761" ref_url="https://bugzilla.suse.com/1216761" source="BUGZILLA"/>
		<reference ref_id="1216844" ref_url="https://bugzilla.suse.com/1216844" source="BUGZILLA"/>
		<reference ref_id="1216861" ref_url="https://bugzilla.suse.com/1216861" source="BUGZILLA"/>
		<reference ref_id="1216909" ref_url="https://bugzilla.suse.com/1216909" source="BUGZILLA"/>
		<reference ref_id="1216959" ref_url="https://bugzilla.suse.com/1216959" source="BUGZILLA"/>
		<reference ref_id="1216965" ref_url="https://bugzilla.suse.com/1216965" source="BUGZILLA"/>
		<reference ref_id="1216976" ref_url="https://bugzilla.suse.com/1216976" source="BUGZILLA"/>
		<reference ref_id="1217036" ref_url="https://bugzilla.suse.com/1217036" source="BUGZILLA"/>
		<reference ref_id="1217068" ref_url="https://bugzilla.suse.com/1217068" source="BUGZILLA"/>
		<reference ref_id="1217086" ref_url="https://bugzilla.suse.com/1217086" source="BUGZILLA"/>
		<reference ref_id="1217124" ref_url="https://bugzilla.suse.com/1217124" source="BUGZILLA"/>
		<reference ref_id="1217140" ref_url="https://bugzilla.suse.com/1217140" source="BUGZILLA"/>
		<reference ref_id="1217195" ref_url="https://bugzilla.suse.com/1217195" source="BUGZILLA"/>
		<reference ref_id="1217200" ref_url="https://bugzilla.suse.com/1217200" source="BUGZILLA"/>
		<reference ref_id="1217205" ref_url="https://bugzilla.suse.com/1217205" source="BUGZILLA"/>
		<reference ref_id="1217332" ref_url="https://bugzilla.suse.com/1217332" source="BUGZILLA"/>
		<reference ref_id="1217366" ref_url="https://bugzilla.suse.com/1217366" source="BUGZILLA"/>
		<reference ref_id="1217515" ref_url="https://bugzilla.suse.com/1217515" source="BUGZILLA"/>
		<reference ref_id="1217598" ref_url="https://bugzilla.suse.com/1217598" source="BUGZILLA"/>
		<reference ref_id="1217599" ref_url="https://bugzilla.suse.com/1217599" source="BUGZILLA"/>
		<reference ref_id="1217609" ref_url="https://bugzilla.suse.com/1217609" source="BUGZILLA"/>
		<reference ref_id="1217687" ref_url="https://bugzilla.suse.com/1217687" source="BUGZILLA"/>
		<reference ref_id="1217731" ref_url="https://bugzilla.suse.com/1217731" source="BUGZILLA"/>
		<reference ref_id="1217780" ref_url="https://bugzilla.suse.com/1217780" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2006" ref_url="https://www.suse.com/security/cve/CVE-2023-2006/" source="CVE"/>
		<reference ref_id="CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775/" source="CVE"/>
		<reference ref_id="CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197/" source="CVE"/>
		<reference ref_id="CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198/" source="CVE"/>
		<reference ref_id="CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244/" source="CVE"/>
		<reference ref_id="CVE-2023-45863" ref_url="https://www.suse.com/security/cve/CVE-2023-45863/" source="CVE"/>
		<reference ref_id="CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871/" source="CVE"/>
		<reference ref_id="CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862/" source="CVE"/>
		<reference ref_id="CVE-2023-5158" ref_url="https://www.suse.com/security/cve/CVE-2023-5158/" source="CVE"/>
		<reference ref_id="CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717/" source="CVE"/>
		<reference ref_id="CVE-2023-6039" ref_url="https://www.suse.com/security/cve/CVE-2023-6039/" source="CVE"/>
		<reference ref_id="CVE-2023-6176" ref_url="https://www.suse.com/security/cve/CVE-2023-6176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).

The following non-security bugs were fixed:

- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).
- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).
- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).
- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).
- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).
- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).
- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).
- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).
- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).
- ALSA: info: Fix potential deadlock at disconnection (git-fixes).
- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).
- ASoC: ams-delta.c: use component after check (git-fixes).
- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).
- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).
- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).
- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).
- ASoC: rt5650: fix the wrong result of key button (git-fixes).
- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).
- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).
- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).
- Bluetooth: btusb: Add date-&gt;evt_skb is NULL check (git-fixes).
- Disable Loongson drivers Loongson is a mips architecture, it does not make sense to build Loongson drivers on other architectures.
- Documentation: networking: correct possessive 'its' (bsc#1215458).
- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).
- Ensure ia32_emulation is always enabled for kernel-obs-build If ia32_emulation is disabled by default, ensure it is enabled back for OBS kernel to allow building 32bit binaries (jsc#PED-3184) [ms: Always pass the parameter, no need to grep through the config which may not be very reliable]
- Fix termination state for idr_for_each_entry_ul() (git-fixes).
- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).
- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).
- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).
- HID: hyperv: remove unused struct synthhid_msg (git-fixes).
- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).
- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).
- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).
- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).
- Input: xpad - add VID for Turtle Beach controllers (git-fixes).
- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).
- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).
- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).
- PCI: Extract ATS disabling to a helper function (bsc#1215458).
- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).
- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).
- PCI: Use FIELD_GET() to extract Link Width (git-fixes).
- PCI: exynos: Do not discard .remove() callback (git-fixes).
- PCI: keystone: Do not discard .probe() callback (git-fixes).
- PCI: keystone: Do not discard .remove() callback (git-fixes).
- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).
- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).
- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).
- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).
- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).
- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- USB: serial: option: add Fibocom L7xx modules (git-fixes).
- USB: serial: option: add Luat Air72*U series products (git-fixes).
- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- USB: usbip: fix stub_dev hub disconnect (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: Add Cortex-A520 CPU part definition (git-fixes)
- arm64: allow kprobes on EL0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass ESR_ELx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out EL1 SSBS emulation hook (git-fixes)
- arm64: report EL1 UNDEFs better (git-fixes)
- arm64: rework BTI exception handling (git-fixes)
- arm64: rework EL0 MRS emulation (git-fixes)
- arm64: rework FPAC exception handling (git-fixes)
- arm64: split EL0/EL1 UNDEF handlers (git-fixes)
- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).
- atl1c: Work around the DMA RX overflow issue (git-fixes).
- atm: iphase: Do PCI error checks on own line (git-fixes).
- blk-mq: Do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: Add device 0bda:887b to device tables (git-fixes).
- bluetooth: Add device 13d3:3571 to device tables (git-fixes).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).
- can: isotp: set max PDU size to 64 kByte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: Fix comment (git-fixes).
- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).
- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).
- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).
- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: Fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).
- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).
- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).
- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).
- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use C syntax highlight in driver.rst (bsc#1215458).
- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).
- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).
- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).
- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: do not use ATRM for external devices (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).
- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: Fix bit updates (git-fixes).
- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).
- drm/gud: Use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).
- drm/i915: Fix potential spectre vulnerability (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).
- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: Create devm device attachment (git-fixes).
- drm/mipi-dsi: Create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).
- drm/panel: st7703: Pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).
- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: omapfb: Drop unused remove function (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).
- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).
- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).
- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).
- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).
- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: Fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).
- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).
- idpf: add RX splitq napi poll support (bsc#1215458).
- idpf: add SRIOV support and other ndo_ops (bsc#1215458).
- idpf: add TX splitq napi poll support (bsc#1215458).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and MAC filter support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for RX queues (bsc#1215458).
- idpf: configure resources for TX queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).
- iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).
- kabi/severities: ignore kabi in rxrpc (bsc#1210447) The rxrpc module is built since SLE15-SP3 but it is not shipped as part of any SLE product, only in Leap (in kernel-*-optional).
- kernel-binary: suse-module-tools is also required when installed Requires(pre) adds dependency for the specific sciptlet. However, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. Add plain Requires as well.
- kernel-source: Move provides after sources
- kernel/fork: beware of __put_task_struct() calling context (bsc#1189998 (PREEMPT_RT prerequisite backports)).
- kernel/fork: beware of __put_task_struct() calling context (bsc#1216761).
- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: Do not use SMBUS calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv-&gt;timeout timer (git-fixes).
- media: ccs: Correctly initialise try compose rectangle (git-fixes).
- media: ccs: Fix driver quirk struct documentation (git-fixes).
- media: cedrus: Fix clock/reset sequence (git-fixes).
- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: Fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: Add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).
- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: Fix double put in dln2_probe (git-fixes).
- misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).
- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).
- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).
- mmc: block: Retry commands in CQE error recovery (git-fixes).
- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).
- mmc: cqhci: Increase recovery halt timeout (git-fixes).
- mmc: cqhci: Warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).
- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).
- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).
- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).
- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: Avoid address overwrite in kernel_connect (bsc#1216861).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: Fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nvme: update firmware version after commit (bsc#1215292).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).
- platform/x86: wmi: Fix opening of char device (git-fixes).
- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: Fix double shift bug (git-fixes).
- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).
- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).
- r8152: Release firmware if we have an error in probe (git-fixes).
- r8152: Run the unload routine if we have errors during probe (git-fixes).
- regmap: Ensure range selector registers are updated after cache sync (git-fixes).
- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).
- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).
- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).
- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).
- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: Fix ksft print formats (git-fixes).
- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).
- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).
- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: Spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).
- tty: 8250: Add support for Brainboxes UP cards (git-fixes).
- tty: 8250: Add support for Intashield IS-100 (git-fixes).
- tty: 8250: Add support for Intashield IX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).
- tty: 8250: Fix port count of PX-257 (git-fixes).
- tty: 8250: Fix up PX-803/PX-857 (git-fixes).
- tty: 8250: Remove UC-257 and UC-431 (git-fixes).
- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).
- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).
- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).
- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).
- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc3: Fix default mode initialization (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).
- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).
- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).
- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).
- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).
- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).
- x86/sev: Fix calculation of end address based on number of pages (git-fixes).
- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).
- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert AGF log flags to unsigned (git-fixes).
- xfs: convert AGI log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize AG block number formatting in ftrace output (git-fixes).
- xfs: standardize AG number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Enable RPM on controllers that support low-power states (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-12"/>
	<updated date="2023-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084909">SUSE bug 1084909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189998">SUSE bug 1189998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210447">SUSE bug 1210447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214286">SUSE bug 1214286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214976">SUSE bug 1214976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215124">SUSE bug 1215124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215292">SUSE bug 1215292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215420">SUSE bug 1215420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215458">SUSE bug 1215458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215710">SUSE bug 1215710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216058">SUSE bug 1216058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216105">SUSE bug 1216105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216259">SUSE bug 1216259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216584">SUSE bug 1216584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216693">SUSE bug 1216693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216759">SUSE bug 1216759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216761">SUSE bug 1216761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216844">SUSE bug 1216844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216861">SUSE bug 1216861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216909">SUSE bug 1216909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216959">SUSE bug 1216959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216965">SUSE bug 1216965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216976">SUSE bug 1216976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217036">SUSE bug 1217036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217068">SUSE bug 1217068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217086">SUSE bug 1217086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217124">SUSE bug 1217124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217140">SUSE bug 1217140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217195">SUSE bug 1217195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217200">SUSE bug 1217200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217205">SUSE bug 1217205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217332">SUSE bug 1217332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217366">SUSE bug 1217366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217515">SUSE bug 1217515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217598">SUSE bug 1217598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217599">SUSE bug 1217599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217609">SUSE bug 1217609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217687">SUSE bug 1217687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217731">SUSE bug 1217731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217780">SUSE bug 1217780</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2006/">CVE-2023-2006 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2006">CVE-2023-2006 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45863/">CVE-2023-45863 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5158/">CVE-2023-5158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6039/">CVE-2023-6039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6176/">CVE-2023-6176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815382" comment="kernel-rt-5.14.21-150400.15.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206095" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1084909" ref_url="https://bugzilla.suse.com/1084909" source="BUGZILLA"/>
		<reference ref_id="1210447" ref_url="https://bugzilla.suse.com/1210447" source="BUGZILLA"/>
		<reference ref_id="1214286" ref_url="https://bugzilla.suse.com/1214286" source="BUGZILLA"/>
		<reference ref_id="1214976" ref_url="https://bugzilla.suse.com/1214976" source="BUGZILLA"/>
		<reference ref_id="1215124" ref_url="https://bugzilla.suse.com/1215124" source="BUGZILLA"/>
		<reference ref_id="1215292" ref_url="https://bugzilla.suse.com/1215292" source="BUGZILLA"/>
		<reference ref_id="1215420" ref_url="https://bugzilla.suse.com/1215420" source="BUGZILLA"/>
		<reference ref_id="1215458" ref_url="https://bugzilla.suse.com/1215458" source="BUGZILLA"/>
		<reference ref_id="1215710" ref_url="https://bugzilla.suse.com/1215710" source="BUGZILLA"/>
		<reference ref_id="1216058" ref_url="https://bugzilla.suse.com/1216058" source="BUGZILLA"/>
		<reference ref_id="1216105" ref_url="https://bugzilla.suse.com/1216105" source="BUGZILLA"/>
		<reference ref_id="1216259" ref_url="https://bugzilla.suse.com/1216259" source="BUGZILLA"/>
		<reference ref_id="1216584" ref_url="https://bugzilla.suse.com/1216584" source="BUGZILLA"/>
		<reference ref_id="1216693" ref_url="https://bugzilla.suse.com/1216693" source="BUGZILLA"/>
		<reference ref_id="1216759" ref_url="https://bugzilla.suse.com/1216759" source="BUGZILLA"/>
		<reference ref_id="1216844" ref_url="https://bugzilla.suse.com/1216844" source="BUGZILLA"/>
		<reference ref_id="1216861" ref_url="https://bugzilla.suse.com/1216861" source="BUGZILLA"/>
		<reference ref_id="1216909" ref_url="https://bugzilla.suse.com/1216909" source="BUGZILLA"/>
		<reference ref_id="1216959" ref_url="https://bugzilla.suse.com/1216959" source="BUGZILLA"/>
		<reference ref_id="1216965" ref_url="https://bugzilla.suse.com/1216965" source="BUGZILLA"/>
		<reference ref_id="1216976" ref_url="https://bugzilla.suse.com/1216976" source="BUGZILLA"/>
		<reference ref_id="1217036" ref_url="https://bugzilla.suse.com/1217036" source="BUGZILLA"/>
		<reference ref_id="1217068" ref_url="https://bugzilla.suse.com/1217068" source="BUGZILLA"/>
		<reference ref_id="1217086" ref_url="https://bugzilla.suse.com/1217086" source="BUGZILLA"/>
		<reference ref_id="1217124" ref_url="https://bugzilla.suse.com/1217124" source="BUGZILLA"/>
		<reference ref_id="1217140" ref_url="https://bugzilla.suse.com/1217140" source="BUGZILLA"/>
		<reference ref_id="1217195" ref_url="https://bugzilla.suse.com/1217195" source="BUGZILLA"/>
		<reference ref_id="1217200" ref_url="https://bugzilla.suse.com/1217200" source="BUGZILLA"/>
		<reference ref_id="1217205" ref_url="https://bugzilla.suse.com/1217205" source="BUGZILLA"/>
		<reference ref_id="1217332" ref_url="https://bugzilla.suse.com/1217332" source="BUGZILLA"/>
		<reference ref_id="1217366" ref_url="https://bugzilla.suse.com/1217366" source="BUGZILLA"/>
		<reference ref_id="1217515" ref_url="https://bugzilla.suse.com/1217515" source="BUGZILLA"/>
		<reference ref_id="1217598" ref_url="https://bugzilla.suse.com/1217598" source="BUGZILLA"/>
		<reference ref_id="1217599" ref_url="https://bugzilla.suse.com/1217599" source="BUGZILLA"/>
		<reference ref_id="1217609" ref_url="https://bugzilla.suse.com/1217609" source="BUGZILLA"/>
		<reference ref_id="1217687" ref_url="https://bugzilla.suse.com/1217687" source="BUGZILLA"/>
		<reference ref_id="1217731" ref_url="https://bugzilla.suse.com/1217731" source="BUGZILLA"/>
		<reference ref_id="1217780" ref_url="https://bugzilla.suse.com/1217780" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2006" ref_url="https://www.suse.com/security/cve/CVE-2023-2006/" source="CVE"/>
		<reference ref_id="CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775/" source="CVE"/>
		<reference ref_id="CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197/" source="CVE"/>
		<reference ref_id="CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198/" source="CVE"/>
		<reference ref_id="CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244/" source="CVE"/>
		<reference ref_id="CVE-2023-45863" ref_url="https://www.suse.com/security/cve/CVE-2023-45863/" source="CVE"/>
		<reference ref_id="CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871/" source="CVE"/>
		<reference ref_id="CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862/" source="CVE"/>
		<reference ref_id="CVE-2023-5158" ref_url="https://www.suse.com/security/cve/CVE-2023-5158/" source="CVE"/>
		<reference ref_id="CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717/" source="CVE"/>
		<reference ref_id="CVE-2023-6039" ref_url="https://www.suse.com/security/cve/CVE-2023-6039/" source="CVE"/>
		<reference ref_id="CVE-2023-6176" ref_url="https://www.suse.com/security/cve/CVE-2023-6176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).

The following non-security bugs were fixed:

- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).
- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).
- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).
- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).
- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).
- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).
- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).
- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).
- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).
- ALSA: info: Fix potential deadlock at disconnection (git-fixes).
- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).
- ASoC: ams-delta.c: use component after check (git-fixes).
- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).
- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).
- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).
- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).
- ASoC: rt5650: fix the wrong result of key button (git-fixes).
- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).
- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).
- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).
- Bluetooth: btusb: Add date-&gt;evt_skb is NULL check (git-fixes).
- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).
- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).
- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).
- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).
- HID: hyperv: remove unused struct synthhid_msg (git-fixes).
- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).
- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).
- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).
- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).
- Input: xpad - add VID for Turtle Beach controllers (git-fixes).
- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).
- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).
- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).
- PCI: Extract ATS disabling to a helper function (bsc#1215458).
- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).
- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).
- PCI: Use FIELD_GET() to extract Link Width (git-fixes).
- PCI: exynos: Do not discard .remove() callback (git-fixes).
- PCI: keystone: Do not discard .probe() callback (git-fixes).
- PCI: keystone: Do not discard .remove() callback (git-fixes).
- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).
- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).
- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).
- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).
- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).
- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- USB: serial: option: add Fibocom L7xx modules (git-fixes).
- USB: serial: option: add Luat Air72*U series products (git-fixes).
- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- USB: usbip: fix stub_dev hub disconnect (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: Add Cortex-A520 CPU part definition (git-fixes)
- arm64: allow kprobes on EL0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass ESR_ELx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out EL1 SSBS emulation hook (git-fixes)
- arm64: report EL1 UNDEFs better (git-fixes)
- arm64: rework BTI exception handling (git-fixes)
- arm64: rework EL0 MRS emulation (git-fixes)
- arm64: rework FPAC exception handling (git-fixes)
- arm64: split EL0/EL1 UNDEF handlers (git-fixes)
- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).
- atl1c: Work around the DMA RX overflow issue (git-fixes).
- atm: iphase: Do PCI error checks on own line (git-fixes).
- blk-mq: Do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: Add device 0bda:887b to device tables (git-fixes).
- bluetooth: Add device 13d3:3571 to device tables (git-fixes).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).
- can: isotp: set max PDU size to 64 kByte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: Fix comment (git-fixes).
- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).
- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).
- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).
- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: Fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).
- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).
- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).
- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).
- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use C syntax highlight in driver.rst (bsc#1215458).
- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).
- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).
- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).
- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: do not use ATRM for external devices (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).
- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: Fix bit updates (git-fixes).
- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).
- drm/gud: Use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).
- drm/i915: Fix potential spectre vulnerability (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).
- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: Create devm device attachment (git-fixes).
- drm/mipi-dsi: Create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).
- drm/panel: st7703: Pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).
- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: omapfb: Drop unused remove function (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).
- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).
- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).
- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).
- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).
- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: Fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).
- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).
- idpf: add RX splitq napi poll support (bsc#1215458).
- idpf: add SRIOV support and other ndo_ops (bsc#1215458).
- idpf: add TX splitq napi poll support (bsc#1215458).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and MAC filter support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for RX queues (bsc#1215458).
- idpf: configure resources for TX queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).
- iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).
- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: Do not use SMBUS calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv-&gt;timeout timer (git-fixes).
- media: ccs: Correctly initialise try compose rectangle (git-fixes).
- media: ccs: Fix driver quirk struct documentation (git-fixes).
- media: cedrus: Fix clock/reset sequence (git-fixes).
- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: Fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: Add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).
- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: Fix double put in dln2_probe (git-fixes).
- misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).
- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).
- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).
- mmc: block: Retry commands in CQE error recovery (git-fixes).
- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).
- mmc: cqhci: Increase recovery halt timeout (git-fixes).
- mmc: cqhci: Warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).
- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).
- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).
- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).
- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: Avoid address overwrite in kernel_connect (bsc#1216861).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: Fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nvme: update firmware version after commit (bsc#1215292).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).
- platform/x86: wmi: Fix opening of char device (git-fixes).
- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: Fix double shift bug (git-fixes).
- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).
- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).
- r8152: Release firmware if we have an error in probe (git-fixes).
- r8152: Run the unload routine if we have errors during probe (git-fixes).
- regmap: Ensure range selector registers are updated after cache sync (git-fixes).
- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).
- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).
- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).
- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).
- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: Fix ksft print formats (git-fixes).
- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).
- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).
- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: Spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).
- tty: 8250: Add support for Brainboxes UP cards (git-fixes).
- tty: 8250: Add support for Intashield IS-100 (git-fixes).
- tty: 8250: Add support for Intashield IX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).
- tty: 8250: Fix port count of PX-257 (git-fixes).
- tty: 8250: Fix up PX-803/PX-857 (git-fixes).
- tty: 8250: Remove UC-257 and UC-431 (git-fixes).
- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).
- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).
- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).
- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).
- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc3: Fix default mode initialization (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).
- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).
- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).
- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).
- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).
- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).
- x86/sev: Fix calculation of end address based on number of pages (git-fixes).
- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).
- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert AGF log flags to unsigned (git-fixes).
- xfs: convert AGI log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize AG block number formatting in ftrace output (git-fixes).
- xfs: standardize AG number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Enable RPM on controllers that support low-power states (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2023-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084909">SUSE bug 1084909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210447">SUSE bug 1210447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214286">SUSE bug 1214286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214976">SUSE bug 1214976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215124">SUSE bug 1215124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215292">SUSE bug 1215292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215420">SUSE bug 1215420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215458">SUSE bug 1215458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215710">SUSE bug 1215710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216058">SUSE bug 1216058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216105">SUSE bug 1216105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216259">SUSE bug 1216259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216584">SUSE bug 1216584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216693">SUSE bug 1216693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216759">SUSE bug 1216759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216844">SUSE bug 1216844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216861">SUSE bug 1216861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216909">SUSE bug 1216909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216959">SUSE bug 1216959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216965">SUSE bug 1216965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216976">SUSE bug 1216976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217036">SUSE bug 1217036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217068">SUSE bug 1217068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217086">SUSE bug 1217086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217124">SUSE bug 1217124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217140">SUSE bug 1217140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217195">SUSE bug 1217195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217200">SUSE bug 1217200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217205">SUSE bug 1217205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217332">SUSE bug 1217332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217366">SUSE bug 1217366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217515">SUSE bug 1217515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217598">SUSE bug 1217598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217599">SUSE bug 1217599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217609">SUSE bug 1217609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217687">SUSE bug 1217687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217731">SUSE bug 1217731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217780">SUSE bug 1217780</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2006/">CVE-2023-2006 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2006">CVE-2023-2006 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45863/">CVE-2023-45863 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5158/">CVE-2023-5158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6039/">CVE-2023-6039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6176/">CVE-2023-6176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815362" comment="kernel-default-5.14.21-150400.24.100.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815363" comment="kernel-default-base-5.14.21-150400.24.100.2.150400.24.46.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206096" version="1" class="patch">
	<metadata>
		<title>Security update for python3-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1217592" ref_url="https://bugzilla.suse.com/1217592" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017361.html" source="SUSE-SU"/>
		<description>
This update for python3-cryptography fixes the following issues:

- CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2023-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217592">SUSE bug 1217592</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813863" comment="python3-cryptography-3.3.2-150400.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206097" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1199483" ref_url="https://bugzilla.suse.com/1199483" source="BUGZILLA"/>
		<reference ref_id="1210231" ref_url="https://bugzilla.suse.com/1210231" source="BUGZILLA"/>
		<reference ref_id="1211478" ref_url="https://bugzilla.suse.com/1211478" source="BUGZILLA"/>
		<reference ref_id="1212398" ref_url="https://bugzilla.suse.com/1212398" source="BUGZILLA"/>
		<reference ref_id="1214680" ref_url="https://bugzilla.suse.com/1214680" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1622" ref_url="https://www.suse.com/security/cve/CVE-2022-1622/" source="CVE"/>
		<reference ref_id="CVE-2022-40090" ref_url="https://www.suse.com/security/cve/CVE-2022-40090/" source="CVE"/>
		<reference ref_id="CVE-2023-1916" ref_url="https://www.suse.com/security/cve/CVE-2023-1916/" source="CVE"/>
		<reference ref_id="CVE-2023-26965" ref_url="https://www.suse.com/security/cve/CVE-2023-26965/" source="CVE"/>
		<reference ref_id="CVE-2023-2731" ref_url="https://www.suse.com/security/cve/CVE-2023-2731/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-2731: Fix null pointer deference in LZWDecode() (bsc#1211478).
- CVE-2023-1916: Fix out-of-bounds read in extractImageSection() (bsc#1210231).
- CVE-2023-26965: Fix heap-based use after free in loadImage() (bsc#1212398).
- CVE-2022-40090: Fix infinite loop in TIFFReadDirectory() (bsc#1214680).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2023-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199483">SUSE bug 1199483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210231">SUSE bug 1210231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211478">SUSE bug 1211478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212398">SUSE bug 1212398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214680">SUSE bug 1214680</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1622/">CVE-2022-1622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1622">CVE-2022-1622 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40090/">CVE-2022-40090 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40090">CVE-2022-40090 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1916/">CVE-2023-1916 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1916">CVE-2023-1916 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26965/">CVE-2023-26965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26965">CVE-2023-26965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2731/">CVE-2023-2731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2731">CVE-2023-2731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815623" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206098" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1201384" ref_url="https://bugzilla.suse.com/1201384" source="BUGZILLA"/>
		<reference ref_id="1218014" ref_url="https://bugzilla.suse.com/1218014" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50495" ref_url="https://www.suse.com/security/cve/CVE-2023-50495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017440.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014)
- Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-18"/>
	<updated date="2023-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201384">SUSE bug 1201384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218014">SUSE bug 1218014</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50495/">CVE-2023-50495 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50495">CVE-2023-50495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816335" comment="libncurses6-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816336" comment="ncurses-utils-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816337" comment="terminfo-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816338" comment="terminfo-base-6.1-150000.5.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206099" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216853" ref_url="https://bugzilla.suse.com/1216853" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38472" ref_url="https://www.suse.com/security/cve/CVE-2023-38472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017448.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2023-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216853">SUSE bug 1216853</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38472/">CVE-2023-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38472">CVE-2023-38472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814965" comment="avahi-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814966" comment="libavahi-client3-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814967" comment="libavahi-common3-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814968" comment="libavahi-core7-0.8-150400.7.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206100" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214788" ref_url="https://bugzilla.suse.com/1214788" source="BUGZILLA"/>
		<reference ref_id="1217950" ref_url="https://bugzilla.suse.com/1217950" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017494.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950).

the following non-security bug was fixed:

- Fix the 'no route to host' error when connecting via ProxyJump
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2023-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214788">SUSE bug 1214788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217950">SUSE bug 1217950</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817184" comment="openssh-8.4p1-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817185" comment="openssh-clients-8.4p1-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817186" comment="openssh-common-8.4p1-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817187" comment="openssh-fips-8.4p1-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817188" comment="openssh-server-8.4p1-150300.3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206101" version="1" class="patch">
	<metadata>
		<title>Security update for docker, rootlesskit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1178760" ref_url="https://bugzilla.suse.com/1178760" source="BUGZILLA"/>
		<reference ref_id="1210141" ref_url="https://bugzilla.suse.com/1210141" source="BUGZILLA"/>
		<reference ref_id="1213229" ref_url="https://bugzilla.suse.com/1213229" source="BUGZILLA"/>
		<reference ref_id="1213500" ref_url="https://bugzilla.suse.com/1213500" source="BUGZILLA"/>
		<reference ref_id="1215323" ref_url="https://bugzilla.suse.com/1215323" source="BUGZILLA"/>
		<reference ref_id="1217513" ref_url="https://bugzilla.suse.com/1217513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12912" ref_url="https://www.suse.com/security/cve/CVE-2020-12912/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
		<description>
This update for docker, rootlesskit fixes the following issues:

docker:

- Update to Docker 24.0.7-ce. See upstream changelong online at
  https://docs.docker.com/engine/release-notes/24.0/#2407&gt;. bsc#1217513
  * Deny containers access to /sys/devices/virtual/powercap by default.
    - CVE-2020-8694 bsc#1170415
    - CVE-2020-8695 bsc#1170446
    - CVE-2020-12912 bsc#1178760

- Update to Docker 24.0.6-ce. See upstream changelong online at

  	https://docs.docker.com/engine/release-notes/24.0/#2406 . bsc#1215323

- Add a docker.socket unit file, but with socket activation effectively
  disabled to ensure that Docker will always run even if you start the socket
  individually. Users should probably just ignore this unit file. bsc#1210141

- Update to Docker 24.0.5-ce. See upstream changelong online at

	https://docs.docker.com/engine/release-notes/24.0/#2405 . bsc#1213229

This update ships docker-rootless support in the docker-rootless-extra package. (jsc#PED-6180)

rootlesskit:

- new package, for docker rootless support. (jsc#PED-6180)

		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178760">SUSE bug 1178760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210141">SUSE bug 1210141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213229">SUSE bug 1213229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213500">SUSE bug 1213500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215323">SUSE bug 1215323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217513">SUSE bug 1217513</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12912/">CVE-2020-12912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12912">CVE-2020-12912 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816011" comment="docker-24.0.7_ce-150000.190.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206102" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218251" ref_url="https://bugzilla.suse.com/1218251" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4603" ref_url="https://www.suse.com/security/cve/CVE-2022-4603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017549.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following issues:

- CVE-2022-4603: Fixed improper validation of array index of the component pppdump (bsc#1218251).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-22"/>
	<updated date="2023-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218251">SUSE bug 1218251</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4603/">CVE-2022-4603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4603">CVE-2022-4603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817822" comment="ppp-2.4.7-150000.5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206103" version="1" class="patch">
	<metadata>
		<title>Security update for jbigkit (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1198146" ref_url="https://bugzilla.suse.com/1198146" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1210" ref_url="https://www.suse.com/security/cve/CVE-2022-1210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033491.html" source="SUSE-SU"/>
		<description>
This update for jbigkit fixes the following issues:

- CVE-2022-1210: Fixed denial of service in TIFF File Handler (bsc#1198146).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-25"/>
	<updated date="2023-12-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1198146">SUSE bug 1198146</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1210/">CVE-2022-1210 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1210">CVE-2022-1210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817821" comment="libjbig2-2.1-150000.3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206104" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1217277" ref_url="https://bugzilla.suse.com/1217277" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5981" ref_url="https://www.suse.com/security/cve/CVE-2023-5981/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017571.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2023-5981: Fixed timing side-channel inside RSA-PSK key exchange (bsc#1217277).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-28"/>
	<updated date="2023-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217277">SUSE bug 1217277</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5981/">CVE-2023-5981 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814270" comment="gnutls-3.7.3-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814271" comment="libgnutls30-3.7.3-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814272" comment="libgnutls30-hmac-3.7.3-150400.4.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206105" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1204425" ref_url="https://bugzilla.suse.com/1204425" source="BUGZILLA"/>
		<reference ref_id="1208881" ref_url="https://bugzilla.suse.com/1208881" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3555" ref_url="https://www.suse.com/security/cve/CVE-2022-3555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0668-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029045.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed a regression introduced with security update for CVE-2022-3555 (bsc#1204425, bsc#1208881)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204425">SUSE bug 1204425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208881">SUSE bug 1208881</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3555/">CVE-2022-3555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3555">CVE-2022-3555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743224" comment="libX11-6-1.6.5-150000.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743063" comment="libX11-data-1.6.5-150000.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009743225" comment="libX11-xcb1-1.6.5-150000.3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206106" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208036" ref_url="https://bugzilla.suse.com/1208036" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0722-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029276.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

  - CVE-2023-23931: Fixed memory corruption due to invalidly changed immutable object (bsc#1208036).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-09"/>
	<updated date="2023-05-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208036">SUSE bug 1208036</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009740809" comment="python3-cryptography-3.3.2-150400.16.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206107" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1207780" ref_url="https://bugzilla.suse.com/1207780" source="BUGZILLA"/>
		<reference ref_id="1208828" ref_url="https://bugzilla.suse.com/1208828" source="BUGZILLA"/>
		<reference ref_id="1208957" ref_url="https://bugzilla.suse.com/1208957" source="BUGZILLA"/>
		<reference ref_id="1208959" ref_url="https://bugzilla.suse.com/1208959" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0512" ref_url="https://www.suse.com/security/cve/CVE-2023-0512/" source="CVE"/>
		<reference ref_id="CVE-2023-1127" ref_url="https://www.suse.com/security/cve/CVE-2023-1127/" source="CVE"/>
		<reference ref_id="CVE-2023-1170" ref_url="https://www.suse.com/security/cve/CVE-2023-1170/" source="CVE"/>
		<reference ref_id="CVE-2023-1175" ref_url="https://www.suse.com/security/cve/CVE-2023-1175/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0781-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029038.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2023-0512: Fixed a divide By Zero (bsc#1207780).
- CVE-2023-1175: vim: an incorrect calculation of buffer size (bsc#1208957).
- CVE-2023-1170: Fixed a heap-based Buffer Overflow (bsc#1208959).
- CVE-2023-1127: Fixed divide by zero in scrolldown() (bsc#1208828).

Updated to version 9.0 with patch level 1386.

- https://github.com/vim/vim/compare/v9.0.1234...v9.0.1386
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207780">SUSE bug 1207780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208828">SUSE bug 1208828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208957">SUSE bug 1208957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208959">SUSE bug 1208959</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0512/">CVE-2023-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0512">CVE-2023-0512 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1127/">CVE-2023-1127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1127">CVE-2023-1127 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1170/">CVE-2023-1170 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1170">CVE-2023-1170 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1175/">CVE-2023-1175 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1175">CVE-2023-1175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009743831" comment="vim-data-common-9.0.1386-150000.5.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744036" comment="vim-small-9.0.1386-150000.5.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206108" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1205375" ref_url="https://bugzilla.suse.com/1205375" source="BUGZILLA"/>
		<reference ref_id="1206065" ref_url="https://bugzilla.suse.com/1206065" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36109" ref_url="https://www.suse.com/security/cve/CVE-2022-36109/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0795-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029040.html" source="SUSE-SU"/>
		<description>

This update for docker fixes the following issues:

Docker was updated to 20.10.23-ce.

See upstream changelog at https://docs.docker.com/engine/release-notes/#201023

Docker was updated to 20.10.21-ce (bsc#1206065)

See upstream changelog at https://docs.docker.com/engine/release-notes/#201021 

Security issues fixed:

- CVE-2022-36109: Fixed supplementary group permissions bypass (bsc#1205375)

- Fix wrong After: in docker.service, fixes bsc#1188447
- Add apparmor-parser as a Recommends to make sure that most users will end up
  with it installed even if they are primarily running SELinux.
- Allow to install container-selinux instead of apparmor-parser.
- Change to using systemd-sysusers
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205375">SUSE bug 1205375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206065">SUSE bug 1206065</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36109/">CVE-2022-36109 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36109">CVE-2022-36109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744035" comment="docker-20.10.23_ce-150000.175.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206109" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1209017" ref_url="https://bugzilla.suse.com/1209017" source="BUGZILLA"/>
		<reference ref_id="1209018" ref_url="https://bugzilla.suse.com/1209018" source="BUGZILLA"/>
		<reference ref_id="1209019" ref_url="https://bugzilla.suse.com/1209019" source="BUGZILLA"/>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42331" ref_url="https://www.suse.com/security/cve/CVE-2022-42331/" source="CVE"/>
		<reference ref_id="CVE-2022-42332" ref_url="https://www.suse.com/security/cve/CVE-2022-42332/" source="CVE"/>
		<reference ref_id="CVE-2022-42333" ref_url="https://www.suse.com/security/cve/CVE-2022-42333/" source="CVE"/>
		<reference ref_id="CVE-2022-42334" ref_url="https://www.suse.com/security/cve/CVE-2022-42334/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0848-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029042.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-42332: Fixed use-after-free in x86 shadow plus log-dirty mode (bsc#1209017).
- CVE-2022-42333,CVE-2022-42334: Fixed x86/HVM pinned cache attributes mis-handling (bsc#1209018).
- CVE-2022-42331: Fixed speculative vulnerability in 32bit SYSCALL path on x86 (bsc#1209019).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209017">SUSE bug 1209017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209018">SUSE bug 1209018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209019">SUSE bug 1209019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42331/">CVE-2022-42331 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42331">CVE-2022-42331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42332/">CVE-2022-42332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42332">CVE-2022-42332 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-42333/">CVE-2022-42333 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42333">CVE-2022-42333 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-42334/">CVE-2022-42334 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42334">CVE-2022-42334 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747893" comment="xen-libs-4.16.3_06-150400.4.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206110" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1203355" ref_url="https://bugzilla.suse.com/1203355" source="BUGZILLA"/>
		<reference ref_id="1208471" ref_url="https://bugzilla.suse.com/1208471" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0868-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029039.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-24329: Fixed a blocklist bypass via the urllib.parse component when supplying a URL that starts with blank characters (bsc#1208471).

The following non-security bug was fixed:

- Eliminate unnecessary and dangerous calls to PyThread_exit_thread() (bsc#1203355).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203355">SUSE bug 1203355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009747153" comment="libpython3_6m1_0-3.6.15-150300.10.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747154" comment="python3-3.6.15-150300.10.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009747155" comment="python3-base-3.6.15-150300.10.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206111" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1180207" ref_url="https://bugzilla.suse.com/1180207" source="BUGZILLA"/>
		<reference ref_id="1185000" ref_url="https://bugzilla.suse.com/1185000" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14394" ref_url="https://www.suse.com/security/cve/CVE-2020-14394/" source="CVE"/>
		<reference ref_id="CVE-2021-3507" ref_url="https://www.suse.com/security/cve/CVE-2021-3507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0879-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029043.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2021-3507: Fixed heap buffer overflow in DMA read data transfers in fdc (bsc#1185000).
- CVE-2020-14394: Fixed infinite loop in xhci_ring_chain_length() (bsc#1180207).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-04-27"/>
	<updated date="2023-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180207">SUSE bug 1180207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185000">SUSE bug 1185000</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14394/">CVE-2020-14394 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14394">CVE-2020-14394 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3507/">CVE-2021-3507 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3507">CVE-2021-3507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009744477" comment="qemu-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744319" comment="qemu-accel-tcg-x86-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744320" comment="qemu-arm-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744478" comment="qemu-audio-spice-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744479" comment="qemu-chardev-spice-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744480" comment="qemu-guest-agent-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744481" comment="qemu-hw-display-qxl-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744482" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744483" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744484" comment="qemu-hw-usb-redirect-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744194" comment="qemu-ipxe-1.0.0+-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744332" comment="qemu-s390x-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744203" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744204" comment="qemu-sgabios-8-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744485" comment="qemu-tools-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744486" comment="qemu-ui-opengl-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744487" comment="qemu-ui-spice-core-6.2.0-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744213" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009744337" comment="qemu-x86-6.2.0-150400.37.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206112" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1209282" ref_url="https://bugzilla.suse.com/1209282" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017585.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- Change permissions for rules folders (bsc#1209282)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-02"/>
	<updated date="2024-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209282">SUSE bug 1209282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815621" comment="libpolkit0-0.116-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815622" comment="polkit-0.116-150200.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206113" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1220770" ref_url="https://bugzilla.suse.com/1220770" source="BUGZILLA"/>
		<reference ref_id="1220771" ref_url="https://bugzilla.suse.com/1220771" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-26458" ref_url="https://www.suse.com/security/cve/CVE-2024-26458/" source="CVE"/>
		<reference ref_id="CVE-2024-26461" ref_url="https://www.suse.com/security/cve/CVE-2024-26461/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018224.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2024-26458: Fixed memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770).
- CVE-2024-26461: Fixed memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (bsc#1220771).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-27"/>
	<updated date="2024-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220770">SUSE bug 1220770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220771">SUSE bug 1220771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26458/">CVE-2024-26458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">CVE-2024-26458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26461/">CVE-2024-26461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852271" comment="krb5-1.19.2-150400.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206114" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216594" ref_url="https://bugzilla.suse.com/1216594" source="BUGZILLA"/>
		<reference ref_id="1216598" ref_url="https://bugzilla.suse.com/1216598" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38469" ref_url="https://www.suse.com/security/cve/CVE-2023-38469/" source="CVE"/>
		<reference ref_id="CVE-2023-38471" ref_url="https://www.suse.com/security/cve/CVE-2023-38471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018228.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-38471: Fixed reachable assertion in dbus_set_host_name (bsc#1216594).
- CVE-2023-38469: Fixed reachable assertions in avahi (bsc#1216598).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-27"/>
	<updated date="2024-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216594">SUSE bug 1216594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216598">SUSE bug 1216598</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38469/">CVE-2023-38469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38469">CVE-2023-38469 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38471/">CVE-2023-38471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38471">CVE-2023-38471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852272" comment="avahi-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852273" comment="libavahi-client3-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852274" comment="libavahi-common3-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852275" comment="libavahi-core7-0.8-150400.7.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206115" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1221677" ref_url="https://bugzilla.suse.com/1221677" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018241.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2024-1753: Fixed full container escape at build time (bsc#1221677).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-03-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221677">SUSE bug 1221677</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852540" comment="podman-4.4.4-150400.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852433" comment="podman-cni-config-4.4.4-150400.4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206116" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1221749" ref_url="https://bugzilla.suse.com/1221749" source="BUGZILLA"/>
		<reference ref_id="1221815" ref_url="https://bugzilla.suse.com/1221815" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2494" ref_url="https://www.suse.com/security/cve/CVE-2024-2494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034895.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2024-2494: Add a check for negative array lengths before allocation to prevent potential DoS. (bsc#1221815)

The following non-security bug was fixed:

-  Avoid memleak in virNodeDeviceGetPCIVPDDynamicCap() (bsc#1221749).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-03"/>
	<updated date="2024-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221749">SUSE bug 1221749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221815">SUSE bug 1221815</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2494/">CVE-2024-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2494">CVE-2024-2494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853062" comment="libvirt-client-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853063" comment="libvirt-daemon-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853064" comment="libvirt-daemon-driver-interface-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853065" comment="libvirt-daemon-driver-network-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853066" comment="libvirt-daemon-driver-nodedev-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853067" comment="libvirt-daemon-driver-nwfilter-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853068" comment="libvirt-daemon-driver-qemu-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853069" comment="libvirt-daemon-driver-secret-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853070" comment="libvirt-daemon-driver-storage-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853071" comment="libvirt-daemon-driver-storage-core-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853072" comment="libvirt-daemon-driver-storage-disk-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853073" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853074" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853075" comment="libvirt-daemon-driver-storage-logical-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853076" comment="libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852838" comment="libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853077" comment="libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853078" comment="libvirt-daemon-qemu-8.0.0-150400.7.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853079" comment="libvirt-libs-8.0.0-150400.7.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206117" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1221332" ref_url="https://bugzilla.suse.com/1221332" source="BUGZILLA"/>
		<reference ref_id="1221334" ref_url="https://bugzilla.suse.com/1221334" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2024-2193" ref_url="https://www.suse.com/security/cve/CVE-2024-2193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034894.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-28746: Register File Data Sampling (bsc#1221332)
- CVE-2024-2193: Fixed GhostRace, a speculative race conditions. (bsc#1221334)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-03"/>
	<updated date="2024-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221332">SUSE bug 1221332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221334">SUSE bug 1221334</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2193/">CVE-2024-2193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2193">CVE-2024-2193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853080" comment="xen-libs-4.16.5_14-150400.4.52.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206118" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="1221289" ref_url="https://bugzilla.suse.com/1221289" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-28757" ref_url="https://www.suse.com/security/cve/CVE-2024-28757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018262.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2023-52425: Fixed a DoS caused by processing large tokens. (bsc#1219559) 
- CVE-2024-28757: Fixed an XML Entity Expansion. (bsc#1221289)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221289">SUSE bug 1221289</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28757/">CVE-2024-28757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853566" comment="libexpat1-2.4.4-150400.3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206119" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1220061" ref_url="https://bugzilla.suse.com/1220061" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45918" ref_url="https://www.suse.com/security/cve/CVE-2023-45918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034889.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2023-45918: Fixed NULL pointer dereference via corrupted xterm-256color file (bsc#1220061).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220061">SUSE bug 1220061</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-45918/">CVE-2023-45918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45918">CVE-2023-45918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853557" comment="libncurses6-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853558" comment="ncurses-utils-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853559" comment="terminfo-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853560" comment="terminfo-base-6.1-150000.5.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206120" version="1" class="patch">
	<metadata>
		<title>Security update for c-ares (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1220279" ref_url="https://bugzilla.suse.com/1220279" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034886.html" source="SUSE-SU"/>
		<description>
This update for c-ares fixes the following issues:

- CVE-2024-25629: Fixed out of bounds read in ares__read_line() (bsc#1220279).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220279">SUSE bug 1220279</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853561" comment="libcares2-1.19.1-150000.3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206121" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1221323" ref_url="https://bugzilla.suse.com/1221323" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22655" ref_url="https://www.suse.com/security/cve/CVE-2023-22655/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-38575" ref_url="https://www.suse.com/security/cve/CVE-2023-38575/" source="CVE"/>
		<reference ref_id="CVE-2023-39368" ref_url="https://www.suse.com/security/cve/CVE-2023-39368/" source="CVE"/>
		<reference ref_id="CVE-2023-43490" ref_url="https://www.suse.com/security/cve/CVE-2023-43490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20240312 release. (bsc#1221323)
- CVE-2023-39368: Protection mechanism failure of bus lock regulator
  for some Intel Processors may allow an unauthenticated user to
  potentially enable denial of service via network access
- CVE-2023-38575: Non-transparent sharing of return predictor targets
  between contexts in some Intel Processors may allow an authorized
  user to potentially enable information disclosure via local access.
- CVE-2023-28746: Information exposure through microarchitectural
  state after transient execution from some register files for some
  Intel Atom Processors may allow an authenticated user to potentially
  enable information disclosure via local access.
- CVE-2023-22655 Protection mechanism failure in some 3rd and 4th
  Generation Intel Xeon Processors when using Intel SGX or Intel TDX
  may allow a privileged user to potentially enable escalation of
  privilege via local access.
- CVE-2023-43490: Incorrect calculation in microcode keying mechanism
  for some Intel Xeon D Processors with Intel? SGX may allow a
  privileged user to potentially enable information disclosure via
  local access.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22655/">CVE-2023-22655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38575/">CVE-2023-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39368/">CVE-2023-39368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43490/">CVE-2023-43490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206122" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219563" ref_url="https://bugzilla.suse.com/1219563" source="BUGZILLA"/>
		<reference ref_id="1220568" ref_url="https://bugzilla.suse.com/1220568" source="BUGZILLA"/>
		<reference ref_id="1221677" ref_url="https://bugzilla.suse.com/1221677" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034878.html" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

- CVE-2024-1753: Fixed an issue to prevent a full container escape at build time. (bsc#1221677)
- Update to version 1.34.1 for compatibility with Docker 25.0
  (which is not in SLES yet, but will eventually be) (bsc#1219563).
  See the corresponding release notes:
  * https://github.com/containers/buildah/releases/tag/v1.34.1
  * https://github.com/containers/buildah/releases/tag/v1.34.0
  * https://github.com/containers/buildah/releases/tag/v1.33.0
  * https://github.com/containers/buildah/releases/tag/v1.32.0
  * https://github.com/containers/buildah/releases/tag/v1.31.0
  * https://github.com/containers/buildah/releases/tag/v1.30.0

- Require cni-plugins (bsc#1220568)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219563">SUSE bug 1219563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220568">SUSE bug 1220568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221677">SUSE bug 1221677</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853562" comment="cni-0.7.1-150100.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853563" comment="cni-plugins-0.8.6-150100.3.22.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206123" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1221665" ref_url="https://bugzilla.suse.com/1221665" source="BUGZILLA"/>
		<reference ref_id="1221667" ref_url="https://bugzilla.suse.com/1221667" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2004" ref_url="https://www.suse.com/security/cve/CVE-2024-2004/" source="CVE"/>
		<reference ref_id="CVE-2024-2398" ref_url="https://www.suse.com/security/cve/CVE-2024-2398/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034871.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2024-2004: Fix the uUsage of disabled protocol logic. (bsc#1221665)
- CVE-2024-2398: Fix HTTP/2 push headers memory-leak. (bsc#1221667)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221665">SUSE bug 1221665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221667">SUSE bug 1221667</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2004/">CVE-2024-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2004">CVE-2024-2004 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2398/">CVE-2024-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853567" comment="curl-8.0.1-150400.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853568" comment="libcurl4-8.0.1-150400.5.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206124" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1221399" ref_url="https://bugzilla.suse.com/1221399" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1167-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034897.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

- CVE-2024-28182: Fixed denial of service via http/2 continuation frames (bsc#1221399)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221399">SUSE bug 1221399</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853565" comment="libnghttp2-14-1.40.0-150200.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206125" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1207987" ref_url="https://bugzilla.suse.com/1207987" source="BUGZILLA"/>
		<reference ref_id="1220117" ref_url="https://bugzilla.suse.com/1220117" source="BUGZILLA"/>
		<reference ref_id="1221831" ref_url="https://bugzilla.suse.com/1221831" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28085" ref_url="https://www.suse.com/security/cve/CVE-2024-28085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034905.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207987">SUSE bug 1207987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220117">SUSE bug 1220117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221831">SUSE bug 1221831</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-28085/">CVE-2024-28085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28085">CVE-2024-28085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853981" comment="libblkid1-2.37.2-150400.8.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853982" comment="libfdisk1-2.37.2-150400.8.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853983" comment="libmount1-2.37.2-150400.8.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853984" comment="libsmartcols1-2.37.2-150400.8.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853985" comment="libuuid1-2.37.2-150400.8.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853986" comment="util-linux-2.37.2-150400.8.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853987" comment="util-linux-systemd-2.37.2-150400.8.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206126" version="1" class="patch">
	<metadata>
		<title>Security update for less (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219901" ref_url="https://bugzilla.suse.com/1219901" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48624" ref_url="https://www.suse.com/security/cve/CVE-2022-48624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034922.html" source="SUSE-SU"/>
		<description>
This update for less fixes the following issues:

- CVE-2022-48624: Fixed LESSCLOSE handling in less that does not quote shell metacharacters (bsc#1219901).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219901">SUSE bug 1219901</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48624/">CVE-2022-48624 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48624">CVE-2022-48624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854018" comment="less-590-150400.3.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206127" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1221984" ref_url="https://bugzilla.suse.com/1221984" source="BUGZILLA"/>
		<reference ref_id="1222302" ref_url="https://bugzilla.suse.com/1222302" source="BUGZILLA"/>
		<reference ref_id="1222453" ref_url="https://bugzilla.suse.com/1222453" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46842" ref_url="https://www.suse.com/security/cve/CVE-2023-46842/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-31142" ref_url="https://www.suse.com/security/cve/CVE-2024-31142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034964.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-46842: Fixed denial of service due to Xen bug check triggered by HVM hypercalls (XSA-454) in xen x86 (bsc#1221984)
- CVE-2024-31142: Fixed incorrect logic for BTC/SRSO mitigations (XSA-455) in xen x86 (bsc#1222302)
- CVE-2024-2201: Fixed memory disclosure via Native Branch History Injection (XSA-456) in xen x86 (bsc#1222453)

Other fixes:

- Update to Xen 4.16.6 (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221984">SUSE bug 1221984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222302">SUSE bug 1222302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222453">SUSE bug 1222453</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46842/">CVE-2023-46842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46842">CVE-2023-46842 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-31142/">CVE-2024-31142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31142">CVE-2024-31142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854660" comment="xen-libs-4.16.6_02-150400.4.55.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206128" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1221242" ref_url="https://bugzilla.suse.com/1221242" source="BUGZILLA"/>
		<reference ref_id="1221746" ref_url="https://bugzilla.suse.com/1221746" source="BUGZILLA"/>
		<reference ref_id="1221747" ref_url="https://bugzilla.suse.com/1221747" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28834" ref_url="https://www.suse.com/security/cve/CVE-2024-28834/" source="CVE"/>
		<reference ref_id="CVE-2024-28835" ref_url="https://www.suse.com/security/cve/CVE-2024-28835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034953.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2024-28834: Fixed side-channel in the deterministic ECDSA (bsc#1221746)
- CVE-2024-28835: Fixed denial of service during certificate chain verification (bsc#1221747)

Other fixes:
  - jitterentropy: Release the memory of the entropy collector when
    using jitterentropy with phtreads as there is also a
    pre-intitization done in the main thread (bsc#1221242)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221242">SUSE bug 1221242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221746">SUSE bug 1221746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221747">SUSE bug 1221747</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28834/">CVE-2024-28834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28835/">CVE-2024-28835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854661" comment="gnutls-3.7.3-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854662" comment="libgnutls30-3.7.3-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854663" comment="libgnutls30-hmac-3.7.3-150400.4.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206129" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1183045" ref_url="https://bugzilla.suse.com/1183045" source="BUGZILLA"/>
		<reference ref_id="1193285" ref_url="https://bugzilla.suse.com/1193285" source="BUGZILLA"/>
		<reference ref_id="1211162" ref_url="https://bugzilla.suse.com/1211162" source="BUGZILLA"/>
		<reference ref_id="1211226" ref_url="https://bugzilla.suse.com/1211226" source="BUGZILLA"/>
		<reference ref_id="1212584" ref_url="https://bugzilla.suse.com/1212584" source="BUGZILLA"/>
		<reference ref_id="1214747" ref_url="https://bugzilla.suse.com/1214747" source="BUGZILLA"/>
		<reference ref_id="1214823" ref_url="https://bugzilla.suse.com/1214823" source="BUGZILLA"/>
		<reference ref_id="1215237" ref_url="https://bugzilla.suse.com/1215237" source="BUGZILLA"/>
		<reference ref_id="1215696" ref_url="https://bugzilla.suse.com/1215696" source="BUGZILLA"/>
		<reference ref_id="1215885" ref_url="https://bugzilla.suse.com/1215885" source="BUGZILLA"/>
		<reference ref_id="1216057" ref_url="https://bugzilla.suse.com/1216057" source="BUGZILLA"/>
		<reference ref_id="1216559" ref_url="https://bugzilla.suse.com/1216559" source="BUGZILLA"/>
		<reference ref_id="1216776" ref_url="https://bugzilla.suse.com/1216776" source="BUGZILLA"/>
		<reference ref_id="1217036" ref_url="https://bugzilla.suse.com/1217036" source="BUGZILLA"/>
		<reference ref_id="1217217" ref_url="https://bugzilla.suse.com/1217217" source="BUGZILLA"/>
		<reference ref_id="1217250" ref_url="https://bugzilla.suse.com/1217250" source="BUGZILLA"/>
		<reference ref_id="1217602" ref_url="https://bugzilla.suse.com/1217602" source="BUGZILLA"/>
		<reference ref_id="1217692" ref_url="https://bugzilla.suse.com/1217692" source="BUGZILLA"/>
		<reference ref_id="1217790" ref_url="https://bugzilla.suse.com/1217790" source="BUGZILLA"/>
		<reference ref_id="1217801" ref_url="https://bugzilla.suse.com/1217801" source="BUGZILLA"/>
		<reference ref_id="1217933" ref_url="https://bugzilla.suse.com/1217933" source="BUGZILLA"/>
		<reference ref_id="1217938" ref_url="https://bugzilla.suse.com/1217938" source="BUGZILLA"/>
		<reference ref_id="1217946" ref_url="https://bugzilla.suse.com/1217946" source="BUGZILLA"/>
		<reference ref_id="1217947" ref_url="https://bugzilla.suse.com/1217947" source="BUGZILLA"/>
		<reference ref_id="1217980" ref_url="https://bugzilla.suse.com/1217980" source="BUGZILLA"/>
		<reference ref_id="1217981" ref_url="https://bugzilla.suse.com/1217981" source="BUGZILLA"/>
		<reference ref_id="1217982" ref_url="https://bugzilla.suse.com/1217982" source="BUGZILLA"/>
		<reference ref_id="1218056" ref_url="https://bugzilla.suse.com/1218056" source="BUGZILLA"/>
		<reference ref_id="1218139" ref_url="https://bugzilla.suse.com/1218139" source="BUGZILLA"/>
		<reference ref_id="1218184" ref_url="https://bugzilla.suse.com/1218184" source="BUGZILLA"/>
		<reference ref_id="1218234" ref_url="https://bugzilla.suse.com/1218234" source="BUGZILLA"/>
		<reference ref_id="1218253" ref_url="https://bugzilla.suse.com/1218253" source="BUGZILLA"/>
		<reference ref_id="1218258" ref_url="https://bugzilla.suse.com/1218258" source="BUGZILLA"/>
		<reference ref_id="1218335" ref_url="https://bugzilla.suse.com/1218335" source="BUGZILLA"/>
		<reference ref_id="1218357" ref_url="https://bugzilla.suse.com/1218357" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1218515" ref_url="https://bugzilla.suse.com/1218515" source="BUGZILLA"/>
		<reference ref_id="1218559" ref_url="https://bugzilla.suse.com/1218559" source="BUGZILLA"/>
		<reference ref_id="1218569" ref_url="https://bugzilla.suse.com/1218569" source="BUGZILLA"/>
		<reference ref_id="1218659" ref_url="https://bugzilla.suse.com/1218659" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555/" source="CVE"/>
		<reference ref_id="CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779/" source="CVE"/>
		<reference ref_id="CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546/" source="CVE"/>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<reference ref_id="CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610/" source="CVE"/>
		<reference ref_id="CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622/" source="CVE"/>
		<reference ref_id="CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931/" source="CVE"/>
		<reference ref_id="CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on (bsc#1218447).
- CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946).
- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).
- CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237).
- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).
- CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335).
- CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258).
- CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253).
- CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938).
- CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250).

The following non-security bugs were fixed:

- Reviewed and added more information to README.SUSE (jsc#PED-5021).
- Build in the correct KOTD repository with multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184) With multibuild setting repository flags is no longer supported for individual spec files - see https://github.com/openSUSE/open-build-service/issues/3574 Add ExclusiveArch conditional that depends on a macro set up by bs-upload-kernel instead. With that each package should build only in one repository - either standard or QA. Note: bs-upload-kernel does not interpret rpm conditionals, and only uses the first ExclusiveArch line to determine the architectures to enable.
- KVM: s390/mm: Properly reset no-dat (bsc#1218056).
- KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217933).
- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).
- NFS: Fix O_DIRECT locking issues (bsc#1211162).
- NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162).
- NFS: Fix a potential data corruption (bsc#1211162).
- NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162).
- NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162).
- NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162).
- NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).
- NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162).
- NLM: Defend against file_lock changes after vfs_test_lock() (bsc#1217692).
- Updated SPI patches for NVIDIA Grace enablement (bsc#1212584, jsc#PED-3459).
- block: fix revalidate performance regression (bsc#1216057).
- bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234).
- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980).
- ceph: fix type promotion bug on 32bit systems (bsc#1217982).
- clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217).
- clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217).
- clocksource: Handle negative skews in 'skew is too large' messages (bsc#1215885 bsc#1217217).
- clocksource: Improve 'skew is too large' messages (bsc#1215885 bsc#1217217).
- clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217).
- clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217).
- clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217).
- clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217).
- dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776).
- fuse: dax: set fc-&gt;dax to NULL in fuse_dax_conn_free() (bsc#1218659).
- kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff
- libceph: use kernel_connect() (bsc#1217981).
- mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files.
- mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515).
- net/smc: Fix pos miscalculation in statistics (bsc#1218139).
- net/tg3: fix race condition in tg3_reset_task() (bsc#1217801).
- nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162).
- remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569).
- s390/vx: fix save/restore of fpu kernel context (bsc#1218357).
- scsi: lpfc: use unsigned type for num_sge (bsc#1214747).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix slot alignment checks (bsc#1216559).
- tracing: Disable preemption when using the filter buffer (bsc#1217036).
- tracing: Fix a possible race when disabling buffered events (bsc#1217036).
- tracing: Fix a warning when allocating buffered events fails (bsc#1217036).
- tracing: Fix incomplete locking when disabling buffered events (bsc#1217036).
- tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036).
- tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036).
- uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978).
- vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602).
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
- x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790).
- x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217).
- x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217).
- x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2024-01-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183045">SUSE bug 1183045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193285">SUSE bug 1193285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211162">SUSE bug 1211162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211226">SUSE bug 1211226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212584">SUSE bug 1212584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214747">SUSE bug 1214747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214823">SUSE bug 1214823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215237">SUSE bug 1215237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215696">SUSE bug 1215696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215885">SUSE bug 1215885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216057">SUSE bug 1216057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216559">SUSE bug 1216559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216776">SUSE bug 1216776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217036">SUSE bug 1217036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217217">SUSE bug 1217217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217250">SUSE bug 1217250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217602">SUSE bug 1217602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217692">SUSE bug 1217692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217790">SUSE bug 1217790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217801">SUSE bug 1217801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217933">SUSE bug 1217933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217938">SUSE bug 1217938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217946">SUSE bug 1217946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217947">SUSE bug 1217947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217980">SUSE bug 1217980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217981">SUSE bug 1217981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217982">SUSE bug 1217982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218056">SUSE bug 1218056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218139">SUSE bug 1218139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218184">SUSE bug 1218184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218234">SUSE bug 1218234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218253">SUSE bug 1218253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218258">SUSE bug 1218258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218335">SUSE bug 1218335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218357">SUSE bug 1218357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218515">SUSE bug 1218515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218559">SUSE bug 1218559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218569">SUSE bug 1218569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218659">SUSE bug 1218659</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819466" comment="kernel-rt-5.14.21-150400.15.65.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206130" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212514" ref_url="https://bugzilla.suse.com/1212514" source="BUGZILLA"/>
		<reference ref_id="1220237" ref_url="https://bugzilla.suse.com/1220237" source="BUGZILLA"/>
		<reference ref_id="1220320" ref_url="https://bugzilla.suse.com/1220320" source="BUGZILLA"/>
		<reference ref_id="1220340" ref_url="https://bugzilla.suse.com/1220340" source="BUGZILLA"/>
		<reference ref_id="1220366" ref_url="https://bugzilla.suse.com/1220366" source="BUGZILLA"/>
		<reference ref_id="1220411" ref_url="https://bugzilla.suse.com/1220411" source="BUGZILLA"/>
		<reference ref_id="1220413" ref_url="https://bugzilla.suse.com/1220413" source="BUGZILLA"/>
		<reference ref_id="1220439" ref_url="https://bugzilla.suse.com/1220439" source="BUGZILLA"/>
		<reference ref_id="1220443" ref_url="https://bugzilla.suse.com/1220443" source="BUGZILLA"/>
		<reference ref_id="1220445" ref_url="https://bugzilla.suse.com/1220445" source="BUGZILLA"/>
		<reference ref_id="1220466" ref_url="https://bugzilla.suse.com/1220466" source="BUGZILLA"/>
		<reference ref_id="1220478" ref_url="https://bugzilla.suse.com/1220478" source="BUGZILLA"/>
		<reference ref_id="1220482" ref_url="https://bugzilla.suse.com/1220482" source="BUGZILLA"/>
		<reference ref_id="1220484" ref_url="https://bugzilla.suse.com/1220484" source="BUGZILLA"/>
		<reference ref_id="1220486" ref_url="https://bugzilla.suse.com/1220486" source="BUGZILLA"/>
		<reference ref_id="1220487" ref_url="https://bugzilla.suse.com/1220487" source="BUGZILLA"/>
		<reference ref_id="1220790" ref_url="https://bugzilla.suse.com/1220790" source="BUGZILLA"/>
		<reference ref_id="1220831" ref_url="https://bugzilla.suse.com/1220831" source="BUGZILLA"/>
		<reference ref_id="1220833" ref_url="https://bugzilla.suse.com/1220833" source="BUGZILLA"/>
		<reference ref_id="1220836" ref_url="https://bugzilla.suse.com/1220836" source="BUGZILLA"/>
		<reference ref_id="1220839" ref_url="https://bugzilla.suse.com/1220839" source="BUGZILLA"/>
		<reference ref_id="1220840" ref_url="https://bugzilla.suse.com/1220840" source="BUGZILLA"/>
		<reference ref_id="1220843" ref_url="https://bugzilla.suse.com/1220843" source="BUGZILLA"/>
		<reference ref_id="1220870" ref_url="https://bugzilla.suse.com/1220870" source="BUGZILLA"/>
		<reference ref_id="1220871" ref_url="https://bugzilla.suse.com/1220871" source="BUGZILLA"/>
		<reference ref_id="1220872" ref_url="https://bugzilla.suse.com/1220872" source="BUGZILLA"/>
		<reference ref_id="1220878" ref_url="https://bugzilla.suse.com/1220878" source="BUGZILLA"/>
		<reference ref_id="1220879" ref_url="https://bugzilla.suse.com/1220879" source="BUGZILLA"/>
		<reference ref_id="1220885" ref_url="https://bugzilla.suse.com/1220885" source="BUGZILLA"/>
		<reference ref_id="1220898" ref_url="https://bugzilla.suse.com/1220898" source="BUGZILLA"/>
		<reference ref_id="1220918" ref_url="https://bugzilla.suse.com/1220918" source="BUGZILLA"/>
		<reference ref_id="1220920" ref_url="https://bugzilla.suse.com/1220920" source="BUGZILLA"/>
		<reference ref_id="1220921" ref_url="https://bugzilla.suse.com/1220921" source="BUGZILLA"/>
		<reference ref_id="1220926" ref_url="https://bugzilla.suse.com/1220926" source="BUGZILLA"/>
		<reference ref_id="1220927" ref_url="https://bugzilla.suse.com/1220927" source="BUGZILLA"/>
		<reference ref_id="1220929" ref_url="https://bugzilla.suse.com/1220929" source="BUGZILLA"/>
		<reference ref_id="1220932" ref_url="https://bugzilla.suse.com/1220932" source="BUGZILLA"/>
		<reference ref_id="1220938" ref_url="https://bugzilla.suse.com/1220938" source="BUGZILLA"/>
		<reference ref_id="1220940" ref_url="https://bugzilla.suse.com/1220940" source="BUGZILLA"/>
		<reference ref_id="1220954" ref_url="https://bugzilla.suse.com/1220954" source="BUGZILLA"/>
		<reference ref_id="1220955" ref_url="https://bugzilla.suse.com/1220955" source="BUGZILLA"/>
		<reference ref_id="1220959" ref_url="https://bugzilla.suse.com/1220959" source="BUGZILLA"/>
		<reference ref_id="1220960" ref_url="https://bugzilla.suse.com/1220960" source="BUGZILLA"/>
		<reference ref_id="1220961" ref_url="https://bugzilla.suse.com/1220961" source="BUGZILLA"/>
		<reference ref_id="1220965" ref_url="https://bugzilla.suse.com/1220965" source="BUGZILLA"/>
		<reference ref_id="1220969" ref_url="https://bugzilla.suse.com/1220969" source="BUGZILLA"/>
		<reference ref_id="1220978" ref_url="https://bugzilla.suse.com/1220978" source="BUGZILLA"/>
		<reference ref_id="1220979" ref_url="https://bugzilla.suse.com/1220979" source="BUGZILLA"/>
		<reference ref_id="1220981" ref_url="https://bugzilla.suse.com/1220981" source="BUGZILLA"/>
		<reference ref_id="1220982" ref_url="https://bugzilla.suse.com/1220982" source="BUGZILLA"/>
		<reference ref_id="1220983" ref_url="https://bugzilla.suse.com/1220983" source="BUGZILLA"/>
		<reference ref_id="1220985" ref_url="https://bugzilla.suse.com/1220985" source="BUGZILLA"/>
		<reference ref_id="1220986" ref_url="https://bugzilla.suse.com/1220986" source="BUGZILLA"/>
		<reference ref_id="1220987" ref_url="https://bugzilla.suse.com/1220987" source="BUGZILLA"/>
		<reference ref_id="1220989" ref_url="https://bugzilla.suse.com/1220989" source="BUGZILLA"/>
		<reference ref_id="1220990" ref_url="https://bugzilla.suse.com/1220990" source="BUGZILLA"/>
		<reference ref_id="1221009" ref_url="https://bugzilla.suse.com/1221009" source="BUGZILLA"/>
		<reference ref_id="1221012" ref_url="https://bugzilla.suse.com/1221012" source="BUGZILLA"/>
		<reference ref_id="1221015" ref_url="https://bugzilla.suse.com/1221015" source="BUGZILLA"/>
		<reference ref_id="1221022" ref_url="https://bugzilla.suse.com/1221022" source="BUGZILLA"/>
		<reference ref_id="1221039" ref_url="https://bugzilla.suse.com/1221039" source="BUGZILLA"/>
		<reference ref_id="1221040" ref_url="https://bugzilla.suse.com/1221040" source="BUGZILLA"/>
		<reference ref_id="1221048" ref_url="https://bugzilla.suse.com/1221048" source="BUGZILLA"/>
		<reference ref_id="1221055" ref_url="https://bugzilla.suse.com/1221055" source="BUGZILLA"/>
		<reference ref_id="1221058" ref_url="https://bugzilla.suse.com/1221058" source="BUGZILLA"/>
		<reference ref_id="1221077" ref_url="https://bugzilla.suse.com/1221077" source="BUGZILLA"/>
		<reference ref_id="1221276" ref_url="https://bugzilla.suse.com/1221276" source="BUGZILLA"/>
		<reference ref_id="1221551" ref_url="https://bugzilla.suse.com/1221551" source="BUGZILLA"/>
		<reference ref_id="1221553" ref_url="https://bugzilla.suse.com/1221553" source="BUGZILLA"/>
		<reference ref_id="1221725" ref_url="https://bugzilla.suse.com/1221725" source="BUGZILLA"/>
		<reference ref_id="1222073" ref_url="https://bugzilla.suse.com/1222073" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46925" ref_url="https://www.suse.com/security/cve/CVE-2021-46925/" source="CVE"/>
		<reference ref_id="CVE-2021-46926" ref_url="https://www.suse.com/security/cve/CVE-2021-46926/" source="CVE"/>
		<reference ref_id="CVE-2021-46927" ref_url="https://www.suse.com/security/cve/CVE-2021-46927/" source="CVE"/>
		<reference ref_id="CVE-2021-46929" ref_url="https://www.suse.com/security/cve/CVE-2021-46929/" source="CVE"/>
		<reference ref_id="CVE-2021-46930" ref_url="https://www.suse.com/security/cve/CVE-2021-46930/" source="CVE"/>
		<reference ref_id="CVE-2021-46931" ref_url="https://www.suse.com/security/cve/CVE-2021-46931/" source="CVE"/>
		<reference ref_id="CVE-2021-46933" ref_url="https://www.suse.com/security/cve/CVE-2021-46933/" source="CVE"/>
		<reference ref_id="CVE-2021-46936" ref_url="https://www.suse.com/security/cve/CVE-2021-46936/" source="CVE"/>
		<reference ref_id="CVE-2021-47082" ref_url="https://www.suse.com/security/cve/CVE-2021-47082/" source="CVE"/>
		<reference ref_id="CVE-2021-47087" ref_url="https://www.suse.com/security/cve/CVE-2021-47087/" source="CVE"/>
		<reference ref_id="CVE-2021-47091" ref_url="https://www.suse.com/security/cve/CVE-2021-47091/" source="CVE"/>
		<reference ref_id="CVE-2021-47093" ref_url="https://www.suse.com/security/cve/CVE-2021-47093/" source="CVE"/>
		<reference ref_id="CVE-2021-47094" ref_url="https://www.suse.com/security/cve/CVE-2021-47094/" source="CVE"/>
		<reference ref_id="CVE-2021-47095" ref_url="https://www.suse.com/security/cve/CVE-2021-47095/" source="CVE"/>
		<reference ref_id="CVE-2021-47096" ref_url="https://www.suse.com/security/cve/CVE-2021-47096/" source="CVE"/>
		<reference ref_id="CVE-2021-47097" ref_url="https://www.suse.com/security/cve/CVE-2021-47097/" source="CVE"/>
		<reference ref_id="CVE-2021-47098" ref_url="https://www.suse.com/security/cve/CVE-2021-47098/" source="CVE"/>
		<reference ref_id="CVE-2021-47099" ref_url="https://www.suse.com/security/cve/CVE-2021-47099/" source="CVE"/>
		<reference ref_id="CVE-2021-47100" ref_url="https://www.suse.com/security/cve/CVE-2021-47100/" source="CVE"/>
		<reference ref_id="CVE-2021-47101" ref_url="https://www.suse.com/security/cve/CVE-2021-47101/" source="CVE"/>
		<reference ref_id="CVE-2021-47102" ref_url="https://www.suse.com/security/cve/CVE-2021-47102/" source="CVE"/>
		<reference ref_id="CVE-2021-47104" ref_url="https://www.suse.com/security/cve/CVE-2021-47104/" source="CVE"/>
		<reference ref_id="CVE-2021-47105" ref_url="https://www.suse.com/security/cve/CVE-2021-47105/" source="CVE"/>
		<reference ref_id="CVE-2021-47107" ref_url="https://www.suse.com/security/cve/CVE-2021-47107/" source="CVE"/>
		<reference ref_id="CVE-2021-47108" ref_url="https://www.suse.com/security/cve/CVE-2021-47108/" source="CVE"/>
		<reference ref_id="CVE-2022-48626" ref_url="https://www.suse.com/security/cve/CVE-2022-48626/" source="CVE"/>
		<reference ref_id="CVE-2022-48629" ref_url="https://www.suse.com/security/cve/CVE-2022-48629/" source="CVE"/>
		<reference ref_id="CVE-2022-48630" ref_url="https://www.suse.com/security/cve/CVE-2022-48630/" source="CVE"/>
		<reference ref_id="CVE-2023-35827" ref_url="https://www.suse.com/security/cve/CVE-2023-35827/" source="CVE"/>
		<reference ref_id="CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450/" source="CVE"/>
		<reference ref_id="CVE-2023-52454" ref_url="https://www.suse.com/security/cve/CVE-2023-52454/" source="CVE"/>
		<reference ref_id="CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469/" source="CVE"/>
		<reference ref_id="CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470/" source="CVE"/>
		<reference ref_id="CVE-2023-52474" ref_url="https://www.suse.com/security/cve/CVE-2023-52474/" source="CVE"/>
		<reference ref_id="CVE-2023-52477" ref_url="https://www.suse.com/security/cve/CVE-2023-52477/" source="CVE"/>
		<reference ref_id="CVE-2023-52492" ref_url="https://www.suse.com/security/cve/CVE-2023-52492/" source="CVE"/>
		<reference ref_id="CVE-2023-52497" ref_url="https://www.suse.com/security/cve/CVE-2023-52497/" source="CVE"/>
		<reference ref_id="CVE-2023-52501" ref_url="https://www.suse.com/security/cve/CVE-2023-52501/" source="CVE"/>
		<reference ref_id="CVE-2023-52502" ref_url="https://www.suse.com/security/cve/CVE-2023-52502/" source="CVE"/>
		<reference ref_id="CVE-2023-52504" ref_url="https://www.suse.com/security/cve/CVE-2023-52504/" source="CVE"/>
		<reference ref_id="CVE-2023-52507" ref_url="https://www.suse.com/security/cve/CVE-2023-52507/" source="CVE"/>
		<reference ref_id="CVE-2023-52508" ref_url="https://www.suse.com/security/cve/CVE-2023-52508/" source="CVE"/>
		<reference ref_id="CVE-2023-52509" ref_url="https://www.suse.com/security/cve/CVE-2023-52509/" source="CVE"/>
		<reference ref_id="CVE-2023-52510" ref_url="https://www.suse.com/security/cve/CVE-2023-52510/" source="CVE"/>
		<reference ref_id="CVE-2023-52511" ref_url="https://www.suse.com/security/cve/CVE-2023-52511/" source="CVE"/>
		<reference ref_id="CVE-2023-52513" ref_url="https://www.suse.com/security/cve/CVE-2023-52513/" source="CVE"/>
		<reference ref_id="CVE-2023-52515" ref_url="https://www.suse.com/security/cve/CVE-2023-52515/" source="CVE"/>
		<reference ref_id="CVE-2023-52517" ref_url="https://www.suse.com/security/cve/CVE-2023-52517/" source="CVE"/>
		<reference ref_id="CVE-2023-52519" ref_url="https://www.suse.com/security/cve/CVE-2023-52519/" source="CVE"/>
		<reference ref_id="CVE-2023-52520" ref_url="https://www.suse.com/security/cve/CVE-2023-52520/" source="CVE"/>
		<reference ref_id="CVE-2023-52523" ref_url="https://www.suse.com/security/cve/CVE-2023-52523/" source="CVE"/>
		<reference ref_id="CVE-2023-52524" ref_url="https://www.suse.com/security/cve/CVE-2023-52524/" source="CVE"/>
		<reference ref_id="CVE-2023-52525" ref_url="https://www.suse.com/security/cve/CVE-2023-52525/" source="CVE"/>
		<reference ref_id="CVE-2023-52528" ref_url="https://www.suse.com/security/cve/CVE-2023-52528/" source="CVE"/>
		<reference ref_id="CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529/" source="CVE"/>
		<reference ref_id="CVE-2023-52532" ref_url="https://www.suse.com/security/cve/CVE-2023-52532/" source="CVE"/>
		<reference ref_id="CVE-2023-52564" ref_url="https://www.suse.com/security/cve/CVE-2023-52564/" source="CVE"/>
		<reference ref_id="CVE-2023-52566" ref_url="https://www.suse.com/security/cve/CVE-2023-52566/" source="CVE"/>
		<reference ref_id="CVE-2023-52567" ref_url="https://www.suse.com/security/cve/CVE-2023-52567/" source="CVE"/>
		<reference ref_id="CVE-2023-52569" ref_url="https://www.suse.com/security/cve/CVE-2023-52569/" source="CVE"/>
		<reference ref_id="CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574/" source="CVE"/>
		<reference ref_id="CVE-2023-52575" ref_url="https://www.suse.com/security/cve/CVE-2023-52575/" source="CVE"/>
		<reference ref_id="CVE-2023-52576" ref_url="https://www.suse.com/security/cve/CVE-2023-52576/" source="CVE"/>
		<reference ref_id="CVE-2023-52582" ref_url="https://www.suse.com/security/cve/CVE-2023-52582/" source="CVE"/>
		<reference ref_id="CVE-2023-52583" ref_url="https://www.suse.com/security/cve/CVE-2023-52583/" source="CVE"/>
		<reference ref_id="CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597/" source="CVE"/>
		<reference ref_id="CVE-2023-52605" ref_url="https://www.suse.com/security/cve/CVE-2023-52605/" source="CVE"/>
		<reference ref_id="CVE-2023-52621" ref_url="https://www.suse.com/security/cve/CVE-2023-52621/" source="CVE"/>
		<reference ref_id="CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742/" source="CVE"/>
		<reference ref_id="CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
- CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-acpi (bsc#1220478).
- CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use get_user_pages_unlocked() (bsc#1220443).
- CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump() (bsc#1220482).
- CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).
- CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq() (bsc#1220486).
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
- CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).
- CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).
- CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path (bsc#1220959).
- CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core (bsc#1220978).
- CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).
- CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).
- CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi (bsc#1220981).
- CVE-2021-47097: Fixed stack out of bound access in elantech_change_report_id() (bsc#1220982).
- CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations hwmon: (lm90) (bsc#1220983).
- CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are cloned (bsc#1220955).
- CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
- CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
- CVE-2021-47102: Fixed incorrect structure access In line: upper = info-&gt;upper_dev in net/marvell/prestera (bsc#1221009).
- CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).
- CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).
- CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).
- CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in drm/mediatek (bsc#1220986).
- CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366).
- CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).
- CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in crypto: qcom-rng (bsc#1220990).
- CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514).
- CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology() (bsc#1220237).
- CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320).
- CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411).
- CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).
- CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445).
- CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790).
- CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration function __dma_async_device_channel_register() (bsc#1221276).
- CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).
- CVE-2023-52501: Fixed possible memory corruption in ring-buffer (bsc#1220885).
- CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220831).
- CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a 5-level paging machine (bsc#1221553).
- CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
- CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid() (bsc#1221015).
- CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836).
- CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).
- CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).
- CVE-2023-52513: Fixed connection failure handling  in RDMA/siw (bsc#1221022).
- CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
- CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO drain in spi/sun6i (bsc#1221055).
- CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc (bsc#1220920).
- CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi (bsc#1220921).
- CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf (bsc#1220926).
- CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
- CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet() (bsc#1220840).
- CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843).
- CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).
- CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
- CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux() (bsc#1220938).
- CVE-2023-52566: Fixed potential use after free in nilfs_gccache_submit_read_data() (bsc#1220940).
- CVE-2023-52567: Fixed possible Oops in  serial/8250_port: when using IRQ polling (irq = 0) (bsc#1220839).
- CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to insert delayed dir index item (bsc#1220918).
- CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
- CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871).
- CVE-2023-52576: Fixed potential use after free in memblock_isolate_range() (bsc#1220872).
- CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).
- CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058).
- CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
- CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
- CVE-2023-52621: Fixed missing asserion in bpf (bsc#1222073).
- CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725).
- CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2 (bsc#1220340).

The following non-security bugs were fixed:

- doc/README.SUSE: Update information about module support status (jsc#PED-5759)
- group-source-files.pl: Quote filenames (boo#1221077).
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212514">SUSE bug 1212514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220237">SUSE bug 1220237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220320">SUSE bug 1220320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220340">SUSE bug 1220340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220366">SUSE bug 1220366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220411">SUSE bug 1220411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220413">SUSE bug 1220413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220439">SUSE bug 1220439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220443">SUSE bug 1220443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220445">SUSE bug 1220445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220466">SUSE bug 1220466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220478">SUSE bug 1220478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220482">SUSE bug 1220482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220484">SUSE bug 1220484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220486">SUSE bug 1220486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220487">SUSE bug 1220487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220790">SUSE bug 1220790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220831">SUSE bug 1220831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220833">SUSE bug 1220833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220836">SUSE bug 1220836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220839">SUSE bug 1220839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220840">SUSE bug 1220840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220843">SUSE bug 1220843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220870">SUSE bug 1220870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220871">SUSE bug 1220871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220872">SUSE bug 1220872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220878">SUSE bug 1220878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220879">SUSE bug 1220879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220885">SUSE bug 1220885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220898">SUSE bug 1220898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220918">SUSE bug 1220918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220920">SUSE bug 1220920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220921">SUSE bug 1220921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220926">SUSE bug 1220926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220927">SUSE bug 1220927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220929">SUSE bug 1220929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220932">SUSE bug 1220932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220938">SUSE bug 1220938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220940">SUSE bug 1220940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220954">SUSE bug 1220954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220955">SUSE bug 1220955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220959">SUSE bug 1220959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220960">SUSE bug 1220960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220961">SUSE bug 1220961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220965">SUSE bug 1220965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220969">SUSE bug 1220969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220978">SUSE bug 1220978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220979">SUSE bug 1220979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220981">SUSE bug 1220981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220982">SUSE bug 1220982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220983">SUSE bug 1220983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220985">SUSE bug 1220985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220986">SUSE bug 1220986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220987">SUSE bug 1220987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220989">SUSE bug 1220989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220990">SUSE bug 1220990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221009">SUSE bug 1221009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221012">SUSE bug 1221012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221015">SUSE bug 1221015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221022">SUSE bug 1221022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221039">SUSE bug 1221039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221040">SUSE bug 1221040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221048">SUSE bug 1221048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221055">SUSE bug 1221055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221058">SUSE bug 1221058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221077">SUSE bug 1221077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221276">SUSE bug 1221276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221551">SUSE bug 1221551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221553">SUSE bug 1221553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222073">SUSE bug 1222073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46925/">CVE-2021-46925 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46925">CVE-2021-46925 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46926/">CVE-2021-46926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46926">CVE-2021-46926 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46927/">CVE-2021-46927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46927">CVE-2021-46927 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46929/">CVE-2021-46929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46929">CVE-2021-46929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46930/">CVE-2021-46930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46930">CVE-2021-46930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46931/">CVE-2021-46931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46931">CVE-2021-46931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46933/">CVE-2021-46933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46933">CVE-2021-46933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46936/">CVE-2021-46936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">CVE-2021-46936 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47082/">CVE-2021-47082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47082">CVE-2021-47082 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47087/">CVE-2021-47087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47087">CVE-2021-47087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47091/">CVE-2021-47091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47091">CVE-2021-47091 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47093/">CVE-2021-47093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47093">CVE-2021-47093 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47094/">CVE-2021-47094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47094">CVE-2021-47094 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47095/">CVE-2021-47095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47095">CVE-2021-47095 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47096/">CVE-2021-47096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47096">CVE-2021-47096 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47097/">CVE-2021-47097 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47097">CVE-2021-47097 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47098/">CVE-2021-47098 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47098">CVE-2021-47098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47099/">CVE-2021-47099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47099">CVE-2021-47099 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47100/">CVE-2021-47100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47100">CVE-2021-47100 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47101/">CVE-2021-47101 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47101">CVE-2021-47101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47102/">CVE-2021-47102 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47102">CVE-2021-47102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47104/">CVE-2021-47104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47104">CVE-2021-47104 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47105/">CVE-2021-47105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47105">CVE-2021-47105 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47107/">CVE-2021-47107 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47107">CVE-2021-47107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47108/">CVE-2021-47108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47108">CVE-2021-47108 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48626/">CVE-2022-48626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48626">CVE-2022-48626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48629/">CVE-2022-48629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48629">CVE-2022-48629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48630/">CVE-2022-48630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48630">CVE-2022-48630 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35827/">CVE-2023-35827 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52454/">CVE-2023-52454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52454">CVE-2023-52454 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52474/">CVE-2023-52474 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52474">CVE-2023-52474 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52477/">CVE-2023-52477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52492/">CVE-2023-52492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52497/">CVE-2023-52497 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52501/">CVE-2023-52501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52501">CVE-2023-52501 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52502/">CVE-2023-52502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52502">CVE-2023-52502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52504/">CVE-2023-52504 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52504">CVE-2023-52504 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52507/">CVE-2023-52507 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52507">CVE-2023-52507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52508/">CVE-2023-52508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52508">CVE-2023-52508 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52509/">CVE-2023-52509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52509">CVE-2023-52509 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52510/">CVE-2023-52510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52510">CVE-2023-52510 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52511/">CVE-2023-52511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52511">CVE-2023-52511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52513/">CVE-2023-52513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52515/">CVE-2023-52515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52515">CVE-2023-52515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52517/">CVE-2023-52517 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52517">CVE-2023-52517 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52519/">CVE-2023-52519 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52519">CVE-2023-52519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52520/">CVE-2023-52520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52523/">CVE-2023-52523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52523">CVE-2023-52523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52524/">CVE-2023-52524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52524">CVE-2023-52524 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52525/">CVE-2023-52525 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52525">CVE-2023-52525 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52528/">CVE-2023-52528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52532/">CVE-2023-52532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52532">CVE-2023-52532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52564/">CVE-2023-52564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52564">CVE-2023-52564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52566/">CVE-2023-52566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52566">CVE-2023-52566 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52567/">CVE-2023-52567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52567">CVE-2023-52567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52569/">CVE-2023-52569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52569">CVE-2023-52569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52575/">CVE-2023-52575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52575">CVE-2023-52575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52576/">CVE-2023-52576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52576">CVE-2023-52576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52582/">CVE-2023-52582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52582">CVE-2023-52582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52583/">CVE-2023-52583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52605/">CVE-2023-52605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52605">CVE-2023-52605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52621/">CVE-2023-52621 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52621">CVE-2023-52621 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855248" comment="kernel-rt-5.14.21-150400.15.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855249" comment="kernel-source-rt-5.14.21-150400.15.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206131" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1200599" ref_url="https://bugzilla.suse.com/1200599" source="BUGZILLA"/>
		<reference ref_id="1209635" ref_url="https://bugzilla.suse.com/1209635" source="BUGZILLA"/>
		<reference ref_id="1212514" ref_url="https://bugzilla.suse.com/1212514" source="BUGZILLA"/>
		<reference ref_id="1213456" ref_url="https://bugzilla.suse.com/1213456" source="BUGZILLA"/>
		<reference ref_id="1217987" ref_url="https://bugzilla.suse.com/1217987" source="BUGZILLA"/>
		<reference ref_id="1217988" ref_url="https://bugzilla.suse.com/1217988" source="BUGZILLA"/>
		<reference ref_id="1217989" ref_url="https://bugzilla.suse.com/1217989" source="BUGZILLA"/>
		<reference ref_id="1220237" ref_url="https://bugzilla.suse.com/1220237" source="BUGZILLA"/>
		<reference ref_id="1220251" ref_url="https://bugzilla.suse.com/1220251" source="BUGZILLA"/>
		<reference ref_id="1220320" ref_url="https://bugzilla.suse.com/1220320" source="BUGZILLA"/>
		<reference ref_id="1220340" ref_url="https://bugzilla.suse.com/1220340" source="BUGZILLA"/>
		<reference ref_id="1220366" ref_url="https://bugzilla.suse.com/1220366" source="BUGZILLA"/>
		<reference ref_id="1220411" ref_url="https://bugzilla.suse.com/1220411" source="BUGZILLA"/>
		<reference ref_id="1220413" ref_url="https://bugzilla.suse.com/1220413" source="BUGZILLA"/>
		<reference ref_id="1220439" ref_url="https://bugzilla.suse.com/1220439" source="BUGZILLA"/>
		<reference ref_id="1220443" ref_url="https://bugzilla.suse.com/1220443" source="BUGZILLA"/>
		<reference ref_id="1220445" ref_url="https://bugzilla.suse.com/1220445" source="BUGZILLA"/>
		<reference ref_id="1220466" ref_url="https://bugzilla.suse.com/1220466" source="BUGZILLA"/>
		<reference ref_id="1220478" ref_url="https://bugzilla.suse.com/1220478" source="BUGZILLA"/>
		<reference ref_id="1220482" ref_url="https://bugzilla.suse.com/1220482" source="BUGZILLA"/>
		<reference ref_id="1220484" ref_url="https://bugzilla.suse.com/1220484" source="BUGZILLA"/>
		<reference ref_id="1220486" ref_url="https://bugzilla.suse.com/1220486" source="BUGZILLA"/>
		<reference ref_id="1220487" ref_url="https://bugzilla.suse.com/1220487" source="BUGZILLA"/>
		<reference ref_id="1220790" ref_url="https://bugzilla.suse.com/1220790" source="BUGZILLA"/>
		<reference ref_id="1220831" ref_url="https://bugzilla.suse.com/1220831" source="BUGZILLA"/>
		<reference ref_id="1220833" ref_url="https://bugzilla.suse.com/1220833" source="BUGZILLA"/>
		<reference ref_id="1220836" ref_url="https://bugzilla.suse.com/1220836" source="BUGZILLA"/>
		<reference ref_id="1220839" ref_url="https://bugzilla.suse.com/1220839" source="BUGZILLA"/>
		<reference ref_id="1220840" ref_url="https://bugzilla.suse.com/1220840" source="BUGZILLA"/>
		<reference ref_id="1220843" ref_url="https://bugzilla.suse.com/1220843" source="BUGZILLA"/>
		<reference ref_id="1220870" ref_url="https://bugzilla.suse.com/1220870" source="BUGZILLA"/>
		<reference ref_id="1220871" ref_url="https://bugzilla.suse.com/1220871" source="BUGZILLA"/>
		<reference ref_id="1220872" ref_url="https://bugzilla.suse.com/1220872" source="BUGZILLA"/>
		<reference ref_id="1220878" ref_url="https://bugzilla.suse.com/1220878" source="BUGZILLA"/>
		<reference ref_id="1220879" ref_url="https://bugzilla.suse.com/1220879" source="BUGZILLA"/>
		<reference ref_id="1220885" ref_url="https://bugzilla.suse.com/1220885" source="BUGZILLA"/>
		<reference ref_id="1220898" ref_url="https://bugzilla.suse.com/1220898" source="BUGZILLA"/>
		<reference ref_id="1220918" ref_url="https://bugzilla.suse.com/1220918" source="BUGZILLA"/>
		<reference ref_id="1220920" ref_url="https://bugzilla.suse.com/1220920" source="BUGZILLA"/>
		<reference ref_id="1220921" ref_url="https://bugzilla.suse.com/1220921" source="BUGZILLA"/>
		<reference ref_id="1220926" ref_url="https://bugzilla.suse.com/1220926" source="BUGZILLA"/>
		<reference ref_id="1220927" ref_url="https://bugzilla.suse.com/1220927" source="BUGZILLA"/>
		<reference ref_id="1220929" ref_url="https://bugzilla.suse.com/1220929" source="BUGZILLA"/>
		<reference ref_id="1220932" ref_url="https://bugzilla.suse.com/1220932" source="BUGZILLA"/>
		<reference ref_id="1220938" ref_url="https://bugzilla.suse.com/1220938" source="BUGZILLA"/>
		<reference ref_id="1220940" ref_url="https://bugzilla.suse.com/1220940" source="BUGZILLA"/>
		<reference ref_id="1220954" ref_url="https://bugzilla.suse.com/1220954" source="BUGZILLA"/>
		<reference ref_id="1220955" ref_url="https://bugzilla.suse.com/1220955" source="BUGZILLA"/>
		<reference ref_id="1220959" ref_url="https://bugzilla.suse.com/1220959" source="BUGZILLA"/>
		<reference ref_id="1220960" ref_url="https://bugzilla.suse.com/1220960" source="BUGZILLA"/>
		<reference ref_id="1220961" ref_url="https://bugzilla.suse.com/1220961" source="BUGZILLA"/>
		<reference ref_id="1220965" ref_url="https://bugzilla.suse.com/1220965" source="BUGZILLA"/>
		<reference ref_id="1220969" ref_url="https://bugzilla.suse.com/1220969" source="BUGZILLA"/>
		<reference ref_id="1220978" ref_url="https://bugzilla.suse.com/1220978" source="BUGZILLA"/>
		<reference ref_id="1220979" ref_url="https://bugzilla.suse.com/1220979" source="BUGZILLA"/>
		<reference ref_id="1220981" ref_url="https://bugzilla.suse.com/1220981" source="BUGZILLA"/>
		<reference ref_id="1220982" ref_url="https://bugzilla.suse.com/1220982" source="BUGZILLA"/>
		<reference ref_id="1220983" ref_url="https://bugzilla.suse.com/1220983" source="BUGZILLA"/>
		<reference ref_id="1220985" ref_url="https://bugzilla.suse.com/1220985" source="BUGZILLA"/>
		<reference ref_id="1220986" ref_url="https://bugzilla.suse.com/1220986" source="BUGZILLA"/>
		<reference ref_id="1220987" ref_url="https://bugzilla.suse.com/1220987" source="BUGZILLA"/>
		<reference ref_id="1220989" ref_url="https://bugzilla.suse.com/1220989" source="BUGZILLA"/>
		<reference ref_id="1220990" ref_url="https://bugzilla.suse.com/1220990" source="BUGZILLA"/>
		<reference ref_id="1221009" ref_url="https://bugzilla.suse.com/1221009" source="BUGZILLA"/>
		<reference ref_id="1221012" ref_url="https://bugzilla.suse.com/1221012" source="BUGZILLA"/>
		<reference ref_id="1221015" ref_url="https://bugzilla.suse.com/1221015" source="BUGZILLA"/>
		<reference ref_id="1221022" ref_url="https://bugzilla.suse.com/1221022" source="BUGZILLA"/>
		<reference ref_id="1221039" ref_url="https://bugzilla.suse.com/1221039" source="BUGZILLA"/>
		<reference ref_id="1221040" ref_url="https://bugzilla.suse.com/1221040" source="BUGZILLA"/>
		<reference ref_id="1221048" ref_url="https://bugzilla.suse.com/1221048" source="BUGZILLA"/>
		<reference ref_id="1221055" ref_url="https://bugzilla.suse.com/1221055" source="BUGZILLA"/>
		<reference ref_id="1221058" ref_url="https://bugzilla.suse.com/1221058" source="BUGZILLA"/>
		<reference ref_id="1221077" ref_url="https://bugzilla.suse.com/1221077" source="BUGZILLA"/>
		<reference ref_id="1221276" ref_url="https://bugzilla.suse.com/1221276" source="BUGZILLA"/>
		<reference ref_id="1221551" ref_url="https://bugzilla.suse.com/1221551" source="BUGZILLA"/>
		<reference ref_id="1221553" ref_url="https://bugzilla.suse.com/1221553" source="BUGZILLA"/>
		<reference ref_id="1221725" ref_url="https://bugzilla.suse.com/1221725" source="BUGZILLA"/>
		<reference ref_id="1222073" ref_url="https://bugzilla.suse.com/1222073" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46925" ref_url="https://www.suse.com/security/cve/CVE-2021-46925/" source="CVE"/>
		<reference ref_id="CVE-2021-46926" ref_url="https://www.suse.com/security/cve/CVE-2021-46926/" source="CVE"/>
		<reference ref_id="CVE-2021-46927" ref_url="https://www.suse.com/security/cve/CVE-2021-46927/" source="CVE"/>
		<reference ref_id="CVE-2021-46929" ref_url="https://www.suse.com/security/cve/CVE-2021-46929/" source="CVE"/>
		<reference ref_id="CVE-2021-46930" ref_url="https://www.suse.com/security/cve/CVE-2021-46930/" source="CVE"/>
		<reference ref_id="CVE-2021-46931" ref_url="https://www.suse.com/security/cve/CVE-2021-46931/" source="CVE"/>
		<reference ref_id="CVE-2021-46933" ref_url="https://www.suse.com/security/cve/CVE-2021-46933/" source="CVE"/>
		<reference ref_id="CVE-2021-46936" ref_url="https://www.suse.com/security/cve/CVE-2021-46936/" source="CVE"/>
		<reference ref_id="CVE-2021-47082" ref_url="https://www.suse.com/security/cve/CVE-2021-47082/" source="CVE"/>
		<reference ref_id="CVE-2021-47087" ref_url="https://www.suse.com/security/cve/CVE-2021-47087/" source="CVE"/>
		<reference ref_id="CVE-2021-47091" ref_url="https://www.suse.com/security/cve/CVE-2021-47091/" source="CVE"/>
		<reference ref_id="CVE-2021-47093" ref_url="https://www.suse.com/security/cve/CVE-2021-47093/" source="CVE"/>
		<reference ref_id="CVE-2021-47094" ref_url="https://www.suse.com/security/cve/CVE-2021-47094/" source="CVE"/>
		<reference ref_id="CVE-2021-47095" ref_url="https://www.suse.com/security/cve/CVE-2021-47095/" source="CVE"/>
		<reference ref_id="CVE-2021-47096" ref_url="https://www.suse.com/security/cve/CVE-2021-47096/" source="CVE"/>
		<reference ref_id="CVE-2021-47097" ref_url="https://www.suse.com/security/cve/CVE-2021-47097/" source="CVE"/>
		<reference ref_id="CVE-2021-47098" ref_url="https://www.suse.com/security/cve/CVE-2021-47098/" source="CVE"/>
		<reference ref_id="CVE-2021-47099" ref_url="https://www.suse.com/security/cve/CVE-2021-47099/" source="CVE"/>
		<reference ref_id="CVE-2021-47100" ref_url="https://www.suse.com/security/cve/CVE-2021-47100/" source="CVE"/>
		<reference ref_id="CVE-2021-47101" ref_url="https://www.suse.com/security/cve/CVE-2021-47101/" source="CVE"/>
		<reference ref_id="CVE-2021-47102" ref_url="https://www.suse.com/security/cve/CVE-2021-47102/" source="CVE"/>
		<reference ref_id="CVE-2021-47104" ref_url="https://www.suse.com/security/cve/CVE-2021-47104/" source="CVE"/>
		<reference ref_id="CVE-2021-47105" ref_url="https://www.suse.com/security/cve/CVE-2021-47105/" source="CVE"/>
		<reference ref_id="CVE-2021-47107" ref_url="https://www.suse.com/security/cve/CVE-2021-47107/" source="CVE"/>
		<reference ref_id="CVE-2021-47108" ref_url="https://www.suse.com/security/cve/CVE-2021-47108/" source="CVE"/>
		<reference ref_id="CVE-2022-20154" ref_url="https://www.suse.com/security/cve/CVE-2022-20154/" source="CVE"/>
		<reference ref_id="CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744/" source="CVE"/>
		<reference ref_id="CVE-2022-48626" ref_url="https://www.suse.com/security/cve/CVE-2022-48626/" source="CVE"/>
		<reference ref_id="CVE-2022-48629" ref_url="https://www.suse.com/security/cve/CVE-2022-48629/" source="CVE"/>
		<reference ref_id="CVE-2022-48630" ref_url="https://www.suse.com/security/cve/CVE-2022-48630/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-35827" ref_url="https://www.suse.com/security/cve/CVE-2023-35827/" source="CVE"/>
		<reference ref_id="CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447/" source="CVE"/>
		<reference ref_id="CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450/" source="CVE"/>
		<reference ref_id="CVE-2023-52454" ref_url="https://www.suse.com/security/cve/CVE-2023-52454/" source="CVE"/>
		<reference ref_id="CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469/" source="CVE"/>
		<reference ref_id="CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470/" source="CVE"/>
		<reference ref_id="CVE-2023-52474" ref_url="https://www.suse.com/security/cve/CVE-2023-52474/" source="CVE"/>
		<reference ref_id="CVE-2023-52477" ref_url="https://www.suse.com/security/cve/CVE-2023-52477/" source="CVE"/>
		<reference ref_id="CVE-2023-52492" ref_url="https://www.suse.com/security/cve/CVE-2023-52492/" source="CVE"/>
		<reference ref_id="CVE-2023-52497" ref_url="https://www.suse.com/security/cve/CVE-2023-52497/" source="CVE"/>
		<reference ref_id="CVE-2023-52501" ref_url="https://www.suse.com/security/cve/CVE-2023-52501/" source="CVE"/>
		<reference ref_id="CVE-2023-52502" ref_url="https://www.suse.com/security/cve/CVE-2023-52502/" source="CVE"/>
		<reference ref_id="CVE-2023-52504" ref_url="https://www.suse.com/security/cve/CVE-2023-52504/" source="CVE"/>
		<reference ref_id="CVE-2023-52507" ref_url="https://www.suse.com/security/cve/CVE-2023-52507/" source="CVE"/>
		<reference ref_id="CVE-2023-52508" ref_url="https://www.suse.com/security/cve/CVE-2023-52508/" source="CVE"/>
		<reference ref_id="CVE-2023-52509" ref_url="https://www.suse.com/security/cve/CVE-2023-52509/" source="CVE"/>
		<reference ref_id="CVE-2023-52510" ref_url="https://www.suse.com/security/cve/CVE-2023-52510/" source="CVE"/>
		<reference ref_id="CVE-2023-52511" ref_url="https://www.suse.com/security/cve/CVE-2023-52511/" source="CVE"/>
		<reference ref_id="CVE-2023-52513" ref_url="https://www.suse.com/security/cve/CVE-2023-52513/" source="CVE"/>
		<reference ref_id="CVE-2023-52515" ref_url="https://www.suse.com/security/cve/CVE-2023-52515/" source="CVE"/>
		<reference ref_id="CVE-2023-52517" ref_url="https://www.suse.com/security/cve/CVE-2023-52517/" source="CVE"/>
		<reference ref_id="CVE-2023-52519" ref_url="https://www.suse.com/security/cve/CVE-2023-52519/" source="CVE"/>
		<reference ref_id="CVE-2023-52520" ref_url="https://www.suse.com/security/cve/CVE-2023-52520/" source="CVE"/>
		<reference ref_id="CVE-2023-52523" ref_url="https://www.suse.com/security/cve/CVE-2023-52523/" source="CVE"/>
		<reference ref_id="CVE-2023-52524" ref_url="https://www.suse.com/security/cve/CVE-2023-52524/" source="CVE"/>
		<reference ref_id="CVE-2023-52525" ref_url="https://www.suse.com/security/cve/CVE-2023-52525/" source="CVE"/>
		<reference ref_id="CVE-2023-52528" ref_url="https://www.suse.com/security/cve/CVE-2023-52528/" source="CVE"/>
		<reference ref_id="CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529/" source="CVE"/>
		<reference ref_id="CVE-2023-52532" ref_url="https://www.suse.com/security/cve/CVE-2023-52532/" source="CVE"/>
		<reference ref_id="CVE-2023-52564" ref_url="https://www.suse.com/security/cve/CVE-2023-52564/" source="CVE"/>
		<reference ref_id="CVE-2023-52566" ref_url="https://www.suse.com/security/cve/CVE-2023-52566/" source="CVE"/>
		<reference ref_id="CVE-2023-52567" ref_url="https://www.suse.com/security/cve/CVE-2023-52567/" source="CVE"/>
		<reference ref_id="CVE-2023-52569" ref_url="https://www.suse.com/security/cve/CVE-2023-52569/" source="CVE"/>
		<reference ref_id="CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574/" source="CVE"/>
		<reference ref_id="CVE-2023-52575" ref_url="https://www.suse.com/security/cve/CVE-2023-52575/" source="CVE"/>
		<reference ref_id="CVE-2023-52576" ref_url="https://www.suse.com/security/cve/CVE-2023-52576/" source="CVE"/>
		<reference ref_id="CVE-2023-52582" ref_url="https://www.suse.com/security/cve/CVE-2023-52582/" source="CVE"/>
		<reference ref_id="CVE-2023-52583" ref_url="https://www.suse.com/security/cve/CVE-2023-52583/" source="CVE"/>
		<reference ref_id="CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597/" source="CVE"/>
		<reference ref_id="CVE-2023-52605" ref_url="https://www.suse.com/security/cve/CVE-2023-52605/" source="CVE"/>
		<reference ref_id="CVE-2023-52621" ref_url="https://www.suse.com/security/cve/CVE-2023-52621/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742/" source="CVE"/>
		<reference ref_id="CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725).
- CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc (bsc#1220920).
- CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).
- CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445).
- CVE-2023-52513: Fixed connection failure handling  in RDMA/siw (bsc#1221022).
- CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
- CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux() (bsc#1220938).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround  (bsc#1220251).
- CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).
- CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
- CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843).
- CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
- CVE-2023-52566: Fixed potential use after free in nilfs_gccache_submit_read_data() (bsc#1220940).
- CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid() (bsc#1221015).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320).
- CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi (bsc#1220921).
- CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514).
- CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836).
- CVE-2023-52501: Fixed possible memory corruption in ring-buffer (bsc#1220885).
- CVE-2023-52567: Fixed possible Oops in  serial/8250_port: when using IRQ polling (irq = 0) (bsc#1220839).
- CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO drain in spi/sun6i (bsc#1221055).
- CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).
- CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet() (bsc#1220840).
- CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a 5-level paging machine (bsc#1221553).
- CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871).
- CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366).
- CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).
- CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in crypto: qcom-rng (bsc#1220990).
- CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-acpi (bsc#1220478).
- CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi (bsc#1220981).
- CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).
- CVE-2021-47097: Fixed stack out of bound access in elantech_change_report_id() (bsc#1220982).
- CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).
- CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).
- CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
- CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in drm/mediatek (bsc#1220986).
- CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations hwmon: (lm90) (bsc#1220983).
- CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
- CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).
- CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path (bsc#1220959).
- CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
- CVE-2021-47102: Fixed incorrect structure access In line: upper = info-&gt;upper_dev in net/marvell/prestera (bsc#1221009).
- CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
- CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use get_user_pages_unlocked() (bsc#1220443).
- CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core (bsc#1220978).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
- CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump() (bsc#1220482).
- CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).
- CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are cloned (bsc#1220955).
- CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration function __dma_async_device_channel_register() (bsc#1221276).
- CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology() (bsc#1220237).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058).
- CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).
- CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790).
- CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).
- CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411).
- CVE-2023-52576: Fixed potential use after free in memblock_isolate_range() (bsc#1220872).
- CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2 (bsc#1220340).
- CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).
- CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
- CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to insert delayed dir index item (bsc#1220918).
- CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220831).
- CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
- CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
- CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf (bsc#1220926).
- CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).
- CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
- CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq() (bsc#1220486).

The following non-security bugs were fixed:

- doc/README.SUSE: Update information about module support status (jsc#PED-5759)
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-04-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200599">SUSE bug 1200599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212514">SUSE bug 1212514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220237">SUSE bug 1220237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220320">SUSE bug 1220320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220340">SUSE bug 1220340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220366">SUSE bug 1220366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220411">SUSE bug 1220411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220413">SUSE bug 1220413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220439">SUSE bug 1220439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220443">SUSE bug 1220443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220445">SUSE bug 1220445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220466">SUSE bug 1220466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220478">SUSE bug 1220478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220482">SUSE bug 1220482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220484">SUSE bug 1220484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220486">SUSE bug 1220486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220487">SUSE bug 1220487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220790">SUSE bug 1220790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220831">SUSE bug 1220831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220833">SUSE bug 1220833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220836">SUSE bug 1220836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220839">SUSE bug 1220839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220840">SUSE bug 1220840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220843">SUSE bug 1220843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220870">SUSE bug 1220870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220871">SUSE bug 1220871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220872">SUSE bug 1220872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220878">SUSE bug 1220878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220879">SUSE bug 1220879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220885">SUSE bug 1220885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220898">SUSE bug 1220898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220918">SUSE bug 1220918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220920">SUSE bug 1220920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220921">SUSE bug 1220921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220926">SUSE bug 1220926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220927">SUSE bug 1220927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220929">SUSE bug 1220929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220932">SUSE bug 1220932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220938">SUSE bug 1220938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220940">SUSE bug 1220940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220954">SUSE bug 1220954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220955">SUSE bug 1220955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220959">SUSE bug 1220959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220960">SUSE bug 1220960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220961">SUSE bug 1220961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220965">SUSE bug 1220965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220969">SUSE bug 1220969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220978">SUSE bug 1220978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220979">SUSE bug 1220979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220981">SUSE bug 1220981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220982">SUSE bug 1220982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220983">SUSE bug 1220983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220985">SUSE bug 1220985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220986">SUSE bug 1220986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220987">SUSE bug 1220987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220989">SUSE bug 1220989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220990">SUSE bug 1220990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221009">SUSE bug 1221009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221012">SUSE bug 1221012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221015">SUSE bug 1221015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221022">SUSE bug 1221022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221039">SUSE bug 1221039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221040">SUSE bug 1221040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221048">SUSE bug 1221048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221055">SUSE bug 1221055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221058">SUSE bug 1221058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221077">SUSE bug 1221077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221276">SUSE bug 1221276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221551">SUSE bug 1221551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221553">SUSE bug 1221553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222073">SUSE bug 1222073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46925/">CVE-2021-46925 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46925">CVE-2021-46925 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46926/">CVE-2021-46926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46926">CVE-2021-46926 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46927/">CVE-2021-46927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46927">CVE-2021-46927 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46929/">CVE-2021-46929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46929">CVE-2021-46929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46930/">CVE-2021-46930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46930">CVE-2021-46930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46931/">CVE-2021-46931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46931">CVE-2021-46931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46933/">CVE-2021-46933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46933">CVE-2021-46933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46936/">CVE-2021-46936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">CVE-2021-46936 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47082/">CVE-2021-47082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47082">CVE-2021-47082 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47087/">CVE-2021-47087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47087">CVE-2021-47087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47091/">CVE-2021-47091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47091">CVE-2021-47091 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47093/">CVE-2021-47093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47093">CVE-2021-47093 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47094/">CVE-2021-47094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47094">CVE-2021-47094 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47095/">CVE-2021-47095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47095">CVE-2021-47095 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47096/">CVE-2021-47096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47096">CVE-2021-47096 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47097/">CVE-2021-47097 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47097">CVE-2021-47097 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47098/">CVE-2021-47098 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47098">CVE-2021-47098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47099/">CVE-2021-47099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47099">CVE-2021-47099 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47100/">CVE-2021-47100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47100">CVE-2021-47100 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47101/">CVE-2021-47101 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47101">CVE-2021-47101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47102/">CVE-2021-47102 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47102">CVE-2021-47102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47104/">CVE-2021-47104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47104">CVE-2021-47104 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47105/">CVE-2021-47105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47105">CVE-2021-47105 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47107/">CVE-2021-47107 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47107">CVE-2021-47107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47108/">CVE-2021-47108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47108">CVE-2021-47108 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20154/">CVE-2022-20154 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20154">CVE-2022-20154 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48626/">CVE-2022-48626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48626">CVE-2022-48626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48629/">CVE-2022-48629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48629">CVE-2022-48629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48630/">CVE-2022-48630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48630">CVE-2022-48630 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35827/">CVE-2023-35827 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52454/">CVE-2023-52454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52454">CVE-2023-52454 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52474/">CVE-2023-52474 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52474">CVE-2023-52474 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52477/">CVE-2023-52477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52492/">CVE-2023-52492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52497/">CVE-2023-52497 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52501/">CVE-2023-52501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52501">CVE-2023-52501 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52502/">CVE-2023-52502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52502">CVE-2023-52502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52504/">CVE-2023-52504 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52504">CVE-2023-52504 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52507/">CVE-2023-52507 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52507">CVE-2023-52507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52508/">CVE-2023-52508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52508">CVE-2023-52508 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52509/">CVE-2023-52509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52509">CVE-2023-52509 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52510/">CVE-2023-52510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52510">CVE-2023-52510 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52511/">CVE-2023-52511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52511">CVE-2023-52511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52513/">CVE-2023-52513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52515/">CVE-2023-52515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52515">CVE-2023-52515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52517/">CVE-2023-52517 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52517">CVE-2023-52517 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52519/">CVE-2023-52519 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52519">CVE-2023-52519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52520/">CVE-2023-52520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52523/">CVE-2023-52523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52523">CVE-2023-52523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52524/">CVE-2023-52524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52524">CVE-2023-52524 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52525/">CVE-2023-52525 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52525">CVE-2023-52525 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52528/">CVE-2023-52528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52532/">CVE-2023-52532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52532">CVE-2023-52532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52564/">CVE-2023-52564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52564">CVE-2023-52564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52566/">CVE-2023-52566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52566">CVE-2023-52566 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52567/">CVE-2023-52567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52567">CVE-2023-52567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52569/">CVE-2023-52569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52569">CVE-2023-52569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52575/">CVE-2023-52575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52575">CVE-2023-52575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52576/">CVE-2023-52576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52576">CVE-2023-52576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52582/">CVE-2023-52582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52582">CVE-2023-52582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52583/">CVE-2023-52583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52605/">CVE-2023-52605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52605">CVE-2023-52605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52621/">CVE-2023-52621 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52621">CVE-2023-52621 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855250" comment="kernel-default-5.14.21-150400.24.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855166" comment="kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206132" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1217000" ref_url="https://bugzilla.suse.com/1217000" source="BUGZILLA"/>
		<reference ref_id="1218475" ref_url="https://bugzilla.suse.com/1218475" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22365" ref_url="https://www.suse.com/security/cve/CVE-2024-22365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017681.html" source="SUSE-SU"/>
		<description>
This update for pam fixes the following issues:

- CVE-2024-22365: Fixed a local denial of service during PAM login
  due to a missing check during path manipulation (bsc#1218475).
- Check localtime_r() return value to fix crashing (bsc#1217000) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217000">SUSE bug 1217000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218475">SUSE bug 1218475</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22365/">CVE-2024-22365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">CVE-2024-22365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819897" comment="pam-1.3.0-150000.6.66.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206133" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1198101" ref_url="https://bugzilla.suse.com/1198101" source="BUGZILLA"/>
		<reference ref_id="1205588" ref_url="https://bugzilla.suse.com/1205588" source="BUGZILLA"/>
		<reference ref_id="1205855" ref_url="https://bugzilla.suse.com/1205855" source="BUGZILLA"/>
		<reference ref_id="1210382" ref_url="https://bugzilla.suse.com/1210382" source="BUGZILLA"/>
		<reference ref_id="1213945" ref_url="https://bugzilla.suse.com/1213945" source="BUGZILLA"/>
		<reference ref_id="1215098" ref_url="https://bugzilla.suse.com/1215098" source="BUGZILLA"/>
		<reference ref_id="1215099" ref_url="https://bugzilla.suse.com/1215099" source="BUGZILLA"/>
		<reference ref_id="1215100" ref_url="https://bugzilla.suse.com/1215100" source="BUGZILLA"/>
		<reference ref_id="1215101" ref_url="https://bugzilla.suse.com/1215101" source="BUGZILLA"/>
		<reference ref_id="1215102" ref_url="https://bugzilla.suse.com/1215102" source="BUGZILLA"/>
		<reference ref_id="1215103" ref_url="https://bugzilla.suse.com/1215103" source="BUGZILLA"/>
		<reference ref_id="1219460" ref_url="https://bugzilla.suse.com/1219460" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737/" source="CVE"/>
		<reference ref_id="CVE-2023-40546" ref_url="https://www.suse.com/security/cve/CVE-2023-40546/" source="CVE"/>
		<reference ref_id="CVE-2023-40547" ref_url="https://www.suse.com/security/cve/CVE-2023-40547/" source="CVE"/>
		<reference ref_id="CVE-2023-40548" ref_url="https://www.suse.com/security/cve/CVE-2023-40548/" source="CVE"/>
		<reference ref_id="CVE-2023-40549" ref_url="https://www.suse.com/security/cve/CVE-2023-40549/" source="CVE"/>
		<reference ref_id="CVE-2023-40550" ref_url="https://www.suse.com/security/cve/CVE-2023-40550/" source="CVE"/>
		<reference ref_id="CVE-2023-40551" ref_url="https://www.suse.com/security/cve/CVE-2023-40551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- Update shim-install to set the TPM2 SRK algorithm (bsc#1213945)
- Limit the requirement of fde-tpm-helper-macros to the distro with
  suse_version 1600 and above (bsc#1219460)

Update to version 15.8:

Security issues fixed:

- mok: fix LogError() invocation (bsc#1215099,CVE-2023-40546)
- avoid incorrectly trusting HTTP headers (bsc#1215098,CVE-2023-40547)
- Fix integer overflow on SBAT section size on 32-bit system (bsc#1215100,CVE-2023-40548)
- Authenticode: verify that the signature header is in bounds (bsc#1215101,CVE-2023-40549)
- pe: Fix an out-of-bound read in verify_buffer_sbat() (bsc#1215102,CVE-2023-40550)
- pe-relocate: Fix bounds check for MZ binaries (bsc#1215103,CVE-2023-40551)

        
The NX flag is disable which is same as the default value of shim-15.8, hence, not need to enable it by this patch now.

- Generate dbx during build so we don't include binary files in sources
- Don't require grub so shim can still be used with systemd-boot
- Update shim-install to fix boot failure of ext4 root file system
  on RAID10 (bsc#1205855)
- Adopt the macros from fde-tpm-helper-macros to update the
  signature in the sealed key after a bootloader upgrade

- Update shim-install to amend full disk encryption support
  - Adopt TPM 2.0 Key File for grub2 TPM 2.0 protector
  - Use the long name to specify the grub2 key protector
  - cryptodisk: support TPM authorized policies
  - Do not use tpm_record_pcrs unless the command is in command.lst

- Removed POST_PROCESS_PE_FLAGS=-N from the build command in shim.spec to
  enable the NX compatibility flag when using post-process-pe after
  discussed with grub2 experts in mail. It's useful for further development
  and testing. (bsc#1205588)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-22"/>
	<updated date="2024-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198101">SUSE bug 1198101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205588">SUSE bug 1205588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205855">SUSE bug 1205855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210382">SUSE bug 1210382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213945">SUSE bug 1213945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215098">SUSE bug 1215098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215099">SUSE bug 1215099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215100">SUSE bug 1215100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215101">SUSE bug 1215101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215102">SUSE bug 1215102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215103">SUSE bug 1215103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219460">SUSE bug 1219460</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40546/">CVE-2023-40546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40546">CVE-2023-40546 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40547/">CVE-2023-40547 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40547">CVE-2023-40547 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40548/">CVE-2023-40548 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40548">CVE-2023-40548 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40549/">CVE-2023-40549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40549">CVE-2023-40549 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40550/">CVE-2023-40550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40550">CVE-2023-40550 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40551/">CVE-2023-40551 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40551">CVE-2023-40551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206134" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1222992" ref_url="https://bugzilla.suse.com/1222992" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035052.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (CVE-2024-2961, bsc#1222992)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-22"/>
	<updated date="2024-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855836" comment="glibc-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855837" comment="glibc-devel-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855838" comment="glibc-locale-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855839" comment="glibc-locale-base-2.31-150300.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206135" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213269" ref_url="https://bugzilla.suse.com/1213269" source="BUGZILLA"/>
		<reference ref_id="1218889" ref_url="https://bugzilla.suse.com/1218889" source="BUGZILLA"/>
		<reference ref_id="1220134" ref_url="https://bugzilla.suse.com/1220134" source="BUGZILLA"/>
		<reference ref_id="1222843" ref_url="https://bugzilla.suse.com/1222843" source="BUGZILLA"/>
		<reference ref_id="1222845" ref_url="https://bugzilla.suse.com/1222845" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3019" ref_url="https://www.suse.com/security/cve/CVE-2023-3019/" source="CVE"/>
		<reference ref_id="CVE-2023-6683" ref_url="https://www.suse.com/security/cve/CVE-2023-6683/" source="CVE"/>
		<reference ref_id="CVE-2024-24474" ref_url="https://www.suse.com/security/cve/CVE-2024-24474/" source="CVE"/>
		<reference ref_id="CVE-2024-3446" ref_url="https://www.suse.com/security/cve/CVE-2024-3446/" source="CVE"/>
		<reference ref_id="CVE-2024-3447" ref_url="https://www.suse.com/security/cve/CVE-2024-3447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

 - CVE-2023-3019: Fixed heap use-after-free in e1000e_write_packet_to_guest() (bsc#1213269)
 - CVE-2023-6683: Fixed NULL pointer dereference in qemu_clipboard_request() (bsc#1218889)
 - CVE-2024-24474: Fixed integer overflow results in buffer overflow via SCSI command (bsc#1220134)
 - CVE-2024-3446: Fixed DM reentrancy issue that could lead to double free vulnerability (bsc#1222843)
 - CVE-2024-3447: Fixed heap buffer overflow in sdhci_write_dataport() (bsc#1222845)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213269">SUSE bug 1213269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218889">SUSE bug 1218889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220134">SUSE bug 1220134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222843">SUSE bug 1222843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222845">SUSE bug 1222845</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3019/">CVE-2023-3019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3019">CVE-2023-3019 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6683/">CVE-2023-6683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6683">CVE-2023-6683 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24474/">CVE-2024-24474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24474">CVE-2024-24474 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3446/">CVE-2024-3446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3446">CVE-2024-3446 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3447/">CVE-2024-3447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3447">CVE-2024-3447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009856046" comment="qemu-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855895" comment="qemu-accel-tcg-x86-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855896" comment="qemu-arm-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856047" comment="qemu-audio-spice-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856048" comment="qemu-chardev-spice-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856049" comment="qemu-guest-agent-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856050" comment="qemu-hw-display-qxl-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856051" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856052" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856053" comment="qemu-hw-usb-redirect-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855913" comment="qemu-ipxe-1.0.0+-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855948" comment="qemu-s390x-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855917" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855918" comment="qemu-sgabios-8-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856054" comment="qemu-tools-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856055" comment="qemu-ui-opengl-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856056" comment="qemu-ui-spice-core-6.2.0-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855925" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855926" comment="qemu-x86-6.2.0-150400.37.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206136" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211188" ref_url="https://bugzilla.suse.com/1211188" source="BUGZILLA"/>
		<reference ref_id="1211190" ref_url="https://bugzilla.suse.com/1211190" source="BUGZILLA"/>
		<reference ref_id="1218126" ref_url="https://bugzilla.suse.com/1218126" source="BUGZILLA"/>
		<reference ref_id="1218186" ref_url="https://bugzilla.suse.com/1218186" source="BUGZILLA"/>
		<reference ref_id="1218209" ref_url="https://bugzilla.suse.com/1218209" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1667" ref_url="https://www.suse.com/security/cve/CVE-2023-1667/" source="CVE"/>
		<reference ref_id="CVE-2023-2283" ref_url="https://www.suse.com/security/cve/CVE-2023-2283/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2023-6004" ref_url="https://www.suse.com/security/cve/CVE-2023-6004/" source="CVE"/>
		<reference ref_id="CVE-2023-6918" ref_url="https://www.suse.com/security/cve/CVE-2023-6918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<description>
This update for libssh fixes the following issues:

Security fixes:

  - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209)
  - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126)
  - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186)
  - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm  guessing (bsc#1211188)
  - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190)

Other fixes:

- Update to version 0.9.8
  - Allow @ in usernames when parsing from URI composes

- Update to version 0.9.7
  - Fix several memory leaks in GSSAPI handling code
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211188">SUSE bug 1211188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211190">SUSE bug 1211190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218126">SUSE bug 1218126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218186">SUSE bug 1218186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218209">SUSE bug 1218209</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1667/">CVE-2023-1667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1667">CVE-2023-1667 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2283/">CVE-2023-2283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2283">CVE-2023-2283 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6004/">CVE-2023-6004 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6004">CVE-2023-6004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6918/">CVE-2023-6918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6918">CVE-2023-6918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819387" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819388" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206137" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219386" ref_url="https://bugzilla.suse.com/1219386" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5992" ref_url="https://www.suse.com/security/cve/CVE-2023-5992/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1402-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035071.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2023-5992: Fixed side-channel leaks while stripping encryption PKCS#1 padding (bsc#1219386)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219386">SUSE bug 1219386</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-5992/">CVE-2023-5992 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5992">CVE-2023-5992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856057" comment="opensc-0.22.0-150400.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206138" version="1" class="patch">
	<metadata>
		<title>Security update for cockpit-wicked (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1217325" ref_url="https://bugzilla.suse.com/1217325" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26364" ref_url="https://www.suse.com/security/cve/CVE-2023-26364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1416-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035088.html" source="SUSE-SU"/>
		<description>
This update for cockpit-wicked fixes the following issues:

- CVE-2023-26364: Fixed denial of service due to improper input validation during CSS parsing (bsc#1217325)

Other fixes:
- Upgrade to version 4.5
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217325">SUSE bug 1217325</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26364/">CVE-2023-26364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-26364">CVE-2023-26364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857606" comment="cockpit-wicked-4.5-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206139" version="1" class="patch">
	<metadata>
		<title>Security update for python-idna (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1222842" ref_url="https://bugzilla.suse.com/1222842" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035104.html" source="SUSE-SU"/>
		<description>
This update for python-idna fixes the following issues:

- CVE-2024-3651: Fixed potential DoS via resource consumption via specially crafted inputs to idna.encode() (bsc#1222842).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2024-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222842">SUSE bug 1222842</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857793" comment="python3-idna-2.6-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206140" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1189495" ref_url="https://bugzilla.suse.com/1189495" source="BUGZILLA"/>
		<reference ref_id="1191175" ref_url="https://bugzilla.suse.com/1191175" source="BUGZILLA"/>
		<reference ref_id="1218686" ref_url="https://bugzilla.suse.com/1218686" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3521" ref_url="https://www.suse.com/security/cve/CVE-2021-3521/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018482.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

Security fixes:
- CVE-2021-3521: Fixed missing subkey binding signature checking (bsc#1191175)

Other fixes:

- accept more signature subpackets marked as critical (bsc#1218686)
- backport limit support for the autopatch macro (bsc#1189495)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-08"/>
	<updated date="2024-05-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189495">SUSE bug 1189495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191175">SUSE bug 1191175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218686">SUSE bug 1218686</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3521/">CVE-2021-3521 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3521">CVE-2021-3521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859567" comment="python3-rpm-4.14.3-150400.59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859568" comment="rpm-4.14.3-150400.59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859569" comment="rpm-ndb-4.14.3-150400.59.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206141" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1183045" ref_url="https://bugzilla.suse.com/1183045" source="BUGZILLA"/>
		<reference ref_id="1193285" ref_url="https://bugzilla.suse.com/1193285" source="BUGZILLA"/>
		<reference ref_id="1211162" ref_url="https://bugzilla.suse.com/1211162" source="BUGZILLA"/>
		<reference ref_id="1211226" ref_url="https://bugzilla.suse.com/1211226" source="BUGZILLA"/>
		<reference ref_id="1212584" ref_url="https://bugzilla.suse.com/1212584" source="BUGZILLA"/>
		<reference ref_id="1214747" ref_url="https://bugzilla.suse.com/1214747" source="BUGZILLA"/>
		<reference ref_id="1214823" ref_url="https://bugzilla.suse.com/1214823" source="BUGZILLA"/>
		<reference ref_id="1215237" ref_url="https://bugzilla.suse.com/1215237" source="BUGZILLA"/>
		<reference ref_id="1215696" ref_url="https://bugzilla.suse.com/1215696" source="BUGZILLA"/>
		<reference ref_id="1215885" ref_url="https://bugzilla.suse.com/1215885" source="BUGZILLA"/>
		<reference ref_id="1216057" ref_url="https://bugzilla.suse.com/1216057" source="BUGZILLA"/>
		<reference ref_id="1216559" ref_url="https://bugzilla.suse.com/1216559" source="BUGZILLA"/>
		<reference ref_id="1216776" ref_url="https://bugzilla.suse.com/1216776" source="BUGZILLA"/>
		<reference ref_id="1217036" ref_url="https://bugzilla.suse.com/1217036" source="BUGZILLA"/>
		<reference ref_id="1217217" ref_url="https://bugzilla.suse.com/1217217" source="BUGZILLA"/>
		<reference ref_id="1217250" ref_url="https://bugzilla.suse.com/1217250" source="BUGZILLA"/>
		<reference ref_id="1217602" ref_url="https://bugzilla.suse.com/1217602" source="BUGZILLA"/>
		<reference ref_id="1217692" ref_url="https://bugzilla.suse.com/1217692" source="BUGZILLA"/>
		<reference ref_id="1217790" ref_url="https://bugzilla.suse.com/1217790" source="BUGZILLA"/>
		<reference ref_id="1217801" ref_url="https://bugzilla.suse.com/1217801" source="BUGZILLA"/>
		<reference ref_id="1217933" ref_url="https://bugzilla.suse.com/1217933" source="BUGZILLA"/>
		<reference ref_id="1217938" ref_url="https://bugzilla.suse.com/1217938" source="BUGZILLA"/>
		<reference ref_id="1217946" ref_url="https://bugzilla.suse.com/1217946" source="BUGZILLA"/>
		<reference ref_id="1217947" ref_url="https://bugzilla.suse.com/1217947" source="BUGZILLA"/>
		<reference ref_id="1217980" ref_url="https://bugzilla.suse.com/1217980" source="BUGZILLA"/>
		<reference ref_id="1217981" ref_url="https://bugzilla.suse.com/1217981" source="BUGZILLA"/>
		<reference ref_id="1217982" ref_url="https://bugzilla.suse.com/1217982" source="BUGZILLA"/>
		<reference ref_id="1218056" ref_url="https://bugzilla.suse.com/1218056" source="BUGZILLA"/>
		<reference ref_id="1218139" ref_url="https://bugzilla.suse.com/1218139" source="BUGZILLA"/>
		<reference ref_id="1218184" ref_url="https://bugzilla.suse.com/1218184" source="BUGZILLA"/>
		<reference ref_id="1218234" ref_url="https://bugzilla.suse.com/1218234" source="BUGZILLA"/>
		<reference ref_id="1218253" ref_url="https://bugzilla.suse.com/1218253" source="BUGZILLA"/>
		<reference ref_id="1218258" ref_url="https://bugzilla.suse.com/1218258" source="BUGZILLA"/>
		<reference ref_id="1218335" ref_url="https://bugzilla.suse.com/1218335" source="BUGZILLA"/>
		<reference ref_id="1218357" ref_url="https://bugzilla.suse.com/1218357" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1218515" ref_url="https://bugzilla.suse.com/1218515" source="BUGZILLA"/>
		<reference ref_id="1218559" ref_url="https://bugzilla.suse.com/1218559" source="BUGZILLA"/>
		<reference ref_id="1218569" ref_url="https://bugzilla.suse.com/1218569" source="BUGZILLA"/>
		<reference ref_id="1218659" ref_url="https://bugzilla.suse.com/1218659" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555/" source="CVE"/>
		<reference ref_id="CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779/" source="CVE"/>
		<reference ref_id="CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546/" source="CVE"/>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<reference ref_id="CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610/" source="CVE"/>
		<reference ref_id="CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622/" source="CVE"/>
		<reference ref_id="CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931/" source="CVE"/>
		<reference ref_id="CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946).
- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).
- CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237).
- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).
- CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335).
- CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218258).
- CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253).
- CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938).
- CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250).

The following non-security bugs were fixed:

- Reviewed and added more information to README.SUSE (jsc#PED-5021).
- Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184).
- Drop drm/bridge lt9611uxc patches that have been reverted on stable trees
- KVM: s390/mm: Properly reset no-dat (bsc#1218056).
- KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217933).
- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).
- NFS: Fix O_DIRECT locking issues (bsc#1211162).
- NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162).
- NFS: Fix a potential data corruption (bsc#1211162).
- NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162).
- NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162).
- NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162).
- NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).
- NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162).
- NLM: Defend against file_lock changes after vfs_test_lock() (bsc#1217692).
- Updated SPI patches for NVIDIA Grace enablement (bsc#1212584 jsc#PED-3459)
- block: fix revalidate performance regression (bsc#1216057).
- bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234).
- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980).
- ceph: fix type promotion bug on 32bit systems (bsc#1217982).
- clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217).
- clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217).
- clocksource: Handle negative skews in 'skew is too large' messages (bsc#1215885 bsc#1217217).
- clocksource: Improve 'skew is too large' messages (bsc#1215885 bsc#1217217).
- clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217).
- clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217).
- clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217).
- clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217).
- dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776).
- fuse: dax: set fc-&gt;dax to NULL in fuse_dax_conn_free() (bsc#1218659).
- libceph: use kernel_connect() (bsc#1217981).
- mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515).
- net/smc: Fix pos miscalculation in statistics (bsc#1218139).
- net/tg3: fix race condition in tg3_reset_task() (bsc#1217801).
- nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162).
- remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569).
- s390/vx: fix save/restore of fpu kernel context (bsc#1218357).
- scsi: lpfc: use unsigned type for num_sge (bsc#1214747).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix slot alignment checks (bsc#1216559).
- tracing: Disable preemption when using the filter buffer (bsc#1217036).
- tracing: Fix a possible race when disabling buffered events (bsc#1217036).
- tracing: Fix a warning when allocating buffered events fails (bsc#1217036).
- tracing: Fix incomplete locking when disabling buffered events (bsc#1217036).
- tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036).
- tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036).
- uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978).
- vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602).
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
- x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790).
- x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217).
- x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217).
- x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183045">SUSE bug 1183045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193285">SUSE bug 1193285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211162">SUSE bug 1211162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211226">SUSE bug 1211226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212584">SUSE bug 1212584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214747">SUSE bug 1214747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214823">SUSE bug 1214823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215237">SUSE bug 1215237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215696">SUSE bug 1215696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215885">SUSE bug 1215885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216057">SUSE bug 1216057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216559">SUSE bug 1216559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216776">SUSE bug 1216776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217036">SUSE bug 1217036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217217">SUSE bug 1217217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217250">SUSE bug 1217250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217602">SUSE bug 1217602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217692">SUSE bug 1217692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217790">SUSE bug 1217790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217801">SUSE bug 1217801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217933">SUSE bug 1217933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217938">SUSE bug 1217938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217946">SUSE bug 1217946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217947">SUSE bug 1217947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217980">SUSE bug 1217980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217981">SUSE bug 1217981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217982">SUSE bug 1217982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218056">SUSE bug 1218056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218139">SUSE bug 1218139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218184">SUSE bug 1218184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218234">SUSE bug 1218234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218253">SUSE bug 1218253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218258">SUSE bug 1218258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218335">SUSE bug 1218335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218357">SUSE bug 1218357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218515">SUSE bug 1218515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218559">SUSE bug 1218559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218569">SUSE bug 1218569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218659">SUSE bug 1218659</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819464" comment="kernel-default-5.14.21-150400.24.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819417" comment="kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206142" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1223100" ref_url="https://bugzilla.suse.com/1223100" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3758" ref_url="https://www.suse.com/security/cve/CVE-2023-3758/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018495.html" source="SUSE-SU"/>
		<description>
This update for sssd fixes the following issues:

- CVE-2023-3758: Fixed race condition during authorization that lead to GPO policies functioning inconsistently (bsc#1223100)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-09"/>
	<updated date="2024-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223100">SUSE bug 1223100</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3758/">CVE-2023-3758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3758">CVE-2023-3758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859893" comment="libsss_certmap0-2.5.2-150400.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859894" comment="libsss_idmap0-2.5.2-150400.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859895" comment="libsss_nss_idmap0-2.5.2-150400.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859896" comment="sssd-2.5.2-150400.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859897" comment="sssd-common-2.5.2-150400.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859898" comment="sssd-krb5-common-2.5.2-150400.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859899" comment="sssd-ldap-2.5.2-150400.4.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206143" version="1" class="patch">
	<metadata>
		<title>Security update for less (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1222849" ref_url="https://bugzilla.suse.com/1222849" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035227.html" source="SUSE-SU"/>
		<description>
This update for less fixes the following issues:

- CVE-2024-32487: Fixed mishandling of \n character in paths when LESSOPEN is set leads to OS command execution. (bsc#1222849)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222849">SUSE bug 1222849</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860372" comment="less-590-150400.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206144" version="1" class="patch">
	<metadata>
		<title>Security update for tpm2-0-tss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1223690" ref_url="https://bugzilla.suse.com/1223690" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29040" ref_url="https://www.suse.com/security/cve/CVE-2024-29040/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035254.html" source="SUSE-SU"/>
		<description>
This update for tpm2-0-tss fixes the following issues:

- CVE-2024-29040: Fixed quote data validation by Fapi_VerifyQuote (bsc#1223690).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223690">SUSE bug 1223690</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29040/">CVE-2024-29040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29040">CVE-2024-29040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861073" comment="libtss2-esys0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861074" comment="libtss2-fapi1-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861075" comment="libtss2-mu0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861076" comment="libtss2-rc0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861077" comment="libtss2-sys1-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861078" comment="libtss2-tcti-device0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861079" comment="libtss2-tctildr0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861080" comment="tpm2-0-tss-3.1.0-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206145" version="1" class="patch">
	<metadata>
		<title>Security update for tpm2.0-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1223687" ref_url="https://bugzilla.suse.com/1223687" source="BUGZILLA"/>
		<reference ref_id="1223689" ref_url="https://bugzilla.suse.com/1223689" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29038" ref_url="https://www.suse.com/security/cve/CVE-2024-29038/" source="CVE"/>
		<reference ref_id="CVE-2024-29039" ref_url="https://www.suse.com/security/cve/CVE-2024-29039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018520.html" source="SUSE-SU"/>
		<description>
This update for tpm2.0-tools fixes the following issues:

- CVE-2024-29038: Fixed arbitrary quote data validation by tpm2_checkquote (bsc#1223687).
- CVE-2024-29039: Fixed pcr selection value to be compared with the attest (bsc#1223689).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223687">SUSE bug 1223687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223689">SUSE bug 1223689</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29038/">CVE-2024-29038 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29039/">CVE-2024-29039 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861081" comment="tpm2.0-tools-5.2-150400.6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206146" version="1" class="patch">
	<metadata>
		<title>Recommended update for google-cloud SDK (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210617" ref_url="https://bugzilla.suse.com/1210617" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30608" ref_url="https://www.suse.com/security/cve/CVE-2023-30608/" source="CVE"/>
		<reference ref_id="SUSE-RU-2024:1637-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035270.html" source="SUSE-SU"/>
		<description>
This update for  google-cloud SDK fixes the following issues:

- Add python311 cloud services packages and dependencies (jsc#PED-7987, jsc#PED-6697)
- Bellow 5 binaries Obsolete the python3.6 counterpart:
    python311-google-resumable-media
    python311-google-api-core
    python311-google-cloud-storage
    python311-google-cloud-core
    python311-googleapis-common-protos

- Regular python311 updates (without Obsoletes):
    python-google-auth
    python-grpcio
    python-sqlparse

- New python311 packages:
    libcrc32c
    python-google-cloud-appengine-logging
    python-google-cloud-artifact-registry
    python-google-cloud-audit-log
    python-google-cloud-build
    python-google-cloud-compute
    python-google-cloud-dns
    python-google-cloud-domains
    python-google-cloud-iam
    python-google-cloud-kms-inventory
    python-google-cloud-kms
    python-google-cloud-logging
    python-google-cloud-run
    python-google-cloud-secret-manager
    python-google-cloud-service-directory
    python-google-cloud-spanner
    python-google-cloud-vpc-access
    python-google-crc32c
    python-grpc-google-iam-v1
    python-grpcio-status
    python-proto-plus

In python-sqlparse this security issue was fixed:

CVE-2023-30608: Fixed parser that contained a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) (bsc#1210617)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210617">SUSE bug 1210617</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30608/">CVE-2023-30608 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30608">CVE-2023-30608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861082" comment="libprotobuf-lite25_1_0-25.1-150400.9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206147" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1209657" ref_url="https://bugzilla.suse.com/1209657" source="BUGZILLA"/>
		<reference ref_id="1215221" ref_url="https://bugzilla.suse.com/1215221" source="BUGZILLA"/>
		<reference ref_id="1216223" ref_url="https://bugzilla.suse.com/1216223" source="BUGZILLA"/>
		<reference ref_id="1218336" ref_url="https://bugzilla.suse.com/1218336" source="BUGZILLA"/>
		<reference ref_id="1218479" ref_url="https://bugzilla.suse.com/1218479" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1219104" ref_url="https://bugzilla.suse.com/1219104" source="BUGZILLA"/>
		<reference ref_id="1219126" ref_url="https://bugzilla.suse.com/1219126" source="BUGZILLA"/>
		<reference ref_id="1219169" ref_url="https://bugzilla.suse.com/1219169" source="BUGZILLA"/>
		<reference ref_id="1219170" ref_url="https://bugzilla.suse.com/1219170" source="BUGZILLA"/>
		<reference ref_id="1219264" ref_url="https://bugzilla.suse.com/1219264" source="BUGZILLA"/>
		<reference ref_id="1220342" ref_url="https://bugzilla.suse.com/1220342" source="BUGZILLA"/>
		<reference ref_id="1220703" ref_url="https://bugzilla.suse.com/1220703" source="BUGZILLA"/>
		<reference ref_id="1220761" ref_url="https://bugzilla.suse.com/1220761" source="BUGZILLA"/>
		<reference ref_id="1220883" ref_url="https://bugzilla.suse.com/1220883" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221061" ref_url="https://bugzilla.suse.com/1221061" source="BUGZILLA"/>
		<reference ref_id="1221088" ref_url="https://bugzilla.suse.com/1221088" source="BUGZILLA"/>
		<reference ref_id="1221293" ref_url="https://bugzilla.suse.com/1221293" source="BUGZILLA"/>
		<reference ref_id="1221299" ref_url="https://bugzilla.suse.com/1221299" source="BUGZILLA"/>
		<reference ref_id="1221612" ref_url="https://bugzilla.suse.com/1221612" source="BUGZILLA"/>
		<reference ref_id="1221725" ref_url="https://bugzilla.suse.com/1221725" source="BUGZILLA"/>
		<reference ref_id="1221830" ref_url="https://bugzilla.suse.com/1221830" source="BUGZILLA"/>
		<reference ref_id="1222117" ref_url="https://bugzilla.suse.com/1222117" source="BUGZILLA"/>
		<reference ref_id="1222422" ref_url="https://bugzilla.suse.com/1222422" source="BUGZILLA"/>
		<reference ref_id="1222430" ref_url="https://bugzilla.suse.com/1222430" source="BUGZILLA"/>
		<reference ref_id="1222435" ref_url="https://bugzilla.suse.com/1222435" source="BUGZILLA"/>
		<reference ref_id="1222482" ref_url="https://bugzilla.suse.com/1222482" source="BUGZILLA"/>
		<reference ref_id="1222503" ref_url="https://bugzilla.suse.com/1222503" source="BUGZILLA"/>
		<reference ref_id="1222536" ref_url="https://bugzilla.suse.com/1222536" source="BUGZILLA"/>
		<reference ref_id="1222559" ref_url="https://bugzilla.suse.com/1222559" source="BUGZILLA"/>
		<reference ref_id="1222585" ref_url="https://bugzilla.suse.com/1222585" source="BUGZILLA"/>
		<reference ref_id="1222618" ref_url="https://bugzilla.suse.com/1222618" source="BUGZILLA"/>
		<reference ref_id="1222624" ref_url="https://bugzilla.suse.com/1222624" source="BUGZILLA"/>
		<reference ref_id="1222660" ref_url="https://bugzilla.suse.com/1222660" source="BUGZILLA"/>
		<reference ref_id="1222662" ref_url="https://bugzilla.suse.com/1222662" source="BUGZILLA"/>
		<reference ref_id="1222664" ref_url="https://bugzilla.suse.com/1222664" source="BUGZILLA"/>
		<reference ref_id="1222666" ref_url="https://bugzilla.suse.com/1222666" source="BUGZILLA"/>
		<reference ref_id="1222669" ref_url="https://bugzilla.suse.com/1222669" source="BUGZILLA"/>
		<reference ref_id="1222671" ref_url="https://bugzilla.suse.com/1222671" source="BUGZILLA"/>
		<reference ref_id="1222703" ref_url="https://bugzilla.suse.com/1222703" source="BUGZILLA"/>
		<reference ref_id="1222704" ref_url="https://bugzilla.suse.com/1222704" source="BUGZILLA"/>
		<reference ref_id="1222706" ref_url="https://bugzilla.suse.com/1222706" source="BUGZILLA"/>
		<reference ref_id="1222709" ref_url="https://bugzilla.suse.com/1222709" source="BUGZILLA"/>
		<reference ref_id="1222721" ref_url="https://bugzilla.suse.com/1222721" source="BUGZILLA"/>
		<reference ref_id="1222726" ref_url="https://bugzilla.suse.com/1222726" source="BUGZILLA"/>
		<reference ref_id="1222773" ref_url="https://bugzilla.suse.com/1222773" source="BUGZILLA"/>
		<reference ref_id="1222776" ref_url="https://bugzilla.suse.com/1222776" source="BUGZILLA"/>
		<reference ref_id="1222785" ref_url="https://bugzilla.suse.com/1222785" source="BUGZILLA"/>
		<reference ref_id="1222787" ref_url="https://bugzilla.suse.com/1222787" source="BUGZILLA"/>
		<reference ref_id="1222790" ref_url="https://bugzilla.suse.com/1222790" source="BUGZILLA"/>
		<reference ref_id="1222791" ref_url="https://bugzilla.suse.com/1222791" source="BUGZILLA"/>
		<reference ref_id="1222792" ref_url="https://bugzilla.suse.com/1222792" source="BUGZILLA"/>
		<reference ref_id="1222796" ref_url="https://bugzilla.suse.com/1222796" source="BUGZILLA"/>
		<reference ref_id="1222824" ref_url="https://bugzilla.suse.com/1222824" source="BUGZILLA"/>
		<reference ref_id="1222829" ref_url="https://bugzilla.suse.com/1222829" source="BUGZILLA"/>
		<reference ref_id="1222832" ref_url="https://bugzilla.suse.com/1222832" source="BUGZILLA"/>
		<reference ref_id="1222836" ref_url="https://bugzilla.suse.com/1222836" source="BUGZILLA"/>
		<reference ref_id="1222838" ref_url="https://bugzilla.suse.com/1222838" source="BUGZILLA"/>
		<reference ref_id="1222866" ref_url="https://bugzilla.suse.com/1222866" source="BUGZILLA"/>
		<reference ref_id="1222867" ref_url="https://bugzilla.suse.com/1222867" source="BUGZILLA"/>
		<reference ref_id="1222869" ref_url="https://bugzilla.suse.com/1222869" source="BUGZILLA"/>
		<reference ref_id="1222876" ref_url="https://bugzilla.suse.com/1222876" source="BUGZILLA"/>
		<reference ref_id="1222878" ref_url="https://bugzilla.suse.com/1222878" source="BUGZILLA"/>
		<reference ref_id="1222879" ref_url="https://bugzilla.suse.com/1222879" source="BUGZILLA"/>
		<reference ref_id="1222881" ref_url="https://bugzilla.suse.com/1222881" source="BUGZILLA"/>
		<reference ref_id="1222883" ref_url="https://bugzilla.suse.com/1222883" source="BUGZILLA"/>
		<reference ref_id="1222888" ref_url="https://bugzilla.suse.com/1222888" source="BUGZILLA"/>
		<reference ref_id="1222894" ref_url="https://bugzilla.suse.com/1222894" source="BUGZILLA"/>
		<reference ref_id="1222901" ref_url="https://bugzilla.suse.com/1222901" source="BUGZILLA"/>
		<reference ref_id="1223016" ref_url="https://bugzilla.suse.com/1223016" source="BUGZILLA"/>
		<reference ref_id="1223187" ref_url="https://bugzilla.suse.com/1223187" source="BUGZILLA"/>
		<reference ref_id="1223380" ref_url="https://bugzilla.suse.com/1223380" source="BUGZILLA"/>
		<reference ref_id="1223474" ref_url="https://bugzilla.suse.com/1223474" source="BUGZILLA"/>
		<reference ref_id="1223475" ref_url="https://bugzilla.suse.com/1223475" source="BUGZILLA"/>
		<reference ref_id="1223477" ref_url="https://bugzilla.suse.com/1223477" source="BUGZILLA"/>
		<reference ref_id="1223479" ref_url="https://bugzilla.suse.com/1223479" source="BUGZILLA"/>
		<reference ref_id="1223482" ref_url="https://bugzilla.suse.com/1223482" source="BUGZILLA"/>
		<reference ref_id="1223484" ref_url="https://bugzilla.suse.com/1223484" source="BUGZILLA"/>
		<reference ref_id="1223487" ref_url="https://bugzilla.suse.com/1223487" source="BUGZILLA"/>
		<reference ref_id="1223503" ref_url="https://bugzilla.suse.com/1223503" source="BUGZILLA"/>
		<reference ref_id="1223505" ref_url="https://bugzilla.suse.com/1223505" source="BUGZILLA"/>
		<reference ref_id="1223509" ref_url="https://bugzilla.suse.com/1223509" source="BUGZILLA"/>
		<reference ref_id="1223513" ref_url="https://bugzilla.suse.com/1223513" source="BUGZILLA"/>
		<reference ref_id="1223516" ref_url="https://bugzilla.suse.com/1223516" source="BUGZILLA"/>
		<reference ref_id="1223517" ref_url="https://bugzilla.suse.com/1223517" source="BUGZILLA"/>
		<reference ref_id="1223518" ref_url="https://bugzilla.suse.com/1223518" source="BUGZILLA"/>
		<reference ref_id="1223519" ref_url="https://bugzilla.suse.com/1223519" source="BUGZILLA"/>
		<reference ref_id="1223522" ref_url="https://bugzilla.suse.com/1223522" source="BUGZILLA"/>
		<reference ref_id="1223523" ref_url="https://bugzilla.suse.com/1223523" source="BUGZILLA"/>
		<reference ref_id="1223705" ref_url="https://bugzilla.suse.com/1223705" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47047" ref_url="https://www.suse.com/security/cve/CVE-2021-47047/" source="CVE"/>
		<reference ref_id="CVE-2021-47181" ref_url="https://www.suse.com/security/cve/CVE-2021-47181/" source="CVE"/>
		<reference ref_id="CVE-2021-47182" ref_url="https://www.suse.com/security/cve/CVE-2021-47182/" source="CVE"/>
		<reference ref_id="CVE-2021-47183" ref_url="https://www.suse.com/security/cve/CVE-2021-47183/" source="CVE"/>
		<reference ref_id="CVE-2021-47184" ref_url="https://www.suse.com/security/cve/CVE-2021-47184/" source="CVE"/>
		<reference ref_id="CVE-2021-47185" ref_url="https://www.suse.com/security/cve/CVE-2021-47185/" source="CVE"/>
		<reference ref_id="CVE-2021-47187" ref_url="https://www.suse.com/security/cve/CVE-2021-47187/" source="CVE"/>
		<reference ref_id="CVE-2021-47188" ref_url="https://www.suse.com/security/cve/CVE-2021-47188/" source="CVE"/>
		<reference ref_id="CVE-2021-47189" ref_url="https://www.suse.com/security/cve/CVE-2021-47189/" source="CVE"/>
		<reference ref_id="CVE-2021-47191" ref_url="https://www.suse.com/security/cve/CVE-2021-47191/" source="CVE"/>
		<reference ref_id="CVE-2021-47192" ref_url="https://www.suse.com/security/cve/CVE-2021-47192/" source="CVE"/>
		<reference ref_id="CVE-2021-47193" ref_url="https://www.suse.com/security/cve/CVE-2021-47193/" source="CVE"/>
		<reference ref_id="CVE-2021-47194" ref_url="https://www.suse.com/security/cve/CVE-2021-47194/" source="CVE"/>
		<reference ref_id="CVE-2021-47195" ref_url="https://www.suse.com/security/cve/CVE-2021-47195/" source="CVE"/>
		<reference ref_id="CVE-2021-47196" ref_url="https://www.suse.com/security/cve/CVE-2021-47196/" source="CVE"/>
		<reference ref_id="CVE-2021-47197" ref_url="https://www.suse.com/security/cve/CVE-2021-47197/" source="CVE"/>
		<reference ref_id="CVE-2021-47198" ref_url="https://www.suse.com/security/cve/CVE-2021-47198/" source="CVE"/>
		<reference ref_id="CVE-2021-47199" ref_url="https://www.suse.com/security/cve/CVE-2021-47199/" source="CVE"/>
		<reference ref_id="CVE-2021-47200" ref_url="https://www.suse.com/security/cve/CVE-2021-47200/" source="CVE"/>
		<reference ref_id="CVE-2021-47201" ref_url="https://www.suse.com/security/cve/CVE-2021-47201/" source="CVE"/>
		<reference ref_id="CVE-2021-47202" ref_url="https://www.suse.com/security/cve/CVE-2021-47202/" source="CVE"/>
		<reference ref_id="CVE-2021-47203" ref_url="https://www.suse.com/security/cve/CVE-2021-47203/" source="CVE"/>
		<reference ref_id="CVE-2021-47204" ref_url="https://www.suse.com/security/cve/CVE-2021-47204/" source="CVE"/>
		<reference ref_id="CVE-2021-47205" ref_url="https://www.suse.com/security/cve/CVE-2021-47205/" source="CVE"/>
		<reference ref_id="CVE-2021-47206" ref_url="https://www.suse.com/security/cve/CVE-2021-47206/" source="CVE"/>
		<reference ref_id="CVE-2021-47207" ref_url="https://www.suse.com/security/cve/CVE-2021-47207/" source="CVE"/>
		<reference ref_id="CVE-2021-47209" ref_url="https://www.suse.com/security/cve/CVE-2021-47209/" source="CVE"/>
		<reference ref_id="CVE-2021-47210" ref_url="https://www.suse.com/security/cve/CVE-2021-47210/" source="CVE"/>
		<reference ref_id="CVE-2021-47211" ref_url="https://www.suse.com/security/cve/CVE-2021-47211/" source="CVE"/>
		<reference ref_id="CVE-2021-47212" ref_url="https://www.suse.com/security/cve/CVE-2021-47212/" source="CVE"/>
		<reference ref_id="CVE-2021-47215" ref_url="https://www.suse.com/security/cve/CVE-2021-47215/" source="CVE"/>
		<reference ref_id="CVE-2021-47216" ref_url="https://www.suse.com/security/cve/CVE-2021-47216/" source="CVE"/>
		<reference ref_id="CVE-2021-47217" ref_url="https://www.suse.com/security/cve/CVE-2021-47217/" source="CVE"/>
		<reference ref_id="CVE-2021-47218" ref_url="https://www.suse.com/security/cve/CVE-2021-47218/" source="CVE"/>
		<reference ref_id="CVE-2021-47219" ref_url="https://www.suse.com/security/cve/CVE-2021-47219/" source="CVE"/>
		<reference ref_id="CVE-2022-48631" ref_url="https://www.suse.com/security/cve/CVE-2022-48631/" source="CVE"/>
		<reference ref_id="CVE-2022-48637" ref_url="https://www.suse.com/security/cve/CVE-2022-48637/" source="CVE"/>
		<reference ref_id="CVE-2022-48638" ref_url="https://www.suse.com/security/cve/CVE-2022-48638/" source="CVE"/>
		<reference ref_id="CVE-2022-48647" ref_url="https://www.suse.com/security/cve/CVE-2022-48647/" source="CVE"/>
		<reference ref_id="CVE-2022-48648" ref_url="https://www.suse.com/security/cve/CVE-2022-48648/" source="CVE"/>
		<reference ref_id="CVE-2022-48650" ref_url="https://www.suse.com/security/cve/CVE-2022-48650/" source="CVE"/>
		<reference ref_id="CVE-2022-48651" ref_url="https://www.suse.com/security/cve/CVE-2022-48651/" source="CVE"/>
		<reference ref_id="CVE-2022-48653" ref_url="https://www.suse.com/security/cve/CVE-2022-48653/" source="CVE"/>
		<reference ref_id="CVE-2022-48654" ref_url="https://www.suse.com/security/cve/CVE-2022-48654/" source="CVE"/>
		<reference ref_id="CVE-2022-48655" ref_url="https://www.suse.com/security/cve/CVE-2022-48655/" source="CVE"/>
		<reference ref_id="CVE-2022-48656" ref_url="https://www.suse.com/security/cve/CVE-2022-48656/" source="CVE"/>
		<reference ref_id="CVE-2022-48657" ref_url="https://www.suse.com/security/cve/CVE-2022-48657/" source="CVE"/>
		<reference ref_id="CVE-2022-48660" ref_url="https://www.suse.com/security/cve/CVE-2022-48660/" source="CVE"/>
		<reference ref_id="CVE-2022-48662" ref_url="https://www.suse.com/security/cve/CVE-2022-48662/" source="CVE"/>
		<reference ref_id="CVE-2022-48663" ref_url="https://www.suse.com/security/cve/CVE-2022-48663/" source="CVE"/>
		<reference ref_id="CVE-2022-48667" ref_url="https://www.suse.com/security/cve/CVE-2022-48667/" source="CVE"/>
		<reference ref_id="CVE-2022-48668" ref_url="https://www.suse.com/security/cve/CVE-2022-48668/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476/" source="CVE"/>
		<reference ref_id="CVE-2023-52500" ref_url="https://www.suse.com/security/cve/CVE-2023-52500/" source="CVE"/>
		<reference ref_id="CVE-2023-52590" ref_url="https://www.suse.com/security/cve/CVE-2023-52590/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52607" ref_url="https://www.suse.com/security/cve/CVE-2023-52607/" source="CVE"/>
		<reference ref_id="CVE-2023-52616" ref_url="https://www.suse.com/security/cve/CVE-2023-52616/" source="CVE"/>
		<reference ref_id="CVE-2023-52628" ref_url="https://www.suse.com/security/cve/CVE-2023-52628/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042/" source="CVE"/>
		<reference ref_id="CVE-2023-7192" ref_url="https://www.suse.com/security/cve/CVE-2023-7192/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-23848" ref_url="https://www.suse.com/security/cve/CVE-2024-23848/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742/" source="CVE"/>
		<reference ref_id="CVE-2024-26601" ref_url="https://www.suse.com/security/cve/CVE-2024-26601/" source="CVE"/>
		<reference ref_id="CVE-2024-26610" ref_url="https://www.suse.com/security/cve/CVE-2024-26610/" source="CVE"/>
		<reference ref_id="CVE-2024-26614" ref_url="https://www.suse.com/security/cve/CVE-2024-26614/" source="CVE"/>
		<reference ref_id="CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642/" source="CVE"/>
		<reference ref_id="CVE-2024-26687" ref_url="https://www.suse.com/security/cve/CVE-2024-26687/" source="CVE"/>
		<reference ref_id="CVE-2024-26688" ref_url="https://www.suse.com/security/cve/CVE-2024-26688/" source="CVE"/>
		<reference ref_id="CVE-2024-26689" ref_url="https://www.suse.com/security/cve/CVE-2024-26689/" source="CVE"/>
		<reference ref_id="CVE-2024-26704" ref_url="https://www.suse.com/security/cve/CVE-2024-26704/" source="CVE"/>
		<reference ref_id="CVE-2024-26727" ref_url="https://www.suse.com/security/cve/CVE-2024-26727/" source="CVE"/>
		<reference ref_id="CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733/" source="CVE"/>
		<reference ref_id="CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766/" source="CVE"/>
		<reference ref_id="CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773/" source="CVE"/>
		<reference ref_id="CVE-2024-26792" ref_url="https://www.suse.com/security/cve/CVE-2024-26792/" source="CVE"/>
		<reference ref_id="CVE-2024-26816" ref_url="https://www.suse.com/security/cve/CVE-2024-26816/" source="CVE"/>
		<reference ref_id="CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898/" source="CVE"/>
		<reference ref_id="CVE-2024-26903" ref_url="https://www.suse.com/security/cve/CVE-2024-26903/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-27389" ref_url="https://www.suse.com/security/cve/CVE-2024-27389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 LTSS kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-26816: Ignore relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618). 
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).
- CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
- CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add kasprintf() (bsc#1221061).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
- CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb-&gt;mac_header (bsc#1223513).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).
- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).
- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).
- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()  (bsc#1222660).

The following non-security bugs were fixed:

- Call flush_delayed_fput() from nfsd main-loop (bsc#1223380).
- ibmvfc: make 'max_sectors' a module option (bsc#1216223).
- scsi: Update max_hw_sectors on rescan (bsc#1216223).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215221">SUSE bug 1215221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216223">SUSE bug 1216223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218336">SUSE bug 1218336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218479">SUSE bug 1218479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219104">SUSE bug 1219104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219169">SUSE bug 1219169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219170">SUSE bug 1219170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220342">SUSE bug 1220342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220703">SUSE bug 1220703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220761">SUSE bug 1220761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220883">SUSE bug 1220883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221061">SUSE bug 1221061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221088">SUSE bug 1221088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221293">SUSE bug 1221293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221299">SUSE bug 1221299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221612">SUSE bug 1221612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221830">SUSE bug 1221830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222117">SUSE bug 1222117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222422">SUSE bug 1222422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222430">SUSE bug 1222430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222435">SUSE bug 1222435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222482">SUSE bug 1222482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222503">SUSE bug 1222503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222536">SUSE bug 1222536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222585">SUSE bug 1222585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222618">SUSE bug 1222618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222624">SUSE bug 1222624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222660">SUSE bug 1222660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222662">SUSE bug 1222662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222664">SUSE bug 1222664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222666">SUSE bug 1222666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222669">SUSE bug 1222669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222671">SUSE bug 1222671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222703">SUSE bug 1222703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222704">SUSE bug 1222704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222706">SUSE bug 1222706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222709">SUSE bug 1222709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222726">SUSE bug 1222726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222773">SUSE bug 1222773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222776">SUSE bug 1222776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222785">SUSE bug 1222785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222787">SUSE bug 1222787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222790">SUSE bug 1222790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222791">SUSE bug 1222791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222792">SUSE bug 1222792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222796">SUSE bug 1222796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222824">SUSE bug 1222824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222829">SUSE bug 1222829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222832">SUSE bug 1222832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222836">SUSE bug 1222836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222838">SUSE bug 1222838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222866">SUSE bug 1222866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222867">SUSE bug 1222867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222869">SUSE bug 1222869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222876">SUSE bug 1222876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222878">SUSE bug 1222878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222879">SUSE bug 1222879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222881">SUSE bug 1222881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222883">SUSE bug 1222883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222888">SUSE bug 1222888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222894">SUSE bug 1222894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222901">SUSE bug 1222901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223187">SUSE bug 1223187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223380">SUSE bug 1223380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223474">SUSE bug 1223474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223475">SUSE bug 1223475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223477">SUSE bug 1223477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223479">SUSE bug 1223479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223482">SUSE bug 1223482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223484">SUSE bug 1223484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223487">SUSE bug 1223487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223503">SUSE bug 1223503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223505">SUSE bug 1223505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223509">SUSE bug 1223509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223513">SUSE bug 1223513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223516">SUSE bug 1223516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223517">SUSE bug 1223517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223518">SUSE bug 1223518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223519">SUSE bug 1223519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223522">SUSE bug 1223522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223523">SUSE bug 1223523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223705">SUSE bug 1223705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47047/">CVE-2021-47047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47047">CVE-2021-47047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47181/">CVE-2021-47181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47181">CVE-2021-47181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47182/">CVE-2021-47182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47182">CVE-2021-47182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47183/">CVE-2021-47183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47183">CVE-2021-47183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47184/">CVE-2021-47184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47184">CVE-2021-47184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47185/">CVE-2021-47185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47185">CVE-2021-47185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47187/">CVE-2021-47187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47187">CVE-2021-47187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47188/">CVE-2021-47188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47188">CVE-2021-47188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47189/">CVE-2021-47189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47189">CVE-2021-47189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47191/">CVE-2021-47191 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47191">CVE-2021-47191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47192/">CVE-2021-47192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47192">CVE-2021-47192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47193/">CVE-2021-47193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47193">CVE-2021-47193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47194/">CVE-2021-47194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47194">CVE-2021-47194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47195/">CVE-2021-47195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47195">CVE-2021-47195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47196/">CVE-2021-47196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47196">CVE-2021-47196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47197/">CVE-2021-47197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47197">CVE-2021-47197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47198/">CVE-2021-47198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47198">CVE-2021-47198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47199/">CVE-2021-47199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47199">CVE-2021-47199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47200/">CVE-2021-47200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47200">CVE-2021-47200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47201/">CVE-2021-47201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47201">CVE-2021-47201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47202/">CVE-2021-47202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47202">CVE-2021-47202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47203/">CVE-2021-47203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47203">CVE-2021-47203 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47204/">CVE-2021-47204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47204">CVE-2021-47204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47205/">CVE-2021-47205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47205">CVE-2021-47205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47206/">CVE-2021-47206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47206">CVE-2021-47206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47207/">CVE-2021-47207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47207">CVE-2021-47207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47209/">CVE-2021-47209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47209">CVE-2021-47209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47210/">CVE-2021-47210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47210">CVE-2021-47210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47211/">CVE-2021-47211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47211">CVE-2021-47211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47212/">CVE-2021-47212 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47212">CVE-2021-47212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47215/">CVE-2021-47215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47215">CVE-2021-47215 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47216/">CVE-2021-47216 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47216">CVE-2021-47216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47217/">CVE-2021-47217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47217">CVE-2021-47217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47218/">CVE-2021-47218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47218">CVE-2021-47218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47219/">CVE-2021-47219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47219">CVE-2021-47219 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48631/">CVE-2022-48631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48631">CVE-2022-48631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48637/">CVE-2022-48637 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48637">CVE-2022-48637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48638/">CVE-2022-48638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48638">CVE-2022-48638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48647/">CVE-2022-48647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48647">CVE-2022-48647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48648/">CVE-2022-48648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48648">CVE-2022-48648 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48650/">CVE-2022-48650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48650">CVE-2022-48650 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48651/">CVE-2022-48651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48651">CVE-2022-48651 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48653/">CVE-2022-48653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48653">CVE-2022-48653 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48654/">CVE-2022-48654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48654">CVE-2022-48654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48655/">CVE-2022-48655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48655">CVE-2022-48655 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48656/">CVE-2022-48656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48656">CVE-2022-48656 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48657/">CVE-2022-48657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48657">CVE-2022-48657 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48660/">CVE-2022-48660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48660">CVE-2022-48660 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48662/">CVE-2022-48662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48662">CVE-2022-48662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48663/">CVE-2022-48663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48663">CVE-2022-48663 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48667/">CVE-2022-48667 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48667">CVE-2022-48667 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48668/">CVE-2022-48668 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48668">CVE-2022-48668 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52500/">CVE-2023-52500 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52500">CVE-2023-52500 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52590/">CVE-2023-52590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52590">CVE-2023-52590 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52607/">CVE-2023-52607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52616/">CVE-2023-52616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52628/">CVE-2023-52628 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7192/">CVE-2023-7192 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7192">CVE-2023-7192 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23848/">CVE-2024-23848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23848">CVE-2024-23848 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26601/">CVE-2024-26601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26610/">CVE-2024-26610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26614/">CVE-2024-26614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26687/">CVE-2024-26687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26687">CVE-2024-26687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26688/">CVE-2024-26688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26689/">CVE-2024-26689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26704/">CVE-2024-26704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26727/">CVE-2024-26727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26792/">CVE-2024-26792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26792">CVE-2024-26792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26816/">CVE-2024-26816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26816">CVE-2024-26816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26903/">CVE-2024-26903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26903">CVE-2024-26903 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27389/">CVE-2024-27389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27389">CVE-2024-27389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861083" comment="kernel-default-5.14.21-150400.24.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860903" comment="kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206148" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1192354" ref_url="https://bugzilla.suse.com/1192354" source="BUGZILLA"/>
		<reference ref_id="1192837" ref_url="https://bugzilla.suse.com/1192837" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1203906" ref_url="https://bugzilla.suse.com/1203906" source="BUGZILLA"/>
		<reference ref_id="1203935" ref_url="https://bugzilla.suse.com/1203935" source="BUGZILLA"/>
		<reference ref_id="1204614" ref_url="https://bugzilla.suse.com/1204614" source="BUGZILLA"/>
		<reference ref_id="1206881" ref_url="https://bugzilla.suse.com/1206881" source="BUGZILLA"/>
		<reference ref_id="1209657" ref_url="https://bugzilla.suse.com/1209657" source="BUGZILLA"/>
		<reference ref_id="1215221" ref_url="https://bugzilla.suse.com/1215221" source="BUGZILLA"/>
		<reference ref_id="1216223" ref_url="https://bugzilla.suse.com/1216223" source="BUGZILLA"/>
		<reference ref_id="1218336" ref_url="https://bugzilla.suse.com/1218336" source="BUGZILLA"/>
		<reference ref_id="1218479" ref_url="https://bugzilla.suse.com/1218479" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1219104" ref_url="https://bugzilla.suse.com/1219104" source="BUGZILLA"/>
		<reference ref_id="1219126" ref_url="https://bugzilla.suse.com/1219126" source="BUGZILLA"/>
		<reference ref_id="1219169" ref_url="https://bugzilla.suse.com/1219169" source="BUGZILLA"/>
		<reference ref_id="1219170" ref_url="https://bugzilla.suse.com/1219170" source="BUGZILLA"/>
		<reference ref_id="1219264" ref_url="https://bugzilla.suse.com/1219264" source="BUGZILLA"/>
		<reference ref_id="1220342" ref_url="https://bugzilla.suse.com/1220342" source="BUGZILLA"/>
		<reference ref_id="1220703" ref_url="https://bugzilla.suse.com/1220703" source="BUGZILLA"/>
		<reference ref_id="1220761" ref_url="https://bugzilla.suse.com/1220761" source="BUGZILLA"/>
		<reference ref_id="1220883" ref_url="https://bugzilla.suse.com/1220883" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221061" ref_url="https://bugzilla.suse.com/1221061" source="BUGZILLA"/>
		<reference ref_id="1221088" ref_url="https://bugzilla.suse.com/1221088" source="BUGZILLA"/>
		<reference ref_id="1221293" ref_url="https://bugzilla.suse.com/1221293" source="BUGZILLA"/>
		<reference ref_id="1221299" ref_url="https://bugzilla.suse.com/1221299" source="BUGZILLA"/>
		<reference ref_id="1221612" ref_url="https://bugzilla.suse.com/1221612" source="BUGZILLA"/>
		<reference ref_id="1221830" ref_url="https://bugzilla.suse.com/1221830" source="BUGZILLA"/>
		<reference ref_id="1222117" ref_url="https://bugzilla.suse.com/1222117" source="BUGZILLA"/>
		<reference ref_id="1222422" ref_url="https://bugzilla.suse.com/1222422" source="BUGZILLA"/>
		<reference ref_id="1222430" ref_url="https://bugzilla.suse.com/1222430" source="BUGZILLA"/>
		<reference ref_id="1222435" ref_url="https://bugzilla.suse.com/1222435" source="BUGZILLA"/>
		<reference ref_id="1222482" ref_url="https://bugzilla.suse.com/1222482" source="BUGZILLA"/>
		<reference ref_id="1222503" ref_url="https://bugzilla.suse.com/1222503" source="BUGZILLA"/>
		<reference ref_id="1222536" ref_url="https://bugzilla.suse.com/1222536" source="BUGZILLA"/>
		<reference ref_id="1222559" ref_url="https://bugzilla.suse.com/1222559" source="BUGZILLA"/>
		<reference ref_id="1222585" ref_url="https://bugzilla.suse.com/1222585" source="BUGZILLA"/>
		<reference ref_id="1222618" ref_url="https://bugzilla.suse.com/1222618" source="BUGZILLA"/>
		<reference ref_id="1222624" ref_url="https://bugzilla.suse.com/1222624" source="BUGZILLA"/>
		<reference ref_id="1222660" ref_url="https://bugzilla.suse.com/1222660" source="BUGZILLA"/>
		<reference ref_id="1222662" ref_url="https://bugzilla.suse.com/1222662" source="BUGZILLA"/>
		<reference ref_id="1222664" ref_url="https://bugzilla.suse.com/1222664" source="BUGZILLA"/>
		<reference ref_id="1222666" ref_url="https://bugzilla.suse.com/1222666" source="BUGZILLA"/>
		<reference ref_id="1222671" ref_url="https://bugzilla.suse.com/1222671" source="BUGZILLA"/>
		<reference ref_id="1222703" ref_url="https://bugzilla.suse.com/1222703" source="BUGZILLA"/>
		<reference ref_id="1222704" ref_url="https://bugzilla.suse.com/1222704" source="BUGZILLA"/>
		<reference ref_id="1222706" ref_url="https://bugzilla.suse.com/1222706" source="BUGZILLA"/>
		<reference ref_id="1222709" ref_url="https://bugzilla.suse.com/1222709" source="BUGZILLA"/>
		<reference ref_id="1222721" ref_url="https://bugzilla.suse.com/1222721" source="BUGZILLA"/>
		<reference ref_id="1222726" ref_url="https://bugzilla.suse.com/1222726" source="BUGZILLA"/>
		<reference ref_id="1222773" ref_url="https://bugzilla.suse.com/1222773" source="BUGZILLA"/>
		<reference ref_id="1222776" ref_url="https://bugzilla.suse.com/1222776" source="BUGZILLA"/>
		<reference ref_id="1222785" ref_url="https://bugzilla.suse.com/1222785" source="BUGZILLA"/>
		<reference ref_id="1222787" ref_url="https://bugzilla.suse.com/1222787" source="BUGZILLA"/>
		<reference ref_id="1222790" ref_url="https://bugzilla.suse.com/1222790" source="BUGZILLA"/>
		<reference ref_id="1222791" ref_url="https://bugzilla.suse.com/1222791" source="BUGZILLA"/>
		<reference ref_id="1222792" ref_url="https://bugzilla.suse.com/1222792" source="BUGZILLA"/>
		<reference ref_id="1222796" ref_url="https://bugzilla.suse.com/1222796" source="BUGZILLA"/>
		<reference ref_id="1222824" ref_url="https://bugzilla.suse.com/1222824" source="BUGZILLA"/>
		<reference ref_id="1222829" ref_url="https://bugzilla.suse.com/1222829" source="BUGZILLA"/>
		<reference ref_id="1222832" ref_url="https://bugzilla.suse.com/1222832" source="BUGZILLA"/>
		<reference ref_id="1222836" ref_url="https://bugzilla.suse.com/1222836" source="BUGZILLA"/>
		<reference ref_id="1222838" ref_url="https://bugzilla.suse.com/1222838" source="BUGZILLA"/>
		<reference ref_id="1222866" ref_url="https://bugzilla.suse.com/1222866" source="BUGZILLA"/>
		<reference ref_id="1222867" ref_url="https://bugzilla.suse.com/1222867" source="BUGZILLA"/>
		<reference ref_id="1222869" ref_url="https://bugzilla.suse.com/1222869" source="BUGZILLA"/>
		<reference ref_id="1222876" ref_url="https://bugzilla.suse.com/1222876" source="BUGZILLA"/>
		<reference ref_id="1222878" ref_url="https://bugzilla.suse.com/1222878" source="BUGZILLA"/>
		<reference ref_id="1222879" ref_url="https://bugzilla.suse.com/1222879" source="BUGZILLA"/>
		<reference ref_id="1222881" ref_url="https://bugzilla.suse.com/1222881" source="BUGZILLA"/>
		<reference ref_id="1222883" ref_url="https://bugzilla.suse.com/1222883" source="BUGZILLA"/>
		<reference ref_id="1222888" ref_url="https://bugzilla.suse.com/1222888" source="BUGZILLA"/>
		<reference ref_id="1222894" ref_url="https://bugzilla.suse.com/1222894" source="BUGZILLA"/>
		<reference ref_id="1222901" ref_url="https://bugzilla.suse.com/1222901" source="BUGZILLA"/>
		<reference ref_id="1223016" ref_url="https://bugzilla.suse.com/1223016" source="BUGZILLA"/>
		<reference ref_id="1223187" ref_url="https://bugzilla.suse.com/1223187" source="BUGZILLA"/>
		<reference ref_id="1223380" ref_url="https://bugzilla.suse.com/1223380" source="BUGZILLA"/>
		<reference ref_id="1223474" ref_url="https://bugzilla.suse.com/1223474" source="BUGZILLA"/>
		<reference ref_id="1223475" ref_url="https://bugzilla.suse.com/1223475" source="BUGZILLA"/>
		<reference ref_id="1223477" ref_url="https://bugzilla.suse.com/1223477" source="BUGZILLA"/>
		<reference ref_id="1223479" ref_url="https://bugzilla.suse.com/1223479" source="BUGZILLA"/>
		<reference ref_id="1223482" ref_url="https://bugzilla.suse.com/1223482" source="BUGZILLA"/>
		<reference ref_id="1223484" ref_url="https://bugzilla.suse.com/1223484" source="BUGZILLA"/>
		<reference ref_id="1223487" ref_url="https://bugzilla.suse.com/1223487" source="BUGZILLA"/>
		<reference ref_id="1223503" ref_url="https://bugzilla.suse.com/1223503" source="BUGZILLA"/>
		<reference ref_id="1223505" ref_url="https://bugzilla.suse.com/1223505" source="BUGZILLA"/>
		<reference ref_id="1223509" ref_url="https://bugzilla.suse.com/1223509" source="BUGZILLA"/>
		<reference ref_id="1223513" ref_url="https://bugzilla.suse.com/1223513" source="BUGZILLA"/>
		<reference ref_id="1223516" ref_url="https://bugzilla.suse.com/1223516" source="BUGZILLA"/>
		<reference ref_id="1223517" ref_url="https://bugzilla.suse.com/1223517" source="BUGZILLA"/>
		<reference ref_id="1223518" ref_url="https://bugzilla.suse.com/1223518" source="BUGZILLA"/>
		<reference ref_id="1223519" ref_url="https://bugzilla.suse.com/1223519" source="BUGZILLA"/>
		<reference ref_id="1223522" ref_url="https://bugzilla.suse.com/1223522" source="BUGZILLA"/>
		<reference ref_id="1223523" ref_url="https://bugzilla.suse.com/1223523" source="BUGZILLA"/>
		<reference ref_id="1223705" ref_url="https://bugzilla.suse.com/1223705" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47047" ref_url="https://www.suse.com/security/cve/CVE-2021-47047/" source="CVE"/>
		<reference ref_id="CVE-2021-47181" ref_url="https://www.suse.com/security/cve/CVE-2021-47181/" source="CVE"/>
		<reference ref_id="CVE-2021-47182" ref_url="https://www.suse.com/security/cve/CVE-2021-47182/" source="CVE"/>
		<reference ref_id="CVE-2021-47183" ref_url="https://www.suse.com/security/cve/CVE-2021-47183/" source="CVE"/>
		<reference ref_id="CVE-2021-47184" ref_url="https://www.suse.com/security/cve/CVE-2021-47184/" source="CVE"/>
		<reference ref_id="CVE-2021-47185" ref_url="https://www.suse.com/security/cve/CVE-2021-47185/" source="CVE"/>
		<reference ref_id="CVE-2021-47187" ref_url="https://www.suse.com/security/cve/CVE-2021-47187/" source="CVE"/>
		<reference ref_id="CVE-2021-47188" ref_url="https://www.suse.com/security/cve/CVE-2021-47188/" source="CVE"/>
		<reference ref_id="CVE-2021-47189" ref_url="https://www.suse.com/security/cve/CVE-2021-47189/" source="CVE"/>
		<reference ref_id="CVE-2021-47191" ref_url="https://www.suse.com/security/cve/CVE-2021-47191/" source="CVE"/>
		<reference ref_id="CVE-2021-47192" ref_url="https://www.suse.com/security/cve/CVE-2021-47192/" source="CVE"/>
		<reference ref_id="CVE-2021-47193" ref_url="https://www.suse.com/security/cve/CVE-2021-47193/" source="CVE"/>
		<reference ref_id="CVE-2021-47194" ref_url="https://www.suse.com/security/cve/CVE-2021-47194/" source="CVE"/>
		<reference ref_id="CVE-2021-47195" ref_url="https://www.suse.com/security/cve/CVE-2021-47195/" source="CVE"/>
		<reference ref_id="CVE-2021-47196" ref_url="https://www.suse.com/security/cve/CVE-2021-47196/" source="CVE"/>
		<reference ref_id="CVE-2021-47197" ref_url="https://www.suse.com/security/cve/CVE-2021-47197/" source="CVE"/>
		<reference ref_id="CVE-2021-47198" ref_url="https://www.suse.com/security/cve/CVE-2021-47198/" source="CVE"/>
		<reference ref_id="CVE-2021-47199" ref_url="https://www.suse.com/security/cve/CVE-2021-47199/" source="CVE"/>
		<reference ref_id="CVE-2021-47200" ref_url="https://www.suse.com/security/cve/CVE-2021-47200/" source="CVE"/>
		<reference ref_id="CVE-2021-47201" ref_url="https://www.suse.com/security/cve/CVE-2021-47201/" source="CVE"/>
		<reference ref_id="CVE-2021-47202" ref_url="https://www.suse.com/security/cve/CVE-2021-47202/" source="CVE"/>
		<reference ref_id="CVE-2021-47203" ref_url="https://www.suse.com/security/cve/CVE-2021-47203/" source="CVE"/>
		<reference ref_id="CVE-2021-47204" ref_url="https://www.suse.com/security/cve/CVE-2021-47204/" source="CVE"/>
		<reference ref_id="CVE-2021-47205" ref_url="https://www.suse.com/security/cve/CVE-2021-47205/" source="CVE"/>
		<reference ref_id="CVE-2021-47206" ref_url="https://www.suse.com/security/cve/CVE-2021-47206/" source="CVE"/>
		<reference ref_id="CVE-2021-47207" ref_url="https://www.suse.com/security/cve/CVE-2021-47207/" source="CVE"/>
		<reference ref_id="CVE-2021-47209" ref_url="https://www.suse.com/security/cve/CVE-2021-47209/" source="CVE"/>
		<reference ref_id="CVE-2021-47210" ref_url="https://www.suse.com/security/cve/CVE-2021-47210/" source="CVE"/>
		<reference ref_id="CVE-2021-47211" ref_url="https://www.suse.com/security/cve/CVE-2021-47211/" source="CVE"/>
		<reference ref_id="CVE-2021-47212" ref_url="https://www.suse.com/security/cve/CVE-2021-47212/" source="CVE"/>
		<reference ref_id="CVE-2021-47215" ref_url="https://www.suse.com/security/cve/CVE-2021-47215/" source="CVE"/>
		<reference ref_id="CVE-2021-47216" ref_url="https://www.suse.com/security/cve/CVE-2021-47216/" source="CVE"/>
		<reference ref_id="CVE-2021-47217" ref_url="https://www.suse.com/security/cve/CVE-2021-47217/" source="CVE"/>
		<reference ref_id="CVE-2021-47218" ref_url="https://www.suse.com/security/cve/CVE-2021-47218/" source="CVE"/>
		<reference ref_id="CVE-2021-47219" ref_url="https://www.suse.com/security/cve/CVE-2021-47219/" source="CVE"/>
		<reference ref_id="CVE-2022-48631" ref_url="https://www.suse.com/security/cve/CVE-2022-48631/" source="CVE"/>
		<reference ref_id="CVE-2022-48637" ref_url="https://www.suse.com/security/cve/CVE-2022-48637/" source="CVE"/>
		<reference ref_id="CVE-2022-48638" ref_url="https://www.suse.com/security/cve/CVE-2022-48638/" source="CVE"/>
		<reference ref_id="CVE-2022-48647" ref_url="https://www.suse.com/security/cve/CVE-2022-48647/" source="CVE"/>
		<reference ref_id="CVE-2022-48648" ref_url="https://www.suse.com/security/cve/CVE-2022-48648/" source="CVE"/>
		<reference ref_id="CVE-2022-48650" ref_url="https://www.suse.com/security/cve/CVE-2022-48650/" source="CVE"/>
		<reference ref_id="CVE-2022-48651" ref_url="https://www.suse.com/security/cve/CVE-2022-48651/" source="CVE"/>
		<reference ref_id="CVE-2022-48653" ref_url="https://www.suse.com/security/cve/CVE-2022-48653/" source="CVE"/>
		<reference ref_id="CVE-2022-48654" ref_url="https://www.suse.com/security/cve/CVE-2022-48654/" source="CVE"/>
		<reference ref_id="CVE-2022-48655" ref_url="https://www.suse.com/security/cve/CVE-2022-48655/" source="CVE"/>
		<reference ref_id="CVE-2022-48656" ref_url="https://www.suse.com/security/cve/CVE-2022-48656/" source="CVE"/>
		<reference ref_id="CVE-2022-48657" ref_url="https://www.suse.com/security/cve/CVE-2022-48657/" source="CVE"/>
		<reference ref_id="CVE-2022-48660" ref_url="https://www.suse.com/security/cve/CVE-2022-48660/" source="CVE"/>
		<reference ref_id="CVE-2022-48662" ref_url="https://www.suse.com/security/cve/CVE-2022-48662/" source="CVE"/>
		<reference ref_id="CVE-2022-48663" ref_url="https://www.suse.com/security/cve/CVE-2022-48663/" source="CVE"/>
		<reference ref_id="CVE-2022-48667" ref_url="https://www.suse.com/security/cve/CVE-2022-48667/" source="CVE"/>
		<reference ref_id="CVE-2022-48668" ref_url="https://www.suse.com/security/cve/CVE-2022-48668/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476/" source="CVE"/>
		<reference ref_id="CVE-2023-52500" ref_url="https://www.suse.com/security/cve/CVE-2023-52500/" source="CVE"/>
		<reference ref_id="CVE-2023-52590" ref_url="https://www.suse.com/security/cve/CVE-2023-52590/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52607" ref_url="https://www.suse.com/security/cve/CVE-2023-52607/" source="CVE"/>
		<reference ref_id="CVE-2023-52616" ref_url="https://www.suse.com/security/cve/CVE-2023-52616/" source="CVE"/>
		<reference ref_id="CVE-2023-52628" ref_url="https://www.suse.com/security/cve/CVE-2023-52628/" source="CVE"/>
		<reference ref_id="CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042/" source="CVE"/>
		<reference ref_id="CVE-2023-7192" ref_url="https://www.suse.com/security/cve/CVE-2023-7192/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-23848" ref_url="https://www.suse.com/security/cve/CVE-2024-23848/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-26601" ref_url="https://www.suse.com/security/cve/CVE-2024-26601/" source="CVE"/>
		<reference ref_id="CVE-2024-26610" ref_url="https://www.suse.com/security/cve/CVE-2024-26610/" source="CVE"/>
		<reference ref_id="CVE-2024-26614" ref_url="https://www.suse.com/security/cve/CVE-2024-26614/" source="CVE"/>
		<reference ref_id="CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642/" source="CVE"/>
		<reference ref_id="CVE-2024-26687" ref_url="https://www.suse.com/security/cve/CVE-2024-26687/" source="CVE"/>
		<reference ref_id="CVE-2024-26688" ref_url="https://www.suse.com/security/cve/CVE-2024-26688/" source="CVE"/>
		<reference ref_id="CVE-2024-26689" ref_url="https://www.suse.com/security/cve/CVE-2024-26689/" source="CVE"/>
		<reference ref_id="CVE-2024-26704" ref_url="https://www.suse.com/security/cve/CVE-2024-26704/" source="CVE"/>
		<reference ref_id="CVE-2024-26727" ref_url="https://www.suse.com/security/cve/CVE-2024-26727/" source="CVE"/>
		<reference ref_id="CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733/" source="CVE"/>
		<reference ref_id="CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766/" source="CVE"/>
		<reference ref_id="CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773/" source="CVE"/>
		<reference ref_id="CVE-2024-26792" ref_url="https://www.suse.com/security/cve/CVE-2024-26792/" source="CVE"/>
		<reference ref_id="CVE-2024-26816" ref_url="https://www.suse.com/security/cve/CVE-2024-26816/" source="CVE"/>
		<reference ref_id="CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898/" source="CVE"/>
		<reference ref_id="CVE-2024-26903" ref_url="https://www.suse.com/security/cve/CVE-2024-26903/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-27389" ref_url="https://www.suse.com/security/cve/CVE-2024-27389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb-&gt;mac_header (bsc#1223513).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
- CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).
- CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).
- CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
- CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).
- CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add kasprintf() (bsc#1221061).
- CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
- CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).


The following non-security bugs were fixed:

- Call flush_delayed_fput() from nfsd main-loop (bsc#1223380).
- ibmvfc: make 'max_sectors' a module option (bsc#1216223).
- scsi: Update max_hw_sectors on rescan (bsc#1216223).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192354">SUSE bug 1192354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192837">SUSE bug 1192837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203906">SUSE bug 1203906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203935">SUSE bug 1203935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204614">SUSE bug 1204614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206881">SUSE bug 1206881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215221">SUSE bug 1215221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216223">SUSE bug 1216223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218336">SUSE bug 1218336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218479">SUSE bug 1218479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219104">SUSE bug 1219104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219169">SUSE bug 1219169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219170">SUSE bug 1219170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220342">SUSE bug 1220342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220703">SUSE bug 1220703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220761">SUSE bug 1220761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220883">SUSE bug 1220883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221061">SUSE bug 1221061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221088">SUSE bug 1221088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221293">SUSE bug 1221293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221299">SUSE bug 1221299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221612">SUSE bug 1221612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221830">SUSE bug 1221830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222117">SUSE bug 1222117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222422">SUSE bug 1222422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222430">SUSE bug 1222430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222435">SUSE bug 1222435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222482">SUSE bug 1222482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222503">SUSE bug 1222503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222536">SUSE bug 1222536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222585">SUSE bug 1222585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222618">SUSE bug 1222618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222624">SUSE bug 1222624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222660">SUSE bug 1222660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222662">SUSE bug 1222662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222664">SUSE bug 1222664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222666">SUSE bug 1222666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222671">SUSE bug 1222671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222703">SUSE bug 1222703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222704">SUSE bug 1222704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222706">SUSE bug 1222706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222709">SUSE bug 1222709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222726">SUSE bug 1222726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222773">SUSE bug 1222773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222776">SUSE bug 1222776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222785">SUSE bug 1222785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222787">SUSE bug 1222787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222790">SUSE bug 1222790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222791">SUSE bug 1222791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222792">SUSE bug 1222792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222796">SUSE bug 1222796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222824">SUSE bug 1222824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222829">SUSE bug 1222829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222832">SUSE bug 1222832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222836">SUSE bug 1222836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222838">SUSE bug 1222838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222866">SUSE bug 1222866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222867">SUSE bug 1222867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222869">SUSE bug 1222869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222876">SUSE bug 1222876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222878">SUSE bug 1222878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222879">SUSE bug 1222879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222881">SUSE bug 1222881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222883">SUSE bug 1222883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222888">SUSE bug 1222888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222894">SUSE bug 1222894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222901">SUSE bug 1222901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223187">SUSE bug 1223187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223380">SUSE bug 1223380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223474">SUSE bug 1223474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223475">SUSE bug 1223475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223477">SUSE bug 1223477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223479">SUSE bug 1223479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223482">SUSE bug 1223482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223484">SUSE bug 1223484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223487">SUSE bug 1223487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223503">SUSE bug 1223503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223505">SUSE bug 1223505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223509">SUSE bug 1223509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223513">SUSE bug 1223513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223516">SUSE bug 1223516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223517">SUSE bug 1223517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223518">SUSE bug 1223518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223519">SUSE bug 1223519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223522">SUSE bug 1223522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223523">SUSE bug 1223523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223705">SUSE bug 1223705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47047/">CVE-2021-47047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47047">CVE-2021-47047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47181/">CVE-2021-47181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47181">CVE-2021-47181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47182/">CVE-2021-47182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47182">CVE-2021-47182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47183/">CVE-2021-47183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47183">CVE-2021-47183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47184/">CVE-2021-47184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47184">CVE-2021-47184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47185/">CVE-2021-47185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47185">CVE-2021-47185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47187/">CVE-2021-47187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47187">CVE-2021-47187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47188/">CVE-2021-47188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47188">CVE-2021-47188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47189/">CVE-2021-47189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47189">CVE-2021-47189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47191/">CVE-2021-47191 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47191">CVE-2021-47191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47192/">CVE-2021-47192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47192">CVE-2021-47192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47193/">CVE-2021-47193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47193">CVE-2021-47193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47194/">CVE-2021-47194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47194">CVE-2021-47194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47195/">CVE-2021-47195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47195">CVE-2021-47195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47196/">CVE-2021-47196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47196">CVE-2021-47196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47197/">CVE-2021-47197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47197">CVE-2021-47197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47198/">CVE-2021-47198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47198">CVE-2021-47198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47199/">CVE-2021-47199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47199">CVE-2021-47199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47200/">CVE-2021-47200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47200">CVE-2021-47200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47201/">CVE-2021-47201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47201">CVE-2021-47201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47202/">CVE-2021-47202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47202">CVE-2021-47202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47203/">CVE-2021-47203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47203">CVE-2021-47203 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47204/">CVE-2021-47204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47204">CVE-2021-47204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47205/">CVE-2021-47205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47205">CVE-2021-47205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47206/">CVE-2021-47206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47206">CVE-2021-47206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47207/">CVE-2021-47207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47207">CVE-2021-47207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47209/">CVE-2021-47209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47209">CVE-2021-47209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47210/">CVE-2021-47210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47210">CVE-2021-47210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47211/">CVE-2021-47211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47211">CVE-2021-47211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47212/">CVE-2021-47212 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47212">CVE-2021-47212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47215/">CVE-2021-47215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47215">CVE-2021-47215 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47216/">CVE-2021-47216 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47216">CVE-2021-47216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47217/">CVE-2021-47217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47217">CVE-2021-47217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47218/">CVE-2021-47218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47218">CVE-2021-47218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47219/">CVE-2021-47219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47219">CVE-2021-47219 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48631/">CVE-2022-48631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48631">CVE-2022-48631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48637/">CVE-2022-48637 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48637">CVE-2022-48637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48638/">CVE-2022-48638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48638">CVE-2022-48638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48647/">CVE-2022-48647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48647">CVE-2022-48647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48648/">CVE-2022-48648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48648">CVE-2022-48648 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48650/">CVE-2022-48650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48650">CVE-2022-48650 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48651/">CVE-2022-48651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48651">CVE-2022-48651 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48653/">CVE-2022-48653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48653">CVE-2022-48653 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48654/">CVE-2022-48654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48654">CVE-2022-48654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48655/">CVE-2022-48655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48655">CVE-2022-48655 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48656/">CVE-2022-48656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48656">CVE-2022-48656 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48657/">CVE-2022-48657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48657">CVE-2022-48657 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48660/">CVE-2022-48660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48660">CVE-2022-48660 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48662/">CVE-2022-48662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48662">CVE-2022-48662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48663/">CVE-2022-48663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48663">CVE-2022-48663 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48667/">CVE-2022-48667 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48667">CVE-2022-48667 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48668/">CVE-2022-48668 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48668">CVE-2022-48668 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52500/">CVE-2023-52500 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52500">CVE-2023-52500 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52590/">CVE-2023-52590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52590">CVE-2023-52590 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52607/">CVE-2023-52607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52616/">CVE-2023-52616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52628/">CVE-2023-52628 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7192/">CVE-2023-7192 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7192">CVE-2023-7192 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23848/">CVE-2024-23848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23848">CVE-2024-23848 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26601/">CVE-2024-26601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26610/">CVE-2024-26610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26614/">CVE-2024-26614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26687/">CVE-2024-26687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26687">CVE-2024-26687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26688/">CVE-2024-26688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26689/">CVE-2024-26689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26704/">CVE-2024-26704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26727/">CVE-2024-26727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26792/">CVE-2024-26792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26792">CVE-2024-26792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26816/">CVE-2024-26816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26816">CVE-2024-26816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26903/">CVE-2024-26903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26903">CVE-2024-26903 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27389/">CVE-2024-27389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27389">CVE-2024-27389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861084" comment="kernel-rt-5.14.21-150400.15.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861085" comment="kernel-source-rt-5.14.21-150400.15.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206149" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1122321" ref_url="https://bugzilla.suse.com/1122321" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6462" ref_url="https://www.suse.com/security/cve/CVE-2019-6462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018555.html" source="SUSE-SU"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2019-6462: Fixed a potentially infinite loop (bsc#1122321).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-20"/>
	<updated date="2024-05-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122321">SUSE bug 1122321</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6462/">CVE-2019-6462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">CVE-2019-6462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861736" comment="libcairo-gobject2-1.16.0-150400.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861737" comment="libcairo2-1.16.0-150400.11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206150" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1213638" ref_url="https://bugzilla.suse.com/1213638" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035342.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issues fixed:

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216)
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233)

Non-security issue fixed:

- make Net::FTP work with TLS 1.3 (bsc#1213638)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213638">SUSE bug 1213638</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6798">CVE-2018-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6913">CVE-2018-6913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861948" comment="perl-5.26.1-150300.17.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861949" comment="perl-base-5.26.1-150300.17.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206151" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1224277" ref_url="https://bugzilla.suse.com/1224277" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45733" ref_url="https://www.suse.com/security/cve/CVE-2023-45733/" source="CVE"/>
		<reference ref_id="CVE-2023-45745" ref_url="https://www.suse.com/security/cve/CVE-2023-45745/" source="CVE"/>
		<reference ref_id="CVE-2023-46103" ref_url="https://www.suse.com/security/cve/CVE-2023-46103/" source="CVE"/>
		<reference ref_id="CVE-2023-47855" ref_url="https://www.suse.com/security/cve/CVE-2023-47855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Intel CPU Microcode was updated to the 20240514 release (bsc#1224277)

- CVE-2023-45733: Fixed a potential security vulnerability in some
  Intel? Processors that may have allowed information disclosure.
- CVE-2023-46103: Fixed a potential security vulnerability in Intel?
  Core™ Ultra Processors that may have allowed denial of service.
- CVE-2023-45745,CVE-2023-47855: Fixed a potential security
  vulnerabilities in some Intel? Trust Domain Extensions (TDX) module
  software that may have allowed escalation of privilege.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45733/">CVE-2023-45733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45745/">CVE-2023-45745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46103/">CVE-2023-46103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-47855/">CVE-2023-47855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47855">CVE-2023-47855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862123" comment="ucode-intel-20240514-150200.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206152" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1224044" ref_url="https://bugzilla.suse.com/1224044" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018626.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2024-34397: Fixed signal subscription unicast spoofing vulnerability (bsc#1224044).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1224044">SUSE bug 1224044</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863159" comment="glib2-tools-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863160" comment="libgio-2_0-0-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863161" comment="libglib-2_0-0-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863162" comment="libgmodule-2_0-0-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863163" comment="libgobject-2_0-0-2.70.5-150400.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206153" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218722" ref_url="https://bugzilla.suse.com/1218722" source="BUGZILLA"/>
		<reference ref_id="1223980" ref_url="https://bugzilla.suse.com/1223980" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195/" source="CVE"/>
		<reference ref_id="CVE-2024-34064" ref_url="https://www.suse.com/security/cve/CVE-2024-34064/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019260.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- Fixed HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-34064, bsc#1223980, CVE-2024-22195, bsc#1218722)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218722">SUSE bug 1218722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223980">SUSE bug 1223980</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34064/">CVE-2024-34064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34064">CVE-2024-34064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863244" comment="python3-Jinja2-2.10.1-150000.3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206154" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1224788" ref_url="https://bugzilla.suse.com/1224788" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1880-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035430.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2024-35195: Fixed cert verification regardless of changes to the value of `verify` (bsc#1224788).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224788">SUSE bug 1224788</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863423" comment="python3-requests-2.25.1-150300.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206155" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1221940" ref_url="https://bugzilla.suse.com/1221940" source="BUGZILLA"/>
		<reference ref_id="1223423" ref_url="https://bugzilla.suse.com/1223423" source="BUGZILLA"/>
		<reference ref_id="1223424" ref_url="https://bugzilla.suse.com/1223424" source="BUGZILLA"/>
		<reference ref_id="1223425" ref_url="https://bugzilla.suse.com/1223425" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599/" source="CVE"/>
		<reference ref_id="CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600/" source="CVE"/>
		<reference ref_id="CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601/" source="CVE"/>
		<reference ref_id="CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2024-33599: Fixed a stack-based buffer overflow in netgroup cache in nscd (bsc#1223423)
- CVE-2024-33600: Avoid null pointer crashes after notfound response in nscd (bsc#1223424)
- CVE-2024-33600: Do not send missing not-found response in addgetnetgrentX in nscd (bsc#1223424)
- CVE-2024-33601, CVE-2024-33602: Fixed use of two buffers in addgetnetgrentX ( bsc#1223425)
- CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425)

- Avoid creating userspace live patching prologue for _start routine (bsc#1221940)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-03"/>
	<updated date="2024-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221940">SUSE bug 1221940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223423">SUSE bug 1223423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223424">SUSE bug 1223424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223425">SUSE bug 1223425</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009864024" comment="glibc-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864025" comment="glibc-devel-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864026" comment="glibc-locale-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864027" comment="glibc-locale-base-2.31-150300.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206156" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1224806" ref_url="https://bugzilla.suse.com/1224806" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4453" ref_url="https://www.suse.com/security/cve/CVE-2024-4453/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1910-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035462.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issues:

- CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-03"/>
	<updated date="2024-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224806">SUSE bug 1224806</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4453/">CVE-2024-4453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4453">CVE-2024-4453 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009864028" comment="gstreamer-plugins-base-1.20.1-150400.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864029" comment="libgstallocators-1_0-0-1.20.1-150400.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864030" comment="libgstapp-1_0-0-1.20.1-150400.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864031" comment="libgstaudio-1_0-0-1.20.1-150400.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864032" comment="libgstgl-1_0-0-1.20.1-150400.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864033" comment="libgstpbutils-1_0-0-1.20.1-150400.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864034" comment="libgstriff-1_0-0-1.20.1-150400.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864035" comment="libgsttag-1_0-0-1.20.1-150400.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864036" comment="libgstvideo-1_0-0-1.20.1-150400.3.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206157" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1222548" ref_url="https://bugzilla.suse.com/1222548" source="BUGZILLA"/>
		<reference ref_id="1224388" ref_url="https://bugzilla.suse.com/1224388" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2511" ref_url="https://www.suse.com/security/cve/CVE-2024-2511/" source="CVE"/>
		<reference ref_id="CVE-2024-4603" ref_url="https://www.suse.com/security/cve/CVE-2024-4603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035495.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-2511: Fixed unconstrained session cache growth in TLSv1.3 (bsc#1222548).
- CVE-2024-4603: Fixed DSA parameter checks for excessive sizes before validating (bsc#1224388).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-07"/>
	<updated date="2024-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222548">SUSE bug 1222548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224388">SUSE bug 1224388</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2511/">CVE-2024-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4603/">CVE-2024-4603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4603">CVE-2024-4603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865157" comment="libopenssl3-3.0.8-150400.4.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206158" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1222548" ref_url="https://bugzilla.suse.com/1222548" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2511" ref_url="https://www.suse.com/security/cve/CVE-2024-2511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1949-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035493.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2024-2511: Fixed unconstrained session cache growth in TLSv1.3 (bsc#1222548).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-07"/>
	<updated date="2024-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222548">SUSE bug 1222548</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2511/">CVE-2024-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865158" comment="libopenssl-1_1-devel-1.1.1l-150400.7.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865159" comment="libopenssl1_1-1.1.1l-150400.7.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865160" comment="libopenssl1_1-hmac-1.1.1l-150400.7.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865161" comment="openssl-1_1-1.1.1l-150400.7.66.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206159" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1223179" ref_url="https://bugzilla.suse.com/1223179" source="BUGZILLA"/>
		<reference ref_id="1225365" ref_url="https://bugzilla.suse.com/1225365" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35235" ref_url="https://www.suse.com/security/cve/CVE-2024-35235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018704.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2024-35235: Fixed a bug in cupsd that could allow an attacker to change the permissions of other files in the system. (bsc#1225365)
- Handle local 'Negotiate' authentication response for cli clients (bsc#1223179)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223179">SUSE bug 1223179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225365">SUSE bug 1225365</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35235/">CVE-2024-35235 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35235">CVE-2024-35235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865705" comment="cups-config-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865706" comment="libcups2-2.2.7-150000.3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206160" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1223356" ref_url="https://bugzilla.suse.com/1223356" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0090" ref_url="https://www.suse.com/security/cve/CVE-2024-0090/" source="CVE"/>
		<reference ref_id="CVE-2024-0091" ref_url="https://www.suse.com/security/cve/CVE-2024-0091/" source="CVE"/>
		<reference ref_id="CVE-2024-0092" ref_url="https://www.suse.com/security/cve/CVE-2024-0092/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035573.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues:

Security Update 550.90.07:

- CVE-2024-0090: Fixed out of bounds write (bsc#1223356).
- CVE-2024-0092: Fixed incorrect exception handling (bsc#1223356).
- CVE-2024-0091: Fixed untrusted pointer dereference (bsc#1223356).

		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223356">SUSE bug 1223356</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0090/">CVE-2024-0090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0090">CVE-2024-0090 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0091/">CVE-2024-0091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0091">CVE-2024-0091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0092/">CVE-2024-0092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0092">CVE-2024-0092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865655" comment="kernel-firmware-nvidia-gspx-G06-550.90.07-150400.9.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865659" comment="nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150400.24.119-150400.9.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206161" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1174585" ref_url="https://bugzilla.suse.com/1174585" source="BUGZILLA"/>
		<reference ref_id="1190569" ref_url="https://bugzilla.suse.com/1190569" source="BUGZILLA"/>
		<reference ref_id="1191949" ref_url="https://bugzilla.suse.com/1191949" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1193983" ref_url="https://bugzilla.suse.com/1193983" source="BUGZILLA"/>
		<reference ref_id="1194288" ref_url="https://bugzilla.suse.com/1194288" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1196869" ref_url="https://bugzilla.suse.com/1196869" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197915" ref_url="https://bugzilla.suse.com/1197915" source="BUGZILLA"/>
		<reference ref_id="1200313" ref_url="https://bugzilla.suse.com/1200313" source="BUGZILLA"/>
		<reference ref_id="1201308" ref_url="https://bugzilla.suse.com/1201308" source="BUGZILLA"/>
		<reference ref_id="1201489" ref_url="https://bugzilla.suse.com/1201489" source="BUGZILLA"/>
		<reference ref_id="1208149" ref_url="https://bugzilla.suse.com/1208149" source="BUGZILLA"/>
		<reference ref_id="1209657" ref_url="https://bugzilla.suse.com/1209657" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1209834" ref_url="https://bugzilla.suse.com/1209834" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1213863" ref_url="https://bugzilla.suse.com/1213863" source="BUGZILLA"/>
		<reference ref_id="1216702" ref_url="https://bugzilla.suse.com/1216702" source="BUGZILLA"/>
		<reference ref_id="1217169" ref_url="https://bugzilla.suse.com/1217169" source="BUGZILLA"/>
		<reference ref_id="1217515" ref_url="https://bugzilla.suse.com/1217515" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1218917" ref_url="https://bugzilla.suse.com/1218917" source="BUGZILLA"/>
		<reference ref_id="1220492" ref_url="https://bugzilla.suse.com/1220492" source="BUGZILLA"/>
		<reference ref_id="1220783" ref_url="https://bugzilla.suse.com/1220783" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221645" ref_url="https://bugzilla.suse.com/1221645" source="BUGZILLA"/>
		<reference ref_id="1221958" ref_url="https://bugzilla.suse.com/1221958" source="BUGZILLA"/>
		<reference ref_id="1222011" ref_url="https://bugzilla.suse.com/1222011" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="1222721" ref_url="https://bugzilla.suse.com/1222721" source="BUGZILLA"/>
		<reference ref_id="1222976" ref_url="https://bugzilla.suse.com/1222976" source="BUGZILLA"/>
		<reference ref_id="1223057" ref_url="https://bugzilla.suse.com/1223057" source="BUGZILLA"/>
		<reference ref_id="1223084" ref_url="https://bugzilla.suse.com/1223084" source="BUGZILLA"/>
		<reference ref_id="1223111" ref_url="https://bugzilla.suse.com/1223111" source="BUGZILLA"/>
		<reference ref_id="1223138" ref_url="https://bugzilla.suse.com/1223138" source="BUGZILLA"/>
		<reference ref_id="1223191" ref_url="https://bugzilla.suse.com/1223191" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223390" ref_url="https://bugzilla.suse.com/1223390" source="BUGZILLA"/>
		<reference ref_id="1223481" ref_url="https://bugzilla.suse.com/1223481" source="BUGZILLA"/>
		<reference ref_id="1223501" ref_url="https://bugzilla.suse.com/1223501" source="BUGZILLA"/>
		<reference ref_id="1223512" ref_url="https://bugzilla.suse.com/1223512" source="BUGZILLA"/>
		<reference ref_id="1223520" ref_url="https://bugzilla.suse.com/1223520" source="BUGZILLA"/>
		<reference ref_id="1223532" ref_url="https://bugzilla.suse.com/1223532" source="BUGZILLA"/>
		<reference ref_id="1223626" ref_url="https://bugzilla.suse.com/1223626" source="BUGZILLA"/>
		<reference ref_id="1223715" ref_url="https://bugzilla.suse.com/1223715" source="BUGZILLA"/>
		<reference ref_id="1223894" ref_url="https://bugzilla.suse.com/1223894" source="BUGZILLA"/>
		<reference ref_id="1223921" ref_url="https://bugzilla.suse.com/1223921" source="BUGZILLA"/>
		<reference ref_id="1223922" ref_url="https://bugzilla.suse.com/1223922" source="BUGZILLA"/>
		<reference ref_id="1223923" ref_url="https://bugzilla.suse.com/1223923" source="BUGZILLA"/>
		<reference ref_id="1223924" ref_url="https://bugzilla.suse.com/1223924" source="BUGZILLA"/>
		<reference ref_id="1223929" ref_url="https://bugzilla.suse.com/1223929" source="BUGZILLA"/>
		<reference ref_id="1223931" ref_url="https://bugzilla.suse.com/1223931" source="BUGZILLA"/>
		<reference ref_id="1223932" ref_url="https://bugzilla.suse.com/1223932" source="BUGZILLA"/>
		<reference ref_id="1223934" ref_url="https://bugzilla.suse.com/1223934" source="BUGZILLA"/>
		<reference ref_id="1223941" ref_url="https://bugzilla.suse.com/1223941" source="BUGZILLA"/>
		<reference ref_id="1223948" ref_url="https://bugzilla.suse.com/1223948" source="BUGZILLA"/>
		<reference ref_id="1223952" ref_url="https://bugzilla.suse.com/1223952" source="BUGZILLA"/>
		<reference ref_id="1223953" ref_url="https://bugzilla.suse.com/1223953" source="BUGZILLA"/>
		<reference ref_id="1223957" ref_url="https://bugzilla.suse.com/1223957" source="BUGZILLA"/>
		<reference ref_id="1223962" ref_url="https://bugzilla.suse.com/1223962" source="BUGZILLA"/>
		<reference ref_id="1223963" ref_url="https://bugzilla.suse.com/1223963" source="BUGZILLA"/>
		<reference ref_id="1223964" ref_url="https://bugzilla.suse.com/1223964" source="BUGZILLA"/>
		<reference ref_id="1223996" ref_url="https://bugzilla.suse.com/1223996" source="BUGZILLA"/>
		<reference ref_id="1224085" ref_url="https://bugzilla.suse.com/1224085" source="BUGZILLA"/>
		<reference ref_id="1224099" ref_url="https://bugzilla.suse.com/1224099" source="BUGZILLA"/>
		<reference ref_id="1224137" ref_url="https://bugzilla.suse.com/1224137" source="BUGZILLA"/>
		<reference ref_id="1224174" ref_url="https://bugzilla.suse.com/1224174" source="BUGZILLA"/>
		<reference ref_id="1224438" ref_url="https://bugzilla.suse.com/1224438" source="BUGZILLA"/>
		<reference ref_id="1224482" ref_url="https://bugzilla.suse.com/1224482" source="BUGZILLA"/>
		<reference ref_id="1224488" ref_url="https://bugzilla.suse.com/1224488" source="BUGZILLA"/>
		<reference ref_id="1224494" ref_url="https://bugzilla.suse.com/1224494" source="BUGZILLA"/>
		<reference ref_id="1224511" ref_url="https://bugzilla.suse.com/1224511" source="BUGZILLA"/>
		<reference ref_id="1224592" ref_url="https://bugzilla.suse.com/1224592" source="BUGZILLA"/>
		<reference ref_id="1224611" ref_url="https://bugzilla.suse.com/1224611" source="BUGZILLA"/>
		<reference ref_id="1224664" ref_url="https://bugzilla.suse.com/1224664" source="BUGZILLA"/>
		<reference ref_id="1224678" ref_url="https://bugzilla.suse.com/1224678" source="BUGZILLA"/>
		<reference ref_id="1224682" ref_url="https://bugzilla.suse.com/1224682" source="BUGZILLA"/>
		<reference ref_id="1224685" ref_url="https://bugzilla.suse.com/1224685" source="BUGZILLA"/>
		<reference ref_id="1224730" ref_url="https://bugzilla.suse.com/1224730" source="BUGZILLA"/>
		<reference ref_id="1224736" ref_url="https://bugzilla.suse.com/1224736" source="BUGZILLA"/>
		<reference ref_id="1224763" ref_url="https://bugzilla.suse.com/1224763" source="BUGZILLA"/>
		<reference ref_id="1224816" ref_url="https://bugzilla.suse.com/1224816" source="BUGZILLA"/>
		<reference ref_id="1224895" ref_url="https://bugzilla.suse.com/1224895" source="BUGZILLA"/>
		<reference ref_id="1224898" ref_url="https://bugzilla.suse.com/1224898" source="BUGZILLA"/>
		<reference ref_id="1224900" ref_url="https://bugzilla.suse.com/1224900" source="BUGZILLA"/>
		<reference ref_id="1224901" ref_url="https://bugzilla.suse.com/1224901" source="BUGZILLA"/>
		<reference ref_id="1224902" ref_url="https://bugzilla.suse.com/1224902" source="BUGZILLA"/>
		<reference ref_id="1224903" ref_url="https://bugzilla.suse.com/1224903" source="BUGZILLA"/>
		<reference ref_id="1224904" ref_url="https://bugzilla.suse.com/1224904" source="BUGZILLA"/>
		<reference ref_id="1224905" ref_url="https://bugzilla.suse.com/1224905" source="BUGZILLA"/>
		<reference ref_id="1224907" ref_url="https://bugzilla.suse.com/1224907" source="BUGZILLA"/>
		<reference ref_id="1224910" ref_url="https://bugzilla.suse.com/1224910" source="BUGZILLA"/>
		<reference ref_id="1224911" ref_url="https://bugzilla.suse.com/1224911" source="BUGZILLA"/>
		<reference ref_id="1224912" ref_url="https://bugzilla.suse.com/1224912" source="BUGZILLA"/>
		<reference ref_id="1224913" ref_url="https://bugzilla.suse.com/1224913" source="BUGZILLA"/>
		<reference ref_id="1224914" ref_url="https://bugzilla.suse.com/1224914" source="BUGZILLA"/>
		<reference ref_id="1224915" ref_url="https://bugzilla.suse.com/1224915" source="BUGZILLA"/>
		<reference ref_id="1224920" ref_url="https://bugzilla.suse.com/1224920" source="BUGZILLA"/>
		<reference ref_id="1224928" ref_url="https://bugzilla.suse.com/1224928" source="BUGZILLA"/>
		<reference ref_id="1224931" ref_url="https://bugzilla.suse.com/1224931" source="BUGZILLA"/>
		<reference ref_id="1224932" ref_url="https://bugzilla.suse.com/1224932" source="BUGZILLA"/>
		<reference ref_id="1224937" ref_url="https://bugzilla.suse.com/1224937" source="BUGZILLA"/>
		<reference ref_id="1224942" ref_url="https://bugzilla.suse.com/1224942" source="BUGZILLA"/>
		<reference ref_id="1224944" ref_url="https://bugzilla.suse.com/1224944" source="BUGZILLA"/>
		<reference ref_id="1224945" ref_url="https://bugzilla.suse.com/1224945" source="BUGZILLA"/>
		<reference ref_id="1224947" ref_url="https://bugzilla.suse.com/1224947" source="BUGZILLA"/>
		<reference ref_id="1224956" ref_url="https://bugzilla.suse.com/1224956" source="BUGZILLA"/>
		<reference ref_id="1224988" ref_url="https://bugzilla.suse.com/1224988" source="BUGZILLA"/>
		<reference ref_id="1225000" ref_url="https://bugzilla.suse.com/1225000" source="BUGZILLA"/>
		<reference ref_id="1225003" ref_url="https://bugzilla.suse.com/1225003" source="BUGZILLA"/>
		<reference ref_id="1225005" ref_url="https://bugzilla.suse.com/1225005" source="BUGZILLA"/>
		<reference ref_id="1225009" ref_url="https://bugzilla.suse.com/1225009" source="BUGZILLA"/>
		<reference ref_id="1225022" ref_url="https://bugzilla.suse.com/1225022" source="BUGZILLA"/>
		<reference ref_id="1225031" ref_url="https://bugzilla.suse.com/1225031" source="BUGZILLA"/>
		<reference ref_id="1225032" ref_url="https://bugzilla.suse.com/1225032" source="BUGZILLA"/>
		<reference ref_id="1225036" ref_url="https://bugzilla.suse.com/1225036" source="BUGZILLA"/>
		<reference ref_id="1225044" ref_url="https://bugzilla.suse.com/1225044" source="BUGZILLA"/>
		<reference ref_id="1225076" ref_url="https://bugzilla.suse.com/1225076" source="BUGZILLA"/>
		<reference ref_id="1225077" ref_url="https://bugzilla.suse.com/1225077" source="BUGZILLA"/>
		<reference ref_id="1225082" ref_url="https://bugzilla.suse.com/1225082" source="BUGZILLA"/>
		<reference ref_id="1225086" ref_url="https://bugzilla.suse.com/1225086" source="BUGZILLA"/>
		<reference ref_id="1225092" ref_url="https://bugzilla.suse.com/1225092" source="BUGZILLA"/>
		<reference ref_id="1225095" ref_url="https://bugzilla.suse.com/1225095" source="BUGZILLA"/>
		<reference ref_id="1225096" ref_url="https://bugzilla.suse.com/1225096" source="BUGZILLA"/>
		<reference ref_id="1225106" ref_url="https://bugzilla.suse.com/1225106" source="BUGZILLA"/>
		<reference ref_id="1225108" ref_url="https://bugzilla.suse.com/1225108" source="BUGZILLA"/>
		<reference ref_id="1225109" ref_url="https://bugzilla.suse.com/1225109" source="BUGZILLA"/>
		<reference ref_id="1225118" ref_url="https://bugzilla.suse.com/1225118" source="BUGZILLA"/>
		<reference ref_id="1225121" ref_url="https://bugzilla.suse.com/1225121" source="BUGZILLA"/>
		<reference ref_id="1225122" ref_url="https://bugzilla.suse.com/1225122" source="BUGZILLA"/>
		<reference ref_id="1225123" ref_url="https://bugzilla.suse.com/1225123" source="BUGZILLA"/>
		<reference ref_id="1225125" ref_url="https://bugzilla.suse.com/1225125" source="BUGZILLA"/>
		<reference ref_id="1225126" ref_url="https://bugzilla.suse.com/1225126" source="BUGZILLA"/>
		<reference ref_id="1225127" ref_url="https://bugzilla.suse.com/1225127" source="BUGZILLA"/>
		<reference ref_id="1225129" ref_url="https://bugzilla.suse.com/1225129" source="BUGZILLA"/>
		<reference ref_id="1225131" ref_url="https://bugzilla.suse.com/1225131" source="BUGZILLA"/>
		<reference ref_id="1225132" ref_url="https://bugzilla.suse.com/1225132" source="BUGZILLA"/>
		<reference ref_id="1225145" ref_url="https://bugzilla.suse.com/1225145" source="BUGZILLA"/>
		<reference ref_id="1225151" ref_url="https://bugzilla.suse.com/1225151" source="BUGZILLA"/>
		<reference ref_id="1225153" ref_url="https://bugzilla.suse.com/1225153" source="BUGZILLA"/>
		<reference ref_id="1225156" ref_url="https://bugzilla.suse.com/1225156" source="BUGZILLA"/>
		<reference ref_id="1225158" ref_url="https://bugzilla.suse.com/1225158" source="BUGZILLA"/>
		<reference ref_id="1225160" ref_url="https://bugzilla.suse.com/1225160" source="BUGZILLA"/>
		<reference ref_id="1225161" ref_url="https://bugzilla.suse.com/1225161" source="BUGZILLA"/>
		<reference ref_id="1225164" ref_url="https://bugzilla.suse.com/1225164" source="BUGZILLA"/>
		<reference ref_id="1225167" ref_url="https://bugzilla.suse.com/1225167" source="BUGZILLA"/>
		<reference ref_id="1225180" ref_url="https://bugzilla.suse.com/1225180" source="BUGZILLA"/>
		<reference ref_id="1225183" ref_url="https://bugzilla.suse.com/1225183" source="BUGZILLA"/>
		<reference ref_id="1225184" ref_url="https://bugzilla.suse.com/1225184" source="BUGZILLA"/>
		<reference ref_id="1225186" ref_url="https://bugzilla.suse.com/1225186" source="BUGZILLA"/>
		<reference ref_id="1225187" ref_url="https://bugzilla.suse.com/1225187" source="BUGZILLA"/>
		<reference ref_id="1225189" ref_url="https://bugzilla.suse.com/1225189" source="BUGZILLA"/>
		<reference ref_id="1225190" ref_url="https://bugzilla.suse.com/1225190" source="BUGZILLA"/>
		<reference ref_id="1225191" ref_url="https://bugzilla.suse.com/1225191" source="BUGZILLA"/>
		<reference ref_id="1225192" ref_url="https://bugzilla.suse.com/1225192" source="BUGZILLA"/>
		<reference ref_id="1225193" ref_url="https://bugzilla.suse.com/1225193" source="BUGZILLA"/>
		<reference ref_id="1225195" ref_url="https://bugzilla.suse.com/1225195" source="BUGZILLA"/>
		<reference ref_id="1225198" ref_url="https://bugzilla.suse.com/1225198" source="BUGZILLA"/>
		<reference ref_id="1225201" ref_url="https://bugzilla.suse.com/1225201" source="BUGZILLA"/>
		<reference ref_id="1225203" ref_url="https://bugzilla.suse.com/1225203" source="BUGZILLA"/>
		<reference ref_id="1225205" ref_url="https://bugzilla.suse.com/1225205" source="BUGZILLA"/>
		<reference ref_id="1225206" ref_url="https://bugzilla.suse.com/1225206" source="BUGZILLA"/>
		<reference ref_id="1225207" ref_url="https://bugzilla.suse.com/1225207" source="BUGZILLA"/>
		<reference ref_id="1225208" ref_url="https://bugzilla.suse.com/1225208" source="BUGZILLA"/>
		<reference ref_id="1225209" ref_url="https://bugzilla.suse.com/1225209" source="BUGZILLA"/>
		<reference ref_id="1225210" ref_url="https://bugzilla.suse.com/1225210" source="BUGZILLA"/>
		<reference ref_id="1225214" ref_url="https://bugzilla.suse.com/1225214" source="BUGZILLA"/>
		<reference ref_id="1225223" ref_url="https://bugzilla.suse.com/1225223" source="BUGZILLA"/>
		<reference ref_id="1225224" ref_url="https://bugzilla.suse.com/1225224" source="BUGZILLA"/>
		<reference ref_id="1225225" ref_url="https://bugzilla.suse.com/1225225" source="BUGZILLA"/>
		<reference ref_id="1225227" ref_url="https://bugzilla.suse.com/1225227" source="BUGZILLA"/>
		<reference ref_id="1225228" ref_url="https://bugzilla.suse.com/1225228" source="BUGZILLA"/>
		<reference ref_id="1225229" ref_url="https://bugzilla.suse.com/1225229" source="BUGZILLA"/>
		<reference ref_id="1225230" ref_url="https://bugzilla.suse.com/1225230" source="BUGZILLA"/>
		<reference ref_id="1225232" ref_url="https://bugzilla.suse.com/1225232" source="BUGZILLA"/>
		<reference ref_id="1225233" ref_url="https://bugzilla.suse.com/1225233" source="BUGZILLA"/>
		<reference ref_id="1225235" ref_url="https://bugzilla.suse.com/1225235" source="BUGZILLA"/>
		<reference ref_id="1225236" ref_url="https://bugzilla.suse.com/1225236" source="BUGZILLA"/>
		<reference ref_id="1225237" ref_url="https://bugzilla.suse.com/1225237" source="BUGZILLA"/>
		<reference ref_id="1225238" ref_url="https://bugzilla.suse.com/1225238" source="BUGZILLA"/>
		<reference ref_id="1225239" ref_url="https://bugzilla.suse.com/1225239" source="BUGZILLA"/>
		<reference ref_id="1225240" ref_url="https://bugzilla.suse.com/1225240" source="BUGZILLA"/>
		<reference ref_id="1225241" ref_url="https://bugzilla.suse.com/1225241" source="BUGZILLA"/>
		<reference ref_id="1225242" ref_url="https://bugzilla.suse.com/1225242" source="BUGZILLA"/>
		<reference ref_id="1225243" ref_url="https://bugzilla.suse.com/1225243" source="BUGZILLA"/>
		<reference ref_id="1225244" ref_url="https://bugzilla.suse.com/1225244" source="BUGZILLA"/>
		<reference ref_id="1225245" ref_url="https://bugzilla.suse.com/1225245" source="BUGZILLA"/>
		<reference ref_id="1225246" ref_url="https://bugzilla.suse.com/1225246" source="BUGZILLA"/>
		<reference ref_id="1225247" ref_url="https://bugzilla.suse.com/1225247" source="BUGZILLA"/>
		<reference ref_id="1225248" ref_url="https://bugzilla.suse.com/1225248" source="BUGZILLA"/>
		<reference ref_id="1225249" ref_url="https://bugzilla.suse.com/1225249" source="BUGZILLA"/>
		<reference ref_id="1225250" ref_url="https://bugzilla.suse.com/1225250" source="BUGZILLA"/>
		<reference ref_id="1225251" ref_url="https://bugzilla.suse.com/1225251" source="BUGZILLA"/>
		<reference ref_id="1225252" ref_url="https://bugzilla.suse.com/1225252" source="BUGZILLA"/>
		<reference ref_id="1225253" ref_url="https://bugzilla.suse.com/1225253" source="BUGZILLA"/>
		<reference ref_id="1225254" ref_url="https://bugzilla.suse.com/1225254" source="BUGZILLA"/>
		<reference ref_id="1225255" ref_url="https://bugzilla.suse.com/1225255" source="BUGZILLA"/>
		<reference ref_id="1225256" ref_url="https://bugzilla.suse.com/1225256" source="BUGZILLA"/>
		<reference ref_id="1225257" ref_url="https://bugzilla.suse.com/1225257" source="BUGZILLA"/>
		<reference ref_id="1225258" ref_url="https://bugzilla.suse.com/1225258" source="BUGZILLA"/>
		<reference ref_id="1225259" ref_url="https://bugzilla.suse.com/1225259" source="BUGZILLA"/>
		<reference ref_id="1225260" ref_url="https://bugzilla.suse.com/1225260" source="BUGZILLA"/>
		<reference ref_id="1225261" ref_url="https://bugzilla.suse.com/1225261" source="BUGZILLA"/>
		<reference ref_id="1225262" ref_url="https://bugzilla.suse.com/1225262" source="BUGZILLA"/>
		<reference ref_id="1225263" ref_url="https://bugzilla.suse.com/1225263" source="BUGZILLA"/>
		<reference ref_id="1225268" ref_url="https://bugzilla.suse.com/1225268" source="BUGZILLA"/>
		<reference ref_id="1225301" ref_url="https://bugzilla.suse.com/1225301" source="BUGZILLA"/>
		<reference ref_id="1225303" ref_url="https://bugzilla.suse.com/1225303" source="BUGZILLA"/>
		<reference ref_id="1225304" ref_url="https://bugzilla.suse.com/1225304" source="BUGZILLA"/>
		<reference ref_id="1225306" ref_url="https://bugzilla.suse.com/1225306" source="BUGZILLA"/>
		<reference ref_id="1225316" ref_url="https://bugzilla.suse.com/1225316" source="BUGZILLA"/>
		<reference ref_id="1225318" ref_url="https://bugzilla.suse.com/1225318" source="BUGZILLA"/>
		<reference ref_id="1225320" ref_url="https://bugzilla.suse.com/1225320" source="BUGZILLA"/>
		<reference ref_id="1225321" ref_url="https://bugzilla.suse.com/1225321" source="BUGZILLA"/>
		<reference ref_id="1225322" ref_url="https://bugzilla.suse.com/1225322" source="BUGZILLA"/>
		<reference ref_id="1225323" ref_url="https://bugzilla.suse.com/1225323" source="BUGZILLA"/>
		<reference ref_id="1225326" ref_url="https://bugzilla.suse.com/1225326" source="BUGZILLA"/>
		<reference ref_id="1225327" ref_url="https://bugzilla.suse.com/1225327" source="BUGZILLA"/>
		<reference ref_id="1225328" ref_url="https://bugzilla.suse.com/1225328" source="BUGZILLA"/>
		<reference ref_id="1225329" ref_url="https://bugzilla.suse.com/1225329" source="BUGZILLA"/>
		<reference ref_id="1225330" ref_url="https://bugzilla.suse.com/1225330" source="BUGZILLA"/>
		<reference ref_id="1225331" ref_url="https://bugzilla.suse.com/1225331" source="BUGZILLA"/>
		<reference ref_id="1225332" ref_url="https://bugzilla.suse.com/1225332" source="BUGZILLA"/>
		<reference ref_id="1225333" ref_url="https://bugzilla.suse.com/1225333" source="BUGZILLA"/>
		<reference ref_id="1225334" ref_url="https://bugzilla.suse.com/1225334" source="BUGZILLA"/>
		<reference ref_id="1225335" ref_url="https://bugzilla.suse.com/1225335" source="BUGZILLA"/>
		<reference ref_id="1225336" ref_url="https://bugzilla.suse.com/1225336" source="BUGZILLA"/>
		<reference ref_id="1225337" ref_url="https://bugzilla.suse.com/1225337" source="BUGZILLA"/>
		<reference ref_id="1225338" ref_url="https://bugzilla.suse.com/1225338" source="BUGZILLA"/>
		<reference ref_id="1225339" ref_url="https://bugzilla.suse.com/1225339" source="BUGZILLA"/>
		<reference ref_id="1225341" ref_url="https://bugzilla.suse.com/1225341" source="BUGZILLA"/>
		<reference ref_id="1225342" ref_url="https://bugzilla.suse.com/1225342" source="BUGZILLA"/>
		<reference ref_id="1225344" ref_url="https://bugzilla.suse.com/1225344" source="BUGZILLA"/>
		<reference ref_id="1225346" ref_url="https://bugzilla.suse.com/1225346" source="BUGZILLA"/>
		<reference ref_id="1225347" ref_url="https://bugzilla.suse.com/1225347" source="BUGZILLA"/>
		<reference ref_id="1225351" ref_url="https://bugzilla.suse.com/1225351" source="BUGZILLA"/>
		<reference ref_id="1225353" ref_url="https://bugzilla.suse.com/1225353" source="BUGZILLA"/>
		<reference ref_id="1225354" ref_url="https://bugzilla.suse.com/1225354" source="BUGZILLA"/>
		<reference ref_id="1225355" ref_url="https://bugzilla.suse.com/1225355" source="BUGZILLA"/>
		<reference ref_id="1225357" ref_url="https://bugzilla.suse.com/1225357" source="BUGZILLA"/>
		<reference ref_id="1225358" ref_url="https://bugzilla.suse.com/1225358" source="BUGZILLA"/>
		<reference ref_id="1225360" ref_url="https://bugzilla.suse.com/1225360" source="BUGZILLA"/>
		<reference ref_id="1225361" ref_url="https://bugzilla.suse.com/1225361" source="BUGZILLA"/>
		<reference ref_id="1225366" ref_url="https://bugzilla.suse.com/1225366" source="BUGZILLA"/>
		<reference ref_id="1225367" ref_url="https://bugzilla.suse.com/1225367" source="BUGZILLA"/>
		<reference ref_id="1225368" ref_url="https://bugzilla.suse.com/1225368" source="BUGZILLA"/>
		<reference ref_id="1225369" ref_url="https://bugzilla.suse.com/1225369" source="BUGZILLA"/>
		<reference ref_id="1225370" ref_url="https://bugzilla.suse.com/1225370" source="BUGZILLA"/>
		<reference ref_id="1225372" ref_url="https://bugzilla.suse.com/1225372" source="BUGZILLA"/>
		<reference ref_id="1225373" ref_url="https://bugzilla.suse.com/1225373" source="BUGZILLA"/>
		<reference ref_id="1225374" ref_url="https://bugzilla.suse.com/1225374" source="BUGZILLA"/>
		<reference ref_id="1225375" ref_url="https://bugzilla.suse.com/1225375" source="BUGZILLA"/>
		<reference ref_id="1225376" ref_url="https://bugzilla.suse.com/1225376" source="BUGZILLA"/>
		<reference ref_id="1225377" ref_url="https://bugzilla.suse.com/1225377" source="BUGZILLA"/>
		<reference ref_id="1225379" ref_url="https://bugzilla.suse.com/1225379" source="BUGZILLA"/>
		<reference ref_id="1225383" ref_url="https://bugzilla.suse.com/1225383" source="BUGZILLA"/>
		<reference ref_id="1225384" ref_url="https://bugzilla.suse.com/1225384" source="BUGZILLA"/>
		<reference ref_id="1225386" ref_url="https://bugzilla.suse.com/1225386" source="BUGZILLA"/>
		<reference ref_id="1225387" ref_url="https://bugzilla.suse.com/1225387" source="BUGZILLA"/>
		<reference ref_id="1225388" ref_url="https://bugzilla.suse.com/1225388" source="BUGZILLA"/>
		<reference ref_id="1225390" ref_url="https://bugzilla.suse.com/1225390" source="BUGZILLA"/>
		<reference ref_id="1225392" ref_url="https://bugzilla.suse.com/1225392" source="BUGZILLA"/>
		<reference ref_id="1225393" ref_url="https://bugzilla.suse.com/1225393" source="BUGZILLA"/>
		<reference ref_id="1225396" ref_url="https://bugzilla.suse.com/1225396" source="BUGZILLA"/>
		<reference ref_id="1225400" ref_url="https://bugzilla.suse.com/1225400" source="BUGZILLA"/>
		<reference ref_id="1225404" ref_url="https://bugzilla.suse.com/1225404" source="BUGZILLA"/>
		<reference ref_id="1225405" ref_url="https://bugzilla.suse.com/1225405" source="BUGZILLA"/>
		<reference ref_id="1225409" ref_url="https://bugzilla.suse.com/1225409" source="BUGZILLA"/>
		<reference ref_id="1225410" ref_url="https://bugzilla.suse.com/1225410" source="BUGZILLA"/>
		<reference ref_id="1225411" ref_url="https://bugzilla.suse.com/1225411" source="BUGZILLA"/>
		<reference ref_id="1225425" ref_url="https://bugzilla.suse.com/1225425" source="BUGZILLA"/>
		<reference ref_id="1225427" ref_url="https://bugzilla.suse.com/1225427" source="BUGZILLA"/>
		<reference ref_id="1225431" ref_url="https://bugzilla.suse.com/1225431" source="BUGZILLA"/>
		<reference ref_id="1225435" ref_url="https://bugzilla.suse.com/1225435" source="BUGZILLA"/>
		<reference ref_id="1225436" ref_url="https://bugzilla.suse.com/1225436" source="BUGZILLA"/>
		<reference ref_id="1225437" ref_url="https://bugzilla.suse.com/1225437" source="BUGZILLA"/>
		<reference ref_id="1225438" ref_url="https://bugzilla.suse.com/1225438" source="BUGZILLA"/>
		<reference ref_id="1225439" ref_url="https://bugzilla.suse.com/1225439" source="BUGZILLA"/>
		<reference ref_id="1225441" ref_url="https://bugzilla.suse.com/1225441" source="BUGZILLA"/>
		<reference ref_id="1225445" ref_url="https://bugzilla.suse.com/1225445" source="BUGZILLA"/>
		<reference ref_id="1225446" ref_url="https://bugzilla.suse.com/1225446" source="BUGZILLA"/>
		<reference ref_id="1225447" ref_url="https://bugzilla.suse.com/1225447" source="BUGZILLA"/>
		<reference ref_id="1225450" ref_url="https://bugzilla.suse.com/1225450" source="BUGZILLA"/>
		<reference ref_id="1225453" ref_url="https://bugzilla.suse.com/1225453" source="BUGZILLA"/>
		<reference ref_id="1225455" ref_url="https://bugzilla.suse.com/1225455" source="BUGZILLA"/>
		<reference ref_id="1225461" ref_url="https://bugzilla.suse.com/1225461" source="BUGZILLA"/>
		<reference ref_id="1225463" ref_url="https://bugzilla.suse.com/1225463" source="BUGZILLA"/>
		<reference ref_id="1225464" ref_url="https://bugzilla.suse.com/1225464" source="BUGZILLA"/>
		<reference ref_id="1225466" ref_url="https://bugzilla.suse.com/1225466" source="BUGZILLA"/>
		<reference ref_id="1225471" ref_url="https://bugzilla.suse.com/1225471" source="BUGZILLA"/>
		<reference ref_id="1225472" ref_url="https://bugzilla.suse.com/1225472" source="BUGZILLA"/>
		<reference ref_id="1225478" ref_url="https://bugzilla.suse.com/1225478" source="BUGZILLA"/>
		<reference ref_id="1225479" ref_url="https://bugzilla.suse.com/1225479" source="BUGZILLA"/>
		<reference ref_id="1225482" ref_url="https://bugzilla.suse.com/1225482" source="BUGZILLA"/>
		<reference ref_id="1225483" ref_url="https://bugzilla.suse.com/1225483" source="BUGZILLA"/>
		<reference ref_id="1225488" ref_url="https://bugzilla.suse.com/1225488" source="BUGZILLA"/>
		<reference ref_id="1225490" ref_url="https://bugzilla.suse.com/1225490" source="BUGZILLA"/>
		<reference ref_id="1225492" ref_url="https://bugzilla.suse.com/1225492" source="BUGZILLA"/>
		<reference ref_id="1225495" ref_url="https://bugzilla.suse.com/1225495" source="BUGZILLA"/>
		<reference ref_id="1225499" ref_url="https://bugzilla.suse.com/1225499" source="BUGZILLA"/>
		<reference ref_id="1225500" ref_url="https://bugzilla.suse.com/1225500" source="BUGZILLA"/>
		<reference ref_id="1225501" ref_url="https://bugzilla.suse.com/1225501" source="BUGZILLA"/>
		<reference ref_id="1225508" ref_url="https://bugzilla.suse.com/1225508" source="BUGZILLA"/>
		<reference ref_id="1225510" ref_url="https://bugzilla.suse.com/1225510" source="BUGZILLA"/>
		<reference ref_id="1225529" ref_url="https://bugzilla.suse.com/1225529" source="BUGZILLA"/>
		<reference ref_id="1225530" ref_url="https://bugzilla.suse.com/1225530" source="BUGZILLA"/>
		<reference ref_id="1225532" ref_url="https://bugzilla.suse.com/1225532" source="BUGZILLA"/>
		<reference ref_id="1225534" ref_url="https://bugzilla.suse.com/1225534" source="BUGZILLA"/>
		<reference ref_id="1225549" ref_url="https://bugzilla.suse.com/1225549" source="BUGZILLA"/>
		<reference ref_id="1225550" ref_url="https://bugzilla.suse.com/1225550" source="BUGZILLA"/>
		<reference ref_id="1225553" ref_url="https://bugzilla.suse.com/1225553" source="BUGZILLA"/>
		<reference ref_id="1225554" ref_url="https://bugzilla.suse.com/1225554" source="BUGZILLA"/>
		<reference ref_id="1225557" ref_url="https://bugzilla.suse.com/1225557" source="BUGZILLA"/>
		<reference ref_id="1225559" ref_url="https://bugzilla.suse.com/1225559" source="BUGZILLA"/>
		<reference ref_id="1225560" ref_url="https://bugzilla.suse.com/1225560" source="BUGZILLA"/>
		<reference ref_id="1225565" ref_url="https://bugzilla.suse.com/1225565" source="BUGZILLA"/>
		<reference ref_id="1225566" ref_url="https://bugzilla.suse.com/1225566" source="BUGZILLA"/>
		<reference ref_id="1225569" ref_url="https://bugzilla.suse.com/1225569" source="BUGZILLA"/>
		<reference ref_id="1225570" ref_url="https://bugzilla.suse.com/1225570" source="BUGZILLA"/>
		<reference ref_id="1225571" ref_url="https://bugzilla.suse.com/1225571" source="BUGZILLA"/>
		<reference ref_id="1225572" ref_url="https://bugzilla.suse.com/1225572" source="BUGZILLA"/>
		<reference ref_id="1225577" ref_url="https://bugzilla.suse.com/1225577" source="BUGZILLA"/>
		<reference ref_id="1225583" ref_url="https://bugzilla.suse.com/1225583" source="BUGZILLA"/>
		<reference ref_id="1225584" ref_url="https://bugzilla.suse.com/1225584" source="BUGZILLA"/>
		<reference ref_id="1225588" ref_url="https://bugzilla.suse.com/1225588" source="BUGZILLA"/>
		<reference ref_id="1225589" ref_url="https://bugzilla.suse.com/1225589" source="BUGZILLA"/>
		<reference ref_id="1225590" ref_url="https://bugzilla.suse.com/1225590" source="BUGZILLA"/>
		<reference ref_id="1225591" ref_url="https://bugzilla.suse.com/1225591" source="BUGZILLA"/>
		<reference ref_id="1225592" ref_url="https://bugzilla.suse.com/1225592" source="BUGZILLA"/>
		<reference ref_id="1225595" ref_url="https://bugzilla.suse.com/1225595" source="BUGZILLA"/>
		<reference ref_id="1225599" ref_url="https://bugzilla.suse.com/1225599" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36788" ref_url="https://www.suse.com/security/cve/CVE-2020-36788/" source="CVE"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="CVE-2021-47358" ref_url="https://www.suse.com/security/cve/CVE-2021-47358/" source="CVE"/>
		<reference ref_id="CVE-2021-47359" ref_url="https://www.suse.com/security/cve/CVE-2021-47359/" source="CVE"/>
		<reference ref_id="CVE-2021-47360" ref_url="https://www.suse.com/security/cve/CVE-2021-47360/" source="CVE"/>
		<reference ref_id="CVE-2021-47361" ref_url="https://www.suse.com/security/cve/CVE-2021-47361/" source="CVE"/>
		<reference ref_id="CVE-2021-47362" ref_url="https://www.suse.com/security/cve/CVE-2021-47362/" source="CVE"/>
		<reference ref_id="CVE-2021-47363" ref_url="https://www.suse.com/security/cve/CVE-2021-47363/" source="CVE"/>
		<reference ref_id="CVE-2021-47364" ref_url="https://www.suse.com/security/cve/CVE-2021-47364/" source="CVE"/>
		<reference ref_id="CVE-2021-47365" ref_url="https://www.suse.com/security/cve/CVE-2021-47365/" source="CVE"/>
		<reference ref_id="CVE-2021-47366" ref_url="https://www.suse.com/security/cve/CVE-2021-47366/" source="CVE"/>
		<reference ref_id="CVE-2021-47367" ref_url="https://www.suse.com/security/cve/CVE-2021-47367/" source="CVE"/>
		<reference ref_id="CVE-2021-47368" ref_url="https://www.suse.com/security/cve/CVE-2021-47368/" source="CVE"/>
		<reference ref_id="CVE-2021-47369" ref_url="https://www.suse.com/security/cve/CVE-2021-47369/" source="CVE"/>
		<reference ref_id="CVE-2021-47370" ref_url="https://www.suse.com/security/cve/CVE-2021-47370/" source="CVE"/>
		<reference ref_id="CVE-2021-47371" ref_url="https://www.suse.com/security/cve/CVE-2021-47371/" source="CVE"/>
		<reference ref_id="CVE-2021-47372" ref_url="https://www.suse.com/security/cve/CVE-2021-47372/" source="CVE"/>
		<reference ref_id="CVE-2021-47373" ref_url="https://www.suse.com/security/cve/CVE-2021-47373/" source="CVE"/>
		<reference ref_id="CVE-2021-47374" ref_url="https://www.suse.com/security/cve/CVE-2021-47374/" source="CVE"/>
		<reference ref_id="CVE-2021-47375" ref_url="https://www.suse.com/security/cve/CVE-2021-47375/" source="CVE"/>
		<reference ref_id="CVE-2021-47376" ref_url="https://www.suse.com/security/cve/CVE-2021-47376/" source="CVE"/>
		<reference ref_id="CVE-2021-47378" ref_url="https://www.suse.com/security/cve/CVE-2021-47378/" source="CVE"/>
		<reference ref_id="CVE-2021-47379" ref_url="https://www.suse.com/security/cve/CVE-2021-47379/" source="CVE"/>
		<reference ref_id="CVE-2021-47380" ref_url="https://www.suse.com/security/cve/CVE-2021-47380/" source="CVE"/>
		<reference ref_id="CVE-2021-47381" ref_url="https://www.suse.com/security/cve/CVE-2021-47381/" source="CVE"/>
		<reference ref_id="CVE-2021-47382" ref_url="https://www.suse.com/security/cve/CVE-2021-47382/" source="CVE"/>
		<reference ref_id="CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383/" source="CVE"/>
		<reference ref_id="CVE-2021-47384" ref_url="https://www.suse.com/security/cve/CVE-2021-47384/" source="CVE"/>
		<reference ref_id="CVE-2021-47385" ref_url="https://www.suse.com/security/cve/CVE-2021-47385/" source="CVE"/>
		<reference ref_id="CVE-2021-47386" ref_url="https://www.suse.com/security/cve/CVE-2021-47386/" source="CVE"/>
		<reference ref_id="CVE-2021-47387" ref_url="https://www.suse.com/security/cve/CVE-2021-47387/" source="CVE"/>
		<reference ref_id="CVE-2021-47388" ref_url="https://www.suse.com/security/cve/CVE-2021-47388/" source="CVE"/>
		<reference ref_id="CVE-2021-47389" ref_url="https://www.suse.com/security/cve/CVE-2021-47389/" source="CVE"/>
		<reference ref_id="CVE-2021-47390" ref_url="https://www.suse.com/security/cve/CVE-2021-47390/" source="CVE"/>
		<reference ref_id="CVE-2021-47391" ref_url="https://www.suse.com/security/cve/CVE-2021-47391/" source="CVE"/>
		<reference ref_id="CVE-2021-47392" ref_url="https://www.suse.com/security/cve/CVE-2021-47392/" source="CVE"/>
		<reference ref_id="CVE-2021-47393" ref_url="https://www.suse.com/security/cve/CVE-2021-47393/" source="CVE"/>
		<reference ref_id="CVE-2021-47394" ref_url="https://www.suse.com/security/cve/CVE-2021-47394/" source="CVE"/>
		<reference ref_id="CVE-2021-47395" ref_url="https://www.suse.com/security/cve/CVE-2021-47395/" source="CVE"/>
		<reference ref_id="CVE-2021-47396" ref_url="https://www.suse.com/security/cve/CVE-2021-47396/" source="CVE"/>
		<reference ref_id="CVE-2021-47397" ref_url="https://www.suse.com/security/cve/CVE-2021-47397/" source="CVE"/>
		<reference ref_id="CVE-2021-47398" ref_url="https://www.suse.com/security/cve/CVE-2021-47398/" source="CVE"/>
		<reference ref_id="CVE-2021-47399" ref_url="https://www.suse.com/security/cve/CVE-2021-47399/" source="CVE"/>
		<reference ref_id="CVE-2021-47400" ref_url="https://www.suse.com/security/cve/CVE-2021-47400/" source="CVE"/>
		<reference ref_id="CVE-2021-47401" ref_url="https://www.suse.com/security/cve/CVE-2021-47401/" source="CVE"/>
		<reference ref_id="CVE-2021-47402" ref_url="https://www.suse.com/security/cve/CVE-2021-47402/" source="CVE"/>
		<reference ref_id="CVE-2021-47403" ref_url="https://www.suse.com/security/cve/CVE-2021-47403/" source="CVE"/>
		<reference ref_id="CVE-2021-47404" ref_url="https://www.suse.com/security/cve/CVE-2021-47404/" source="CVE"/>
		<reference ref_id="CVE-2021-47405" ref_url="https://www.suse.com/security/cve/CVE-2021-47405/" source="CVE"/>
		<reference ref_id="CVE-2021-47406" ref_url="https://www.suse.com/security/cve/CVE-2021-47406/" source="CVE"/>
		<reference ref_id="CVE-2021-47407" ref_url="https://www.suse.com/security/cve/CVE-2021-47407/" source="CVE"/>
		<reference ref_id="CVE-2021-47408" ref_url="https://www.suse.com/security/cve/CVE-2021-47408/" source="CVE"/>
		<reference ref_id="CVE-2021-47409" ref_url="https://www.suse.com/security/cve/CVE-2021-47409/" source="CVE"/>
		<reference ref_id="CVE-2021-47410" ref_url="https://www.suse.com/security/cve/CVE-2021-47410/" source="CVE"/>
		<reference ref_id="CVE-2021-47412" ref_url="https://www.suse.com/security/cve/CVE-2021-47412/" source="CVE"/>
		<reference ref_id="CVE-2021-47413" ref_url="https://www.suse.com/security/cve/CVE-2021-47413/" source="CVE"/>
		<reference ref_id="CVE-2021-47414" ref_url="https://www.suse.com/security/cve/CVE-2021-47414/" source="CVE"/>
		<reference ref_id="CVE-2021-47415" ref_url="https://www.suse.com/security/cve/CVE-2021-47415/" source="CVE"/>
		<reference ref_id="CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416/" source="CVE"/>
		<reference ref_id="CVE-2021-47417" ref_url="https://www.suse.com/security/cve/CVE-2021-47417/" source="CVE"/>
		<reference ref_id="CVE-2021-47418" ref_url="https://www.suse.com/security/cve/CVE-2021-47418/" source="CVE"/>
		<reference ref_id="CVE-2021-47419" ref_url="https://www.suse.com/security/cve/CVE-2021-47419/" source="CVE"/>
		<reference ref_id="CVE-2021-47420" ref_url="https://www.suse.com/security/cve/CVE-2021-47420/" source="CVE"/>
		<reference ref_id="CVE-2021-47421" ref_url="https://www.suse.com/security/cve/CVE-2021-47421/" source="CVE"/>
		<reference ref_id="CVE-2021-47422" ref_url="https://www.suse.com/security/cve/CVE-2021-47422/" source="CVE"/>
		<reference ref_id="CVE-2021-47423" ref_url="https://www.suse.com/security/cve/CVE-2021-47423/" source="CVE"/>
		<reference ref_id="CVE-2021-47424" ref_url="https://www.suse.com/security/cve/CVE-2021-47424/" source="CVE"/>
		<reference ref_id="CVE-2021-47425" ref_url="https://www.suse.com/security/cve/CVE-2021-47425/" source="CVE"/>
		<reference ref_id="CVE-2021-47426" ref_url="https://www.suse.com/security/cve/CVE-2021-47426/" source="CVE"/>
		<reference ref_id="CVE-2021-47427" ref_url="https://www.suse.com/security/cve/CVE-2021-47427/" source="CVE"/>
		<reference ref_id="CVE-2021-47428" ref_url="https://www.suse.com/security/cve/CVE-2021-47428/" source="CVE"/>
		<reference ref_id="CVE-2021-47429" ref_url="https://www.suse.com/security/cve/CVE-2021-47429/" source="CVE"/>
		<reference ref_id="CVE-2021-47430" ref_url="https://www.suse.com/security/cve/CVE-2021-47430/" source="CVE"/>
		<reference ref_id="CVE-2021-47431" ref_url="https://www.suse.com/security/cve/CVE-2021-47431/" source="CVE"/>
		<reference ref_id="CVE-2021-47433" ref_url="https://www.suse.com/security/cve/CVE-2021-47433/" source="CVE"/>
		<reference ref_id="CVE-2021-47434" ref_url="https://www.suse.com/security/cve/CVE-2021-47434/" source="CVE"/>
		<reference ref_id="CVE-2021-47435" ref_url="https://www.suse.com/security/cve/CVE-2021-47435/" source="CVE"/>
		<reference ref_id="CVE-2021-47436" ref_url="https://www.suse.com/security/cve/CVE-2021-47436/" source="CVE"/>
		<reference ref_id="CVE-2021-47437" ref_url="https://www.suse.com/security/cve/CVE-2021-47437/" source="CVE"/>
		<reference ref_id="CVE-2021-47438" ref_url="https://www.suse.com/security/cve/CVE-2021-47438/" source="CVE"/>
		<reference ref_id="CVE-2021-47439" ref_url="https://www.suse.com/security/cve/CVE-2021-47439/" source="CVE"/>
		<reference ref_id="CVE-2021-47440" ref_url="https://www.suse.com/security/cve/CVE-2021-47440/" source="CVE"/>
		<reference ref_id="CVE-2021-47441" ref_url="https://www.suse.com/security/cve/CVE-2021-47441/" source="CVE"/>
		<reference ref_id="CVE-2021-47442" ref_url="https://www.suse.com/security/cve/CVE-2021-47442/" source="CVE"/>
		<reference ref_id="CVE-2021-47443" ref_url="https://www.suse.com/security/cve/CVE-2021-47443/" source="CVE"/>
		<reference ref_id="CVE-2021-47444" ref_url="https://www.suse.com/security/cve/CVE-2021-47444/" source="CVE"/>
		<reference ref_id="CVE-2021-47445" ref_url="https://www.suse.com/security/cve/CVE-2021-47445/" source="CVE"/>
		<reference ref_id="CVE-2021-47446" ref_url="https://www.suse.com/security/cve/CVE-2021-47446/" source="CVE"/>
		<reference ref_id="CVE-2021-47447" ref_url="https://www.suse.com/security/cve/CVE-2021-47447/" source="CVE"/>
		<reference ref_id="CVE-2021-47448" ref_url="https://www.suse.com/security/cve/CVE-2021-47448/" source="CVE"/>
		<reference ref_id="CVE-2021-47449" ref_url="https://www.suse.com/security/cve/CVE-2021-47449/" source="CVE"/>
		<reference ref_id="CVE-2021-47450" ref_url="https://www.suse.com/security/cve/CVE-2021-47450/" source="CVE"/>
		<reference ref_id="CVE-2021-47451" ref_url="https://www.suse.com/security/cve/CVE-2021-47451/" source="CVE"/>
		<reference ref_id="CVE-2021-47452" ref_url="https://www.suse.com/security/cve/CVE-2021-47452/" source="CVE"/>
		<reference ref_id="CVE-2021-47453" ref_url="https://www.suse.com/security/cve/CVE-2021-47453/" source="CVE"/>
		<reference ref_id="CVE-2021-47454" ref_url="https://www.suse.com/security/cve/CVE-2021-47454/" source="CVE"/>
		<reference ref_id="CVE-2021-47455" ref_url="https://www.suse.com/security/cve/CVE-2021-47455/" source="CVE"/>
		<reference ref_id="CVE-2021-47456" ref_url="https://www.suse.com/security/cve/CVE-2021-47456/" source="CVE"/>
		<reference ref_id="CVE-2021-47457" ref_url="https://www.suse.com/security/cve/CVE-2021-47457/" source="CVE"/>
		<reference ref_id="CVE-2021-47458" ref_url="https://www.suse.com/security/cve/CVE-2021-47458/" source="CVE"/>
		<reference ref_id="CVE-2021-47459" ref_url="https://www.suse.com/security/cve/CVE-2021-47459/" source="CVE"/>
		<reference ref_id="CVE-2021-47460" ref_url="https://www.suse.com/security/cve/CVE-2021-47460/" source="CVE"/>
		<reference ref_id="CVE-2021-47461" ref_url="https://www.suse.com/security/cve/CVE-2021-47461/" source="CVE"/>
		<reference ref_id="CVE-2021-47462" ref_url="https://www.suse.com/security/cve/CVE-2021-47462/" source="CVE"/>
		<reference ref_id="CVE-2021-47463" ref_url="https://www.suse.com/security/cve/CVE-2021-47463/" source="CVE"/>
		<reference ref_id="CVE-2021-47464" ref_url="https://www.suse.com/security/cve/CVE-2021-47464/" source="CVE"/>
		<reference ref_id="CVE-2021-47465" ref_url="https://www.suse.com/security/cve/CVE-2021-47465/" source="CVE"/>
		<reference ref_id="CVE-2021-47466" ref_url="https://www.suse.com/security/cve/CVE-2021-47466/" source="CVE"/>
		<reference ref_id="CVE-2021-47467" ref_url="https://www.suse.com/security/cve/CVE-2021-47467/" source="CVE"/>
		<reference ref_id="CVE-2021-47468" ref_url="https://www.suse.com/security/cve/CVE-2021-47468/" source="CVE"/>
		<reference ref_id="CVE-2021-47469" ref_url="https://www.suse.com/security/cve/CVE-2021-47469/" source="CVE"/>
		<reference ref_id="CVE-2021-47470" ref_url="https://www.suse.com/security/cve/CVE-2021-47470/" source="CVE"/>
		<reference ref_id="CVE-2021-47471" ref_url="https://www.suse.com/security/cve/CVE-2021-47471/" source="CVE"/>
		<reference ref_id="CVE-2021-47472" ref_url="https://www.suse.com/security/cve/CVE-2021-47472/" source="CVE"/>
		<reference ref_id="CVE-2021-47473" ref_url="https://www.suse.com/security/cve/CVE-2021-47473/" source="CVE"/>
		<reference ref_id="CVE-2021-47474" ref_url="https://www.suse.com/security/cve/CVE-2021-47474/" source="CVE"/>
		<reference ref_id="CVE-2021-47475" ref_url="https://www.suse.com/security/cve/CVE-2021-47475/" source="CVE"/>
		<reference ref_id="CVE-2021-47476" ref_url="https://www.suse.com/security/cve/CVE-2021-47476/" source="CVE"/>
		<reference ref_id="CVE-2021-47477" ref_url="https://www.suse.com/security/cve/CVE-2021-47477/" source="CVE"/>
		<reference ref_id="CVE-2021-47478" ref_url="https://www.suse.com/security/cve/CVE-2021-47478/" source="CVE"/>
		<reference ref_id="CVE-2021-47479" ref_url="https://www.suse.com/security/cve/CVE-2021-47479/" source="CVE"/>
		<reference ref_id="CVE-2021-47480" ref_url="https://www.suse.com/security/cve/CVE-2021-47480/" source="CVE"/>
		<reference ref_id="CVE-2021-47481" ref_url="https://www.suse.com/security/cve/CVE-2021-47481/" source="CVE"/>
		<reference ref_id="CVE-2021-47482" ref_url="https://www.suse.com/security/cve/CVE-2021-47482/" source="CVE"/>
		<reference ref_id="CVE-2021-47483" ref_url="https://www.suse.com/security/cve/CVE-2021-47483/" source="CVE"/>
		<reference ref_id="CVE-2021-47484" ref_url="https://www.suse.com/security/cve/CVE-2021-47484/" source="CVE"/>
		<reference ref_id="CVE-2021-47485" ref_url="https://www.suse.com/security/cve/CVE-2021-47485/" source="CVE"/>
		<reference ref_id="CVE-2021-47486" ref_url="https://www.suse.com/security/cve/CVE-2021-47486/" source="CVE"/>
		<reference ref_id="CVE-2021-47488" ref_url="https://www.suse.com/security/cve/CVE-2021-47488/" source="CVE"/>
		<reference ref_id="CVE-2021-47489" ref_url="https://www.suse.com/security/cve/CVE-2021-47489/" source="CVE"/>
		<reference ref_id="CVE-2021-47490" ref_url="https://www.suse.com/security/cve/CVE-2021-47490/" source="CVE"/>
		<reference ref_id="CVE-2021-47491" ref_url="https://www.suse.com/security/cve/CVE-2021-47491/" source="CVE"/>
		<reference ref_id="CVE-2021-47492" ref_url="https://www.suse.com/security/cve/CVE-2021-47492/" source="CVE"/>
		<reference ref_id="CVE-2021-47493" ref_url="https://www.suse.com/security/cve/CVE-2021-47493/" source="CVE"/>
		<reference ref_id="CVE-2021-47494" ref_url="https://www.suse.com/security/cve/CVE-2021-47494/" source="CVE"/>
		<reference ref_id="CVE-2021-47495" ref_url="https://www.suse.com/security/cve/CVE-2021-47495/" source="CVE"/>
		<reference ref_id="CVE-2021-47496" ref_url="https://www.suse.com/security/cve/CVE-2021-47496/" source="CVE"/>
		<reference ref_id="CVE-2021-47497" ref_url="https://www.suse.com/security/cve/CVE-2021-47497/" source="CVE"/>
		<reference ref_id="CVE-2021-47498" ref_url="https://www.suse.com/security/cve/CVE-2021-47498/" source="CVE"/>
		<reference ref_id="CVE-2021-47499" ref_url="https://www.suse.com/security/cve/CVE-2021-47499/" source="CVE"/>
		<reference ref_id="CVE-2021-47500" ref_url="https://www.suse.com/security/cve/CVE-2021-47500/" source="CVE"/>
		<reference ref_id="CVE-2021-47501" ref_url="https://www.suse.com/security/cve/CVE-2021-47501/" source="CVE"/>
		<reference ref_id="CVE-2021-47502" ref_url="https://www.suse.com/security/cve/CVE-2021-47502/" source="CVE"/>
		<reference ref_id="CVE-2021-47503" ref_url="https://www.suse.com/security/cve/CVE-2021-47503/" source="CVE"/>
		<reference ref_id="CVE-2021-47505" ref_url="https://www.suse.com/security/cve/CVE-2021-47505/" source="CVE"/>
		<reference ref_id="CVE-2021-47506" ref_url="https://www.suse.com/security/cve/CVE-2021-47506/" source="CVE"/>
		<reference ref_id="CVE-2021-47507" ref_url="https://www.suse.com/security/cve/CVE-2021-47507/" source="CVE"/>
		<reference ref_id="CVE-2021-47509" ref_url="https://www.suse.com/security/cve/CVE-2021-47509/" source="CVE"/>
		<reference ref_id="CVE-2021-47510" ref_url="https://www.suse.com/security/cve/CVE-2021-47510/" source="CVE"/>
		<reference ref_id="CVE-2021-47511" ref_url="https://www.suse.com/security/cve/CVE-2021-47511/" source="CVE"/>
		<reference ref_id="CVE-2021-47513" ref_url="https://www.suse.com/security/cve/CVE-2021-47513/" source="CVE"/>
		<reference ref_id="CVE-2021-47514" ref_url="https://www.suse.com/security/cve/CVE-2021-47514/" source="CVE"/>
		<reference ref_id="CVE-2021-47516" ref_url="https://www.suse.com/security/cve/CVE-2021-47516/" source="CVE"/>
		<reference ref_id="CVE-2021-47518" ref_url="https://www.suse.com/security/cve/CVE-2021-47518/" source="CVE"/>
		<reference ref_id="CVE-2021-47520" ref_url="https://www.suse.com/security/cve/CVE-2021-47520/" source="CVE"/>
		<reference ref_id="CVE-2021-47521" ref_url="https://www.suse.com/security/cve/CVE-2021-47521/" source="CVE"/>
		<reference ref_id="CVE-2021-47522" ref_url="https://www.suse.com/security/cve/CVE-2021-47522/" source="CVE"/>
		<reference ref_id="CVE-2021-47523" ref_url="https://www.suse.com/security/cve/CVE-2021-47523/" source="CVE"/>
		<reference ref_id="CVE-2021-47524" ref_url="https://www.suse.com/security/cve/CVE-2021-47524/" source="CVE"/>
		<reference ref_id="CVE-2021-47525" ref_url="https://www.suse.com/security/cve/CVE-2021-47525/" source="CVE"/>
		<reference ref_id="CVE-2021-47526" ref_url="https://www.suse.com/security/cve/CVE-2021-47526/" source="CVE"/>
		<reference ref_id="CVE-2021-47528" ref_url="https://www.suse.com/security/cve/CVE-2021-47528/" source="CVE"/>
		<reference ref_id="CVE-2021-47529" ref_url="https://www.suse.com/security/cve/CVE-2021-47529/" source="CVE"/>
		<reference ref_id="CVE-2021-47533" ref_url="https://www.suse.com/security/cve/CVE-2021-47533/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2021-47535" ref_url="https://www.suse.com/security/cve/CVE-2021-47535/" source="CVE"/>
		<reference ref_id="CVE-2021-47536" ref_url="https://www.suse.com/security/cve/CVE-2021-47536/" source="CVE"/>
		<reference ref_id="CVE-2021-47537" ref_url="https://www.suse.com/security/cve/CVE-2021-47537/" source="CVE"/>
		<reference ref_id="CVE-2021-47540" ref_url="https://www.suse.com/security/cve/CVE-2021-47540/" source="CVE"/>
		<reference ref_id="CVE-2021-47541" ref_url="https://www.suse.com/security/cve/CVE-2021-47541/" source="CVE"/>
		<reference ref_id="CVE-2021-47542" ref_url="https://www.suse.com/security/cve/CVE-2021-47542/" source="CVE"/>
		<reference ref_id="CVE-2021-47544" ref_url="https://www.suse.com/security/cve/CVE-2021-47544/" source="CVE"/>
		<reference ref_id="CVE-2021-47549" ref_url="https://www.suse.com/security/cve/CVE-2021-47549/" source="CVE"/>
		<reference ref_id="CVE-2021-47550" ref_url="https://www.suse.com/security/cve/CVE-2021-47550/" source="CVE"/>
		<reference ref_id="CVE-2021-47551" ref_url="https://www.suse.com/security/cve/CVE-2021-47551/" source="CVE"/>
		<reference ref_id="CVE-2021-47553" ref_url="https://www.suse.com/security/cve/CVE-2021-47553/" source="CVE"/>
		<reference ref_id="CVE-2021-47554" ref_url="https://www.suse.com/security/cve/CVE-2021-47554/" source="CVE"/>
		<reference ref_id="CVE-2021-47556" ref_url="https://www.suse.com/security/cve/CVE-2021-47556/" source="CVE"/>
		<reference ref_id="CVE-2021-47558" ref_url="https://www.suse.com/security/cve/CVE-2021-47558/" source="CVE"/>
		<reference ref_id="CVE-2021-47559" ref_url="https://www.suse.com/security/cve/CVE-2021-47559/" source="CVE"/>
		<reference ref_id="CVE-2021-47560" ref_url="https://www.suse.com/security/cve/CVE-2021-47560/" source="CVE"/>
		<reference ref_id="CVE-2021-47562" ref_url="https://www.suse.com/security/cve/CVE-2021-47562/" source="CVE"/>
		<reference ref_id="CVE-2021-47563" ref_url="https://www.suse.com/security/cve/CVE-2021-47563/" source="CVE"/>
		<reference ref_id="CVE-2021-47564" ref_url="https://www.suse.com/security/cve/CVE-2021-47564/" source="CVE"/>
		<reference ref_id="CVE-2021-47565" ref_url="https://www.suse.com/security/cve/CVE-2021-47565/" source="CVE"/>
		<reference ref_id="CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632/" source="CVE"/>
		<reference ref_id="CVE-2022-48634" ref_url="https://www.suse.com/security/cve/CVE-2022-48634/" source="CVE"/>
		<reference ref_id="CVE-2022-48636" ref_url="https://www.suse.com/security/cve/CVE-2022-48636/" source="CVE"/>
		<reference ref_id="CVE-2022-48652" ref_url="https://www.suse.com/security/cve/CVE-2022-48652/" source="CVE"/>
		<reference ref_id="CVE-2022-48671" ref_url="https://www.suse.com/security/cve/CVE-2022-48671/" source="CVE"/>
		<reference ref_id="CVE-2022-48672" ref_url="https://www.suse.com/security/cve/CVE-2022-48672/" source="CVE"/>
		<reference ref_id="CVE-2022-48673" ref_url="https://www.suse.com/security/cve/CVE-2022-48673/" source="CVE"/>
		<reference ref_id="CVE-2022-48675" ref_url="https://www.suse.com/security/cve/CVE-2022-48675/" source="CVE"/>
		<reference ref_id="CVE-2022-48686" ref_url="https://www.suse.com/security/cve/CVE-2022-48686/" source="CVE"/>
		<reference ref_id="CVE-2022-48687" ref_url="https://www.suse.com/security/cve/CVE-2022-48687/" source="CVE"/>
		<reference ref_id="CVE-2022-48688" ref_url="https://www.suse.com/security/cve/CVE-2022-48688/" source="CVE"/>
		<reference ref_id="CVE-2022-48692" ref_url="https://www.suse.com/security/cve/CVE-2022-48692/" source="CVE"/>
		<reference ref_id="CVE-2022-48693" ref_url="https://www.suse.com/security/cve/CVE-2022-48693/" source="CVE"/>
		<reference ref_id="CVE-2022-48694" ref_url="https://www.suse.com/security/cve/CVE-2022-48694/" source="CVE"/>
		<reference ref_id="CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695/" source="CVE"/>
		<reference ref_id="CVE-2022-48697" ref_url="https://www.suse.com/security/cve/CVE-2022-48697/" source="CVE"/>
		<reference ref_id="CVE-2022-48699" ref_url="https://www.suse.com/security/cve/CVE-2022-48699/" source="CVE"/>
		<reference ref_id="CVE-2022-48700" ref_url="https://www.suse.com/security/cve/CVE-2022-48700/" source="CVE"/>
		<reference ref_id="CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701/" source="CVE"/>
		<reference ref_id="CVE-2022-48702" ref_url="https://www.suse.com/security/cve/CVE-2022-48702/" source="CVE"/>
		<reference ref_id="CVE-2022-48703" ref_url="https://www.suse.com/security/cve/CVE-2022-48703/" source="CVE"/>
		<reference ref_id="CVE-2022-48704" ref_url="https://www.suse.com/security/cve/CVE-2022-48704/" source="CVE"/>
		<reference ref_id="CVE-2022-48708" ref_url="https://www.suse.com/security/cve/CVE-2022-48708/" source="CVE"/>
		<reference ref_id="CVE-2022-48709" ref_url="https://www.suse.com/security/cve/CVE-2022-48709/" source="CVE"/>
		<reference ref_id="CVE-2022-48710" ref_url="https://www.suse.com/security/cve/CVE-2022-48710/" source="CVE"/>
		<reference ref_id="CVE-2023-52654" ref_url="https://www.suse.com/security/cve/CVE-2023-52654/" source="CVE"/>
		<reference ref_id="CVE-2023-52655" ref_url="https://www.suse.com/security/cve/CVE-2023-52655/" source="CVE"/>
		<reference ref_id="CVE-2023-52676" ref_url="https://www.suse.com/security/cve/CVE-2023-52676/" source="CVE"/>
		<reference ref_id="CVE-2023-52686" ref_url="https://www.suse.com/security/cve/CVE-2023-52686/" source="CVE"/>
		<reference ref_id="CVE-2023-52690" ref_url="https://www.suse.com/security/cve/CVE-2023-52690/" source="CVE"/>
		<reference ref_id="CVE-2023-52702" ref_url="https://www.suse.com/security/cve/CVE-2023-52702/" source="CVE"/>
		<reference ref_id="CVE-2023-52703" ref_url="https://www.suse.com/security/cve/CVE-2023-52703/" source="CVE"/>
		<reference ref_id="CVE-2023-52707" ref_url="https://www.suse.com/security/cve/CVE-2023-52707/" source="CVE"/>
		<reference ref_id="CVE-2023-52708" ref_url="https://www.suse.com/security/cve/CVE-2023-52708/" source="CVE"/>
		<reference ref_id="CVE-2023-52730" ref_url="https://www.suse.com/security/cve/CVE-2023-52730/" source="CVE"/>
		<reference ref_id="CVE-2023-52733" ref_url="https://www.suse.com/security/cve/CVE-2023-52733/" source="CVE"/>
		<reference ref_id="CVE-2023-52736" ref_url="https://www.suse.com/security/cve/CVE-2023-52736/" source="CVE"/>
		<reference ref_id="CVE-2023-52738" ref_url="https://www.suse.com/security/cve/CVE-2023-52738/" source="CVE"/>
		<reference ref_id="CVE-2023-52739" ref_url="https://www.suse.com/security/cve/CVE-2023-52739/" source="CVE"/>
		<reference ref_id="CVE-2023-52740" ref_url="https://www.suse.com/security/cve/CVE-2023-52740/" source="CVE"/>
		<reference ref_id="CVE-2023-52741" ref_url="https://www.suse.com/security/cve/CVE-2023-52741/" source="CVE"/>
		<reference ref_id="CVE-2023-52742" ref_url="https://www.suse.com/security/cve/CVE-2023-52742/" source="CVE"/>
		<reference ref_id="CVE-2023-52743" ref_url="https://www.suse.com/security/cve/CVE-2023-52743/" source="CVE"/>
		<reference ref_id="CVE-2023-52744" ref_url="https://www.suse.com/security/cve/CVE-2023-52744/" source="CVE"/>
		<reference ref_id="CVE-2023-52745" ref_url="https://www.suse.com/security/cve/CVE-2023-52745/" source="CVE"/>
		<reference ref_id="CVE-2023-52747" ref_url="https://www.suse.com/security/cve/CVE-2023-52747/" source="CVE"/>
		<reference ref_id="CVE-2023-52753" ref_url="https://www.suse.com/security/cve/CVE-2023-52753/" source="CVE"/>
		<reference ref_id="CVE-2023-52754" ref_url="https://www.suse.com/security/cve/CVE-2023-52754/" source="CVE"/>
		<reference ref_id="CVE-2023-52756" ref_url="https://www.suse.com/security/cve/CVE-2023-52756/" source="CVE"/>
		<reference ref_id="CVE-2023-52759" ref_url="https://www.suse.com/security/cve/CVE-2023-52759/" source="CVE"/>
		<reference ref_id="CVE-2023-52763" ref_url="https://www.suse.com/security/cve/CVE-2023-52763/" source="CVE"/>
		<reference ref_id="CVE-2023-52764" ref_url="https://www.suse.com/security/cve/CVE-2023-52764/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52774" ref_url="https://www.suse.com/security/cve/CVE-2023-52774/" source="CVE"/>
		<reference ref_id="CVE-2023-52781" ref_url="https://www.suse.com/security/cve/CVE-2023-52781/" source="CVE"/>
		<reference ref_id="CVE-2023-52788" ref_url="https://www.suse.com/security/cve/CVE-2023-52788/" source="CVE"/>
		<reference ref_id="CVE-2023-52789" ref_url="https://www.suse.com/security/cve/CVE-2023-52789/" source="CVE"/>
		<reference ref_id="CVE-2023-52791" ref_url="https://www.suse.com/security/cve/CVE-2023-52791/" source="CVE"/>
		<reference ref_id="CVE-2023-52798" ref_url="https://www.suse.com/security/cve/CVE-2023-52798/" source="CVE"/>
		<reference ref_id="CVE-2023-52799" ref_url="https://www.suse.com/security/cve/CVE-2023-52799/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52804" ref_url="https://www.suse.com/security/cve/CVE-2023-52804/" source="CVE"/>
		<reference ref_id="CVE-2023-52805" ref_url="https://www.suse.com/security/cve/CVE-2023-52805/" source="CVE"/>
		<reference ref_id="CVE-2023-52806" ref_url="https://www.suse.com/security/cve/CVE-2023-52806/" source="CVE"/>
		<reference ref_id="CVE-2023-52810" ref_url="https://www.suse.com/security/cve/CVE-2023-52810/" source="CVE"/>
		<reference ref_id="CVE-2023-52811" ref_url="https://www.suse.com/security/cve/CVE-2023-52811/" source="CVE"/>
		<reference ref_id="CVE-2023-52814" ref_url="https://www.suse.com/security/cve/CVE-2023-52814/" source="CVE"/>
		<reference ref_id="CVE-2023-52816" ref_url="https://www.suse.com/security/cve/CVE-2023-52816/" source="CVE"/>
		<reference ref_id="CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817/" source="CVE"/>
		<reference ref_id="CVE-2023-52818" ref_url="https://www.suse.com/security/cve/CVE-2023-52818/" source="CVE"/>
		<reference ref_id="CVE-2023-52819" ref_url="https://www.suse.com/security/cve/CVE-2023-52819/" source="CVE"/>
		<reference ref_id="CVE-2023-52821" ref_url="https://www.suse.com/security/cve/CVE-2023-52821/" source="CVE"/>
		<reference ref_id="CVE-2023-52825" ref_url="https://www.suse.com/security/cve/CVE-2023-52825/" source="CVE"/>
		<reference ref_id="CVE-2023-52826" ref_url="https://www.suse.com/security/cve/CVE-2023-52826/" source="CVE"/>
		<reference ref_id="CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832/" source="CVE"/>
		<reference ref_id="CVE-2023-52833" ref_url="https://www.suse.com/security/cve/CVE-2023-52833/" source="CVE"/>
		<reference ref_id="CVE-2023-52834" ref_url="https://www.suse.com/security/cve/CVE-2023-52834/" source="CVE"/>
		<reference ref_id="CVE-2023-52838" ref_url="https://www.suse.com/security/cve/CVE-2023-52838/" source="CVE"/>
		<reference ref_id="CVE-2023-52840" ref_url="https://www.suse.com/security/cve/CVE-2023-52840/" source="CVE"/>
		<reference ref_id="CVE-2023-52841" ref_url="https://www.suse.com/security/cve/CVE-2023-52841/" source="CVE"/>
		<reference ref_id="CVE-2023-52844" ref_url="https://www.suse.com/security/cve/CVE-2023-52844/" source="CVE"/>
		<reference ref_id="CVE-2023-52847" ref_url="https://www.suse.com/security/cve/CVE-2023-52847/" source="CVE"/>
		<reference ref_id="CVE-2023-52853" ref_url="https://www.suse.com/security/cve/CVE-2023-52853/" source="CVE"/>
		<reference ref_id="CVE-2023-52854" ref_url="https://www.suse.com/security/cve/CVE-2023-52854/" source="CVE"/>
		<reference ref_id="CVE-2023-52855" ref_url="https://www.suse.com/security/cve/CVE-2023-52855/" source="CVE"/>
		<reference ref_id="CVE-2023-52856" ref_url="https://www.suse.com/security/cve/CVE-2023-52856/" source="CVE"/>
		<reference ref_id="CVE-2023-52858" ref_url="https://www.suse.com/security/cve/CVE-2023-52858/" source="CVE"/>
		<reference ref_id="CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864/" source="CVE"/>
		<reference ref_id="CVE-2023-52865" ref_url="https://www.suse.com/security/cve/CVE-2023-52865/" source="CVE"/>
		<reference ref_id="CVE-2023-52867" ref_url="https://www.suse.com/security/cve/CVE-2023-52867/" source="CVE"/>
		<reference ref_id="CVE-2023-52868" ref_url="https://www.suse.com/security/cve/CVE-2023-52868/" source="CVE"/>
		<reference ref_id="CVE-2023-52870" ref_url="https://www.suse.com/security/cve/CVE-2023-52870/" source="CVE"/>
		<reference ref_id="CVE-2023-52871" ref_url="https://www.suse.com/security/cve/CVE-2023-52871/" source="CVE"/>
		<reference ref_id="CVE-2023-52872" ref_url="https://www.suse.com/security/cve/CVE-2023-52872/" source="CVE"/>
		<reference ref_id="CVE-2023-52873" ref_url="https://www.suse.com/security/cve/CVE-2023-52873/" source="CVE"/>
		<reference ref_id="CVE-2023-52875" ref_url="https://www.suse.com/security/cve/CVE-2023-52875/" source="CVE"/>
		<reference ref_id="CVE-2023-52876" ref_url="https://www.suse.com/security/cve/CVE-2023-52876/" source="CVE"/>
		<reference ref_id="CVE-2023-52877" ref_url="https://www.suse.com/security/cve/CVE-2023-52877/" source="CVE"/>
		<reference ref_id="CVE-2023-52878" ref_url="https://www.suse.com/security/cve/CVE-2023-52878/" source="CVE"/>
		<reference ref_id="CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880/" source="CVE"/>
		<reference ref_id="CVE-2024-0639" ref_url="https://www.suse.com/security/cve/CVE-2024-0639/" source="CVE"/>
		<reference ref_id="CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828/" source="CVE"/>
		<reference ref_id="CVE-2024-26840" ref_url="https://www.suse.com/security/cve/CVE-2024-26840/" source="CVE"/>
		<reference ref_id="CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852/" source="CVE"/>
		<reference ref_id="CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862/" source="CVE"/>
		<reference ref_id="CVE-2024-26921" ref_url="https://www.suse.com/security/cve/CVE-2024-26921/" source="CVE"/>
		<reference ref_id="CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925/" source="CVE"/>
		<reference ref_id="CVE-2024-26928" ref_url="https://www.suse.com/security/cve/CVE-2024-26928/" source="CVE"/>
		<reference ref_id="CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929/" source="CVE"/>
		<reference ref_id="CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930/" source="CVE"/>
		<reference ref_id="CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398/" source="CVE"/>
		<reference ref_id="CVE-2024-27413" ref_url="https://www.suse.com/security/cve/CVE-2024-27413/" source="CVE"/>
		<reference ref_id="CVE-2024-35811" ref_url="https://www.suse.com/security/cve/CVE-2024-35811/" source="CVE"/>
		<reference ref_id="CVE-2024-35815" ref_url="https://www.suse.com/security/cve/CVE-2024-35815/" source="CVE"/>
		<reference ref_id="CVE-2024-35817" ref_url="https://www.suse.com/security/cve/CVE-2024-35817/" source="CVE"/>
		<reference ref_id="CVE-2024-35863" ref_url="https://www.suse.com/security/cve/CVE-2024-35863/" source="CVE"/>
		<reference ref_id="CVE-2024-35867" ref_url="https://www.suse.com/security/cve/CVE-2024-35867/" source="CVE"/>
		<reference ref_id="CVE-2024-35868" ref_url="https://www.suse.com/security/cve/CVE-2024-35868/" source="CVE"/>
		<reference ref_id="CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895/" source="CVE"/>
		<reference ref_id="CVE-2024-35904" ref_url="https://www.suse.com/security/cve/CVE-2024-35904/" source="CVE"/>
		<reference ref_id="CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905/" source="CVE"/>
		<reference ref_id="CVE-2024-35914" ref_url="https://www.suse.com/security/cve/CVE-2024-35914/" source="CVE"/>
		<reference ref_id="CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
- CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-26929: Fixed double free of fcport (bsc#1223715).
- CVE-2024-26930: Fixed double free of the ha-&gt;vp_map pointer (bsc#1223626).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438).
- CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494).
- CVE-2024-35905: Fixed int overflow for stack access size  (bsc#1224488).
- CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE (bsc#1222011).

The following non-security bugs were fixed:

- af_unix: annote lockless accesses to unix_tot_inflight &amp; gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)-&gt;inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- filemap: remove use of wait bookmarks (bsc#1224085).
- idpf: extend tx watchdog timeout (bsc#1224137).
- ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).
- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).
- powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV (bsc#1220492 ltc#205270).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc: Refactor verification of MSR_RI (bsc#1223191).
- supported.conf: support tcp_dctcp module (jsc#PED-8111)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174585">SUSE bug 1174585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190569">SUSE bug 1190569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191949">SUSE bug 1191949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193983">SUSE bug 1193983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194288">SUSE bug 1194288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196869">SUSE bug 1196869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197915">SUSE bug 1197915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200313">SUSE bug 1200313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201308">SUSE bug 1201308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201489">SUSE bug 1201489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208149">SUSE bug 1208149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209834">SUSE bug 1209834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213863">SUSE bug 1213863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217169">SUSE bug 1217169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217515">SUSE bug 1217515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218917">SUSE bug 1218917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220492">SUSE bug 1220492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220783">SUSE bug 1220783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221645">SUSE bug 1221645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221958">SUSE bug 1221958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222011">SUSE bug 1222011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222976">SUSE bug 1222976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223057">SUSE bug 1223057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223084">SUSE bug 1223084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223111">SUSE bug 1223111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223138">SUSE bug 1223138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223191">SUSE bug 1223191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223390">SUSE bug 1223390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223481">SUSE bug 1223481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223501">SUSE bug 1223501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223512">SUSE bug 1223512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223520">SUSE bug 1223520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223532">SUSE bug 1223532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223626">SUSE bug 1223626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223715">SUSE bug 1223715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223894">SUSE bug 1223894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223921">SUSE bug 1223921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223922">SUSE bug 1223922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223923">SUSE bug 1223923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223924">SUSE bug 1223924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223929">SUSE bug 1223929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223931">SUSE bug 1223931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223932">SUSE bug 1223932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223934">SUSE bug 1223934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223941">SUSE bug 1223941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223948">SUSE bug 1223948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223952">SUSE bug 1223952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223953">SUSE bug 1223953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223957">SUSE bug 1223957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223962">SUSE bug 1223962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223963">SUSE bug 1223963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223964">SUSE bug 1223964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223996">SUSE bug 1223996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224085">SUSE bug 1224085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224099">SUSE bug 1224099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224137">SUSE bug 1224137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224174">SUSE bug 1224174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224438">SUSE bug 1224438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224482">SUSE bug 1224482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224494">SUSE bug 1224494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224511">SUSE bug 1224511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224592">SUSE bug 1224592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224611">SUSE bug 1224611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224664">SUSE bug 1224664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224678">SUSE bug 1224678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224682">SUSE bug 1224682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224685">SUSE bug 1224685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224730">SUSE bug 1224730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224736">SUSE bug 1224736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224763">SUSE bug 1224763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224816">SUSE bug 1224816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224895">SUSE bug 1224895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224898">SUSE bug 1224898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224900">SUSE bug 1224900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224901">SUSE bug 1224901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224902">SUSE bug 1224902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224903">SUSE bug 1224903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224904">SUSE bug 1224904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224905">SUSE bug 1224905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224907">SUSE bug 1224907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224910">SUSE bug 1224910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224911">SUSE bug 1224911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224912">SUSE bug 1224912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224913">SUSE bug 1224913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224914">SUSE bug 1224914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224915">SUSE bug 1224915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224920">SUSE bug 1224920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224928">SUSE bug 1224928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224931">SUSE bug 1224931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224932">SUSE bug 1224932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224937">SUSE bug 1224937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224942">SUSE bug 1224942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224944">SUSE bug 1224944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224945">SUSE bug 1224945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224947">SUSE bug 1224947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224956">SUSE bug 1224956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224988">SUSE bug 1224988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225000">SUSE bug 1225000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225003">SUSE bug 1225003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225005">SUSE bug 1225005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225009">SUSE bug 1225009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225022">SUSE bug 1225022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225031">SUSE bug 1225031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225032">SUSE bug 1225032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225036">SUSE bug 1225036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225044">SUSE bug 1225044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225076">SUSE bug 1225076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225077">SUSE bug 1225077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225082">SUSE bug 1225082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225086">SUSE bug 1225086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225092">SUSE bug 1225092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225095">SUSE bug 1225095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225096">SUSE bug 1225096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225106">SUSE bug 1225106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225108">SUSE bug 1225108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225109">SUSE bug 1225109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225118">SUSE bug 1225118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225121">SUSE bug 1225121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225122">SUSE bug 1225122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225123">SUSE bug 1225123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225125">SUSE bug 1225125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225126">SUSE bug 1225126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225127">SUSE bug 1225127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225129">SUSE bug 1225129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225131">SUSE bug 1225131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225132">SUSE bug 1225132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225145">SUSE bug 1225145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225151">SUSE bug 1225151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225153">SUSE bug 1225153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225156">SUSE bug 1225156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225158">SUSE bug 1225158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225160">SUSE bug 1225160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225161">SUSE bug 1225161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225164">SUSE bug 1225164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225167">SUSE bug 1225167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225180">SUSE bug 1225180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225183">SUSE bug 1225183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225184">SUSE bug 1225184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225186">SUSE bug 1225186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225187">SUSE bug 1225187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225191">SUSE bug 1225191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225192">SUSE bug 1225192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225193">SUSE bug 1225193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225195">SUSE bug 1225195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225198">SUSE bug 1225198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225201">SUSE bug 1225201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225203">SUSE bug 1225203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225205">SUSE bug 1225205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225206">SUSE bug 1225206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225207">SUSE bug 1225207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225208">SUSE bug 1225208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225209">SUSE bug 1225209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225210">SUSE bug 1225210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225214">SUSE bug 1225214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225223">SUSE bug 1225223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225224">SUSE bug 1225224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225225">SUSE bug 1225225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225227">SUSE bug 1225227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225228">SUSE bug 1225228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225229">SUSE bug 1225229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225230">SUSE bug 1225230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225232">SUSE bug 1225232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225233">SUSE bug 1225233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225235">SUSE bug 1225235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225236">SUSE bug 1225236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225237">SUSE bug 1225237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225238">SUSE bug 1225238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225239">SUSE bug 1225239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225240">SUSE bug 1225240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225241">SUSE bug 1225241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225242">SUSE bug 1225242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225243">SUSE bug 1225243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225244">SUSE bug 1225244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225245">SUSE bug 1225245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225246">SUSE bug 1225246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225247">SUSE bug 1225247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225248">SUSE bug 1225248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225249">SUSE bug 1225249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225250">SUSE bug 1225250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225251">SUSE bug 1225251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225252">SUSE bug 1225252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225253">SUSE bug 1225253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225254">SUSE bug 1225254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225255">SUSE bug 1225255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225256">SUSE bug 1225256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225257">SUSE bug 1225257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225258">SUSE bug 1225258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225259">SUSE bug 1225259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225260">SUSE bug 1225260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225261">SUSE bug 1225261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225262">SUSE bug 1225262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225263">SUSE bug 1225263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225268">SUSE bug 1225268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225301">SUSE bug 1225301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225303">SUSE bug 1225303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225304">SUSE bug 1225304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225306">SUSE bug 1225306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225316">SUSE bug 1225316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225318">SUSE bug 1225318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225320">SUSE bug 1225320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225321">SUSE bug 1225321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225322">SUSE bug 1225322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225323">SUSE bug 1225323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225326">SUSE bug 1225326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225327">SUSE bug 1225327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225328">SUSE bug 1225328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225329">SUSE bug 1225329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225330">SUSE bug 1225330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225331">SUSE bug 1225331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225332">SUSE bug 1225332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225333">SUSE bug 1225333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225334">SUSE bug 1225334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225335">SUSE bug 1225335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225337">SUSE bug 1225337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225338">SUSE bug 1225338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225339">SUSE bug 1225339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225341">SUSE bug 1225341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225342">SUSE bug 1225342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225344">SUSE bug 1225344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225346">SUSE bug 1225346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225347">SUSE bug 1225347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225351">SUSE bug 1225351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225353">SUSE bug 1225353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225354">SUSE bug 1225354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225355">SUSE bug 1225355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225357">SUSE bug 1225357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225358">SUSE bug 1225358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225360">SUSE bug 1225360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225361">SUSE bug 1225361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225366">SUSE bug 1225366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225367">SUSE bug 1225367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225368">SUSE bug 1225368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225369">SUSE bug 1225369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225370">SUSE bug 1225370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225372">SUSE bug 1225372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225373">SUSE bug 1225373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225374">SUSE bug 1225374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225375">SUSE bug 1225375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225376">SUSE bug 1225376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225377">SUSE bug 1225377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225379">SUSE bug 1225379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225383">SUSE bug 1225383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225384">SUSE bug 1225384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225386">SUSE bug 1225386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225387">SUSE bug 1225387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225388">SUSE bug 1225388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225390">SUSE bug 1225390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225392">SUSE bug 1225392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225393">SUSE bug 1225393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225396">SUSE bug 1225396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225400">SUSE bug 1225400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225404">SUSE bug 1225404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225405">SUSE bug 1225405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225409">SUSE bug 1225409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225410">SUSE bug 1225410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225411">SUSE bug 1225411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225425">SUSE bug 1225425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225427">SUSE bug 1225427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225431">SUSE bug 1225431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225435">SUSE bug 1225435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225436">SUSE bug 1225436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225437">SUSE bug 1225437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225438">SUSE bug 1225438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225439">SUSE bug 1225439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225441">SUSE bug 1225441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225445">SUSE bug 1225445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225446">SUSE bug 1225446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225447">SUSE bug 1225447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225450">SUSE bug 1225450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225453">SUSE bug 1225453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225455">SUSE bug 1225455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225461">SUSE bug 1225461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225463">SUSE bug 1225463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225464">SUSE bug 1225464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225466">SUSE bug 1225466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225471">SUSE bug 1225471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225472">SUSE bug 1225472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225478">SUSE bug 1225478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225479">SUSE bug 1225479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225482">SUSE bug 1225482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225483">SUSE bug 1225483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225488">SUSE bug 1225488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225490">SUSE bug 1225490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225492">SUSE bug 1225492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225495">SUSE bug 1225495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225499">SUSE bug 1225499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225500">SUSE bug 1225500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225501">SUSE bug 1225501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225508">SUSE bug 1225508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225510">SUSE bug 1225510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225529">SUSE bug 1225529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225530">SUSE bug 1225530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225532">SUSE bug 1225532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225534">SUSE bug 1225534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225549">SUSE bug 1225549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225550">SUSE bug 1225550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225553">SUSE bug 1225553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225554">SUSE bug 1225554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225557">SUSE bug 1225557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225559">SUSE bug 1225559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225560">SUSE bug 1225560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225565">SUSE bug 1225565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225566">SUSE bug 1225566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225569">SUSE bug 1225569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225570">SUSE bug 1225570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225571">SUSE bug 1225571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225572">SUSE bug 1225572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225577">SUSE bug 1225577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225583">SUSE bug 1225583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225584">SUSE bug 1225584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225588">SUSE bug 1225588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225589">SUSE bug 1225589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225590">SUSE bug 1225590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225591">SUSE bug 1225591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225592">SUSE bug 1225592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225595">SUSE bug 1225595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225599">SUSE bug 1225599</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-36788/">CVE-2020-36788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36788">CVE-2020-36788 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47358/">CVE-2021-47358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47358">CVE-2021-47358 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47359/">CVE-2021-47359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47359">CVE-2021-47359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47360/">CVE-2021-47360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47360">CVE-2021-47360 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47361/">CVE-2021-47361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47361">CVE-2021-47361 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47362/">CVE-2021-47362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47362">CVE-2021-47362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47363/">CVE-2021-47363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47363">CVE-2021-47363 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47364/">CVE-2021-47364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47364">CVE-2021-47364 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47365/">CVE-2021-47365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47365">CVE-2021-47365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47366/">CVE-2021-47366 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47366">CVE-2021-47366 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47367/">CVE-2021-47367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47367">CVE-2021-47367 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47368/">CVE-2021-47368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47368">CVE-2021-47368 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47369/">CVE-2021-47369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47369">CVE-2021-47369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47370/">CVE-2021-47370 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47370">CVE-2021-47370 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47371/">CVE-2021-47371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47371">CVE-2021-47371 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47372/">CVE-2021-47372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47372">CVE-2021-47372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47373/">CVE-2021-47373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47373">CVE-2021-47373 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47374/">CVE-2021-47374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47374">CVE-2021-47374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47375/">CVE-2021-47375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47375">CVE-2021-47375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47376/">CVE-2021-47376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47376">CVE-2021-47376 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47378/">CVE-2021-47378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47378">CVE-2021-47378 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47379/">CVE-2021-47379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47379">CVE-2021-47379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47380/">CVE-2021-47380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47380">CVE-2021-47380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47381/">CVE-2021-47381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47381">CVE-2021-47381 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47382/">CVE-2021-47382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47382">CVE-2021-47382 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47384/">CVE-2021-47384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47384">CVE-2021-47384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47385/">CVE-2021-47385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47385">CVE-2021-47385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47386/">CVE-2021-47386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47386">CVE-2021-47386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47387/">CVE-2021-47387 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47387">CVE-2021-47387 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47388/">CVE-2021-47388 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47388">CVE-2021-47388 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47389/">CVE-2021-47389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47389">CVE-2021-47389 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47390/">CVE-2021-47390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47390">CVE-2021-47390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47391/">CVE-2021-47391 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47391">CVE-2021-47391 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47392/">CVE-2021-47392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47392">CVE-2021-47392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47393/">CVE-2021-47393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47393">CVE-2021-47393 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47394/">CVE-2021-47394 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47394">CVE-2021-47394 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47395/">CVE-2021-47395 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47395">CVE-2021-47395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47396/">CVE-2021-47396 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47396">CVE-2021-47396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47397/">CVE-2021-47397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47397">CVE-2021-47397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47398/">CVE-2021-47398 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47398">CVE-2021-47398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47399/">CVE-2021-47399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47399">CVE-2021-47399 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47400/">CVE-2021-47400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47400">CVE-2021-47400 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47401/">CVE-2021-47401 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47401">CVE-2021-47401 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47402/">CVE-2021-47402 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47402">CVE-2021-47402 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47403/">CVE-2021-47403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47403">CVE-2021-47403 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47404/">CVE-2021-47404 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47404">CVE-2021-47404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47405/">CVE-2021-47405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47405">CVE-2021-47405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47406/">CVE-2021-47406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47406">CVE-2021-47406 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47407/">CVE-2021-47407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47407">CVE-2021-47407 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47408/">CVE-2021-47408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47408">CVE-2021-47408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47409/">CVE-2021-47409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47409">CVE-2021-47409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47410/">CVE-2021-47410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47410">CVE-2021-47410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47412/">CVE-2021-47412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47412">CVE-2021-47412 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47413/">CVE-2021-47413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47413">CVE-2021-47413 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47414/">CVE-2021-47414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47414">CVE-2021-47414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47415/">CVE-2021-47415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47415">CVE-2021-47415 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47417/">CVE-2021-47417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47417">CVE-2021-47417 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47418/">CVE-2021-47418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47418">CVE-2021-47418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47419/">CVE-2021-47419 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47419">CVE-2021-47419 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47420/">CVE-2021-47420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47420">CVE-2021-47420 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47421/">CVE-2021-47421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47421">CVE-2021-47421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47422/">CVE-2021-47422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47422">CVE-2021-47422 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47423/">CVE-2021-47423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47423">CVE-2021-47423 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47424/">CVE-2021-47424 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47424">CVE-2021-47424 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47425/">CVE-2021-47425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47425">CVE-2021-47425 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47426/">CVE-2021-47426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47426">CVE-2021-47426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47427/">CVE-2021-47427 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47427">CVE-2021-47427 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47428/">CVE-2021-47428 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47428">CVE-2021-47428 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47429/">CVE-2021-47429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47429">CVE-2021-47429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47430/">CVE-2021-47430 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47430">CVE-2021-47430 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47431/">CVE-2021-47431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47431">CVE-2021-47431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47433/">CVE-2021-47433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47433">CVE-2021-47433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47434/">CVE-2021-47434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47434">CVE-2021-47434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47435/">CVE-2021-47435 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47435">CVE-2021-47435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47436/">CVE-2021-47436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47436">CVE-2021-47436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47437/">CVE-2021-47437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47437">CVE-2021-47437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47438/">CVE-2021-47438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47438">CVE-2021-47438 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47439/">CVE-2021-47439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47439">CVE-2021-47439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47440/">CVE-2021-47440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47440">CVE-2021-47440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47441/">CVE-2021-47441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47441">CVE-2021-47441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47442/">CVE-2021-47442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47442">CVE-2021-47442 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47443/">CVE-2021-47443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47443">CVE-2021-47443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47444/">CVE-2021-47444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47444">CVE-2021-47444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47445/">CVE-2021-47445 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47445">CVE-2021-47445 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47446/">CVE-2021-47446 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47446">CVE-2021-47446 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47447/">CVE-2021-47447 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47447">CVE-2021-47447 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47448/">CVE-2021-47448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47448">CVE-2021-47448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47449/">CVE-2021-47449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47449">CVE-2021-47449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47450/">CVE-2021-47450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47450">CVE-2021-47450 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47451/">CVE-2021-47451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47451">CVE-2021-47451 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47452/">CVE-2021-47452 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47452">CVE-2021-47452 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47453/">CVE-2021-47453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47453">CVE-2021-47453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47454/">CVE-2021-47454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47454">CVE-2021-47454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47455/">CVE-2021-47455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47455">CVE-2021-47455 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47456/">CVE-2021-47456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47456">CVE-2021-47456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47457/">CVE-2021-47457 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47457">CVE-2021-47457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47458/">CVE-2021-47458 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47458">CVE-2021-47458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47459/">CVE-2021-47459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47459">CVE-2021-47459 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47460/">CVE-2021-47460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47460">CVE-2021-47460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47461/">CVE-2021-47461 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47461">CVE-2021-47461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47462/">CVE-2021-47462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47462">CVE-2021-47462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47463/">CVE-2021-47463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47463">CVE-2021-47463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47464/">CVE-2021-47464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47464">CVE-2021-47464 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47465/">CVE-2021-47465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47465">CVE-2021-47465 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47466/">CVE-2021-47466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47466">CVE-2021-47466 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47467/">CVE-2021-47467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47467">CVE-2021-47467 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47468/">CVE-2021-47468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47468">CVE-2021-47468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47469/">CVE-2021-47469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47469">CVE-2021-47469 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47470/">CVE-2021-47470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47470">CVE-2021-47470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47471/">CVE-2021-47471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47471">CVE-2021-47471 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47472/">CVE-2021-47472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47472">CVE-2021-47472 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47473/">CVE-2021-47473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47473">CVE-2021-47473 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47474/">CVE-2021-47474 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47474">CVE-2021-47474 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47475/">CVE-2021-47475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47475">CVE-2021-47475 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47476/">CVE-2021-47476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47476">CVE-2021-47476 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47477/">CVE-2021-47477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47477">CVE-2021-47477 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47478/">CVE-2021-47478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47478">CVE-2021-47478 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47479/">CVE-2021-47479 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47479">CVE-2021-47479 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47480/">CVE-2021-47480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47480">CVE-2021-47480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47481/">CVE-2021-47481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47481">CVE-2021-47481 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47482/">CVE-2021-47482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47482">CVE-2021-47482 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47483/">CVE-2021-47483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47483">CVE-2021-47483 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47484/">CVE-2021-47484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47484">CVE-2021-47484 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47485/">CVE-2021-47485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47485">CVE-2021-47485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47486/">CVE-2021-47486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47486">CVE-2021-47486 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47488/">CVE-2021-47488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47488">CVE-2021-47488 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47489/">CVE-2021-47489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47489">CVE-2021-47489 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47490/">CVE-2021-47490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47490">CVE-2021-47490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47491/">CVE-2021-47491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47491">CVE-2021-47491 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47492/">CVE-2021-47492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47492">CVE-2021-47492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47493/">CVE-2021-47493 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47493">CVE-2021-47493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47494/">CVE-2021-47494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47494">CVE-2021-47494 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47495/">CVE-2021-47495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47495">CVE-2021-47495 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47496/">CVE-2021-47496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47496">CVE-2021-47496 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47497/">CVE-2021-47497 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47497">CVE-2021-47497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47498/">CVE-2021-47498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47498">CVE-2021-47498 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47499/">CVE-2021-47499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47499">CVE-2021-47499 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47500/">CVE-2021-47500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47500">CVE-2021-47500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47501/">CVE-2021-47501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47501">CVE-2021-47501 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47502/">CVE-2021-47502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47502">CVE-2021-47502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47503/">CVE-2021-47503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47503">CVE-2021-47503 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47505/">CVE-2021-47505 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47505">CVE-2021-47505 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47506/">CVE-2021-47506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47506">CVE-2021-47506 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47507/">CVE-2021-47507 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47507">CVE-2021-47507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47509/">CVE-2021-47509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47509">CVE-2021-47509 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47510/">CVE-2021-47510 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47510">CVE-2021-47510 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47511/">CVE-2021-47511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47511">CVE-2021-47511 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47513/">CVE-2021-47513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47513">CVE-2021-47513 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47514/">CVE-2021-47514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47514">CVE-2021-47514 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47516/">CVE-2021-47516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47516">CVE-2021-47516 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47518/">CVE-2021-47518 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47518">CVE-2021-47518 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47520/">CVE-2021-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47520">CVE-2021-47520 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47521/">CVE-2021-47521 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47521">CVE-2021-47521 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47522/">CVE-2021-47522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47522">CVE-2021-47522 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47523/">CVE-2021-47523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47523">CVE-2021-47523 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47524/">CVE-2021-47524 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47524">CVE-2021-47524 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47525/">CVE-2021-47525 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47525">CVE-2021-47525 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47526/">CVE-2021-47526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47526">CVE-2021-47526 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47528/">CVE-2021-47528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47528">CVE-2021-47528 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47529/">CVE-2021-47529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47529">CVE-2021-47529 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47533/">CVE-2021-47533 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47533">CVE-2021-47533 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47535/">CVE-2021-47535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47535">CVE-2021-47535 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47536/">CVE-2021-47536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47536">CVE-2021-47536 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47537/">CVE-2021-47537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47537">CVE-2021-47537 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47540/">CVE-2021-47540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47540">CVE-2021-47540 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47541/">CVE-2021-47541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47541">CVE-2021-47541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47542/">CVE-2021-47542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47542">CVE-2021-47542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47544/">CVE-2021-47544 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47544">CVE-2021-47544 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47549/">CVE-2021-47549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47549">CVE-2021-47549 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47550/">CVE-2021-47550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47550">CVE-2021-47550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47551/">CVE-2021-47551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47551">CVE-2021-47551 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47553/">CVE-2021-47553 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47553">CVE-2021-47553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47554/">CVE-2021-47554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47554">CVE-2021-47554 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47556/">CVE-2021-47556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47556">CVE-2021-47556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47558/">CVE-2021-47558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47558">CVE-2021-47558 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47559/">CVE-2021-47559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47559">CVE-2021-47559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47560/">CVE-2021-47560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47560">CVE-2021-47560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47562/">CVE-2021-47562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47562">CVE-2021-47562 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47563/">CVE-2021-47563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47563">CVE-2021-47563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47564/">CVE-2021-47564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47564">CVE-2021-47564 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47565/">CVE-2021-47565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47565">CVE-2021-47565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48634/">CVE-2022-48634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48634">CVE-2022-48634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48636/">CVE-2022-48636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48636">CVE-2022-48636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48652/">CVE-2022-48652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48652">CVE-2022-48652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48671/">CVE-2022-48671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48671">CVE-2022-48671 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48672/">CVE-2022-48672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48672">CVE-2022-48672 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48673/">CVE-2022-48673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48673">CVE-2022-48673 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48675/">CVE-2022-48675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48675">CVE-2022-48675 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48686/">CVE-2022-48686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48686">CVE-2022-48686 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48687/">CVE-2022-48687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48687">CVE-2022-48687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48688/">CVE-2022-48688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48688">CVE-2022-48688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48692/">CVE-2022-48692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48692">CVE-2022-48692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48693/">CVE-2022-48693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48693">CVE-2022-48693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48694/">CVE-2022-48694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48694">CVE-2022-48694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48697/">CVE-2022-48697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48697">CVE-2022-48697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48699/">CVE-2022-48699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48699">CVE-2022-48699 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48700/">CVE-2022-48700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48700">CVE-2022-48700 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48702/">CVE-2022-48702 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48702">CVE-2022-48702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48703/">CVE-2022-48703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48703">CVE-2022-48703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48704/">CVE-2022-48704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48704">CVE-2022-48704 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48708/">CVE-2022-48708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48708">CVE-2022-48708 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48709/">CVE-2022-48709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48709">CVE-2022-48709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48710/">CVE-2022-48710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48710">CVE-2022-48710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52654/">CVE-2023-52654 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52655/">CVE-2023-52655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52676/">CVE-2023-52676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52676">CVE-2023-52676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52686/">CVE-2023-52686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52686">CVE-2023-52686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52690/">CVE-2023-52690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52690">CVE-2023-52690 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52702/">CVE-2023-52702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52702">CVE-2023-52702 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52703/">CVE-2023-52703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52703">CVE-2023-52703 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52707/">CVE-2023-52707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52707">CVE-2023-52707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52708/">CVE-2023-52708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52708">CVE-2023-52708 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52730/">CVE-2023-52730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52730">CVE-2023-52730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52733/">CVE-2023-52733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52733">CVE-2023-52733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52736/">CVE-2023-52736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52736">CVE-2023-52736 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52738/">CVE-2023-52738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52738">CVE-2023-52738 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52739/">CVE-2023-52739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52739">CVE-2023-52739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52740/">CVE-2023-52740 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52740">CVE-2023-52740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52741/">CVE-2023-52741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52741">CVE-2023-52741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52742/">CVE-2023-52742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52742">CVE-2023-52742 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52743/">CVE-2023-52743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52743">CVE-2023-52743 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52744/">CVE-2023-52744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52744">CVE-2023-52744 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52745/">CVE-2023-52745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52745">CVE-2023-52745 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52747/">CVE-2023-52747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52747">CVE-2023-52747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52753/">CVE-2023-52753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52753">CVE-2023-52753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52754/">CVE-2023-52754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52754">CVE-2023-52754 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52756/">CVE-2023-52756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52756">CVE-2023-52756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52759/">CVE-2023-52759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52759">CVE-2023-52759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52763/">CVE-2023-52763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52763">CVE-2023-52763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52764/">CVE-2023-52764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52764">CVE-2023-52764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52774/">CVE-2023-52774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52774">CVE-2023-52774 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52781/">CVE-2023-52781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52781">CVE-2023-52781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52788/">CVE-2023-52788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52788">CVE-2023-52788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52789/">CVE-2023-52789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52789">CVE-2023-52789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52791/">CVE-2023-52791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52791">CVE-2023-52791 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52798/">CVE-2023-52798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52798">CVE-2023-52798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52799/">CVE-2023-52799 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52799">CVE-2023-52799 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52804/">CVE-2023-52804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52804">CVE-2023-52804 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52805/">CVE-2023-52805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52805">CVE-2023-52805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52806/">CVE-2023-52806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52806">CVE-2023-52806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52810/">CVE-2023-52810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52810">CVE-2023-52810 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52811/">CVE-2023-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52811">CVE-2023-52811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52814/">CVE-2023-52814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52814">CVE-2023-52814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52816/">CVE-2023-52816 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52816">CVE-2023-52816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52818/">CVE-2023-52818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52818">CVE-2023-52818 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52819/">CVE-2023-52819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52819">CVE-2023-52819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52821/">CVE-2023-52821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52821">CVE-2023-52821 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52825/">CVE-2023-52825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52825">CVE-2023-52825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52826/">CVE-2023-52826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52826">CVE-2023-52826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52833/">CVE-2023-52833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52833">CVE-2023-52833 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52834/">CVE-2023-52834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52834">CVE-2023-52834 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52838/">CVE-2023-52838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52838">CVE-2023-52838 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52840/">CVE-2023-52840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52840">CVE-2023-52840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52841/">CVE-2023-52841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52841">CVE-2023-52841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52844/">CVE-2023-52844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52844">CVE-2023-52844 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52847/">CVE-2023-52847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52847">CVE-2023-52847 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52853/">CVE-2023-52853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52853">CVE-2023-52853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52854/">CVE-2023-52854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52854">CVE-2023-52854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52855/">CVE-2023-52855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52855">CVE-2023-52855 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52856/">CVE-2023-52856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52856">CVE-2023-52856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52858/">CVE-2023-52858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52858">CVE-2023-52858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52865/">CVE-2023-52865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52865">CVE-2023-52865 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52867/">CVE-2023-52867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52867">CVE-2023-52867 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52868/">CVE-2023-52868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52868">CVE-2023-52868 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52870/">CVE-2023-52870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52870">CVE-2023-52870 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52871/">CVE-2023-52871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52871">CVE-2023-52871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52872/">CVE-2023-52872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52872">CVE-2023-52872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52873/">CVE-2023-52873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52873">CVE-2023-52873 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52875/">CVE-2023-52875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52875">CVE-2023-52875 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52876/">CVE-2023-52876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52876">CVE-2023-52876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52877/">CVE-2023-52877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52877">CVE-2023-52877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52878/">CVE-2023-52878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52878">CVE-2023-52878 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0639/">CVE-2024-0639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0639">CVE-2024-0639 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26840/">CVE-2024-26840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26840">CVE-2024-26840 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26921/">CVE-2024-26921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26928/">CVE-2024-26928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26928">CVE-2024-26928 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27413/">CVE-2024-27413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27413">CVE-2024-27413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35811/">CVE-2024-35811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35811">CVE-2024-35811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35815/">CVE-2024-35815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35817/">CVE-2024-35817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35863/">CVE-2024-35863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35867/">CVE-2024-35867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35867">CVE-2024-35867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35868/">CVE-2024-35868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35868">CVE-2024-35868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35904/">CVE-2024-35904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35904">CVE-2024-35904 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35914/">CVE-2024-35914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35914">CVE-2024-35914 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865707" comment="kernel-rt-5.14.21-150400.15.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865708" comment="kernel-source-rt-5.14.21-150400.15.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206162" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1212233" ref_url="https://bugzilla.suse.com/1212233" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3164" ref_url="https://www.suse.com/security/cve/CVE-2023-3164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2028-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035583.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-3164: Fixed a heap buffer overflow in tiffcrop. (bsc#1212233)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212233">SUSE bug 1212233</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3164/">CVE-2023-3164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3164">CVE-2023-3164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865820" comment="libtiff5-4.0.9-150000.45.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206163" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218300" ref_url="https://bugzilla.suse.com/1218300" source="BUGZILLA"/>
		<reference ref_id="1218301" ref_url="https://bugzilla.suse.com/1218301" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50229" ref_url="https://www.suse.com/security/cve/CVE-2023-50229/" source="CVE"/>
		<reference ref_id="CVE-2023-50230" ref_url="https://www.suse.com/security/cve/CVE-2023-50230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017754.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2023-50229: Fixed an out of bounds write in the primary version
  counter for the Phone Book Access Profile implementation
  (bsc#1218300).
- CVE-2023-50230: Fixed an out of bounds write in the secondary
  version counter for the Phone Book Access Profile implementation
  (bsc#1218301).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218300">SUSE bug 1218300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218301">SUSE bug 1218301</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50229/">CVE-2023-50229 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50229">CVE-2023-50229 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50230/">CVE-2023-50230 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50230">CVE-2023-50230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844431" comment="libbluetooth3-5.62-150400.4.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206164" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1195391" ref_url="https://bugzilla.suse.com/1195391" source="BUGZILLA"/>
		<reference ref_id="1219276" ref_url="https://bugzilla.suse.com/1219276" source="BUGZILLA"/>
		<reference ref_id="1223903" ref_url="https://bugzilla.suse.com/1223903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48622" ref_url="https://www.suse.com/security/cve/CVE-2022-48622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035643.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

gdk-pixbuf was updated to version 2.42.12:

- Security issues fixed:

  * CVE-2022-48622: Fixed heap memory corruption on gdk-pixbuf (bsc#1219276)

- Changes in version 2.42.12:

  + ani: Reject files with multiple INA or IART chunks,
  + ani: validate chunk size,
  + Updated translations.

- Enable other image loaders such as xpm and xbm (bsc#1223903)

- Changes in version 2.42.11:

  + Disable fringe loaders by default.
  + Introspection fixes.
  + Updated translations.

- Changes in version 2.42.10:

  + Search for rst2man.py.
  + Update the memory size limit for JPEG images.
  + Updated translations.

- Fixed loading of larger images
- Avoid Bash specific syntax in baselibs postscript (bsc#1195391) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2024-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195391">SUSE bug 1195391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219276">SUSE bug 1219276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223903">SUSE bug 1223903</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48622/">CVE-2022-48622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48622">CVE-2022-48622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868392" comment="gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868393" comment="libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868394" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206165" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1225551" ref_url="https://bugzilla.suse.com/1225551" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4741" ref_url="https://www.suse.com/security/cve/CVE-2024-4741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035648.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2024-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225551">SUSE bug 1225551</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4741/">CVE-2024-4741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868395" comment="libopenssl3-3.0.8-150400.4.57.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206166" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1225551" ref_url="https://bugzilla.suse.com/1225551" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4741" ref_url="https://www.suse.com/security/cve/CVE-2024-4741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035647.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2024-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225551">SUSE bug 1225551</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4741/">CVE-2024-4741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868396" comment="libopenssl-1_1-devel-1.1.1l-150400.7.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868397" comment="libopenssl1_1-1.1.1l-150400.7.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868398" comment="libopenssl1_1-hmac-1.1.1l-150400.7.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868399" comment="openssl-1_1-1.1.1l-150400.7.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206167" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1224122" ref_url="https://bugzilla.suse.com/1224122" source="BUGZILLA"/>
		<reference ref_id="1226136" ref_url="https://bugzilla.suse.com/1226136" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018757.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- Update to version 4.9.5
- CVE-2024-3727: Fixed a flaw that allowed attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks. (bsc#1224122)
- CVE-2024-24786: Fixed an infinite loop in protojson. (bsc#1226136)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2024-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224122">SUSE bug 1224122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226136">SUSE bug 1226136</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868400" comment="podman-4.9.5-150400.4.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206168" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1221400" ref_url="https://bugzilla.suse.com/1221400" source="BUGZILLA"/>
		<reference ref_id="1224323" ref_url="https://bugzilla.suse.com/1224323" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018771.html" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

Update to containerd v1.7.17.

- CVE-2023-45288: Fixed the limit of CONTINUATION frames read for an HTTP/2 request (bsc#1221400).
- Fixed /sys/devices/virtual/powercap accessibility by default containers to mitigate power-based side channel attacks (bsc#1224323).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224323">SUSE bug 1224323</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868463" comment="containerd-1.7.17-150000.111.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206169" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1225971" ref_url="https://bugzilla.suse.com/1225971" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-20696" ref_url="https://www.suse.com/security/cve/CVE-2024-20696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035706.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225971">SUSE bug 1225971</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-20696/">CVE-2024-20696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20696">CVE-2024-20696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868679" comment="libarchive13-3.5.1-150400.3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206170" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1174585" ref_url="https://bugzilla.suse.com/1174585" source="BUGZILLA"/>
		<reference ref_id="1190569" ref_url="https://bugzilla.suse.com/1190569" source="BUGZILLA"/>
		<reference ref_id="1191949" ref_url="https://bugzilla.suse.com/1191949" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1193983" ref_url="https://bugzilla.suse.com/1193983" source="BUGZILLA"/>
		<reference ref_id="1194288" ref_url="https://bugzilla.suse.com/1194288" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1196869" ref_url="https://bugzilla.suse.com/1196869" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197915" ref_url="https://bugzilla.suse.com/1197915" source="BUGZILLA"/>
		<reference ref_id="1200313" ref_url="https://bugzilla.suse.com/1200313" source="BUGZILLA"/>
		<reference ref_id="1201308" ref_url="https://bugzilla.suse.com/1201308" source="BUGZILLA"/>
		<reference ref_id="1201489" ref_url="https://bugzilla.suse.com/1201489" source="BUGZILLA"/>
		<reference ref_id="1208149" ref_url="https://bugzilla.suse.com/1208149" source="BUGZILLA"/>
		<reference ref_id="1209657" ref_url="https://bugzilla.suse.com/1209657" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1209834" ref_url="https://bugzilla.suse.com/1209834" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1213863" ref_url="https://bugzilla.suse.com/1213863" source="BUGZILLA"/>
		<reference ref_id="1216702" ref_url="https://bugzilla.suse.com/1216702" source="BUGZILLA"/>
		<reference ref_id="1217169" ref_url="https://bugzilla.suse.com/1217169" source="BUGZILLA"/>
		<reference ref_id="1217515" ref_url="https://bugzilla.suse.com/1217515" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1218917" ref_url="https://bugzilla.suse.com/1218917" source="BUGZILLA"/>
		<reference ref_id="1220492" ref_url="https://bugzilla.suse.com/1220492" source="BUGZILLA"/>
		<reference ref_id="1220783" ref_url="https://bugzilla.suse.com/1220783" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221645" ref_url="https://bugzilla.suse.com/1221645" source="BUGZILLA"/>
		<reference ref_id="1221958" ref_url="https://bugzilla.suse.com/1221958" source="BUGZILLA"/>
		<reference ref_id="1222011" ref_url="https://bugzilla.suse.com/1222011" source="BUGZILLA"/>
		<reference ref_id="1222559" ref_url="https://bugzilla.suse.com/1222559" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="1222721" ref_url="https://bugzilla.suse.com/1222721" source="BUGZILLA"/>
		<reference ref_id="1222976" ref_url="https://bugzilla.suse.com/1222976" source="BUGZILLA"/>
		<reference ref_id="1223057" ref_url="https://bugzilla.suse.com/1223057" source="BUGZILLA"/>
		<reference ref_id="1223084" ref_url="https://bugzilla.suse.com/1223084" source="BUGZILLA"/>
		<reference ref_id="1223111" ref_url="https://bugzilla.suse.com/1223111" source="BUGZILLA"/>
		<reference ref_id="1223138" ref_url="https://bugzilla.suse.com/1223138" source="BUGZILLA"/>
		<reference ref_id="1223191" ref_url="https://bugzilla.suse.com/1223191" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223390" ref_url="https://bugzilla.suse.com/1223390" source="BUGZILLA"/>
		<reference ref_id="1223481" ref_url="https://bugzilla.suse.com/1223481" source="BUGZILLA"/>
		<reference ref_id="1223501" ref_url="https://bugzilla.suse.com/1223501" source="BUGZILLA"/>
		<reference ref_id="1223505" ref_url="https://bugzilla.suse.com/1223505" source="BUGZILLA"/>
		<reference ref_id="1223512" ref_url="https://bugzilla.suse.com/1223512" source="BUGZILLA"/>
		<reference ref_id="1223520" ref_url="https://bugzilla.suse.com/1223520" source="BUGZILLA"/>
		<reference ref_id="1223532" ref_url="https://bugzilla.suse.com/1223532" source="BUGZILLA"/>
		<reference ref_id="1223626" ref_url="https://bugzilla.suse.com/1223626" source="BUGZILLA"/>
		<reference ref_id="1223715" ref_url="https://bugzilla.suse.com/1223715" source="BUGZILLA"/>
		<reference ref_id="1223894" ref_url="https://bugzilla.suse.com/1223894" source="BUGZILLA"/>
		<reference ref_id="1223921" ref_url="https://bugzilla.suse.com/1223921" source="BUGZILLA"/>
		<reference ref_id="1223922" ref_url="https://bugzilla.suse.com/1223922" source="BUGZILLA"/>
		<reference ref_id="1223923" ref_url="https://bugzilla.suse.com/1223923" source="BUGZILLA"/>
		<reference ref_id="1223924" ref_url="https://bugzilla.suse.com/1223924" source="BUGZILLA"/>
		<reference ref_id="1223929" ref_url="https://bugzilla.suse.com/1223929" source="BUGZILLA"/>
		<reference ref_id="1223931" ref_url="https://bugzilla.suse.com/1223931" source="BUGZILLA"/>
		<reference ref_id="1223932" ref_url="https://bugzilla.suse.com/1223932" source="BUGZILLA"/>
		<reference ref_id="1223934" ref_url="https://bugzilla.suse.com/1223934" source="BUGZILLA"/>
		<reference ref_id="1223941" ref_url="https://bugzilla.suse.com/1223941" source="BUGZILLA"/>
		<reference ref_id="1223948" ref_url="https://bugzilla.suse.com/1223948" source="BUGZILLA"/>
		<reference ref_id="1223952" ref_url="https://bugzilla.suse.com/1223952" source="BUGZILLA"/>
		<reference ref_id="1223953" ref_url="https://bugzilla.suse.com/1223953" source="BUGZILLA"/>
		<reference ref_id="1223957" ref_url="https://bugzilla.suse.com/1223957" source="BUGZILLA"/>
		<reference ref_id="1223962" ref_url="https://bugzilla.suse.com/1223962" source="BUGZILLA"/>
		<reference ref_id="1223963" ref_url="https://bugzilla.suse.com/1223963" source="BUGZILLA"/>
		<reference ref_id="1223964" ref_url="https://bugzilla.suse.com/1223964" source="BUGZILLA"/>
		<reference ref_id="1223996" ref_url="https://bugzilla.suse.com/1223996" source="BUGZILLA"/>
		<reference ref_id="1224085" ref_url="https://bugzilla.suse.com/1224085" source="BUGZILLA"/>
		<reference ref_id="1224099" ref_url="https://bugzilla.suse.com/1224099" source="BUGZILLA"/>
		<reference ref_id="1224137" ref_url="https://bugzilla.suse.com/1224137" source="BUGZILLA"/>
		<reference ref_id="1224174" ref_url="https://bugzilla.suse.com/1224174" source="BUGZILLA"/>
		<reference ref_id="1224438" ref_url="https://bugzilla.suse.com/1224438" source="BUGZILLA"/>
		<reference ref_id="1224482" ref_url="https://bugzilla.suse.com/1224482" source="BUGZILLA"/>
		<reference ref_id="1224488" ref_url="https://bugzilla.suse.com/1224488" source="BUGZILLA"/>
		<reference ref_id="1224494" ref_url="https://bugzilla.suse.com/1224494" source="BUGZILLA"/>
		<reference ref_id="1224511" ref_url="https://bugzilla.suse.com/1224511" source="BUGZILLA"/>
		<reference ref_id="1224592" ref_url="https://bugzilla.suse.com/1224592" source="BUGZILLA"/>
		<reference ref_id="1224611" ref_url="https://bugzilla.suse.com/1224611" source="BUGZILLA"/>
		<reference ref_id="1224664" ref_url="https://bugzilla.suse.com/1224664" source="BUGZILLA"/>
		<reference ref_id="1224678" ref_url="https://bugzilla.suse.com/1224678" source="BUGZILLA"/>
		<reference ref_id="1224682" ref_url="https://bugzilla.suse.com/1224682" source="BUGZILLA"/>
		<reference ref_id="1224685" ref_url="https://bugzilla.suse.com/1224685" source="BUGZILLA"/>
		<reference ref_id="1224730" ref_url="https://bugzilla.suse.com/1224730" source="BUGZILLA"/>
		<reference ref_id="1224736" ref_url="https://bugzilla.suse.com/1224736" source="BUGZILLA"/>
		<reference ref_id="1224763" ref_url="https://bugzilla.suse.com/1224763" source="BUGZILLA"/>
		<reference ref_id="1224816" ref_url="https://bugzilla.suse.com/1224816" source="BUGZILLA"/>
		<reference ref_id="1224895" ref_url="https://bugzilla.suse.com/1224895" source="BUGZILLA"/>
		<reference ref_id="1224898" ref_url="https://bugzilla.suse.com/1224898" source="BUGZILLA"/>
		<reference ref_id="1224900" ref_url="https://bugzilla.suse.com/1224900" source="BUGZILLA"/>
		<reference ref_id="1224901" ref_url="https://bugzilla.suse.com/1224901" source="BUGZILLA"/>
		<reference ref_id="1224902" ref_url="https://bugzilla.suse.com/1224902" source="BUGZILLA"/>
		<reference ref_id="1224903" ref_url="https://bugzilla.suse.com/1224903" source="BUGZILLA"/>
		<reference ref_id="1224904" ref_url="https://bugzilla.suse.com/1224904" source="BUGZILLA"/>
		<reference ref_id="1224905" ref_url="https://bugzilla.suse.com/1224905" source="BUGZILLA"/>
		<reference ref_id="1224907" ref_url="https://bugzilla.suse.com/1224907" source="BUGZILLA"/>
		<reference ref_id="1224909" ref_url="https://bugzilla.suse.com/1224909" source="BUGZILLA"/>
		<reference ref_id="1224910" ref_url="https://bugzilla.suse.com/1224910" source="BUGZILLA"/>
		<reference ref_id="1224911" ref_url="https://bugzilla.suse.com/1224911" source="BUGZILLA"/>
		<reference ref_id="1224912" ref_url="https://bugzilla.suse.com/1224912" source="BUGZILLA"/>
		<reference ref_id="1224913" ref_url="https://bugzilla.suse.com/1224913" source="BUGZILLA"/>
		<reference ref_id="1224914" ref_url="https://bugzilla.suse.com/1224914" source="BUGZILLA"/>
		<reference ref_id="1224915" ref_url="https://bugzilla.suse.com/1224915" source="BUGZILLA"/>
		<reference ref_id="1224920" ref_url="https://bugzilla.suse.com/1224920" source="BUGZILLA"/>
		<reference ref_id="1224928" ref_url="https://bugzilla.suse.com/1224928" source="BUGZILLA"/>
		<reference ref_id="1224931" ref_url="https://bugzilla.suse.com/1224931" source="BUGZILLA"/>
		<reference ref_id="1224932" ref_url="https://bugzilla.suse.com/1224932" source="BUGZILLA"/>
		<reference ref_id="1224937" ref_url="https://bugzilla.suse.com/1224937" source="BUGZILLA"/>
		<reference ref_id="1224942" ref_url="https://bugzilla.suse.com/1224942" source="BUGZILLA"/>
		<reference ref_id="1224944" ref_url="https://bugzilla.suse.com/1224944" source="BUGZILLA"/>
		<reference ref_id="1224945" ref_url="https://bugzilla.suse.com/1224945" source="BUGZILLA"/>
		<reference ref_id="1224947" ref_url="https://bugzilla.suse.com/1224947" source="BUGZILLA"/>
		<reference ref_id="1224956" ref_url="https://bugzilla.suse.com/1224956" source="BUGZILLA"/>
		<reference ref_id="1224988" ref_url="https://bugzilla.suse.com/1224988" source="BUGZILLA"/>
		<reference ref_id="1225000" ref_url="https://bugzilla.suse.com/1225000" source="BUGZILLA"/>
		<reference ref_id="1225003" ref_url="https://bugzilla.suse.com/1225003" source="BUGZILLA"/>
		<reference ref_id="1225005" ref_url="https://bugzilla.suse.com/1225005" source="BUGZILLA"/>
		<reference ref_id="1225009" ref_url="https://bugzilla.suse.com/1225009" source="BUGZILLA"/>
		<reference ref_id="1225022" ref_url="https://bugzilla.suse.com/1225022" source="BUGZILLA"/>
		<reference ref_id="1225031" ref_url="https://bugzilla.suse.com/1225031" source="BUGZILLA"/>
		<reference ref_id="1225032" ref_url="https://bugzilla.suse.com/1225032" source="BUGZILLA"/>
		<reference ref_id="1225036" ref_url="https://bugzilla.suse.com/1225036" source="BUGZILLA"/>
		<reference ref_id="1225044" ref_url="https://bugzilla.suse.com/1225044" source="BUGZILLA"/>
		<reference ref_id="1225076" ref_url="https://bugzilla.suse.com/1225076" source="BUGZILLA"/>
		<reference ref_id="1225077" ref_url="https://bugzilla.suse.com/1225077" source="BUGZILLA"/>
		<reference ref_id="1225082" ref_url="https://bugzilla.suse.com/1225082" source="BUGZILLA"/>
		<reference ref_id="1225086" ref_url="https://bugzilla.suse.com/1225086" source="BUGZILLA"/>
		<reference ref_id="1225092" ref_url="https://bugzilla.suse.com/1225092" source="BUGZILLA"/>
		<reference ref_id="1225095" ref_url="https://bugzilla.suse.com/1225095" source="BUGZILLA"/>
		<reference ref_id="1225096" ref_url="https://bugzilla.suse.com/1225096" source="BUGZILLA"/>
		<reference ref_id="1225106" ref_url="https://bugzilla.suse.com/1225106" source="BUGZILLA"/>
		<reference ref_id="1225108" ref_url="https://bugzilla.suse.com/1225108" source="BUGZILLA"/>
		<reference ref_id="1225109" ref_url="https://bugzilla.suse.com/1225109" source="BUGZILLA"/>
		<reference ref_id="1225118" ref_url="https://bugzilla.suse.com/1225118" source="BUGZILLA"/>
		<reference ref_id="1225121" ref_url="https://bugzilla.suse.com/1225121" source="BUGZILLA"/>
		<reference ref_id="1225122" ref_url="https://bugzilla.suse.com/1225122" source="BUGZILLA"/>
		<reference ref_id="1225123" ref_url="https://bugzilla.suse.com/1225123" source="BUGZILLA"/>
		<reference ref_id="1225125" ref_url="https://bugzilla.suse.com/1225125" source="BUGZILLA"/>
		<reference ref_id="1225126" ref_url="https://bugzilla.suse.com/1225126" source="BUGZILLA"/>
		<reference ref_id="1225127" ref_url="https://bugzilla.suse.com/1225127" source="BUGZILLA"/>
		<reference ref_id="1225129" ref_url="https://bugzilla.suse.com/1225129" source="BUGZILLA"/>
		<reference ref_id="1225131" ref_url="https://bugzilla.suse.com/1225131" source="BUGZILLA"/>
		<reference ref_id="1225132" ref_url="https://bugzilla.suse.com/1225132" source="BUGZILLA"/>
		<reference ref_id="1225145" ref_url="https://bugzilla.suse.com/1225145" source="BUGZILLA"/>
		<reference ref_id="1225151" ref_url="https://bugzilla.suse.com/1225151" source="BUGZILLA"/>
		<reference ref_id="1225153" ref_url="https://bugzilla.suse.com/1225153" source="BUGZILLA"/>
		<reference ref_id="1225156" ref_url="https://bugzilla.suse.com/1225156" source="BUGZILLA"/>
		<reference ref_id="1225158" ref_url="https://bugzilla.suse.com/1225158" source="BUGZILLA"/>
		<reference ref_id="1225160" ref_url="https://bugzilla.suse.com/1225160" source="BUGZILLA"/>
		<reference ref_id="1225161" ref_url="https://bugzilla.suse.com/1225161" source="BUGZILLA"/>
		<reference ref_id="1225164" ref_url="https://bugzilla.suse.com/1225164" source="BUGZILLA"/>
		<reference ref_id="1225167" ref_url="https://bugzilla.suse.com/1225167" source="BUGZILLA"/>
		<reference ref_id="1225180" ref_url="https://bugzilla.suse.com/1225180" source="BUGZILLA"/>
		<reference ref_id="1225183" ref_url="https://bugzilla.suse.com/1225183" source="BUGZILLA"/>
		<reference ref_id="1225184" ref_url="https://bugzilla.suse.com/1225184" source="BUGZILLA"/>
		<reference ref_id="1225186" ref_url="https://bugzilla.suse.com/1225186" source="BUGZILLA"/>
		<reference ref_id="1225187" ref_url="https://bugzilla.suse.com/1225187" source="BUGZILLA"/>
		<reference ref_id="1225189" ref_url="https://bugzilla.suse.com/1225189" source="BUGZILLA"/>
		<reference ref_id="1225190" ref_url="https://bugzilla.suse.com/1225190" source="BUGZILLA"/>
		<reference ref_id="1225191" ref_url="https://bugzilla.suse.com/1225191" source="BUGZILLA"/>
		<reference ref_id="1225192" ref_url="https://bugzilla.suse.com/1225192" source="BUGZILLA"/>
		<reference ref_id="1225193" ref_url="https://bugzilla.suse.com/1225193" source="BUGZILLA"/>
		<reference ref_id="1225195" ref_url="https://bugzilla.suse.com/1225195" source="BUGZILLA"/>
		<reference ref_id="1225198" ref_url="https://bugzilla.suse.com/1225198" source="BUGZILLA"/>
		<reference ref_id="1225201" ref_url="https://bugzilla.suse.com/1225201" source="BUGZILLA"/>
		<reference ref_id="1225203" ref_url="https://bugzilla.suse.com/1225203" source="BUGZILLA"/>
		<reference ref_id="1225205" ref_url="https://bugzilla.suse.com/1225205" source="BUGZILLA"/>
		<reference ref_id="1225206" ref_url="https://bugzilla.suse.com/1225206" source="BUGZILLA"/>
		<reference ref_id="1225207" ref_url="https://bugzilla.suse.com/1225207" source="BUGZILLA"/>
		<reference ref_id="1225208" ref_url="https://bugzilla.suse.com/1225208" source="BUGZILLA"/>
		<reference ref_id="1225209" ref_url="https://bugzilla.suse.com/1225209" source="BUGZILLA"/>
		<reference ref_id="1225210" ref_url="https://bugzilla.suse.com/1225210" source="BUGZILLA"/>
		<reference ref_id="1225214" ref_url="https://bugzilla.suse.com/1225214" source="BUGZILLA"/>
		<reference ref_id="1225223" ref_url="https://bugzilla.suse.com/1225223" source="BUGZILLA"/>
		<reference ref_id="1225224" ref_url="https://bugzilla.suse.com/1225224" source="BUGZILLA"/>
		<reference ref_id="1225225" ref_url="https://bugzilla.suse.com/1225225" source="BUGZILLA"/>
		<reference ref_id="1225227" ref_url="https://bugzilla.suse.com/1225227" source="BUGZILLA"/>
		<reference ref_id="1225228" ref_url="https://bugzilla.suse.com/1225228" source="BUGZILLA"/>
		<reference ref_id="1225229" ref_url="https://bugzilla.suse.com/1225229" source="BUGZILLA"/>
		<reference ref_id="1225230" ref_url="https://bugzilla.suse.com/1225230" source="BUGZILLA"/>
		<reference ref_id="1225232" ref_url="https://bugzilla.suse.com/1225232" source="BUGZILLA"/>
		<reference ref_id="1225233" ref_url="https://bugzilla.suse.com/1225233" source="BUGZILLA"/>
		<reference ref_id="1225235" ref_url="https://bugzilla.suse.com/1225235" source="BUGZILLA"/>
		<reference ref_id="1225236" ref_url="https://bugzilla.suse.com/1225236" source="BUGZILLA"/>
		<reference ref_id="1225237" ref_url="https://bugzilla.suse.com/1225237" source="BUGZILLA"/>
		<reference ref_id="1225238" ref_url="https://bugzilla.suse.com/1225238" source="BUGZILLA"/>
		<reference ref_id="1225239" ref_url="https://bugzilla.suse.com/1225239" source="BUGZILLA"/>
		<reference ref_id="1225240" ref_url="https://bugzilla.suse.com/1225240" source="BUGZILLA"/>
		<reference ref_id="1225241" ref_url="https://bugzilla.suse.com/1225241" source="BUGZILLA"/>
		<reference ref_id="1225242" ref_url="https://bugzilla.suse.com/1225242" source="BUGZILLA"/>
		<reference ref_id="1225243" ref_url="https://bugzilla.suse.com/1225243" source="BUGZILLA"/>
		<reference ref_id="1225244" ref_url="https://bugzilla.suse.com/1225244" source="BUGZILLA"/>
		<reference ref_id="1225245" ref_url="https://bugzilla.suse.com/1225245" source="BUGZILLA"/>
		<reference ref_id="1225246" ref_url="https://bugzilla.suse.com/1225246" source="BUGZILLA"/>
		<reference ref_id="1225247" ref_url="https://bugzilla.suse.com/1225247" source="BUGZILLA"/>
		<reference ref_id="1225248" ref_url="https://bugzilla.suse.com/1225248" source="BUGZILLA"/>
		<reference ref_id="1225249" ref_url="https://bugzilla.suse.com/1225249" source="BUGZILLA"/>
		<reference ref_id="1225250" ref_url="https://bugzilla.suse.com/1225250" source="BUGZILLA"/>
		<reference ref_id="1225251" ref_url="https://bugzilla.suse.com/1225251" source="BUGZILLA"/>
		<reference ref_id="1225252" ref_url="https://bugzilla.suse.com/1225252" source="BUGZILLA"/>
		<reference ref_id="1225253" ref_url="https://bugzilla.suse.com/1225253" source="BUGZILLA"/>
		<reference ref_id="1225254" ref_url="https://bugzilla.suse.com/1225254" source="BUGZILLA"/>
		<reference ref_id="1225255" ref_url="https://bugzilla.suse.com/1225255" source="BUGZILLA"/>
		<reference ref_id="1225256" ref_url="https://bugzilla.suse.com/1225256" source="BUGZILLA"/>
		<reference ref_id="1225257" ref_url="https://bugzilla.suse.com/1225257" source="BUGZILLA"/>
		<reference ref_id="1225258" ref_url="https://bugzilla.suse.com/1225258" source="BUGZILLA"/>
		<reference ref_id="1225259" ref_url="https://bugzilla.suse.com/1225259" source="BUGZILLA"/>
		<reference ref_id="1225260" ref_url="https://bugzilla.suse.com/1225260" source="BUGZILLA"/>
		<reference ref_id="1225261" ref_url="https://bugzilla.suse.com/1225261" source="BUGZILLA"/>
		<reference ref_id="1225262" ref_url="https://bugzilla.suse.com/1225262" source="BUGZILLA"/>
		<reference ref_id="1225263" ref_url="https://bugzilla.suse.com/1225263" source="BUGZILLA"/>
		<reference ref_id="1225268" ref_url="https://bugzilla.suse.com/1225268" source="BUGZILLA"/>
		<reference ref_id="1225301" ref_url="https://bugzilla.suse.com/1225301" source="BUGZILLA"/>
		<reference ref_id="1225303" ref_url="https://bugzilla.suse.com/1225303" source="BUGZILLA"/>
		<reference ref_id="1225304" ref_url="https://bugzilla.suse.com/1225304" source="BUGZILLA"/>
		<reference ref_id="1225306" ref_url="https://bugzilla.suse.com/1225306" source="BUGZILLA"/>
		<reference ref_id="1225316" ref_url="https://bugzilla.suse.com/1225316" source="BUGZILLA"/>
		<reference ref_id="1225318" ref_url="https://bugzilla.suse.com/1225318" source="BUGZILLA"/>
		<reference ref_id="1225320" ref_url="https://bugzilla.suse.com/1225320" source="BUGZILLA"/>
		<reference ref_id="1225321" ref_url="https://bugzilla.suse.com/1225321" source="BUGZILLA"/>
		<reference ref_id="1225322" ref_url="https://bugzilla.suse.com/1225322" source="BUGZILLA"/>
		<reference ref_id="1225323" ref_url="https://bugzilla.suse.com/1225323" source="BUGZILLA"/>
		<reference ref_id="1225326" ref_url="https://bugzilla.suse.com/1225326" source="BUGZILLA"/>
		<reference ref_id="1225327" ref_url="https://bugzilla.suse.com/1225327" source="BUGZILLA"/>
		<reference ref_id="1225328" ref_url="https://bugzilla.suse.com/1225328" source="BUGZILLA"/>
		<reference ref_id="1225329" ref_url="https://bugzilla.suse.com/1225329" source="BUGZILLA"/>
		<reference ref_id="1225330" ref_url="https://bugzilla.suse.com/1225330" source="BUGZILLA"/>
		<reference ref_id="1225331" ref_url="https://bugzilla.suse.com/1225331" source="BUGZILLA"/>
		<reference ref_id="1225332" ref_url="https://bugzilla.suse.com/1225332" source="BUGZILLA"/>
		<reference ref_id="1225333" ref_url="https://bugzilla.suse.com/1225333" source="BUGZILLA"/>
		<reference ref_id="1225334" ref_url="https://bugzilla.suse.com/1225334" source="BUGZILLA"/>
		<reference ref_id="1225335" ref_url="https://bugzilla.suse.com/1225335" source="BUGZILLA"/>
		<reference ref_id="1225336" ref_url="https://bugzilla.suse.com/1225336" source="BUGZILLA"/>
		<reference ref_id="1225337" ref_url="https://bugzilla.suse.com/1225337" source="BUGZILLA"/>
		<reference ref_id="1225338" ref_url="https://bugzilla.suse.com/1225338" source="BUGZILLA"/>
		<reference ref_id="1225339" ref_url="https://bugzilla.suse.com/1225339" source="BUGZILLA"/>
		<reference ref_id="1225341" ref_url="https://bugzilla.suse.com/1225341" source="BUGZILLA"/>
		<reference ref_id="1225342" ref_url="https://bugzilla.suse.com/1225342" source="BUGZILLA"/>
		<reference ref_id="1225344" ref_url="https://bugzilla.suse.com/1225344" source="BUGZILLA"/>
		<reference ref_id="1225346" ref_url="https://bugzilla.suse.com/1225346" source="BUGZILLA"/>
		<reference ref_id="1225347" ref_url="https://bugzilla.suse.com/1225347" source="BUGZILLA"/>
		<reference ref_id="1225351" ref_url="https://bugzilla.suse.com/1225351" source="BUGZILLA"/>
		<reference ref_id="1225353" ref_url="https://bugzilla.suse.com/1225353" source="BUGZILLA"/>
		<reference ref_id="1225354" ref_url="https://bugzilla.suse.com/1225354" source="BUGZILLA"/>
		<reference ref_id="1225355" ref_url="https://bugzilla.suse.com/1225355" source="BUGZILLA"/>
		<reference ref_id="1225357" ref_url="https://bugzilla.suse.com/1225357" source="BUGZILLA"/>
		<reference ref_id="1225358" ref_url="https://bugzilla.suse.com/1225358" source="BUGZILLA"/>
		<reference ref_id="1225360" ref_url="https://bugzilla.suse.com/1225360" source="BUGZILLA"/>
		<reference ref_id="1225361" ref_url="https://bugzilla.suse.com/1225361" source="BUGZILLA"/>
		<reference ref_id="1225366" ref_url="https://bugzilla.suse.com/1225366" source="BUGZILLA"/>
		<reference ref_id="1225367" ref_url="https://bugzilla.suse.com/1225367" source="BUGZILLA"/>
		<reference ref_id="1225368" ref_url="https://bugzilla.suse.com/1225368" source="BUGZILLA"/>
		<reference ref_id="1225369" ref_url="https://bugzilla.suse.com/1225369" source="BUGZILLA"/>
		<reference ref_id="1225370" ref_url="https://bugzilla.suse.com/1225370" source="BUGZILLA"/>
		<reference ref_id="1225372" ref_url="https://bugzilla.suse.com/1225372" source="BUGZILLA"/>
		<reference ref_id="1225373" ref_url="https://bugzilla.suse.com/1225373" source="BUGZILLA"/>
		<reference ref_id="1225374" ref_url="https://bugzilla.suse.com/1225374" source="BUGZILLA"/>
		<reference ref_id="1225375" ref_url="https://bugzilla.suse.com/1225375" source="BUGZILLA"/>
		<reference ref_id="1225376" ref_url="https://bugzilla.suse.com/1225376" source="BUGZILLA"/>
		<reference ref_id="1225377" ref_url="https://bugzilla.suse.com/1225377" source="BUGZILLA"/>
		<reference ref_id="1225379" ref_url="https://bugzilla.suse.com/1225379" source="BUGZILLA"/>
		<reference ref_id="1225380" ref_url="https://bugzilla.suse.com/1225380" source="BUGZILLA"/>
		<reference ref_id="1225383" ref_url="https://bugzilla.suse.com/1225383" source="BUGZILLA"/>
		<reference ref_id="1225384" ref_url="https://bugzilla.suse.com/1225384" source="BUGZILLA"/>
		<reference ref_id="1225386" ref_url="https://bugzilla.suse.com/1225386" source="BUGZILLA"/>
		<reference ref_id="1225387" ref_url="https://bugzilla.suse.com/1225387" source="BUGZILLA"/>
		<reference ref_id="1225388" ref_url="https://bugzilla.suse.com/1225388" source="BUGZILLA"/>
		<reference ref_id="1225390" ref_url="https://bugzilla.suse.com/1225390" source="BUGZILLA"/>
		<reference ref_id="1225392" ref_url="https://bugzilla.suse.com/1225392" source="BUGZILLA"/>
		<reference ref_id="1225393" ref_url="https://bugzilla.suse.com/1225393" source="BUGZILLA"/>
		<reference ref_id="1225396" ref_url="https://bugzilla.suse.com/1225396" source="BUGZILLA"/>
		<reference ref_id="1225400" ref_url="https://bugzilla.suse.com/1225400" source="BUGZILLA"/>
		<reference ref_id="1225404" ref_url="https://bugzilla.suse.com/1225404" source="BUGZILLA"/>
		<reference ref_id="1225405" ref_url="https://bugzilla.suse.com/1225405" source="BUGZILLA"/>
		<reference ref_id="1225409" ref_url="https://bugzilla.suse.com/1225409" source="BUGZILLA"/>
		<reference ref_id="1225410" ref_url="https://bugzilla.suse.com/1225410" source="BUGZILLA"/>
		<reference ref_id="1225411" ref_url="https://bugzilla.suse.com/1225411" source="BUGZILLA"/>
		<reference ref_id="1225425" ref_url="https://bugzilla.suse.com/1225425" source="BUGZILLA"/>
		<reference ref_id="1225427" ref_url="https://bugzilla.suse.com/1225427" source="BUGZILLA"/>
		<reference ref_id="1225431" ref_url="https://bugzilla.suse.com/1225431" source="BUGZILLA"/>
		<reference ref_id="1225435" ref_url="https://bugzilla.suse.com/1225435" source="BUGZILLA"/>
		<reference ref_id="1225436" ref_url="https://bugzilla.suse.com/1225436" source="BUGZILLA"/>
		<reference ref_id="1225437" ref_url="https://bugzilla.suse.com/1225437" source="BUGZILLA"/>
		<reference ref_id="1225438" ref_url="https://bugzilla.suse.com/1225438" source="BUGZILLA"/>
		<reference ref_id="1225439" ref_url="https://bugzilla.suse.com/1225439" source="BUGZILLA"/>
		<reference ref_id="1225441" ref_url="https://bugzilla.suse.com/1225441" source="BUGZILLA"/>
		<reference ref_id="1225445" ref_url="https://bugzilla.suse.com/1225445" source="BUGZILLA"/>
		<reference ref_id="1225446" ref_url="https://bugzilla.suse.com/1225446" source="BUGZILLA"/>
		<reference ref_id="1225447" ref_url="https://bugzilla.suse.com/1225447" source="BUGZILLA"/>
		<reference ref_id="1225450" ref_url="https://bugzilla.suse.com/1225450" source="BUGZILLA"/>
		<reference ref_id="1225453" ref_url="https://bugzilla.suse.com/1225453" source="BUGZILLA"/>
		<reference ref_id="1225455" ref_url="https://bugzilla.suse.com/1225455" source="BUGZILLA"/>
		<reference ref_id="1225461" ref_url="https://bugzilla.suse.com/1225461" source="BUGZILLA"/>
		<reference ref_id="1225463" ref_url="https://bugzilla.suse.com/1225463" source="BUGZILLA"/>
		<reference ref_id="1225464" ref_url="https://bugzilla.suse.com/1225464" source="BUGZILLA"/>
		<reference ref_id="1225466" ref_url="https://bugzilla.suse.com/1225466" source="BUGZILLA"/>
		<reference ref_id="1225471" ref_url="https://bugzilla.suse.com/1225471" source="BUGZILLA"/>
		<reference ref_id="1225472" ref_url="https://bugzilla.suse.com/1225472" source="BUGZILLA"/>
		<reference ref_id="1225478" ref_url="https://bugzilla.suse.com/1225478" source="BUGZILLA"/>
		<reference ref_id="1225479" ref_url="https://bugzilla.suse.com/1225479" source="BUGZILLA"/>
		<reference ref_id="1225482" ref_url="https://bugzilla.suse.com/1225482" source="BUGZILLA"/>
		<reference ref_id="1225483" ref_url="https://bugzilla.suse.com/1225483" source="BUGZILLA"/>
		<reference ref_id="1225486" ref_url="https://bugzilla.suse.com/1225486" source="BUGZILLA"/>
		<reference ref_id="1225488" ref_url="https://bugzilla.suse.com/1225488" source="BUGZILLA"/>
		<reference ref_id="1225490" ref_url="https://bugzilla.suse.com/1225490" source="BUGZILLA"/>
		<reference ref_id="1225492" ref_url="https://bugzilla.suse.com/1225492" source="BUGZILLA"/>
		<reference ref_id="1225495" ref_url="https://bugzilla.suse.com/1225495" source="BUGZILLA"/>
		<reference ref_id="1225499" ref_url="https://bugzilla.suse.com/1225499" source="BUGZILLA"/>
		<reference ref_id="1225500" ref_url="https://bugzilla.suse.com/1225500" source="BUGZILLA"/>
		<reference ref_id="1225501" ref_url="https://bugzilla.suse.com/1225501" source="BUGZILLA"/>
		<reference ref_id="1225508" ref_url="https://bugzilla.suse.com/1225508" source="BUGZILLA"/>
		<reference ref_id="1225510" ref_url="https://bugzilla.suse.com/1225510" source="BUGZILLA"/>
		<reference ref_id="1225529" ref_url="https://bugzilla.suse.com/1225529" source="BUGZILLA"/>
		<reference ref_id="1225530" ref_url="https://bugzilla.suse.com/1225530" source="BUGZILLA"/>
		<reference ref_id="1225532" ref_url="https://bugzilla.suse.com/1225532" source="BUGZILLA"/>
		<reference ref_id="1225534" ref_url="https://bugzilla.suse.com/1225534" source="BUGZILLA"/>
		<reference ref_id="1225549" ref_url="https://bugzilla.suse.com/1225549" source="BUGZILLA"/>
		<reference ref_id="1225550" ref_url="https://bugzilla.suse.com/1225550" source="BUGZILLA"/>
		<reference ref_id="1225553" ref_url="https://bugzilla.suse.com/1225553" source="BUGZILLA"/>
		<reference ref_id="1225554" ref_url="https://bugzilla.suse.com/1225554" source="BUGZILLA"/>
		<reference ref_id="1225557" ref_url="https://bugzilla.suse.com/1225557" source="BUGZILLA"/>
		<reference ref_id="1225559" ref_url="https://bugzilla.suse.com/1225559" source="BUGZILLA"/>
		<reference ref_id="1225560" ref_url="https://bugzilla.suse.com/1225560" source="BUGZILLA"/>
		<reference ref_id="1225565" ref_url="https://bugzilla.suse.com/1225565" source="BUGZILLA"/>
		<reference ref_id="1225566" ref_url="https://bugzilla.suse.com/1225566" source="BUGZILLA"/>
		<reference ref_id="1225569" ref_url="https://bugzilla.suse.com/1225569" source="BUGZILLA"/>
		<reference ref_id="1225570" ref_url="https://bugzilla.suse.com/1225570" source="BUGZILLA"/>
		<reference ref_id="1225571" ref_url="https://bugzilla.suse.com/1225571" source="BUGZILLA"/>
		<reference ref_id="1225572" ref_url="https://bugzilla.suse.com/1225572" source="BUGZILLA"/>
		<reference ref_id="1225577" ref_url="https://bugzilla.suse.com/1225577" source="BUGZILLA"/>
		<reference ref_id="1225583" ref_url="https://bugzilla.suse.com/1225583" source="BUGZILLA"/>
		<reference ref_id="1225584" ref_url="https://bugzilla.suse.com/1225584" source="BUGZILLA"/>
		<reference ref_id="1225588" ref_url="https://bugzilla.suse.com/1225588" source="BUGZILLA"/>
		<reference ref_id="1225589" ref_url="https://bugzilla.suse.com/1225589" source="BUGZILLA"/>
		<reference ref_id="1225590" ref_url="https://bugzilla.suse.com/1225590" source="BUGZILLA"/>
		<reference ref_id="1225591" ref_url="https://bugzilla.suse.com/1225591" source="BUGZILLA"/>
		<reference ref_id="1225592" ref_url="https://bugzilla.suse.com/1225592" source="BUGZILLA"/>
		<reference ref_id="1225595" ref_url="https://bugzilla.suse.com/1225595" source="BUGZILLA"/>
		<reference ref_id="1225599" ref_url="https://bugzilla.suse.com/1225599" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36788" ref_url="https://www.suse.com/security/cve/CVE-2020-36788/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-4148" ref_url="https://www.suse.com/security/cve/CVE-2021-4148/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="CVE-2021-47358" ref_url="https://www.suse.com/security/cve/CVE-2021-47358/" source="CVE"/>
		<reference ref_id="CVE-2021-47359" ref_url="https://www.suse.com/security/cve/CVE-2021-47359/" source="CVE"/>
		<reference ref_id="CVE-2021-47360" ref_url="https://www.suse.com/security/cve/CVE-2021-47360/" source="CVE"/>
		<reference ref_id="CVE-2021-47361" ref_url="https://www.suse.com/security/cve/CVE-2021-47361/" source="CVE"/>
		<reference ref_id="CVE-2021-47362" ref_url="https://www.suse.com/security/cve/CVE-2021-47362/" source="CVE"/>
		<reference ref_id="CVE-2021-47363" ref_url="https://www.suse.com/security/cve/CVE-2021-47363/" source="CVE"/>
		<reference ref_id="CVE-2021-47364" ref_url="https://www.suse.com/security/cve/CVE-2021-47364/" source="CVE"/>
		<reference ref_id="CVE-2021-47365" ref_url="https://www.suse.com/security/cve/CVE-2021-47365/" source="CVE"/>
		<reference ref_id="CVE-2021-47366" ref_url="https://www.suse.com/security/cve/CVE-2021-47366/" source="CVE"/>
		<reference ref_id="CVE-2021-47367" ref_url="https://www.suse.com/security/cve/CVE-2021-47367/" source="CVE"/>
		<reference ref_id="CVE-2021-47368" ref_url="https://www.suse.com/security/cve/CVE-2021-47368/" source="CVE"/>
		<reference ref_id="CVE-2021-47369" ref_url="https://www.suse.com/security/cve/CVE-2021-47369/" source="CVE"/>
		<reference ref_id="CVE-2021-47370" ref_url="https://www.suse.com/security/cve/CVE-2021-47370/" source="CVE"/>
		<reference ref_id="CVE-2021-47371" ref_url="https://www.suse.com/security/cve/CVE-2021-47371/" source="CVE"/>
		<reference ref_id="CVE-2021-47372" ref_url="https://www.suse.com/security/cve/CVE-2021-47372/" source="CVE"/>
		<reference ref_id="CVE-2021-47373" ref_url="https://www.suse.com/security/cve/CVE-2021-47373/" source="CVE"/>
		<reference ref_id="CVE-2021-47374" ref_url="https://www.suse.com/security/cve/CVE-2021-47374/" source="CVE"/>
		<reference ref_id="CVE-2021-47375" ref_url="https://www.suse.com/security/cve/CVE-2021-47375/" source="CVE"/>
		<reference ref_id="CVE-2021-47376" ref_url="https://www.suse.com/security/cve/CVE-2021-47376/" source="CVE"/>
		<reference ref_id="CVE-2021-47378" ref_url="https://www.suse.com/security/cve/CVE-2021-47378/" source="CVE"/>
		<reference ref_id="CVE-2021-47379" ref_url="https://www.suse.com/security/cve/CVE-2021-47379/" source="CVE"/>
		<reference ref_id="CVE-2021-47380" ref_url="https://www.suse.com/security/cve/CVE-2021-47380/" source="CVE"/>
		<reference ref_id="CVE-2021-47381" ref_url="https://www.suse.com/security/cve/CVE-2021-47381/" source="CVE"/>
		<reference ref_id="CVE-2021-47382" ref_url="https://www.suse.com/security/cve/CVE-2021-47382/" source="CVE"/>
		<reference ref_id="CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383/" source="CVE"/>
		<reference ref_id="CVE-2021-47384" ref_url="https://www.suse.com/security/cve/CVE-2021-47384/" source="CVE"/>
		<reference ref_id="CVE-2021-47385" ref_url="https://www.suse.com/security/cve/CVE-2021-47385/" source="CVE"/>
		<reference ref_id="CVE-2021-47386" ref_url="https://www.suse.com/security/cve/CVE-2021-47386/" source="CVE"/>
		<reference ref_id="CVE-2021-47387" ref_url="https://www.suse.com/security/cve/CVE-2021-47387/" source="CVE"/>
		<reference ref_id="CVE-2021-47388" ref_url="https://www.suse.com/security/cve/CVE-2021-47388/" source="CVE"/>
		<reference ref_id="CVE-2021-47389" ref_url="https://www.suse.com/security/cve/CVE-2021-47389/" source="CVE"/>
		<reference ref_id="CVE-2021-47390" ref_url="https://www.suse.com/security/cve/CVE-2021-47390/" source="CVE"/>
		<reference ref_id="CVE-2021-47391" ref_url="https://www.suse.com/security/cve/CVE-2021-47391/" source="CVE"/>
		<reference ref_id="CVE-2021-47392" ref_url="https://www.suse.com/security/cve/CVE-2021-47392/" source="CVE"/>
		<reference ref_id="CVE-2021-47393" ref_url="https://www.suse.com/security/cve/CVE-2021-47393/" source="CVE"/>
		<reference ref_id="CVE-2021-47394" ref_url="https://www.suse.com/security/cve/CVE-2021-47394/" source="CVE"/>
		<reference ref_id="CVE-2021-47395" ref_url="https://www.suse.com/security/cve/CVE-2021-47395/" source="CVE"/>
		<reference ref_id="CVE-2021-47396" ref_url="https://www.suse.com/security/cve/CVE-2021-47396/" source="CVE"/>
		<reference ref_id="CVE-2021-47397" ref_url="https://www.suse.com/security/cve/CVE-2021-47397/" source="CVE"/>
		<reference ref_id="CVE-2021-47398" ref_url="https://www.suse.com/security/cve/CVE-2021-47398/" source="CVE"/>
		<reference ref_id="CVE-2021-47399" ref_url="https://www.suse.com/security/cve/CVE-2021-47399/" source="CVE"/>
		<reference ref_id="CVE-2021-47400" ref_url="https://www.suse.com/security/cve/CVE-2021-47400/" source="CVE"/>
		<reference ref_id="CVE-2021-47401" ref_url="https://www.suse.com/security/cve/CVE-2021-47401/" source="CVE"/>
		<reference ref_id="CVE-2021-47402" ref_url="https://www.suse.com/security/cve/CVE-2021-47402/" source="CVE"/>
		<reference ref_id="CVE-2021-47403" ref_url="https://www.suse.com/security/cve/CVE-2021-47403/" source="CVE"/>
		<reference ref_id="CVE-2021-47404" ref_url="https://www.suse.com/security/cve/CVE-2021-47404/" source="CVE"/>
		<reference ref_id="CVE-2021-47405" ref_url="https://www.suse.com/security/cve/CVE-2021-47405/" source="CVE"/>
		<reference ref_id="CVE-2021-47406" ref_url="https://www.suse.com/security/cve/CVE-2021-47406/" source="CVE"/>
		<reference ref_id="CVE-2021-47407" ref_url="https://www.suse.com/security/cve/CVE-2021-47407/" source="CVE"/>
		<reference ref_id="CVE-2021-47408" ref_url="https://www.suse.com/security/cve/CVE-2021-47408/" source="CVE"/>
		<reference ref_id="CVE-2021-47409" ref_url="https://www.suse.com/security/cve/CVE-2021-47409/" source="CVE"/>
		<reference ref_id="CVE-2021-47410" ref_url="https://www.suse.com/security/cve/CVE-2021-47410/" source="CVE"/>
		<reference ref_id="CVE-2021-47412" ref_url="https://www.suse.com/security/cve/CVE-2021-47412/" source="CVE"/>
		<reference ref_id="CVE-2021-47413" ref_url="https://www.suse.com/security/cve/CVE-2021-47413/" source="CVE"/>
		<reference ref_id="CVE-2021-47414" ref_url="https://www.suse.com/security/cve/CVE-2021-47414/" source="CVE"/>
		<reference ref_id="CVE-2021-47415" ref_url="https://www.suse.com/security/cve/CVE-2021-47415/" source="CVE"/>
		<reference ref_id="CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416/" source="CVE"/>
		<reference ref_id="CVE-2021-47417" ref_url="https://www.suse.com/security/cve/CVE-2021-47417/" source="CVE"/>
		<reference ref_id="CVE-2021-47418" ref_url="https://www.suse.com/security/cve/CVE-2021-47418/" source="CVE"/>
		<reference ref_id="CVE-2021-47419" ref_url="https://www.suse.com/security/cve/CVE-2021-47419/" source="CVE"/>
		<reference ref_id="CVE-2021-47420" ref_url="https://www.suse.com/security/cve/CVE-2021-47420/" source="CVE"/>
		<reference ref_id="CVE-2021-47421" ref_url="https://www.suse.com/security/cve/CVE-2021-47421/" source="CVE"/>
		<reference ref_id="CVE-2021-47422" ref_url="https://www.suse.com/security/cve/CVE-2021-47422/" source="CVE"/>
		<reference ref_id="CVE-2021-47423" ref_url="https://www.suse.com/security/cve/CVE-2021-47423/" source="CVE"/>
		<reference ref_id="CVE-2021-47424" ref_url="https://www.suse.com/security/cve/CVE-2021-47424/" source="CVE"/>
		<reference ref_id="CVE-2021-47425" ref_url="https://www.suse.com/security/cve/CVE-2021-47425/" source="CVE"/>
		<reference ref_id="CVE-2021-47426" ref_url="https://www.suse.com/security/cve/CVE-2021-47426/" source="CVE"/>
		<reference ref_id="CVE-2021-47427" ref_url="https://www.suse.com/security/cve/CVE-2021-47427/" source="CVE"/>
		<reference ref_id="CVE-2021-47428" ref_url="https://www.suse.com/security/cve/CVE-2021-47428/" source="CVE"/>
		<reference ref_id="CVE-2021-47429" ref_url="https://www.suse.com/security/cve/CVE-2021-47429/" source="CVE"/>
		<reference ref_id="CVE-2021-47430" ref_url="https://www.suse.com/security/cve/CVE-2021-47430/" source="CVE"/>
		<reference ref_id="CVE-2021-47431" ref_url="https://www.suse.com/security/cve/CVE-2021-47431/" source="CVE"/>
		<reference ref_id="CVE-2021-47433" ref_url="https://www.suse.com/security/cve/CVE-2021-47433/" source="CVE"/>
		<reference ref_id="CVE-2021-47434" ref_url="https://www.suse.com/security/cve/CVE-2021-47434/" source="CVE"/>
		<reference ref_id="CVE-2021-47435" ref_url="https://www.suse.com/security/cve/CVE-2021-47435/" source="CVE"/>
		<reference ref_id="CVE-2021-47436" ref_url="https://www.suse.com/security/cve/CVE-2021-47436/" source="CVE"/>
		<reference ref_id="CVE-2021-47437" ref_url="https://www.suse.com/security/cve/CVE-2021-47437/" source="CVE"/>
		<reference ref_id="CVE-2021-47438" ref_url="https://www.suse.com/security/cve/CVE-2021-47438/" source="CVE"/>
		<reference ref_id="CVE-2021-47439" ref_url="https://www.suse.com/security/cve/CVE-2021-47439/" source="CVE"/>
		<reference ref_id="CVE-2021-47440" ref_url="https://www.suse.com/security/cve/CVE-2021-47440/" source="CVE"/>
		<reference ref_id="CVE-2021-47441" ref_url="https://www.suse.com/security/cve/CVE-2021-47441/" source="CVE"/>
		<reference ref_id="CVE-2021-47442" ref_url="https://www.suse.com/security/cve/CVE-2021-47442/" source="CVE"/>
		<reference ref_id="CVE-2021-47443" ref_url="https://www.suse.com/security/cve/CVE-2021-47443/" source="CVE"/>
		<reference ref_id="CVE-2021-47444" ref_url="https://www.suse.com/security/cve/CVE-2021-47444/" source="CVE"/>
		<reference ref_id="CVE-2021-47445" ref_url="https://www.suse.com/security/cve/CVE-2021-47445/" source="CVE"/>
		<reference ref_id="CVE-2021-47446" ref_url="https://www.suse.com/security/cve/CVE-2021-47446/" source="CVE"/>
		<reference ref_id="CVE-2021-47447" ref_url="https://www.suse.com/security/cve/CVE-2021-47447/" source="CVE"/>
		<reference ref_id="CVE-2021-47448" ref_url="https://www.suse.com/security/cve/CVE-2021-47448/" source="CVE"/>
		<reference ref_id="CVE-2021-47449" ref_url="https://www.suse.com/security/cve/CVE-2021-47449/" source="CVE"/>
		<reference ref_id="CVE-2021-47450" ref_url="https://www.suse.com/security/cve/CVE-2021-47450/" source="CVE"/>
		<reference ref_id="CVE-2021-47451" ref_url="https://www.suse.com/security/cve/CVE-2021-47451/" source="CVE"/>
		<reference ref_id="CVE-2021-47452" ref_url="https://www.suse.com/security/cve/CVE-2021-47452/" source="CVE"/>
		<reference ref_id="CVE-2021-47453" ref_url="https://www.suse.com/security/cve/CVE-2021-47453/" source="CVE"/>
		<reference ref_id="CVE-2021-47454" ref_url="https://www.suse.com/security/cve/CVE-2021-47454/" source="CVE"/>
		<reference ref_id="CVE-2021-47455" ref_url="https://www.suse.com/security/cve/CVE-2021-47455/" source="CVE"/>
		<reference ref_id="CVE-2021-47456" ref_url="https://www.suse.com/security/cve/CVE-2021-47456/" source="CVE"/>
		<reference ref_id="CVE-2021-47457" ref_url="https://www.suse.com/security/cve/CVE-2021-47457/" source="CVE"/>
		<reference ref_id="CVE-2021-47458" ref_url="https://www.suse.com/security/cve/CVE-2021-47458/" source="CVE"/>
		<reference ref_id="CVE-2021-47459" ref_url="https://www.suse.com/security/cve/CVE-2021-47459/" source="CVE"/>
		<reference ref_id="CVE-2021-47460" ref_url="https://www.suse.com/security/cve/CVE-2021-47460/" source="CVE"/>
		<reference ref_id="CVE-2021-47461" ref_url="https://www.suse.com/security/cve/CVE-2021-47461/" source="CVE"/>
		<reference ref_id="CVE-2021-47462" ref_url="https://www.suse.com/security/cve/CVE-2021-47462/" source="CVE"/>
		<reference ref_id="CVE-2021-47463" ref_url="https://www.suse.com/security/cve/CVE-2021-47463/" source="CVE"/>
		<reference ref_id="CVE-2021-47464" ref_url="https://www.suse.com/security/cve/CVE-2021-47464/" source="CVE"/>
		<reference ref_id="CVE-2021-47465" ref_url="https://www.suse.com/security/cve/CVE-2021-47465/" source="CVE"/>
		<reference ref_id="CVE-2021-47466" ref_url="https://www.suse.com/security/cve/CVE-2021-47466/" source="CVE"/>
		<reference ref_id="CVE-2021-47467" ref_url="https://www.suse.com/security/cve/CVE-2021-47467/" source="CVE"/>
		<reference ref_id="CVE-2021-47468" ref_url="https://www.suse.com/security/cve/CVE-2021-47468/" source="CVE"/>
		<reference ref_id="CVE-2021-47469" ref_url="https://www.suse.com/security/cve/CVE-2021-47469/" source="CVE"/>
		<reference ref_id="CVE-2021-47470" ref_url="https://www.suse.com/security/cve/CVE-2021-47470/" source="CVE"/>
		<reference ref_id="CVE-2021-47471" ref_url="https://www.suse.com/security/cve/CVE-2021-47471/" source="CVE"/>
		<reference ref_id="CVE-2021-47472" ref_url="https://www.suse.com/security/cve/CVE-2021-47472/" source="CVE"/>
		<reference ref_id="CVE-2021-47473" ref_url="https://www.suse.com/security/cve/CVE-2021-47473/" source="CVE"/>
		<reference ref_id="CVE-2021-47474" ref_url="https://www.suse.com/security/cve/CVE-2021-47474/" source="CVE"/>
		<reference ref_id="CVE-2021-47475" ref_url="https://www.suse.com/security/cve/CVE-2021-47475/" source="CVE"/>
		<reference ref_id="CVE-2021-47476" ref_url="https://www.suse.com/security/cve/CVE-2021-47476/" source="CVE"/>
		<reference ref_id="CVE-2021-47477" ref_url="https://www.suse.com/security/cve/CVE-2021-47477/" source="CVE"/>
		<reference ref_id="CVE-2021-47478" ref_url="https://www.suse.com/security/cve/CVE-2021-47478/" source="CVE"/>
		<reference ref_id="CVE-2021-47479" ref_url="https://www.suse.com/security/cve/CVE-2021-47479/" source="CVE"/>
		<reference ref_id="CVE-2021-47480" ref_url="https://www.suse.com/security/cve/CVE-2021-47480/" source="CVE"/>
		<reference ref_id="CVE-2021-47481" ref_url="https://www.suse.com/security/cve/CVE-2021-47481/" source="CVE"/>
		<reference ref_id="CVE-2021-47482" ref_url="https://www.suse.com/security/cve/CVE-2021-47482/" source="CVE"/>
		<reference ref_id="CVE-2021-47483" ref_url="https://www.suse.com/security/cve/CVE-2021-47483/" source="CVE"/>
		<reference ref_id="CVE-2021-47484" ref_url="https://www.suse.com/security/cve/CVE-2021-47484/" source="CVE"/>
		<reference ref_id="CVE-2021-47485" ref_url="https://www.suse.com/security/cve/CVE-2021-47485/" source="CVE"/>
		<reference ref_id="CVE-2021-47486" ref_url="https://www.suse.com/security/cve/CVE-2021-47486/" source="CVE"/>
		<reference ref_id="CVE-2021-47488" ref_url="https://www.suse.com/security/cve/CVE-2021-47488/" source="CVE"/>
		<reference ref_id="CVE-2021-47489" ref_url="https://www.suse.com/security/cve/CVE-2021-47489/" source="CVE"/>
		<reference ref_id="CVE-2021-47490" ref_url="https://www.suse.com/security/cve/CVE-2021-47490/" source="CVE"/>
		<reference ref_id="CVE-2021-47491" ref_url="https://www.suse.com/security/cve/CVE-2021-47491/" source="CVE"/>
		<reference ref_id="CVE-2021-47492" ref_url="https://www.suse.com/security/cve/CVE-2021-47492/" source="CVE"/>
		<reference ref_id="CVE-2021-47493" ref_url="https://www.suse.com/security/cve/CVE-2021-47493/" source="CVE"/>
		<reference ref_id="CVE-2021-47494" ref_url="https://www.suse.com/security/cve/CVE-2021-47494/" source="CVE"/>
		<reference ref_id="CVE-2021-47495" ref_url="https://www.suse.com/security/cve/CVE-2021-47495/" source="CVE"/>
		<reference ref_id="CVE-2021-47496" ref_url="https://www.suse.com/security/cve/CVE-2021-47496/" source="CVE"/>
		<reference ref_id="CVE-2021-47497" ref_url="https://www.suse.com/security/cve/CVE-2021-47497/" source="CVE"/>
		<reference ref_id="CVE-2021-47498" ref_url="https://www.suse.com/security/cve/CVE-2021-47498/" source="CVE"/>
		<reference ref_id="CVE-2021-47499" ref_url="https://www.suse.com/security/cve/CVE-2021-47499/" source="CVE"/>
		<reference ref_id="CVE-2021-47500" ref_url="https://www.suse.com/security/cve/CVE-2021-47500/" source="CVE"/>
		<reference ref_id="CVE-2021-47501" ref_url="https://www.suse.com/security/cve/CVE-2021-47501/" source="CVE"/>
		<reference ref_id="CVE-2021-47502" ref_url="https://www.suse.com/security/cve/CVE-2021-47502/" source="CVE"/>
		<reference ref_id="CVE-2021-47503" ref_url="https://www.suse.com/security/cve/CVE-2021-47503/" source="CVE"/>
		<reference ref_id="CVE-2021-47505" ref_url="https://www.suse.com/security/cve/CVE-2021-47505/" source="CVE"/>
		<reference ref_id="CVE-2021-47506" ref_url="https://www.suse.com/security/cve/CVE-2021-47506/" source="CVE"/>
		<reference ref_id="CVE-2021-47507" ref_url="https://www.suse.com/security/cve/CVE-2021-47507/" source="CVE"/>
		<reference ref_id="CVE-2021-47509" ref_url="https://www.suse.com/security/cve/CVE-2021-47509/" source="CVE"/>
		<reference ref_id="CVE-2021-47510" ref_url="https://www.suse.com/security/cve/CVE-2021-47510/" source="CVE"/>
		<reference ref_id="CVE-2021-47511" ref_url="https://www.suse.com/security/cve/CVE-2021-47511/" source="CVE"/>
		<reference ref_id="CVE-2021-47513" ref_url="https://www.suse.com/security/cve/CVE-2021-47513/" source="CVE"/>
		<reference ref_id="CVE-2021-47514" ref_url="https://www.suse.com/security/cve/CVE-2021-47514/" source="CVE"/>
		<reference ref_id="CVE-2021-47516" ref_url="https://www.suse.com/security/cve/CVE-2021-47516/" source="CVE"/>
		<reference ref_id="CVE-2021-47518" ref_url="https://www.suse.com/security/cve/CVE-2021-47518/" source="CVE"/>
		<reference ref_id="CVE-2021-47520" ref_url="https://www.suse.com/security/cve/CVE-2021-47520/" source="CVE"/>
		<reference ref_id="CVE-2021-47521" ref_url="https://www.suse.com/security/cve/CVE-2021-47521/" source="CVE"/>
		<reference ref_id="CVE-2021-47522" ref_url="https://www.suse.com/security/cve/CVE-2021-47522/" source="CVE"/>
		<reference ref_id="CVE-2021-47523" ref_url="https://www.suse.com/security/cve/CVE-2021-47523/" source="CVE"/>
		<reference ref_id="CVE-2021-47524" ref_url="https://www.suse.com/security/cve/CVE-2021-47524/" source="CVE"/>
		<reference ref_id="CVE-2021-47525" ref_url="https://www.suse.com/security/cve/CVE-2021-47525/" source="CVE"/>
		<reference ref_id="CVE-2021-47526" ref_url="https://www.suse.com/security/cve/CVE-2021-47526/" source="CVE"/>
		<reference ref_id="CVE-2021-47528" ref_url="https://www.suse.com/security/cve/CVE-2021-47528/" source="CVE"/>
		<reference ref_id="CVE-2021-47529" ref_url="https://www.suse.com/security/cve/CVE-2021-47529/" source="CVE"/>
		<reference ref_id="CVE-2021-47533" ref_url="https://www.suse.com/security/cve/CVE-2021-47533/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2021-47535" ref_url="https://www.suse.com/security/cve/CVE-2021-47535/" source="CVE"/>
		<reference ref_id="CVE-2021-47536" ref_url="https://www.suse.com/security/cve/CVE-2021-47536/" source="CVE"/>
		<reference ref_id="CVE-2021-47537" ref_url="https://www.suse.com/security/cve/CVE-2021-47537/" source="CVE"/>
		<reference ref_id="CVE-2021-47540" ref_url="https://www.suse.com/security/cve/CVE-2021-47540/" source="CVE"/>
		<reference ref_id="CVE-2021-47541" ref_url="https://www.suse.com/security/cve/CVE-2021-47541/" source="CVE"/>
		<reference ref_id="CVE-2021-47542" ref_url="https://www.suse.com/security/cve/CVE-2021-47542/" source="CVE"/>
		<reference ref_id="CVE-2021-47544" ref_url="https://www.suse.com/security/cve/CVE-2021-47544/" source="CVE"/>
		<reference ref_id="CVE-2021-47549" ref_url="https://www.suse.com/security/cve/CVE-2021-47549/" source="CVE"/>
		<reference ref_id="CVE-2021-47550" ref_url="https://www.suse.com/security/cve/CVE-2021-47550/" source="CVE"/>
		<reference ref_id="CVE-2021-47551" ref_url="https://www.suse.com/security/cve/CVE-2021-47551/" source="CVE"/>
		<reference ref_id="CVE-2021-47553" ref_url="https://www.suse.com/security/cve/CVE-2021-47553/" source="CVE"/>
		<reference ref_id="CVE-2021-47554" ref_url="https://www.suse.com/security/cve/CVE-2021-47554/" source="CVE"/>
		<reference ref_id="CVE-2021-47556" ref_url="https://www.suse.com/security/cve/CVE-2021-47556/" source="CVE"/>
		<reference ref_id="CVE-2021-47558" ref_url="https://www.suse.com/security/cve/CVE-2021-47558/" source="CVE"/>
		<reference ref_id="CVE-2021-47559" ref_url="https://www.suse.com/security/cve/CVE-2021-47559/" source="CVE"/>
		<reference ref_id="CVE-2021-47560" ref_url="https://www.suse.com/security/cve/CVE-2021-47560/" source="CVE"/>
		<reference ref_id="CVE-2021-47562" ref_url="https://www.suse.com/security/cve/CVE-2021-47562/" source="CVE"/>
		<reference ref_id="CVE-2021-47563" ref_url="https://www.suse.com/security/cve/CVE-2021-47563/" source="CVE"/>
		<reference ref_id="CVE-2021-47564" ref_url="https://www.suse.com/security/cve/CVE-2021-47564/" source="CVE"/>
		<reference ref_id="CVE-2021-47565" ref_url="https://www.suse.com/security/cve/CVE-2021-47565/" source="CVE"/>
		<reference ref_id="CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632/" source="CVE"/>
		<reference ref_id="CVE-2022-48634" ref_url="https://www.suse.com/security/cve/CVE-2022-48634/" source="CVE"/>
		<reference ref_id="CVE-2022-48636" ref_url="https://www.suse.com/security/cve/CVE-2022-48636/" source="CVE"/>
		<reference ref_id="CVE-2022-48652" ref_url="https://www.suse.com/security/cve/CVE-2022-48652/" source="CVE"/>
		<reference ref_id="CVE-2022-48662" ref_url="https://www.suse.com/security/cve/CVE-2022-48662/" source="CVE"/>
		<reference ref_id="CVE-2022-48671" ref_url="https://www.suse.com/security/cve/CVE-2022-48671/" source="CVE"/>
		<reference ref_id="CVE-2022-48672" ref_url="https://www.suse.com/security/cve/CVE-2022-48672/" source="CVE"/>
		<reference ref_id="CVE-2022-48673" ref_url="https://www.suse.com/security/cve/CVE-2022-48673/" source="CVE"/>
		<reference ref_id="CVE-2022-48675" ref_url="https://www.suse.com/security/cve/CVE-2022-48675/" source="CVE"/>
		<reference ref_id="CVE-2022-48686" ref_url="https://www.suse.com/security/cve/CVE-2022-48686/" source="CVE"/>
		<reference ref_id="CVE-2022-48687" ref_url="https://www.suse.com/security/cve/CVE-2022-48687/" source="CVE"/>
		<reference ref_id="CVE-2022-48688" ref_url="https://www.suse.com/security/cve/CVE-2022-48688/" source="CVE"/>
		<reference ref_id="CVE-2022-48692" ref_url="https://www.suse.com/security/cve/CVE-2022-48692/" source="CVE"/>
		<reference ref_id="CVE-2022-48693" ref_url="https://www.suse.com/security/cve/CVE-2022-48693/" source="CVE"/>
		<reference ref_id="CVE-2022-48694" ref_url="https://www.suse.com/security/cve/CVE-2022-48694/" source="CVE"/>
		<reference ref_id="CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695/" source="CVE"/>
		<reference ref_id="CVE-2022-48697" ref_url="https://www.suse.com/security/cve/CVE-2022-48697/" source="CVE"/>
		<reference ref_id="CVE-2022-48699" ref_url="https://www.suse.com/security/cve/CVE-2022-48699/" source="CVE"/>
		<reference ref_id="CVE-2022-48700" ref_url="https://www.suse.com/security/cve/CVE-2022-48700/" source="CVE"/>
		<reference ref_id="CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701/" source="CVE"/>
		<reference ref_id="CVE-2022-48702" ref_url="https://www.suse.com/security/cve/CVE-2022-48702/" source="CVE"/>
		<reference ref_id="CVE-2022-48703" ref_url="https://www.suse.com/security/cve/CVE-2022-48703/" source="CVE"/>
		<reference ref_id="CVE-2022-48704" ref_url="https://www.suse.com/security/cve/CVE-2022-48704/" source="CVE"/>
		<reference ref_id="CVE-2022-48708" ref_url="https://www.suse.com/security/cve/CVE-2022-48708/" source="CVE"/>
		<reference ref_id="CVE-2022-48709" ref_url="https://www.suse.com/security/cve/CVE-2022-48709/" source="CVE"/>
		<reference ref_id="CVE-2022-48710" ref_url="https://www.suse.com/security/cve/CVE-2022-48710/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-2860" ref_url="https://www.suse.com/security/cve/CVE-2023-2860/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52654" ref_url="https://www.suse.com/security/cve/CVE-2023-52654/" source="CVE"/>
		<reference ref_id="CVE-2023-52655" ref_url="https://www.suse.com/security/cve/CVE-2023-52655/" source="CVE"/>
		<reference ref_id="CVE-2023-52676" ref_url="https://www.suse.com/security/cve/CVE-2023-52676/" source="CVE"/>
		<reference ref_id="CVE-2023-52686" ref_url="https://www.suse.com/security/cve/CVE-2023-52686/" source="CVE"/>
		<reference ref_id="CVE-2023-52690" ref_url="https://www.suse.com/security/cve/CVE-2023-52690/" source="CVE"/>
		<reference ref_id="CVE-2023-52702" ref_url="https://www.suse.com/security/cve/CVE-2023-52702/" source="CVE"/>
		<reference ref_id="CVE-2023-52703" ref_url="https://www.suse.com/security/cve/CVE-2023-52703/" source="CVE"/>
		<reference ref_id="CVE-2023-52707" ref_url="https://www.suse.com/security/cve/CVE-2023-52707/" source="CVE"/>
		<reference ref_id="CVE-2023-52708" ref_url="https://www.suse.com/security/cve/CVE-2023-52708/" source="CVE"/>
		<reference ref_id="CVE-2023-52730" ref_url="https://www.suse.com/security/cve/CVE-2023-52730/" source="CVE"/>
		<reference ref_id="CVE-2023-52733" ref_url="https://www.suse.com/security/cve/CVE-2023-52733/" source="CVE"/>
		<reference ref_id="CVE-2023-52736" ref_url="https://www.suse.com/security/cve/CVE-2023-52736/" source="CVE"/>
		<reference ref_id="CVE-2023-52738" ref_url="https://www.suse.com/security/cve/CVE-2023-52738/" source="CVE"/>
		<reference ref_id="CVE-2023-52739" ref_url="https://www.suse.com/security/cve/CVE-2023-52739/" source="CVE"/>
		<reference ref_id="CVE-2023-52740" ref_url="https://www.suse.com/security/cve/CVE-2023-52740/" source="CVE"/>
		<reference ref_id="CVE-2023-52741" ref_url="https://www.suse.com/security/cve/CVE-2023-52741/" source="CVE"/>
		<reference ref_id="CVE-2023-52742" ref_url="https://www.suse.com/security/cve/CVE-2023-52742/" source="CVE"/>
		<reference ref_id="CVE-2023-52743" ref_url="https://www.suse.com/security/cve/CVE-2023-52743/" source="CVE"/>
		<reference ref_id="CVE-2023-52744" ref_url="https://www.suse.com/security/cve/CVE-2023-52744/" source="CVE"/>
		<reference ref_id="CVE-2023-52745" ref_url="https://www.suse.com/security/cve/CVE-2023-52745/" source="CVE"/>
		<reference ref_id="CVE-2023-52747" ref_url="https://www.suse.com/security/cve/CVE-2023-52747/" source="CVE"/>
		<reference ref_id="CVE-2023-52753" ref_url="https://www.suse.com/security/cve/CVE-2023-52753/" source="CVE"/>
		<reference ref_id="CVE-2023-52754" ref_url="https://www.suse.com/security/cve/CVE-2023-52754/" source="CVE"/>
		<reference ref_id="CVE-2023-52756" ref_url="https://www.suse.com/security/cve/CVE-2023-52756/" source="CVE"/>
		<reference ref_id="CVE-2023-52759" ref_url="https://www.suse.com/security/cve/CVE-2023-52759/" source="CVE"/>
		<reference ref_id="CVE-2023-52763" ref_url="https://www.suse.com/security/cve/CVE-2023-52763/" source="CVE"/>
		<reference ref_id="CVE-2023-52764" ref_url="https://www.suse.com/security/cve/CVE-2023-52764/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52774" ref_url="https://www.suse.com/security/cve/CVE-2023-52774/" source="CVE"/>
		<reference ref_id="CVE-2023-52781" ref_url="https://www.suse.com/security/cve/CVE-2023-52781/" source="CVE"/>
		<reference ref_id="CVE-2023-52788" ref_url="https://www.suse.com/security/cve/CVE-2023-52788/" source="CVE"/>
		<reference ref_id="CVE-2023-52789" ref_url="https://www.suse.com/security/cve/CVE-2023-52789/" source="CVE"/>
		<reference ref_id="CVE-2023-52791" ref_url="https://www.suse.com/security/cve/CVE-2023-52791/" source="CVE"/>
		<reference ref_id="CVE-2023-52798" ref_url="https://www.suse.com/security/cve/CVE-2023-52798/" source="CVE"/>
		<reference ref_id="CVE-2023-52799" ref_url="https://www.suse.com/security/cve/CVE-2023-52799/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52804" ref_url="https://www.suse.com/security/cve/CVE-2023-52804/" source="CVE"/>
		<reference ref_id="CVE-2023-52805" ref_url="https://www.suse.com/security/cve/CVE-2023-52805/" source="CVE"/>
		<reference ref_id="CVE-2023-52806" ref_url="https://www.suse.com/security/cve/CVE-2023-52806/" source="CVE"/>
		<reference ref_id="CVE-2023-52810" ref_url="https://www.suse.com/security/cve/CVE-2023-52810/" source="CVE"/>
		<reference ref_id="CVE-2023-52811" ref_url="https://www.suse.com/security/cve/CVE-2023-52811/" source="CVE"/>
		<reference ref_id="CVE-2023-52814" ref_url="https://www.suse.com/security/cve/CVE-2023-52814/" source="CVE"/>
		<reference ref_id="CVE-2023-52816" ref_url="https://www.suse.com/security/cve/CVE-2023-52816/" source="CVE"/>
		<reference ref_id="CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817/" source="CVE"/>
		<reference ref_id="CVE-2023-52818" ref_url="https://www.suse.com/security/cve/CVE-2023-52818/" source="CVE"/>
		<reference ref_id="CVE-2023-52819" ref_url="https://www.suse.com/security/cve/CVE-2023-52819/" source="CVE"/>
		<reference ref_id="CVE-2023-52821" ref_url="https://www.suse.com/security/cve/CVE-2023-52821/" source="CVE"/>
		<reference ref_id="CVE-2023-52825" ref_url="https://www.suse.com/security/cve/CVE-2023-52825/" source="CVE"/>
		<reference ref_id="CVE-2023-52826" ref_url="https://www.suse.com/security/cve/CVE-2023-52826/" source="CVE"/>
		<reference ref_id="CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832/" source="CVE"/>
		<reference ref_id="CVE-2023-52833" ref_url="https://www.suse.com/security/cve/CVE-2023-52833/" source="CVE"/>
		<reference ref_id="CVE-2023-52834" ref_url="https://www.suse.com/security/cve/CVE-2023-52834/" source="CVE"/>
		<reference ref_id="CVE-2023-52838" ref_url="https://www.suse.com/security/cve/CVE-2023-52838/" source="CVE"/>
		<reference ref_id="CVE-2023-52840" ref_url="https://www.suse.com/security/cve/CVE-2023-52840/" source="CVE"/>
		<reference ref_id="CVE-2023-52841" ref_url="https://www.suse.com/security/cve/CVE-2023-52841/" source="CVE"/>
		<reference ref_id="CVE-2023-52844" ref_url="https://www.suse.com/security/cve/CVE-2023-52844/" source="CVE"/>
		<reference ref_id="CVE-2023-52847" ref_url="https://www.suse.com/security/cve/CVE-2023-52847/" source="CVE"/>
		<reference ref_id="CVE-2023-52853" ref_url="https://www.suse.com/security/cve/CVE-2023-52853/" source="CVE"/>
		<reference ref_id="CVE-2023-52854" ref_url="https://www.suse.com/security/cve/CVE-2023-52854/" source="CVE"/>
		<reference ref_id="CVE-2023-52855" ref_url="https://www.suse.com/security/cve/CVE-2023-52855/" source="CVE"/>
		<reference ref_id="CVE-2023-52856" ref_url="https://www.suse.com/security/cve/CVE-2023-52856/" source="CVE"/>
		<reference ref_id="CVE-2023-52858" ref_url="https://www.suse.com/security/cve/CVE-2023-52858/" source="CVE"/>
		<reference ref_id="CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864/" source="CVE"/>
		<reference ref_id="CVE-2023-52865" ref_url="https://www.suse.com/security/cve/CVE-2023-52865/" source="CVE"/>
		<reference ref_id="CVE-2023-52867" ref_url="https://www.suse.com/security/cve/CVE-2023-52867/" source="CVE"/>
		<reference ref_id="CVE-2023-52868" ref_url="https://www.suse.com/security/cve/CVE-2023-52868/" source="CVE"/>
		<reference ref_id="CVE-2023-52870" ref_url="https://www.suse.com/security/cve/CVE-2023-52870/" source="CVE"/>
		<reference ref_id="CVE-2023-52871" ref_url="https://www.suse.com/security/cve/CVE-2023-52871/" source="CVE"/>
		<reference ref_id="CVE-2023-52872" ref_url="https://www.suse.com/security/cve/CVE-2023-52872/" source="CVE"/>
		<reference ref_id="CVE-2023-52873" ref_url="https://www.suse.com/security/cve/CVE-2023-52873/" source="CVE"/>
		<reference ref_id="CVE-2023-52875" ref_url="https://www.suse.com/security/cve/CVE-2023-52875/" source="CVE"/>
		<reference ref_id="CVE-2023-52876" ref_url="https://www.suse.com/security/cve/CVE-2023-52876/" source="CVE"/>
		<reference ref_id="CVE-2023-52877" ref_url="https://www.suse.com/security/cve/CVE-2023-52877/" source="CVE"/>
		<reference ref_id="CVE-2023-52878" ref_url="https://www.suse.com/security/cve/CVE-2023-52878/" source="CVE"/>
		<reference ref_id="CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2024-0639" ref_url="https://www.suse.com/security/cve/CVE-2024-0639/" source="CVE"/>
		<reference ref_id="CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828/" source="CVE"/>
		<reference ref_id="CVE-2024-26840" ref_url="https://www.suse.com/security/cve/CVE-2024-26840/" source="CVE"/>
		<reference ref_id="CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852/" source="CVE"/>
		<reference ref_id="CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862/" source="CVE"/>
		<reference ref_id="CVE-2024-26921" ref_url="https://www.suse.com/security/cve/CVE-2024-26921/" source="CVE"/>
		<reference ref_id="CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925/" source="CVE"/>
		<reference ref_id="CVE-2024-26928" ref_url="https://www.suse.com/security/cve/CVE-2024-26928/" source="CVE"/>
		<reference ref_id="CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929/" source="CVE"/>
		<reference ref_id="CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930/" source="CVE"/>
		<reference ref_id="CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398/" source="CVE"/>
		<reference ref_id="CVE-2024-27413" ref_url="https://www.suse.com/security/cve/CVE-2024-27413/" source="CVE"/>
		<reference ref_id="CVE-2024-35811" ref_url="https://www.suse.com/security/cve/CVE-2024-35811/" source="CVE"/>
		<reference ref_id="CVE-2024-35815" ref_url="https://www.suse.com/security/cve/CVE-2024-35815/" source="CVE"/>
		<reference ref_id="CVE-2024-35817" ref_url="https://www.suse.com/security/cve/CVE-2024-35817/" source="CVE"/>
		<reference ref_id="CVE-2024-35863" ref_url="https://www.suse.com/security/cve/CVE-2024-35863/" source="CVE"/>
		<reference ref_id="CVE-2024-35867" ref_url="https://www.suse.com/security/cve/CVE-2024-35867/" source="CVE"/>
		<reference ref_id="CVE-2024-35868" ref_url="https://www.suse.com/security/cve/CVE-2024-35868/" source="CVE"/>
		<reference ref_id="CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895/" source="CVE"/>
		<reference ref_id="CVE-2024-35904" ref_url="https://www.suse.com/security/cve/CVE-2024-35904/" source="CVE"/>
		<reference ref_id="CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905/" source="CVE"/>
		<reference ref_id="CVE-2024-35914" ref_url="https://www.suse.com/security/cve/CVE-2024-35914/" source="CVE"/>
		<reference ref_id="CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
- CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-35863: Fix potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35867: Fix potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fix potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-26928: Fix potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE (bsc#1222011).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
- CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
- CVE-2024-35904: Avoid dereference of garbage after mount failure (bsc#1224494).
- CVE-2024-26929: Fixed double free of fcport (bsc#1223715).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-26930: Fixed double free of the ha-&gt;vp_map pointer (bsc#1223626).
- CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).

The following non-security bugs were fixed:

- af_unix: Do not use atomic ops for unix_sk(sk)-&gt;inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- af_unix: annote lockless accesses to unix_tot_inflight &amp; gc_in_progress (bsc#1223384).
- filemap: remove use of wait bookmarks (bsc#1224085).
- idpf: extend tx watchdog timeout (bsc#1224137).
- ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).
- powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV (bsc#1220492 ltc#205270).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).
- powerpc: Refactor verification of MSR_RI (bsc#1223191).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174585">SUSE bug 1174585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190569">SUSE bug 1190569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191949">SUSE bug 1191949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193983">SUSE bug 1193983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194288">SUSE bug 1194288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196869">SUSE bug 1196869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197915">SUSE bug 1197915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200313">SUSE bug 1200313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201308">SUSE bug 1201308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201489">SUSE bug 1201489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208149">SUSE bug 1208149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209834">SUSE bug 1209834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213863">SUSE bug 1213863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217169">SUSE bug 1217169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217515">SUSE bug 1217515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218917">SUSE bug 1218917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220492">SUSE bug 1220492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220783">SUSE bug 1220783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221645">SUSE bug 1221645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221958">SUSE bug 1221958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222011">SUSE bug 1222011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222976">SUSE bug 1222976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223057">SUSE bug 1223057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223084">SUSE bug 1223084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223111">SUSE bug 1223111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223138">SUSE bug 1223138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223191">SUSE bug 1223191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223390">SUSE bug 1223390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223481">SUSE bug 1223481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223501">SUSE bug 1223501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223505">SUSE bug 1223505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223512">SUSE bug 1223512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223520">SUSE bug 1223520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223532">SUSE bug 1223532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223626">SUSE bug 1223626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223715">SUSE bug 1223715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223894">SUSE bug 1223894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223921">SUSE bug 1223921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223922">SUSE bug 1223922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223923">SUSE bug 1223923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223924">SUSE bug 1223924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223929">SUSE bug 1223929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223931">SUSE bug 1223931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223932">SUSE bug 1223932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223934">SUSE bug 1223934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223941">SUSE bug 1223941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223948">SUSE bug 1223948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223952">SUSE bug 1223952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223953">SUSE bug 1223953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223957">SUSE bug 1223957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223962">SUSE bug 1223962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223963">SUSE bug 1223963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223964">SUSE bug 1223964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223996">SUSE bug 1223996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224085">SUSE bug 1224085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224099">SUSE bug 1224099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224137">SUSE bug 1224137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224174">SUSE bug 1224174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224438">SUSE bug 1224438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224482">SUSE bug 1224482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224494">SUSE bug 1224494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224511">SUSE bug 1224511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224592">SUSE bug 1224592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224611">SUSE bug 1224611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224664">SUSE bug 1224664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224678">SUSE bug 1224678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224682">SUSE bug 1224682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224685">SUSE bug 1224685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224730">SUSE bug 1224730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224736">SUSE bug 1224736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224763">SUSE bug 1224763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224816">SUSE bug 1224816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224895">SUSE bug 1224895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224898">SUSE bug 1224898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224900">SUSE bug 1224900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224901">SUSE bug 1224901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224902">SUSE bug 1224902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224903">SUSE bug 1224903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224904">SUSE bug 1224904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224905">SUSE bug 1224905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224907">SUSE bug 1224907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224909">SUSE bug 1224909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224910">SUSE bug 1224910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224911">SUSE bug 1224911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224912">SUSE bug 1224912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224913">SUSE bug 1224913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224914">SUSE bug 1224914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224915">SUSE bug 1224915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224920">SUSE bug 1224920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224928">SUSE bug 1224928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224931">SUSE bug 1224931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224932">SUSE bug 1224932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224937">SUSE bug 1224937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224942">SUSE bug 1224942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224944">SUSE bug 1224944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224945">SUSE bug 1224945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224947">SUSE bug 1224947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224956">SUSE bug 1224956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224988">SUSE bug 1224988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225000">SUSE bug 1225000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225003">SUSE bug 1225003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225005">SUSE bug 1225005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225009">SUSE bug 1225009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225022">SUSE bug 1225022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225031">SUSE bug 1225031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225032">SUSE bug 1225032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225036">SUSE bug 1225036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225044">SUSE bug 1225044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225076">SUSE bug 1225076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225077">SUSE bug 1225077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225082">SUSE bug 1225082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225086">SUSE bug 1225086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225092">SUSE bug 1225092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225095">SUSE bug 1225095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225096">SUSE bug 1225096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225106">SUSE bug 1225106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225108">SUSE bug 1225108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225109">SUSE bug 1225109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225118">SUSE bug 1225118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225121">SUSE bug 1225121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225122">SUSE bug 1225122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225123">SUSE bug 1225123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225125">SUSE bug 1225125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225126">SUSE bug 1225126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225127">SUSE bug 1225127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225129">SUSE bug 1225129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225131">SUSE bug 1225131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225132">SUSE bug 1225132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225145">SUSE bug 1225145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225151">SUSE bug 1225151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225153">SUSE bug 1225153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225156">SUSE bug 1225156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225158">SUSE bug 1225158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225160">SUSE bug 1225160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225161">SUSE bug 1225161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225164">SUSE bug 1225164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225167">SUSE bug 1225167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225180">SUSE bug 1225180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225183">SUSE bug 1225183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225184">SUSE bug 1225184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225186">SUSE bug 1225186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225187">SUSE bug 1225187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225191">SUSE bug 1225191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225192">SUSE bug 1225192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225193">SUSE bug 1225193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225195">SUSE bug 1225195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225198">SUSE bug 1225198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225201">SUSE bug 1225201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225203">SUSE bug 1225203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225205">SUSE bug 1225205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225206">SUSE bug 1225206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225207">SUSE bug 1225207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225208">SUSE bug 1225208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225209">SUSE bug 1225209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225210">SUSE bug 1225210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225214">SUSE bug 1225214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225223">SUSE bug 1225223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225224">SUSE bug 1225224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225225">SUSE bug 1225225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225227">SUSE bug 1225227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225228">SUSE bug 1225228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225229">SUSE bug 1225229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225230">SUSE bug 1225230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225232">SUSE bug 1225232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225233">SUSE bug 1225233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225235">SUSE bug 1225235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225236">SUSE bug 1225236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225237">SUSE bug 1225237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225238">SUSE bug 1225238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225239">SUSE bug 1225239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225240">SUSE bug 1225240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225241">SUSE bug 1225241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225242">SUSE bug 1225242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225243">SUSE bug 1225243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225244">SUSE bug 1225244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225245">SUSE bug 1225245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225246">SUSE bug 1225246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225247">SUSE bug 1225247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225248">SUSE bug 1225248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225249">SUSE bug 1225249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225250">SUSE bug 1225250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225251">SUSE bug 1225251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225252">SUSE bug 1225252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225253">SUSE bug 1225253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225254">SUSE bug 1225254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225255">SUSE bug 1225255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225256">SUSE bug 1225256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225257">SUSE bug 1225257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225258">SUSE bug 1225258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225259">SUSE bug 1225259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225260">SUSE bug 1225260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225261">SUSE bug 1225261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225262">SUSE bug 1225262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225263">SUSE bug 1225263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225268">SUSE bug 1225268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225301">SUSE bug 1225301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225303">SUSE bug 1225303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225304">SUSE bug 1225304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225306">SUSE bug 1225306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225316">SUSE bug 1225316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225318">SUSE bug 1225318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225320">SUSE bug 1225320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225321">SUSE bug 1225321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225322">SUSE bug 1225322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225323">SUSE bug 1225323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225326">SUSE bug 1225326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225327">SUSE bug 1225327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225328">SUSE bug 1225328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225329">SUSE bug 1225329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225330">SUSE bug 1225330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225331">SUSE bug 1225331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225332">SUSE bug 1225332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225333">SUSE bug 1225333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225334">SUSE bug 1225334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225335">SUSE bug 1225335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225337">SUSE bug 1225337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225338">SUSE bug 1225338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225339">SUSE bug 1225339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225341">SUSE bug 1225341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225342">SUSE bug 1225342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225344">SUSE bug 1225344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225346">SUSE bug 1225346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225347">SUSE bug 1225347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225351">SUSE bug 1225351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225353">SUSE bug 1225353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225354">SUSE bug 1225354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225355">SUSE bug 1225355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225357">SUSE bug 1225357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225358">SUSE bug 1225358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225360">SUSE bug 1225360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225361">SUSE bug 1225361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225366">SUSE bug 1225366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225367">SUSE bug 1225367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225368">SUSE bug 1225368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225369">SUSE bug 1225369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225370">SUSE bug 1225370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225372">SUSE bug 1225372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225373">SUSE bug 1225373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225374">SUSE bug 1225374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225375">SUSE bug 1225375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225376">SUSE bug 1225376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225377">SUSE bug 1225377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225379">SUSE bug 1225379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225380">SUSE bug 1225380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225383">SUSE bug 1225383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225384">SUSE bug 1225384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225386">SUSE bug 1225386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225387">SUSE bug 1225387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225388">SUSE bug 1225388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225390">SUSE bug 1225390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225392">SUSE bug 1225392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225393">SUSE bug 1225393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225396">SUSE bug 1225396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225400">SUSE bug 1225400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225404">SUSE bug 1225404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225405">SUSE bug 1225405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225409">SUSE bug 1225409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225410">SUSE bug 1225410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225411">SUSE bug 1225411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225425">SUSE bug 1225425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225427">SUSE bug 1225427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225431">SUSE bug 1225431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225435">SUSE bug 1225435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225436">SUSE bug 1225436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225437">SUSE bug 1225437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225438">SUSE bug 1225438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225439">SUSE bug 1225439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225441">SUSE bug 1225441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225445">SUSE bug 1225445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225446">SUSE bug 1225446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225447">SUSE bug 1225447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225450">SUSE bug 1225450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225453">SUSE bug 1225453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225455">SUSE bug 1225455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225461">SUSE bug 1225461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225463">SUSE bug 1225463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225464">SUSE bug 1225464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225466">SUSE bug 1225466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225471">SUSE bug 1225471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225472">SUSE bug 1225472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225478">SUSE bug 1225478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225479">SUSE bug 1225479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225482">SUSE bug 1225482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225483">SUSE bug 1225483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225486">SUSE bug 1225486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225488">SUSE bug 1225488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225490">SUSE bug 1225490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225492">SUSE bug 1225492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225495">SUSE bug 1225495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225499">SUSE bug 1225499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225500">SUSE bug 1225500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225501">SUSE bug 1225501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225508">SUSE bug 1225508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225510">SUSE bug 1225510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225529">SUSE bug 1225529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225530">SUSE bug 1225530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225532">SUSE bug 1225532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225534">SUSE bug 1225534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225549">SUSE bug 1225549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225550">SUSE bug 1225550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225553">SUSE bug 1225553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225554">SUSE bug 1225554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225557">SUSE bug 1225557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225559">SUSE bug 1225559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225560">SUSE bug 1225560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225565">SUSE bug 1225565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225566">SUSE bug 1225566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225569">SUSE bug 1225569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225570">SUSE bug 1225570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225571">SUSE bug 1225571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225572">SUSE bug 1225572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225577">SUSE bug 1225577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225583">SUSE bug 1225583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225584">SUSE bug 1225584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225588">SUSE bug 1225588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225589">SUSE bug 1225589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225590">SUSE bug 1225590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225591">SUSE bug 1225591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225592">SUSE bug 1225592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225595">SUSE bug 1225595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225599">SUSE bug 1225599</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-36788/">CVE-2020-36788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36788">CVE-2020-36788 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39698">CVE-2021-39698 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4148/">CVE-2021-4148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4148">CVE-2021-4148 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47358/">CVE-2021-47358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47358">CVE-2021-47358 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47359/">CVE-2021-47359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47359">CVE-2021-47359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47360/">CVE-2021-47360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47360">CVE-2021-47360 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47361/">CVE-2021-47361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47361">CVE-2021-47361 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47362/">CVE-2021-47362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47362">CVE-2021-47362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47363/">CVE-2021-47363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47363">CVE-2021-47363 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47364/">CVE-2021-47364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47364">CVE-2021-47364 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47365/">CVE-2021-47365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47365">CVE-2021-47365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47366/">CVE-2021-47366 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47366">CVE-2021-47366 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47367/">CVE-2021-47367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47367">CVE-2021-47367 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47368/">CVE-2021-47368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47368">CVE-2021-47368 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47369/">CVE-2021-47369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47369">CVE-2021-47369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47370/">CVE-2021-47370 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47370">CVE-2021-47370 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47371/">CVE-2021-47371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47371">CVE-2021-47371 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47372/">CVE-2021-47372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47372">CVE-2021-47372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47373/">CVE-2021-47373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47373">CVE-2021-47373 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47374/">CVE-2021-47374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47374">CVE-2021-47374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47375/">CVE-2021-47375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47375">CVE-2021-47375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47376/">CVE-2021-47376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47376">CVE-2021-47376 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47378/">CVE-2021-47378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47378">CVE-2021-47378 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47379/">CVE-2021-47379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47379">CVE-2021-47379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47380/">CVE-2021-47380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47380">CVE-2021-47380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47381/">CVE-2021-47381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47381">CVE-2021-47381 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47382/">CVE-2021-47382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47382">CVE-2021-47382 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47384/">CVE-2021-47384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47384">CVE-2021-47384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47385/">CVE-2021-47385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47385">CVE-2021-47385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47386/">CVE-2021-47386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47386">CVE-2021-47386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47387/">CVE-2021-47387 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47387">CVE-2021-47387 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47388/">CVE-2021-47388 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47388">CVE-2021-47388 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47389/">CVE-2021-47389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47389">CVE-2021-47389 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47390/">CVE-2021-47390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47390">CVE-2021-47390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47391/">CVE-2021-47391 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47391">CVE-2021-47391 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47392/">CVE-2021-47392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47392">CVE-2021-47392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47393/">CVE-2021-47393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47393">CVE-2021-47393 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47394/">CVE-2021-47394 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47394">CVE-2021-47394 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47395/">CVE-2021-47395 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47395">CVE-2021-47395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47396/">CVE-2021-47396 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47396">CVE-2021-47396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47397/">CVE-2021-47397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47397">CVE-2021-47397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47398/">CVE-2021-47398 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47398">CVE-2021-47398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47399/">CVE-2021-47399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47399">CVE-2021-47399 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47400/">CVE-2021-47400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47400">CVE-2021-47400 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47401/">CVE-2021-47401 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47401">CVE-2021-47401 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47402/">CVE-2021-47402 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47402">CVE-2021-47402 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47403/">CVE-2021-47403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47403">CVE-2021-47403 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47404/">CVE-2021-47404 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47404">CVE-2021-47404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47405/">CVE-2021-47405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47405">CVE-2021-47405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47406/">CVE-2021-47406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47406">CVE-2021-47406 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47407/">CVE-2021-47407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47407">CVE-2021-47407 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47408/">CVE-2021-47408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47408">CVE-2021-47408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47409/">CVE-2021-47409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47409">CVE-2021-47409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47410/">CVE-2021-47410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47410">CVE-2021-47410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47412/">CVE-2021-47412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47412">CVE-2021-47412 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47413/">CVE-2021-47413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47413">CVE-2021-47413 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47414/">CVE-2021-47414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47414">CVE-2021-47414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47415/">CVE-2021-47415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47415">CVE-2021-47415 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47417/">CVE-2021-47417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47417">CVE-2021-47417 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47418/">CVE-2021-47418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47418">CVE-2021-47418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47419/">CVE-2021-47419 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47419">CVE-2021-47419 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47420/">CVE-2021-47420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47420">CVE-2021-47420 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47421/">CVE-2021-47421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47421">CVE-2021-47421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47422/">CVE-2021-47422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47422">CVE-2021-47422 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47423/">CVE-2021-47423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47423">CVE-2021-47423 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47424/">CVE-2021-47424 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47424">CVE-2021-47424 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47425/">CVE-2021-47425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47425">CVE-2021-47425 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47426/">CVE-2021-47426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47426">CVE-2021-47426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47427/">CVE-2021-47427 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47427">CVE-2021-47427 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47428/">CVE-2021-47428 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47428">CVE-2021-47428 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47429/">CVE-2021-47429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47429">CVE-2021-47429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47430/">CVE-2021-47430 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47430">CVE-2021-47430 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47431/">CVE-2021-47431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47431">CVE-2021-47431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47433/">CVE-2021-47433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47433">CVE-2021-47433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47434/">CVE-2021-47434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47434">CVE-2021-47434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47435/">CVE-2021-47435 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47435">CVE-2021-47435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47436/">CVE-2021-47436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47436">CVE-2021-47436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47437/">CVE-2021-47437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47437">CVE-2021-47437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47438/">CVE-2021-47438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47438">CVE-2021-47438 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47439/">CVE-2021-47439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47439">CVE-2021-47439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47440/">CVE-2021-47440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47440">CVE-2021-47440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47441/">CVE-2021-47441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47441">CVE-2021-47441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47442/">CVE-2021-47442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47442">CVE-2021-47442 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47443/">CVE-2021-47443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47443">CVE-2021-47443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47444/">CVE-2021-47444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47444">CVE-2021-47444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47445/">CVE-2021-47445 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47445">CVE-2021-47445 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47446/">CVE-2021-47446 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47446">CVE-2021-47446 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47447/">CVE-2021-47447 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47447">CVE-2021-47447 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47448/">CVE-2021-47448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47448">CVE-2021-47448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47449/">CVE-2021-47449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47449">CVE-2021-47449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47450/">CVE-2021-47450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47450">CVE-2021-47450 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47451/">CVE-2021-47451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47451">CVE-2021-47451 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47452/">CVE-2021-47452 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47452">CVE-2021-47452 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47453/">CVE-2021-47453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47453">CVE-2021-47453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47454/">CVE-2021-47454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47454">CVE-2021-47454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47455/">CVE-2021-47455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47455">CVE-2021-47455 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47456/">CVE-2021-47456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47456">CVE-2021-47456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47457/">CVE-2021-47457 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47457">CVE-2021-47457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47458/">CVE-2021-47458 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47458">CVE-2021-47458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47459/">CVE-2021-47459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47459">CVE-2021-47459 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47460/">CVE-2021-47460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47460">CVE-2021-47460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47461/">CVE-2021-47461 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47461">CVE-2021-47461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47462/">CVE-2021-47462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47462">CVE-2021-47462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47463/">CVE-2021-47463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47463">CVE-2021-47463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47464/">CVE-2021-47464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47464">CVE-2021-47464 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47465/">CVE-2021-47465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47465">CVE-2021-47465 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47466/">CVE-2021-47466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47466">CVE-2021-47466 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47467/">CVE-2021-47467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47467">CVE-2021-47467 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47468/">CVE-2021-47468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47468">CVE-2021-47468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47469/">CVE-2021-47469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47469">CVE-2021-47469 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47470/">CVE-2021-47470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47470">CVE-2021-47470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47471/">CVE-2021-47471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47471">CVE-2021-47471 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47472/">CVE-2021-47472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47472">CVE-2021-47472 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47473/">CVE-2021-47473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47473">CVE-2021-47473 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47474/">CVE-2021-47474 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47474">CVE-2021-47474 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47475/">CVE-2021-47475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47475">CVE-2021-47475 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47476/">CVE-2021-47476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47476">CVE-2021-47476 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47477/">CVE-2021-47477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47477">CVE-2021-47477 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47478/">CVE-2021-47478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47478">CVE-2021-47478 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47479/">CVE-2021-47479 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47479">CVE-2021-47479 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47480/">CVE-2021-47480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47480">CVE-2021-47480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47481/">CVE-2021-47481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47481">CVE-2021-47481 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47482/">CVE-2021-47482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47482">CVE-2021-47482 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47483/">CVE-2021-47483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47483">CVE-2021-47483 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47484/">CVE-2021-47484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47484">CVE-2021-47484 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47485/">CVE-2021-47485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47485">CVE-2021-47485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47486/">CVE-2021-47486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47486">CVE-2021-47486 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47488/">CVE-2021-47488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47488">CVE-2021-47488 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47489/">CVE-2021-47489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47489">CVE-2021-47489 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47490/">CVE-2021-47490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47490">CVE-2021-47490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47491/">CVE-2021-47491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47491">CVE-2021-47491 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47492/">CVE-2021-47492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47492">CVE-2021-47492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47493/">CVE-2021-47493 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47493">CVE-2021-47493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47494/">CVE-2021-47494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47494">CVE-2021-47494 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47495/">CVE-2021-47495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47495">CVE-2021-47495 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47496/">CVE-2021-47496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47496">CVE-2021-47496 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47497/">CVE-2021-47497 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47497">CVE-2021-47497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47498/">CVE-2021-47498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47498">CVE-2021-47498 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47499/">CVE-2021-47499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47499">CVE-2021-47499 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47500/">CVE-2021-47500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47500">CVE-2021-47500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47501/">CVE-2021-47501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47501">CVE-2021-47501 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47502/">CVE-2021-47502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47502">CVE-2021-47502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47503/">CVE-2021-47503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47503">CVE-2021-47503 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47505/">CVE-2021-47505 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47505">CVE-2021-47505 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47506/">CVE-2021-47506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47506">CVE-2021-47506 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47507/">CVE-2021-47507 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47507">CVE-2021-47507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47509/">CVE-2021-47509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47509">CVE-2021-47509 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47510/">CVE-2021-47510 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47510">CVE-2021-47510 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47511/">CVE-2021-47511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47511">CVE-2021-47511 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47513/">CVE-2021-47513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47513">CVE-2021-47513 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47514/">CVE-2021-47514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47514">CVE-2021-47514 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47516/">CVE-2021-47516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47516">CVE-2021-47516 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47518/">CVE-2021-47518 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47518">CVE-2021-47518 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47520/">CVE-2021-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47520">CVE-2021-47520 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47521/">CVE-2021-47521 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47521">CVE-2021-47521 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47522/">CVE-2021-47522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47522">CVE-2021-47522 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47523/">CVE-2021-47523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47523">CVE-2021-47523 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47524/">CVE-2021-47524 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47524">CVE-2021-47524 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47525/">CVE-2021-47525 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47525">CVE-2021-47525 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47526/">CVE-2021-47526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47526">CVE-2021-47526 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47528/">CVE-2021-47528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47528">CVE-2021-47528 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47529/">CVE-2021-47529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47529">CVE-2021-47529 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47533/">CVE-2021-47533 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47533">CVE-2021-47533 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47535/">CVE-2021-47535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47535">CVE-2021-47535 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47536/">CVE-2021-47536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47536">CVE-2021-47536 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47537/">CVE-2021-47537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47537">CVE-2021-47537 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47540/">CVE-2021-47540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47540">CVE-2021-47540 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47541/">CVE-2021-47541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47541">CVE-2021-47541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47542/">CVE-2021-47542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47542">CVE-2021-47542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47544/">CVE-2021-47544 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47544">CVE-2021-47544 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47549/">CVE-2021-47549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47549">CVE-2021-47549 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47550/">CVE-2021-47550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47550">CVE-2021-47550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47551/">CVE-2021-47551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47551">CVE-2021-47551 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47553/">CVE-2021-47553 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47553">CVE-2021-47553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47554/">CVE-2021-47554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47554">CVE-2021-47554 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47556/">CVE-2021-47556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47556">CVE-2021-47556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47558/">CVE-2021-47558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47558">CVE-2021-47558 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47559/">CVE-2021-47559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47559">CVE-2021-47559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47560/">CVE-2021-47560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47560">CVE-2021-47560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47562/">CVE-2021-47562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47562">CVE-2021-47562 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47563/">CVE-2021-47563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47563">CVE-2021-47563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47564/">CVE-2021-47564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47564">CVE-2021-47564 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47565/">CVE-2021-47565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47565">CVE-2021-47565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48634/">CVE-2022-48634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48634">CVE-2022-48634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48636/">CVE-2022-48636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48636">CVE-2022-48636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48652/">CVE-2022-48652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48652">CVE-2022-48652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48662/">CVE-2022-48662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48662">CVE-2022-48662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48671/">CVE-2022-48671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48671">CVE-2022-48671 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48672/">CVE-2022-48672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48672">CVE-2022-48672 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48673/">CVE-2022-48673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48673">CVE-2022-48673 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48675/">CVE-2022-48675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48675">CVE-2022-48675 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48686/">CVE-2022-48686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48686">CVE-2022-48686 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48687/">CVE-2022-48687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48687">CVE-2022-48687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48688/">CVE-2022-48688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48688">CVE-2022-48688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48692/">CVE-2022-48692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48692">CVE-2022-48692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48693/">CVE-2022-48693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48693">CVE-2022-48693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48694/">CVE-2022-48694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48694">CVE-2022-48694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48697/">CVE-2022-48697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48697">CVE-2022-48697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48699/">CVE-2022-48699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48699">CVE-2022-48699 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48700/">CVE-2022-48700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48700">CVE-2022-48700 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48702/">CVE-2022-48702 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48702">CVE-2022-48702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48703/">CVE-2022-48703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48703">CVE-2022-48703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48704/">CVE-2022-48704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48704">CVE-2022-48704 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48708/">CVE-2022-48708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48708">CVE-2022-48708 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48709/">CVE-2022-48709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48709">CVE-2022-48709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48710/">CVE-2022-48710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48710">CVE-2022-48710 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2860/">CVE-2023-2860 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2860">CVE-2023-2860 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52654/">CVE-2023-52654 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52655/">CVE-2023-52655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52676/">CVE-2023-52676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52676">CVE-2023-52676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52686/">CVE-2023-52686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52686">CVE-2023-52686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52690/">CVE-2023-52690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52690">CVE-2023-52690 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52702/">CVE-2023-52702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52702">CVE-2023-52702 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52703/">CVE-2023-52703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52703">CVE-2023-52703 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52707/">CVE-2023-52707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52707">CVE-2023-52707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52708/">CVE-2023-52708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52708">CVE-2023-52708 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52730/">CVE-2023-52730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52730">CVE-2023-52730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52733/">CVE-2023-52733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52733">CVE-2023-52733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52736/">CVE-2023-52736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52736">CVE-2023-52736 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52738/">CVE-2023-52738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52738">CVE-2023-52738 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52739/">CVE-2023-52739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52739">CVE-2023-52739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52740/">CVE-2023-52740 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52740">CVE-2023-52740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52741/">CVE-2023-52741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52741">CVE-2023-52741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52742/">CVE-2023-52742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52742">CVE-2023-52742 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52743/">CVE-2023-52743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52743">CVE-2023-52743 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52744/">CVE-2023-52744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52744">CVE-2023-52744 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52745/">CVE-2023-52745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52745">CVE-2023-52745 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52747/">CVE-2023-52747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52747">CVE-2023-52747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52753/">CVE-2023-52753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52753">CVE-2023-52753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52754/">CVE-2023-52754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52754">CVE-2023-52754 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52756/">CVE-2023-52756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52756">CVE-2023-52756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52759/">CVE-2023-52759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52759">CVE-2023-52759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52763/">CVE-2023-52763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52763">CVE-2023-52763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52764/">CVE-2023-52764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52764">CVE-2023-52764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52774/">CVE-2023-52774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52774">CVE-2023-52774 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52781/">CVE-2023-52781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52781">CVE-2023-52781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52788/">CVE-2023-52788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52788">CVE-2023-52788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52789/">CVE-2023-52789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52789">CVE-2023-52789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52791/">CVE-2023-52791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52791">CVE-2023-52791 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52798/">CVE-2023-52798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52798">CVE-2023-52798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52799/">CVE-2023-52799 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52799">CVE-2023-52799 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52804/">CVE-2023-52804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52804">CVE-2023-52804 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52805/">CVE-2023-52805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52805">CVE-2023-52805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52806/">CVE-2023-52806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52806">CVE-2023-52806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52810/">CVE-2023-52810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52810">CVE-2023-52810 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52811/">CVE-2023-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52811">CVE-2023-52811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52814/">CVE-2023-52814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52814">CVE-2023-52814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52816/">CVE-2023-52816 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52816">CVE-2023-52816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52818/">CVE-2023-52818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52818">CVE-2023-52818 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52819/">CVE-2023-52819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52819">CVE-2023-52819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52821/">CVE-2023-52821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52821">CVE-2023-52821 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52825/">CVE-2023-52825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52825">CVE-2023-52825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52826/">CVE-2023-52826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52826">CVE-2023-52826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52833/">CVE-2023-52833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52833">CVE-2023-52833 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52834/">CVE-2023-52834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52834">CVE-2023-52834 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52838/">CVE-2023-52838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52838">CVE-2023-52838 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52840/">CVE-2023-52840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52840">CVE-2023-52840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52841/">CVE-2023-52841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52841">CVE-2023-52841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52844/">CVE-2023-52844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52844">CVE-2023-52844 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52847/">CVE-2023-52847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52847">CVE-2023-52847 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52853/">CVE-2023-52853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52853">CVE-2023-52853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52854/">CVE-2023-52854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52854">CVE-2023-52854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52855/">CVE-2023-52855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52855">CVE-2023-52855 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52856/">CVE-2023-52856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52856">CVE-2023-52856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52858/">CVE-2023-52858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52858">CVE-2023-52858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52865/">CVE-2023-52865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52865">CVE-2023-52865 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52867/">CVE-2023-52867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52867">CVE-2023-52867 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52868/">CVE-2023-52868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52868">CVE-2023-52868 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52870/">CVE-2023-52870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52870">CVE-2023-52870 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52871/">CVE-2023-52871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52871">CVE-2023-52871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52872/">CVE-2023-52872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52872">CVE-2023-52872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52873/">CVE-2023-52873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52873">CVE-2023-52873 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52875/">CVE-2023-52875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52875">CVE-2023-52875 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52876/">CVE-2023-52876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52876">CVE-2023-52876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52877/">CVE-2023-52877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52877">CVE-2023-52877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52878/">CVE-2023-52878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52878">CVE-2023-52878 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0639/">CVE-2024-0639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0639">CVE-2024-0639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26840/">CVE-2024-26840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26840">CVE-2024-26840 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26921/">CVE-2024-26921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26928/">CVE-2024-26928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26928">CVE-2024-26928 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27413/">CVE-2024-27413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27413">CVE-2024-27413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35811/">CVE-2024-35811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35811">CVE-2024-35811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35815/">CVE-2024-35815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35817/">CVE-2024-35817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35863/">CVE-2024-35863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35867/">CVE-2024-35867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35867">CVE-2024-35867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35868/">CVE-2024-35868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35868">CVE-2024-35868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35904/">CVE-2024-35904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35904">CVE-2024-35904 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35914/">CVE-2024-35914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35914">CVE-2024-35914 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869879" comment="kernel-default-5.14.21-150400.24.122.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869533" comment="kernel-default-base-5.14.21-150400.24.122.2.150400.24.58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206171" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1227052" ref_url="https://bugzilla.suse.com/1227052" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2273-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036322.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2024-6104: Fixed a potential leak of sensitive information on
  HTTP log file (bsc#1227052).  
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227052">SUSE bug 1227052</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871285" comment="podman-4.9.5-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878199" comment="podman-remote-4.9.5-150400.4.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206172" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1224282" ref_url="https://bugzilla.suse.com/1224282" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34459" ref_url="https://www.suse.com/security/cve/CVE-2024-34459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018855.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2024-34459: Fixed buffer over-read in xmlHTMLPrintFileContext in xmllint.c (bsc#1224282).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1224282">SUSE bug 1224282</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-34459/">CVE-2024-34459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34459">CVE-2024-34459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871286" comment="libxml2-2-2.9.14-150400.5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871287" comment="libxml2-tools-2.9.14-150400.5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871288" comment="python3-libxml2-2.9.14-150400.5.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206173" version="1" class="patch">
	<metadata>
		<title>Security update for libndp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1225771" ref_url="https://bugzilla.suse.com/1225771" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5564" ref_url="https://www.suse.com/security/cve/CVE-2024-5564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035808.html" source="SUSE-SU"/>
		<description>
This update for libndp fixes the following issues:

- CVE-2024-5564: Add a check on the route information option length field. (bsc#1225771)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225771">SUSE bug 1225771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5564/">CVE-2024-5564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5564">CVE-2024-5564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871289" comment="libndp0-1.6-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206174" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1227186" ref_url="https://bugzilla.suse.com/1227186" source="BUGZILLA"/>
		<reference ref_id="1227187" ref_url="https://bugzilla.suse.com/1227187" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-37370" ref_url="https://www.suse.com/security/cve/CVE-2024-37370/" source="CVE"/>
		<reference ref_id="CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035853.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).
- CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-08"/>
	<updated date="2024-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227186">SUSE bug 1227186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227187">SUSE bug 1227187</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-37370/">CVE-2024-37370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871749" comment="krb5-1.19.2-150400.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206175" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218571" ref_url="https://bugzilla.suse.com/1218571" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-7207" ref_url="https://www.suse.com/security/cve/CVE-2023-7207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017765.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- CVE-2023-7207: Fixed a path traversal issue that could lead to an
  arbitrary file write during archive extraction (bsc#1218571).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2024-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218571">SUSE bug 1218571</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-7207/">CVE-2023-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7207">CVE-2023-7207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819467" comment="cpio-2.13-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206176" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1195775" ref_url="https://bugzilla.suse.com/1195775" source="BUGZILLA"/>
		<reference ref_id="1216124" ref_url="https://bugzilla.suse.com/1216124" source="BUGZILLA"/>
		<reference ref_id="1218148" ref_url="https://bugzilla.suse.com/1218148" source="BUGZILLA"/>
		<reference ref_id="1219224" ref_url="https://bugzilla.suse.com/1219224" source="BUGZILLA"/>
		<reference ref_id="1220492" ref_url="https://bugzilla.suse.com/1220492" source="BUGZILLA"/>
		<reference ref_id="1222015" ref_url="https://bugzilla.suse.com/1222015" source="BUGZILLA"/>
		<reference ref_id="1222254" ref_url="https://bugzilla.suse.com/1222254" source="BUGZILLA"/>
		<reference ref_id="1222678" ref_url="https://bugzilla.suse.com/1222678" source="BUGZILLA"/>
		<reference ref_id="1224020" ref_url="https://bugzilla.suse.com/1224020" source="BUGZILLA"/>
		<reference ref_id="1224679" ref_url="https://bugzilla.suse.com/1224679" source="BUGZILLA"/>
		<reference ref_id="1224696" ref_url="https://bugzilla.suse.com/1224696" source="BUGZILLA"/>
		<reference ref_id="1224703" ref_url="https://bugzilla.suse.com/1224703" source="BUGZILLA"/>
		<reference ref_id="1224749" ref_url="https://bugzilla.suse.com/1224749" source="BUGZILLA"/>
		<reference ref_id="1224764" ref_url="https://bugzilla.suse.com/1224764" source="BUGZILLA"/>
		<reference ref_id="1224765" ref_url="https://bugzilla.suse.com/1224765" source="BUGZILLA"/>
		<reference ref_id="1224766" ref_url="https://bugzilla.suse.com/1224766" source="BUGZILLA"/>
		<reference ref_id="1224935" ref_url="https://bugzilla.suse.com/1224935" source="BUGZILLA"/>
		<reference ref_id="1225098" ref_url="https://bugzilla.suse.com/1225098" source="BUGZILLA"/>
		<reference ref_id="1225467" ref_url="https://bugzilla.suse.com/1225467" source="BUGZILLA"/>
		<reference ref_id="1225487" ref_url="https://bugzilla.suse.com/1225487" source="BUGZILLA"/>
		<reference ref_id="1225518" ref_url="https://bugzilla.suse.com/1225518" source="BUGZILLA"/>
		<reference ref_id="1225611" ref_url="https://bugzilla.suse.com/1225611" source="BUGZILLA"/>
		<reference ref_id="1225732" ref_url="https://bugzilla.suse.com/1225732" source="BUGZILLA"/>
		<reference ref_id="1225737" ref_url="https://bugzilla.suse.com/1225737" source="BUGZILLA"/>
		<reference ref_id="1225749" ref_url="https://bugzilla.suse.com/1225749" source="BUGZILLA"/>
		<reference ref_id="1225840" ref_url="https://bugzilla.suse.com/1225840" source="BUGZILLA"/>
		<reference ref_id="1225866" ref_url="https://bugzilla.suse.com/1225866" source="BUGZILLA"/>
		<reference ref_id="1226145" ref_url="https://bugzilla.suse.com/1226145" source="BUGZILLA"/>
		<reference ref_id="1226211" ref_url="https://bugzilla.suse.com/1226211" source="BUGZILLA"/>
		<reference ref_id="1226212" ref_url="https://bugzilla.suse.com/1226212" source="BUGZILLA"/>
		<reference ref_id="1226270" ref_url="https://bugzilla.suse.com/1226270" source="BUGZILLA"/>
		<reference ref_id="1226587" ref_url="https://bugzilla.suse.com/1226587" source="BUGZILLA"/>
		<reference ref_id="1226595" ref_url="https://bugzilla.suse.com/1226595" source="BUGZILLA"/>
		<reference ref_id="1226634" ref_url="https://bugzilla.suse.com/1226634" source="BUGZILLA"/>
		<reference ref_id="1226785" ref_url="https://bugzilla.suse.com/1226785" source="BUGZILLA"/>
		<reference ref_id="1226786" ref_url="https://bugzilla.suse.com/1226786" source="BUGZILLA"/>
		<reference ref_id="1226789" ref_url="https://bugzilla.suse.com/1226789" source="BUGZILLA"/>
		<reference ref_id="1226953" ref_url="https://bugzilla.suse.com/1226953" source="BUGZILLA"/>
		<reference ref_id="1226962" ref_url="https://bugzilla.suse.com/1226962" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47555" ref_url="https://www.suse.com/security/cve/CVE-2021-47555/" source="CVE"/>
		<reference ref_id="CVE-2021-47571" ref_url="https://www.suse.com/security/cve/CVE-2021-47571/" source="CVE"/>
		<reference ref_id="CVE-2023-24023" ref_url="https://www.suse.com/security/cve/CVE-2023-24023/" source="CVE"/>
		<reference ref_id="CVE-2023-52670" ref_url="https://www.suse.com/security/cve/CVE-2023-52670/" source="CVE"/>
		<reference ref_id="CVE-2023-52752" ref_url="https://www.suse.com/security/cve/CVE-2023-52752/" source="CVE"/>
		<reference ref_id="CVE-2023-52837" ref_url="https://www.suse.com/security/cve/CVE-2023-52837/" source="CVE"/>
		<reference ref_id="CVE-2023-52846" ref_url="https://www.suse.com/security/cve/CVE-2023-52846/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2024-26745" ref_url="https://www.suse.com/security/cve/CVE-2024-26745/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861/" source="CVE"/>
		<reference ref_id="CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862/" source="CVE"/>
		<reference ref_id="CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864/" source="CVE"/>
		<reference ref_id="CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869/" source="CVE"/>
		<reference ref_id="CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950/" source="CVE"/>
		<reference ref_id="CVE-2024-36894" ref_url="https://www.suse.com/security/cve/CVE-2024-36894/" source="CVE"/>
		<reference ref_id="CVE-2024-36899" ref_url="https://www.suse.com/security/cve/CVE-2024-36899/" source="CVE"/>
		<reference ref_id="CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904/" source="CVE"/>
		<reference ref_id="CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940/" source="CVE"/>
		<reference ref_id="CVE-2024-36964" ref_url="https://www.suse.com/security/cve/CVE-2024-36964/" source="CVE"/>
		<reference ref_id="CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971/" source="CVE"/>
		<reference ref_id="CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541/" source="CVE"/>
		<reference ref_id="CVE-2024-38545" ref_url="https://www.suse.com/security/cve/CVE-2024-38545/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-38560" ref_url="https://www.suse.com/security/cve/CVE-2024-38560/" source="CVE"/>
		<reference ref_id="CVE-2024-38564" ref_url="https://www.suse.com/security/cve/CVE-2024-38564/" source="CVE"/>
		<reference ref_id="CVE-2024-38578" ref_url="https://www.suse.com/security/cve/CVE-2024-38578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47555: net: vlan: fix underflow for the real_dev refcnt (bsc#1225467).
- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).
- CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148).
- CVE-2023-52670: rpmsg: virtio: Free driver_override when rpmsg_remove() (bsc#1224696).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35950: drm/client: Fully protect modes with dev-&gt;mode_config.mutex (bsc#1224703).
- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-38541: of: module: add buffer overflow check in of_modalias() (bsc#1226587).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).
- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634).

The following non-security bugs were fixed:

- Revert 'build initrd without systemd' (bsc#1195775)
- cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254).
- cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254).
- cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).
- cgroup: Remove unnecessary list_empty() (bsc#1222254).
- cgroup: preserve KABI of cgroup_root (bsc#1222254).
- mkspec-dtb: add toplevel symlinks also on arm
- ocfs2: adjust enabling place for la window (bsc#1219224).
- ocfs2: fix sparse warnings (bsc#1219224).
- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).
- ocfs2: speed up chain-list searching (bsc#1219224).
- random: treat bootloader trust toggle the same way as cpu trust toggle (bsc#1226953).
- rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212) Some builds do not just create an iso9660 image, but also mount it during build.
- rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211) docker needs more networking modules, even legacy iptable_nat and _filter.
- rpm/kernel-obs-build.spec.in: Include algif_hash, aegis128 and xts modules afgif_hash is needed by some packages (e.g. iwd) for tests, xts is used for LUKS2 volumes by default and aegis128 is useful as AEAD cipher for LUKS2. Wrap the long line to make it readable.
- rpm/mkspec-dtb: dtbs have moved to vendor sub-directories in 6.5 By commit 724ba6751532 ('ARM: dts: Move .dts files to vendor sub-directories'). So switch to them.
- scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1216124).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: guarantee refcounted children from parent session (bsc#1224679).
- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).
- xfs: do not include bnobt blocks when reserving free block pool (bsc#1226270).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-10"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195775">SUSE bug 1195775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216124">SUSE bug 1216124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218148">SUSE bug 1218148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219224">SUSE bug 1219224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220492">SUSE bug 1220492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222015">SUSE bug 1222015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222254">SUSE bug 1222254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222678">SUSE bug 1222678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224020">SUSE bug 1224020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224679">SUSE bug 1224679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224696">SUSE bug 1224696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224703">SUSE bug 1224703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224749">SUSE bug 1224749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224764">SUSE bug 1224764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224765">SUSE bug 1224765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224766">SUSE bug 1224766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224935">SUSE bug 1224935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225098">SUSE bug 1225098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225467">SUSE bug 1225467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225487">SUSE bug 1225487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225518">SUSE bug 1225518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225732">SUSE bug 1225732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225737">SUSE bug 1225737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225749">SUSE bug 1225749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225840">SUSE bug 1225840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225866">SUSE bug 1225866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226145">SUSE bug 1226145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226211">SUSE bug 1226211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226212">SUSE bug 1226212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226270">SUSE bug 1226270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226587">SUSE bug 1226587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226595">SUSE bug 1226595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226634">SUSE bug 1226634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226785">SUSE bug 1226785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226786">SUSE bug 1226786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226789">SUSE bug 1226789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226953">SUSE bug 1226953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226962">SUSE bug 1226962</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47555/">CVE-2021-47555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47555">CVE-2021-47555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47571/">CVE-2021-47571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47571">CVE-2021-47571 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24023/">CVE-2023-24023 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023">CVE-2023-24023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52670/">CVE-2023-52670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52670">CVE-2023-52670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52752/">CVE-2023-52752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52752">CVE-2023-52752 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52837/">CVE-2023-52837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52837">CVE-2023-52837 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52846/">CVE-2023-52846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52846">CVE-2023-52846 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26745/">CVE-2024-26745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26745">CVE-2024-26745 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36894/">CVE-2024-36894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36894">CVE-2024-36894 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36899/">CVE-2024-36899 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36964/">CVE-2024-36964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38545/">CVE-2024-38545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38545">CVE-2024-38545 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38560/">CVE-2024-38560 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38560">CVE-2024-38560 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38564/">CVE-2024-38564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38578/">CVE-2024-38578 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38578">CVE-2024-38578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872402" comment="kernel-rt-5.14.21-150400.15.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872403" comment="kernel-source-rt-5.14.21-150400.15.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206177" version="1" class="patch">
	<metadata>
		<title>Security update for oniguruma (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1141157" ref_url="https://bugzilla.suse.com/1141157" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13225" ref_url="https://www.suse.com/security/cve/CVE-2019-13225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035929.html" source="SUSE-SU"/>
		<description>
This update for oniguruma fixes the following issues:

- CVE-2019-13225: Fixed null-pointer dereference in match_at() in regexec.c (bsc#1141157).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141157">SUSE bug 1141157</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13225/">CVE-2019-13225 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13225">CVE-2019-13225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872658" comment="libonig4-6.7.0-150000.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206178" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="1220664" ref_url="https://bugzilla.suse.com/1220664" source="BUGZILLA"/>
		<reference ref_id="1221563" ref_url="https://bugzilla.suse.com/1221563" source="BUGZILLA"/>
		<reference ref_id="1221854" ref_url="https://bugzilla.suse.com/1221854" source="BUGZILLA"/>
		<reference ref_id="1222075" ref_url="https://bugzilla.suse.com/1222075" source="BUGZILLA"/>
		<reference ref_id="1226447" ref_url="https://bugzilla.suse.com/1226447" source="BUGZILLA"/>
		<reference ref_id="1226448" ref_url="https://bugzilla.suse.com/1226448" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-52425: Fixed backport so it uses features sniffing, not just comparing version number (bsc#1219559).
- CVE-2024-0450: Fixed detecting the vulnerability of 'quoted-overlap' zipbomb (bsc#1221854).
- CVE-2024-4032: Rearranging definition of private v global IP. (bsc#1226448)
- CVE-2024-0397: Remove a memory race condition in ssl.SSLContext certificate store methods. (bsc#1226447)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220664">SUSE bug 1220664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221563">SUSE bug 1221563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222075">SUSE bug 1222075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226447">SUSE bug 1226447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226448">SUSE bug 1226448</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873840" comment="libpython3_6m1_0-3.6.15-150300.10.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873841" comment="python3-3.6.15-150300.10.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873842" comment="python3-base-3.6.15-150300.10.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206179" version="1" class="patch">
	<metadata>
		<title>Security update for cockpit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1226040" ref_url="https://bugzilla.suse.com/1226040" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6126" ref_url="https://www.suse.com/security/cve/CVE-2024-6126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018983.html" source="SUSE-SU"/>
		<description>
This update for cockpit fixes the following issues:

- CVE-2024-6126: Fixed Integer overflow in pam_sm_close_session() (bsc#1226040).		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226040">SUSE bug 1226040</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-6126/">CVE-2024-6126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6126">CVE-2024-6126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874147" comment="cockpit-251.3-150400.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874148" comment="cockpit-bridge-251.3-150400.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874149" comment="cockpit-networkmanager-251.3-150400.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874150" comment="cockpit-selinux-251.3-150400.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874151" comment="cockpit-storaged-251.3-150400.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874152" comment="cockpit-system-251.3-150400.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874153" comment="cockpit-ws-251.3-150400.6.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206180" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1195775" ref_url="https://bugzilla.suse.com/1195775" source="BUGZILLA"/>
		<reference ref_id="1216124" ref_url="https://bugzilla.suse.com/1216124" source="BUGZILLA"/>
		<reference ref_id="1218148" ref_url="https://bugzilla.suse.com/1218148" source="BUGZILLA"/>
		<reference ref_id="1219224" ref_url="https://bugzilla.suse.com/1219224" source="BUGZILLA"/>
		<reference ref_id="1220492" ref_url="https://bugzilla.suse.com/1220492" source="BUGZILLA"/>
		<reference ref_id="1222015" ref_url="https://bugzilla.suse.com/1222015" source="BUGZILLA"/>
		<reference ref_id="1222254" ref_url="https://bugzilla.suse.com/1222254" source="BUGZILLA"/>
		<reference ref_id="1222678" ref_url="https://bugzilla.suse.com/1222678" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1224020" ref_url="https://bugzilla.suse.com/1224020" source="BUGZILLA"/>
		<reference ref_id="1224679" ref_url="https://bugzilla.suse.com/1224679" source="BUGZILLA"/>
		<reference ref_id="1224696" ref_url="https://bugzilla.suse.com/1224696" source="BUGZILLA"/>
		<reference ref_id="1224703" ref_url="https://bugzilla.suse.com/1224703" source="BUGZILLA"/>
		<reference ref_id="1224749" ref_url="https://bugzilla.suse.com/1224749" source="BUGZILLA"/>
		<reference ref_id="1224764" ref_url="https://bugzilla.suse.com/1224764" source="BUGZILLA"/>
		<reference ref_id="1224765" ref_url="https://bugzilla.suse.com/1224765" source="BUGZILLA"/>
		<reference ref_id="1224766" ref_url="https://bugzilla.suse.com/1224766" source="BUGZILLA"/>
		<reference ref_id="1224935" ref_url="https://bugzilla.suse.com/1224935" source="BUGZILLA"/>
		<reference ref_id="1225098" ref_url="https://bugzilla.suse.com/1225098" source="BUGZILLA"/>
		<reference ref_id="1225467" ref_url="https://bugzilla.suse.com/1225467" source="BUGZILLA"/>
		<reference ref_id="1225487" ref_url="https://bugzilla.suse.com/1225487" source="BUGZILLA"/>
		<reference ref_id="1225518" ref_url="https://bugzilla.suse.com/1225518" source="BUGZILLA"/>
		<reference ref_id="1225611" ref_url="https://bugzilla.suse.com/1225611" source="BUGZILLA"/>
		<reference ref_id="1225732" ref_url="https://bugzilla.suse.com/1225732" source="BUGZILLA"/>
		<reference ref_id="1225737" ref_url="https://bugzilla.suse.com/1225737" source="BUGZILLA"/>
		<reference ref_id="1225749" ref_url="https://bugzilla.suse.com/1225749" source="BUGZILLA"/>
		<reference ref_id="1225840" ref_url="https://bugzilla.suse.com/1225840" source="BUGZILLA"/>
		<reference ref_id="1225866" ref_url="https://bugzilla.suse.com/1225866" source="BUGZILLA"/>
		<reference ref_id="1226145" ref_url="https://bugzilla.suse.com/1226145" source="BUGZILLA"/>
		<reference ref_id="1226211" ref_url="https://bugzilla.suse.com/1226211" source="BUGZILLA"/>
		<reference ref_id="1226212" ref_url="https://bugzilla.suse.com/1226212" source="BUGZILLA"/>
		<reference ref_id="1226270" ref_url="https://bugzilla.suse.com/1226270" source="BUGZILLA"/>
		<reference ref_id="1226587" ref_url="https://bugzilla.suse.com/1226587" source="BUGZILLA"/>
		<reference ref_id="1226595" ref_url="https://bugzilla.suse.com/1226595" source="BUGZILLA"/>
		<reference ref_id="1226634" ref_url="https://bugzilla.suse.com/1226634" source="BUGZILLA"/>
		<reference ref_id="1226758" ref_url="https://bugzilla.suse.com/1226758" source="BUGZILLA"/>
		<reference ref_id="1226785" ref_url="https://bugzilla.suse.com/1226785" source="BUGZILLA"/>
		<reference ref_id="1226786" ref_url="https://bugzilla.suse.com/1226786" source="BUGZILLA"/>
		<reference ref_id="1226789" ref_url="https://bugzilla.suse.com/1226789" source="BUGZILLA"/>
		<reference ref_id="1226953" ref_url="https://bugzilla.suse.com/1226953" source="BUGZILLA"/>
		<reference ref_id="1226962" ref_url="https://bugzilla.suse.com/1226962" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47555" ref_url="https://www.suse.com/security/cve/CVE-2021-47555/" source="CVE"/>
		<reference ref_id="CVE-2021-47571" ref_url="https://www.suse.com/security/cve/CVE-2021-47571/" source="CVE"/>
		<reference ref_id="CVE-2023-24023" ref_url="https://www.suse.com/security/cve/CVE-2023-24023/" source="CVE"/>
		<reference ref_id="CVE-2023-52670" ref_url="https://www.suse.com/security/cve/CVE-2023-52670/" source="CVE"/>
		<reference ref_id="CVE-2023-52752" ref_url="https://www.suse.com/security/cve/CVE-2023-52752/" source="CVE"/>
		<reference ref_id="CVE-2023-52837" ref_url="https://www.suse.com/security/cve/CVE-2023-52837/" source="CVE"/>
		<reference ref_id="CVE-2023-52846" ref_url="https://www.suse.com/security/cve/CVE-2023-52846/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2024-26745" ref_url="https://www.suse.com/security/cve/CVE-2024-26745/" source="CVE"/>
		<reference ref_id="CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861/" source="CVE"/>
		<reference ref_id="CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862/" source="CVE"/>
		<reference ref_id="CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864/" source="CVE"/>
		<reference ref_id="CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869/" source="CVE"/>
		<reference ref_id="CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950/" source="CVE"/>
		<reference ref_id="CVE-2024-36894" ref_url="https://www.suse.com/security/cve/CVE-2024-36894/" source="CVE"/>
		<reference ref_id="CVE-2024-36899" ref_url="https://www.suse.com/security/cve/CVE-2024-36899/" source="CVE"/>
		<reference ref_id="CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904/" source="CVE"/>
		<reference ref_id="CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940/" source="CVE"/>
		<reference ref_id="CVE-2024-36964" ref_url="https://www.suse.com/security/cve/CVE-2024-36964/" source="CVE"/>
		<reference ref_id="CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971/" source="CVE"/>
		<reference ref_id="CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541/" source="CVE"/>
		<reference ref_id="CVE-2024-38545" ref_url="https://www.suse.com/security/cve/CVE-2024-38545/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-38560" ref_url="https://www.suse.com/security/cve/CVE-2024-38560/" source="CVE"/>
		<reference ref_id="CVE-2024-38564" ref_url="https://www.suse.com/security/cve/CVE-2024-38564/" source="CVE"/>
		<reference ref_id="CVE-2024-38578" ref_url="https://www.suse.com/security/cve/CVE-2024-38578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634,).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595)
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2024-38541: of: module: add buffer overflow check in of_modalias() (bsc#1226587).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() (bsc#1226758).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()(bsc#1224766).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2023-52670: rpmsg: virtio: Free driver_override when rpmsg_remove() (bsc#1224696).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).
- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).
- CVE-2021-47555: net: vlan: fix underflow for the real_dev refcnt (bsc#1225467).
- CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148).
- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).
- CVE-2024-35950: drm/client: Fully protect modes with dev-&gt;mode_config.mutex (bsc#1224703).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).

The following non-security bugs were fixed:

- Revert 'build initrd without systemd' (bsc#1195775)'
- cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254).
- cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254).
- cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).
- cgroup: Remove unnecessary list_empty() (bsc#1222254).
- cgroup: preserve KABI of cgroup_root (bsc#1222254).
- ocfs2: adjust enabling place for la window (bsc#1219224).
- ocfs2: fix sparse warnings (bsc#1219224).
- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).
- ocfs2: speed up chain-list searching (bsc#1219224).
- random: treat bootloader trust toggle the same way as cpu trust toggle (bsc#1226953).
- rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212).
- rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211).
- scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1216124).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).
- xfs: do not include bnobt blocks when reserving free block pool (bsc#1226270).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195775">SUSE bug 1195775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216124">SUSE bug 1216124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218148">SUSE bug 1218148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219224">SUSE bug 1219224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220492">SUSE bug 1220492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222015">SUSE bug 1222015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222254">SUSE bug 1222254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222678">SUSE bug 1222678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224020">SUSE bug 1224020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224679">SUSE bug 1224679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224696">SUSE bug 1224696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224703">SUSE bug 1224703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224749">SUSE bug 1224749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224764">SUSE bug 1224764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224765">SUSE bug 1224765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224766">SUSE bug 1224766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224935">SUSE bug 1224935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225098">SUSE bug 1225098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225467">SUSE bug 1225467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225487">SUSE bug 1225487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225518">SUSE bug 1225518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225732">SUSE bug 1225732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225737">SUSE bug 1225737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225749">SUSE bug 1225749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225840">SUSE bug 1225840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225866">SUSE bug 1225866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226145">SUSE bug 1226145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226211">SUSE bug 1226211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226212">SUSE bug 1226212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226270">SUSE bug 1226270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226587">SUSE bug 1226587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226595">SUSE bug 1226595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226634">SUSE bug 1226634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226758">SUSE bug 1226758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226785">SUSE bug 1226785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226786">SUSE bug 1226786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226789">SUSE bug 1226789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226953">SUSE bug 1226953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226962">SUSE bug 1226962</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47555/">CVE-2021-47555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47555">CVE-2021-47555 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47571/">CVE-2021-47571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47571">CVE-2021-47571 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24023/">CVE-2023-24023 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023">CVE-2023-24023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52670/">CVE-2023-52670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52670">CVE-2023-52670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52752/">CVE-2023-52752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52752">CVE-2023-52752 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52837/">CVE-2023-52837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52837">CVE-2023-52837 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52846/">CVE-2023-52846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52846">CVE-2023-52846 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26745/">CVE-2024-26745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26745">CVE-2024-26745 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36894/">CVE-2024-36894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36894">CVE-2024-36894 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36899/">CVE-2024-36899 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36964/">CVE-2024-36964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38545/">CVE-2024-38545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38545">CVE-2024-38545 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38560/">CVE-2024-38560 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38560">CVE-2024-38560 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38564/">CVE-2024-38564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38578/">CVE-2024-38578 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38578">CVE-2024-38578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874146" comment="kernel-default-5.14.21-150400.24.125.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874079" comment="kernel-default-base-5.14.21-150400.24.125.1.150400.24.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206181" version="1" class="patch">
	<metadata>
		<title>Security update for python-dnspython (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1222693" ref_url="https://bugzilla.suse.com/1222693" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036193.html" source="SUSE-SU"/>
		<description>
This update for python-dnspython fixes the following issues:

  - CVE-2023-29483: Fixed an issue that allowed remote attackers to
    interfere with DNS name resolution (bsc#1222693).  
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222693">SUSE bug 1222693</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877243" comment="python3-dnspython-1.15.0-150000.3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206182" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="916845" ref_url="https://bugzilla.suse.com/916845" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4235" ref_url="https://www.suse.com/security/cve/CVE-2013-4235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036191.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2013-4235: Fixed a race condition when copying and removing directory trees (bsc#916845).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/916845">SUSE bug 916845</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-4235/">CVE-2013-4235 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877670" comment="login_defs-4.8.1-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877671" comment="shadow-4.8.1-150400.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206183" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1228120" ref_url="https://bugzilla.suse.com/1228120" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6655" ref_url="https://www.suse.com/security/cve/CVE-2024-6655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036188.html" source="SUSE-SU"/>
		<description>
This update for gtk2 fixes the following issues:

- CVE-2024-6655: Fixed library injection from current working directory (bsc#1228120)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228120">SUSE bug 1228120</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6655/">CVE-2024-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6655">CVE-2024-6655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877665" comment="gtk2-tools-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877666" comment="libgtk-2_0-0-2.24.33-150400.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206184" version="1" class="patch">
	<metadata>
		<title>Security update for gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1228120" ref_url="https://bugzilla.suse.com/1228120" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6655" ref_url="https://www.suse.com/security/cve/CVE-2024-6655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2661-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036187.html" source="SUSE-SU"/>
		<description>
This update for gtk3 fixes the following issues:

- CVE-2024-6655: Fixed library injection from current working directory (bsc#1228120)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228120">SUSE bug 1228120</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6655/">CVE-2024-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6655">CVE-2024-6655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877287" comment="gtk3-data-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877309" comment="gtk3-schema-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877667" comment="gtk3-tools-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877668" comment="libgtk-3-0-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877669" comment="typelib-1_0-Gtk-3_0-3.24.34-150400.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206185" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1226469" ref_url="https://bugzilla.suse.com/1226469" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036186.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2024-37891: Fixed proxy-authorization request header is not stripped during cross-origin redirects (bsc#1226469)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226469">SUSE bug 1226469</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877315" comment="python3-urllib3-1.25.10-150300.4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206186" version="1" class="patch">
	<metadata>
		<title>Security update for orc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1228184" ref_url="https://bugzilla.suse.com/1228184" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-40897" ref_url="https://www.suse.com/security/cve/CVE-2024-40897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036185.html" source="SUSE-SU"/>
		<description>
This update for orc fixes the following issues:

- CVE-2024-40897: Fixed stack-based buffer overflow in the orc compiler when formatting error messages for certain input files (bsc#1228184)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228184">SUSE bug 1228184</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40897/">CVE-2024-40897 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40897">CVE-2024-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877663" comment="liborc-0_4-0-0.4.28-150000.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206187" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218851" ref_url="https://bugzilla.suse.com/1218851" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46839" ref_url="https://www.suse.com/security/cve/CVE-2023-46839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017812.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-46839: Fixed phantom functions assigned to incorrect contexts (XSA-449) (bsc#1218851)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-30"/>
	<updated date="2024-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218851">SUSE bug 1218851</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46839/">CVE-2023-46839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46839">CVE-2023-46839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844743" comment="xen-libs-4.16.5_12-150400.4.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206188" version="1" class="patch">
	<metadata>
		<title>Recommended update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214980" ref_url="https://bugzilla.suse.com/1214980" source="BUGZILLA"/>
		<reference ref_id="1222804" ref_url="https://bugzilla.suse.com/1222804" source="BUGZILLA"/>
		<reference ref_id="1222807" ref_url="https://bugzilla.suse.com/1222807" source="BUGZILLA"/>
		<reference ref_id="1222811" ref_url="https://bugzilla.suse.com/1222811" source="BUGZILLA"/>
		<reference ref_id="1222813" ref_url="https://bugzilla.suse.com/1222813" source="BUGZILLA"/>
		<reference ref_id="1222814" ref_url="https://bugzilla.suse.com/1222814" source="BUGZILLA"/>
		<reference ref_id="1222821" ref_url="https://bugzilla.suse.com/1222821" source="BUGZILLA"/>
		<reference ref_id="1222822" ref_url="https://bugzilla.suse.com/1222822" source="BUGZILLA"/>
		<reference ref_id="1222826" ref_url="https://bugzilla.suse.com/1222826" source="BUGZILLA"/>
		<reference ref_id="1222828" ref_url="https://bugzilla.suse.com/1222828" source="BUGZILLA"/>
		<reference ref_id="1222830" ref_url="https://bugzilla.suse.com/1222830" source="BUGZILLA"/>
		<reference ref_id="1222833" ref_url="https://bugzilla.suse.com/1222833" source="BUGZILLA"/>
		<reference ref_id="1222834" ref_url="https://bugzilla.suse.com/1222834" source="BUGZILLA"/>
		<reference ref_id="1223724" ref_url="https://bugzilla.suse.com/1223724" source="BUGZILLA"/>
		<reference ref_id="1224113" ref_url="https://bugzilla.suse.com/1224113" source="BUGZILLA"/>
		<reference ref_id="1224115" ref_url="https://bugzilla.suse.com/1224115" source="BUGZILLA"/>
		<reference ref_id="1224116" ref_url="https://bugzilla.suse.com/1224116" source="BUGZILLA"/>
		<reference ref_id="1224118" ref_url="https://bugzilla.suse.com/1224118" source="BUGZILLA"/>
		<reference ref_id="1227918" ref_url="https://bugzilla.suse.com/1227918" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="SUSE-RU-2024:2684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036227.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

- Fixed startup crash of Firefox when using FIPS-mode (bsc#1223724).
- Added 'Provides: nss' so other RPMs that require 'nss' can
  be installed (jira PED-6358).

- FIPS: added safe memsets (bsc#1222811)
- FIPS: restrict AES-GCM (bsc#1222830)
- FIPS: Updated FIPS approved cipher lists (bsc#1222813, bsc#1222814, bsc#1222821, bsc#1222822, bsc#1224118)
- FIPS: Updated FIPS self tests (bsc#1222807, bsc#1222828, bsc#1222834)
- FIPS: Updated FIPS approved cipher lists (bsc#1222804, bsc#1222826, bsc#1222833, bsc#1224113, bsc#1224115, bsc#1224116)

- Require `sed` for mozilla-nss-sysinit, as setup-nsssysinit.sh 
  depends on it and will create a broken, empty config, if sed is
  missing (bsc#1227918)

Update to NSS 3.101.2:

* bmo#1905691 - ChaChaXor to return after the function



update to NSS 3.101.1:

* GLOBALTRUST 2020: Set Distrust After for TLS and S/MIME.

update to NSS 3.101:

* add diagnostic assertions for SFTKObject refcount.
* freeing the slot in DeleteCertAndKey if authentication failed
* fix formatting issues.
* Add Firmaprofesional CA Root-A Web to NSS.
* remove invalid acvp fuzz test vectors.
* pad short P-384 and P-521 signatures gtests.
* remove unused FreeBL ECC code.
* pad short P-384 and P-521 signatures.
* be less strict about ECDSA private key length.
* Integrate HACL* P-521.
* Integrate HACL* P-384.
* memory leak in create_objects_from_handles.
* ensure all input is consumed in a few places in mozilla::pkix
* SMIME/CMS and PKCS #12 do not integrate with modern NSS policy
* clean up escape handling
* Use lib::pkix as default validator instead of the old-one
* Need to add high level support for PQ signing.
* Certificate Compression: changing the allocation/freeing of buffer + Improving the documentation
* SMIME/CMS and PKCS #12 do not integrate with modern NSS policy
* Allow for non-full length ecdsa signature when using softoken
* Modification of .taskcluster.yml due to mozlint indent defects
* Implement support for PBMAC1 in PKCS#12
* disable VLA warnings for fuzz builds.
* remove redundant AllocItem implementation.
* add PK11_ReadDistrustAfterAttribute.
* - Clang-formatting of SEC_GetMgfTypeByOidTag update
* Set SEC_ERROR_LIBRARY_FAILURE on self-test failure
* sftk_getParameters(): Fix fallback to default variable after error with configfile.
* Switch to the mozillareleases/image_builder image

- switch from ec_field_GFp to ec_field_plain

Update to NSS 3.100:

* merge pk11_kyberSlotList into pk11_ecSlotList for faster Xyber operations.
* remove ckcapi.
* avoid a potential PK11GenericObject memory leak.
* Remove incomplete ESDH code.
* Decrypt RSA OAEP encrypted messages.
* Fix certutil CRLDP URI code.
* Don't set CKA_DERIVE for CKK_EC_EDWARDS private keys.
* Add ability to encrypt and decrypt CMS messages using ECDH.
* Correct Templates for key agreement in smime/cmsasn.c.
* Moving the decodedCert allocation to NSS.
* Allow developers to speed up repeated local execution of NSS tests that depend on certificates.

Update to NSS 3.99:

* Removing check for message len in ed25519 (bmo#1325335)
* add ed25519 to SECU_ecName2params. (bmo#1884276)
* add EdDSA wycheproof tests. (bmo#1325335)
* nss/lib layer code for EDDSA. (bmo#1325335)
* Adding EdDSA implementation. (bmo#1325335)
* Exporting Certificate Compression types (bmo#1881027)
* Updating ACVP docker to rust 1.74 (bmo#1880857)
* Updating HACL* to 0f136f28935822579c244f287e1d2a1908a7e552 (bmo#1325335)
* Add NSS_CMSRecipient_IsSupported. (bmo#1877730)

Update to NSS 3.98:

* (CVE-2023-5388) Timing attack against RSA decryption in TLS
* Certificate Compression: enabling the check that the compression was advertised
* Move Windows workers to nss-1/b-win2022-alpha
* Remove Email trust bit from OISTE WISeKey Global Root GC CA
* Replace `distutils.spawn.find_executable` with `shutil.which` within `mach` in `nss`
* Certificate Compression: Updating nss_bogo_shim to support Certificate compression
* TLS Certificate Compression (RFC 8879) Implementation
* Add valgrind annotations to freebl kyber operations for constant-time execution tests
* Set nssckbi version number to 2.66
* Add Telekom Security roots
* Add D-Trust 2022 S/MIME roots
* Remove expired Security Communication RootCA1 root
* move keys to a slot that supports concatenation in PK11_ConcatSymKeys
* remove unmaintained tls-interop tests
* bogo: add support for the -ipv6 and -shim-id shim flags
* bogo: add support for the -curves shim flag and update Kyber expectations
* bogo: adjust expectation for a key usage bit test
* mozpkix: add option to ignore invalid subject alternative names
* Fix selfserv not stripping `publicname:` from -X value
* take ownership of ecckilla shims
* add valgrind annotations to freebl/ec.c
* PR_INADDR_ANY needs PR_htonl before assignment to inet.ip
* Update zlib to 1.3.1

Update to NSS 3.97:

* make Xyber768d00 opt-in by policy
* add libssl support for xyber768d00
* add PK11_ConcatSymKeys
* add Kyber and a PKCS#11 KEM interface to softoken
* add a FreeBL API for Kyber
* part 2: vendor github.com/pq-crystals/kyber/commit/e0d1c6ff
* part 1: add a script for vendoring kyber from pq-crystals repo
* Removing the calls to RSA Blind from loader.*
* fix worker type for level3 mac tasks
* RSA Blind implementation
* Remove DSA selftests
* read KWP testvectors from JSON
* Backed out changeset dcb174139e4f
* Fix CKM_PBE_SHA1_DES2_EDE_CBC derivation
* Wrap CC shell commands in gyp expansions

Update to NSS 3.96.1:

* Use pypi dependencies for MacOS worker in ./build_gyp.sh
* p7sign: add -a hash and -u certusage (also p7verify cleanups)
* add a defensive check for large ssl_DefSend return values
* Add dependency to the taskcluster script for Darwin
* Upgrade version of the MacOS worker for the CI

Update to NSS 3.95:

* Bump builtins version number.
* Remove Email trust bit from Autoridad de Certificacion Firmaprofesional CIF A62634068 root cert.
* Remove 4 DigiCert (Symantec/Verisign) Root Certificates
* Remove 3 TrustCor Root Certificates from NSS.
* Remove Camerfirma root certificates from NSS.
* Remove old Autoridad de Certificacion Firmaprofesional Certificate.
* Add four Commscope root certificates to NSS.
* Add TrustAsia Global Root CA G3 and G4 root certificates.
* Include P-384 and P-521 Scalar Validation from HACL*
* Include P-256 Scalar Validation from HACL*.
* After the HACL 256 ECC patch, NSS incorrectly encodes 256 ECC without DER wrapping at the softoken level
* Add means to provide library parameters to C_Initialize
* add OSXSAVE and XCR0 tests to AVX2 detection.
* Typo in ssl3_AppendHandshakeNumber
* Introducing input check of ssl3_AppendHandshakeNumber
* Fix Invalid casts in instance.c

Update to NSS 3.94:

* Updated code and commit ID for HACL*
* update ACVP fuzzed test vector: refuzzed with current NSS
* Softoken C_ calls should use system FIPS setting to select NSC_ or FC_ variants
* NSS needs a database tool that can dump the low level representation of the database
* declare string literals using char in pkixnames_tests.cpp
* avoid implicit conversion for ByteString
* update rust version for acvp docker
* Moving the init function of the mpi_ints before clean-up in ec.c
* P-256 ECDH and ECDSA from HACL*
* Add ACVP test vectors to the repository
* Stop relying on std::basic_string&lt;uint8_t&gt;
* Transpose the PPC_ABI check from Makefile to gyp

Update to NSS 3.93:

* Update zlib in NSS to 1.3.
* softoken: iterate hashUpdate calls for long inputs.
* regenerate NameConstraints test certificates (bsc#1214980).

Update to NSS 3.92:

* Set nssckbi version number to 2.62
* Add 4 Atos TrustedRoot Root CA certificates to NSS
* Add 4 SSL.com Root CA certificates
* Add Sectigo E46 and R46 Root CA certificates
* Add LAWtrust Root CA2 (4096)
* Remove E-Tugra Certification Authority root
* Remove Camerfirma Chambers of Commerce Root.
* Remove Hongkong Post Root CA 1
* Remove E-Tugra Global Root CA ECC v3 and RSA v3
* Avoid redefining BYTE_ORDER on hppa Linux

Update to NSS 3.91:

* Implementation of the HW support check for ADX instruction
* Removing the support of Curve25519
* Fix comment about the addition of ticketSupportsEarlyData
* Adding args to enable-legacy-db build
* dbtests.sh failure in 'certutil dump keys with explicit default trust flags'
* Initialize flags in slot structures
* Improve the length check of RSA input to avoid heap overflow
* Followup Fixes
* avoid processing unexpected inputs by checking for m_exptmod base sign
* add a limit check on order_k to avoid infinite loop
* Update HACL* to commit 5f6051d2
* add SHA3 to cryptohi and softoken
* HACL SHA3
* Disabling ASM C25519 for A but X86_64

Update to NSS 3.90.3:

* GLOBALTRUST 2020: Set Distrust After for TLS and S/MIME.
* clean up escape handling.
* remove redundant AllocItem implementation.
* Disable ASM support for Curve25519.
* Disable ASM support for Curve25519 for all but X86_64. 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214980">SUSE bug 1214980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222804">SUSE bug 1222804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222807">SUSE bug 1222807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222811">SUSE bug 1222811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222813">SUSE bug 1222813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222814">SUSE bug 1222814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222821">SUSE bug 1222821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222822">SUSE bug 1222822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222826">SUSE bug 1222826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222828">SUSE bug 1222828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222830">SUSE bug 1222830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222833">SUSE bug 1222833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222834">SUSE bug 1222834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223724">SUSE bug 1223724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224113">SUSE bug 1224113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224115">SUSE bug 1224115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224116">SUSE bug 1224116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224118">SUSE bug 1224118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227918">SUSE bug 1227918</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877772" comment="libfreebl3-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877773" comment="libsoftokn3-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877774" comment="mozilla-nss-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877775" comment="mozilla-nss-certs-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877776" comment="mozilla-nss-tools-3.101.2-150400.3.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206189" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1228770" ref_url="https://bugzilla.suse.com/1228770" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4235" ref_url="https://www.suse.com/security/cve/CVE-2013-4235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019128.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- Fixed not copying of skel files (bsc#1228770)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-07"/>
	<updated date="2024-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228770">SUSE bug 1228770</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-4235/">CVE-2013-4235 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878522" comment="login_defs-4.8.1-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878523" comment="shadow-4.8.1-150400.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206190" version="1" class="patch">
	<metadata>
		<title>Security update for ca-certificates-mozilla (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1220356" ref_url="https://bugzilla.suse.com/1220356" source="BUGZILLA"/>
		<reference ref_id="1227525" ref_url="https://bugzilla.suse.com/1227525" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019164.html" source="SUSE-SU"/>
		<description>
This update for ca-certificates-mozilla fixes the following issues:

- Updated to 2.68 state of Mozilla SSL root CAs (bsc#1227525)
  - Added: FIRMAPROFESIONAL CA ROOT-A WEB
  - Distrust: GLOBALTRUST 2020

- Updated to 2.66 state of Mozilla SSL root CAs (bsc#1220356)
  Added:
  - CommScope Public Trust ECC Root-01
  - CommScope Public Trust ECC Root-02
  - CommScope Public Trust RSA Root-01
  - CommScope Public Trust RSA Root-02
  - D-Trust SBR Root CA 1 2022
  - D-Trust SBR Root CA 2 2022
  - Telekom Security SMIME ECC Root 2021
  - Telekom Security SMIME RSA Root 2023
  - Telekom Security TLS ECC Root 2020
  - Telekom Security TLS RSA Root 2023
  - TrustAsia Global Root CA G3
  - TrustAsia Global Root CA G4
  Removed:
  - Autoridad de Certificacion Firmaprofesional CIF A62634068
  - Chambers of Commerce Root - 2008
  - Global Chambersign Root - 2008
  - Security Communication Root CA
  - Symantec Class 1 Public Primary Certification Authority - G6
  - Symantec Class 2 Public Primary Certification Authority - G6
  - TrustCor ECA-1
  - TrustCor RootCert CA-1
  - TrustCor RootCert CA-2
  - VeriSign Class 1 Public Primary Certification Authority - G3
  - VeriSign Class 2 Public Primary Certification Authority - G3
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220356">SUSE bug 1220356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227525">SUSE bug 1227525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878674" comment="ca-certificates-mozilla-2.68-150200.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206191" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1190336" ref_url="https://bugzilla.suse.com/1190336" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1193454" ref_url="https://bugzilla.suse.com/1193454" source="BUGZILLA"/>
		<reference ref_id="1193554" ref_url="https://bugzilla.suse.com/1193554" source="BUGZILLA"/>
		<reference ref_id="1193787" ref_url="https://bugzilla.suse.com/1193787" source="BUGZILLA"/>
		<reference ref_id="1193883" ref_url="https://bugzilla.suse.com/1193883" source="BUGZILLA"/>
		<reference ref_id="1194324" ref_url="https://bugzilla.suse.com/1194324" source="BUGZILLA"/>
		<reference ref_id="1194826" ref_url="https://bugzilla.suse.com/1194826" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195341" ref_url="https://bugzilla.suse.com/1195341" source="BUGZILLA"/>
		<reference ref_id="1195349" ref_url="https://bugzilla.suse.com/1195349" source="BUGZILLA"/>
		<reference ref_id="1195357" ref_url="https://bugzilla.suse.com/1195357" source="BUGZILLA"/>
		<reference ref_id="1195668" ref_url="https://bugzilla.suse.com/1195668" source="BUGZILLA"/>
		<reference ref_id="1195927" ref_url="https://bugzilla.suse.com/1195927" source="BUGZILLA"/>
		<reference ref_id="1195957" ref_url="https://bugzilla.suse.com/1195957" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196746" ref_url="https://bugzilla.suse.com/1196746" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1197146" ref_url="https://bugzilla.suse.com/1197146" source="BUGZILLA"/>
		<reference ref_id="1197246" ref_url="https://bugzilla.suse.com/1197246" source="BUGZILLA"/>
		<reference ref_id="1197762" ref_url="https://bugzilla.suse.com/1197762" source="BUGZILLA"/>
		<reference ref_id="1197915" ref_url="https://bugzilla.suse.com/1197915" source="BUGZILLA"/>
		<reference ref_id="1198014" ref_url="https://bugzilla.suse.com/1198014" source="BUGZILLA"/>
		<reference ref_id="1199295" ref_url="https://bugzilla.suse.com/1199295" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1202686" ref_url="https://bugzilla.suse.com/1202686" source="BUGZILLA"/>
		<reference ref_id="1202767" ref_url="https://bugzilla.suse.com/1202767" source="BUGZILLA"/>
		<reference ref_id="1202780" ref_url="https://bugzilla.suse.com/1202780" source="BUGZILLA"/>
		<reference ref_id="1209636" ref_url="https://bugzilla.suse.com/1209636" source="BUGZILLA"/>
		<reference ref_id="1213123" ref_url="https://bugzilla.suse.com/1213123" source="BUGZILLA"/>
		<reference ref_id="1215587" ref_url="https://bugzilla.suse.com/1215587" source="BUGZILLA"/>
		<reference ref_id="1216834" ref_url="https://bugzilla.suse.com/1216834" source="BUGZILLA"/>
		<reference ref_id="1218820" ref_url="https://bugzilla.suse.com/1218820" source="BUGZILLA"/>
		<reference ref_id="1220185" ref_url="https://bugzilla.suse.com/1220185" source="BUGZILLA"/>
		<reference ref_id="1220186" ref_url="https://bugzilla.suse.com/1220186" source="BUGZILLA"/>
		<reference ref_id="1222728" ref_url="https://bugzilla.suse.com/1222728" source="BUGZILLA"/>
		<reference ref_id="1222809" ref_url="https://bugzilla.suse.com/1222809" source="BUGZILLA"/>
		<reference ref_id="1222810" ref_url="https://bugzilla.suse.com/1222810" source="BUGZILLA"/>
		<reference ref_id="1223635" ref_url="https://bugzilla.suse.com/1223635" source="BUGZILLA"/>
		<reference ref_id="1223863" ref_url="https://bugzilla.suse.com/1223863" source="BUGZILLA"/>
		<reference ref_id="1224495" ref_url="https://bugzilla.suse.com/1224495" source="BUGZILLA"/>
		<reference ref_id="1224671" ref_url="https://bugzilla.suse.com/1224671" source="BUGZILLA"/>
		<reference ref_id="1225573" ref_url="https://bugzilla.suse.com/1225573" source="BUGZILLA"/>
		<reference ref_id="1226168" ref_url="https://bugzilla.suse.com/1226168" source="BUGZILLA"/>
		<reference ref_id="1226226" ref_url="https://bugzilla.suse.com/1226226" source="BUGZILLA"/>
		<reference ref_id="1226519" ref_url="https://bugzilla.suse.com/1226519" source="BUGZILLA"/>
		<reference ref_id="1226537" ref_url="https://bugzilla.suse.com/1226537" source="BUGZILLA"/>
		<reference ref_id="1226539" ref_url="https://bugzilla.suse.com/1226539" source="BUGZILLA"/>
		<reference ref_id="1226550" ref_url="https://bugzilla.suse.com/1226550" source="BUGZILLA"/>
		<reference ref_id="1226553" ref_url="https://bugzilla.suse.com/1226553" source="BUGZILLA"/>
		<reference ref_id="1226554" ref_url="https://bugzilla.suse.com/1226554" source="BUGZILLA"/>
		<reference ref_id="1226556" ref_url="https://bugzilla.suse.com/1226556" source="BUGZILLA"/>
		<reference ref_id="1226557" ref_url="https://bugzilla.suse.com/1226557" source="BUGZILLA"/>
		<reference ref_id="1226558" ref_url="https://bugzilla.suse.com/1226558" source="BUGZILLA"/>
		<reference ref_id="1226559" ref_url="https://bugzilla.suse.com/1226559" source="BUGZILLA"/>
		<reference ref_id="1226561" ref_url="https://bugzilla.suse.com/1226561" source="BUGZILLA"/>
		<reference ref_id="1226562" ref_url="https://bugzilla.suse.com/1226562" source="BUGZILLA"/>
		<reference ref_id="1226563" ref_url="https://bugzilla.suse.com/1226563" source="BUGZILLA"/>
		<reference ref_id="1226564" ref_url="https://bugzilla.suse.com/1226564" source="BUGZILLA"/>
		<reference ref_id="1226567" ref_url="https://bugzilla.suse.com/1226567" source="BUGZILLA"/>
		<reference ref_id="1226569" ref_url="https://bugzilla.suse.com/1226569" source="BUGZILLA"/>
		<reference ref_id="1226572" ref_url="https://bugzilla.suse.com/1226572" source="BUGZILLA"/>
		<reference ref_id="1226574" ref_url="https://bugzilla.suse.com/1226574" source="BUGZILLA"/>
		<reference ref_id="1226575" ref_url="https://bugzilla.suse.com/1226575" source="BUGZILLA"/>
		<reference ref_id="1226576" ref_url="https://bugzilla.suse.com/1226576" source="BUGZILLA"/>
		<reference ref_id="1226577" ref_url="https://bugzilla.suse.com/1226577" source="BUGZILLA"/>
		<reference ref_id="1226580" ref_url="https://bugzilla.suse.com/1226580" source="BUGZILLA"/>
		<reference ref_id="1226583" ref_url="https://bugzilla.suse.com/1226583" source="BUGZILLA"/>
		<reference ref_id="1226585" ref_url="https://bugzilla.suse.com/1226585" source="BUGZILLA"/>
		<reference ref_id="1226587" ref_url="https://bugzilla.suse.com/1226587" source="BUGZILLA"/>
		<reference ref_id="1226601" ref_url="https://bugzilla.suse.com/1226601" source="BUGZILLA"/>
		<reference ref_id="1226602" ref_url="https://bugzilla.suse.com/1226602" source="BUGZILLA"/>
		<reference ref_id="1226603" ref_url="https://bugzilla.suse.com/1226603" source="BUGZILLA"/>
		<reference ref_id="1226607" ref_url="https://bugzilla.suse.com/1226607" source="BUGZILLA"/>
		<reference ref_id="1226614" ref_url="https://bugzilla.suse.com/1226614" source="BUGZILLA"/>
		<reference ref_id="1226617" ref_url="https://bugzilla.suse.com/1226617" source="BUGZILLA"/>
		<reference ref_id="1226618" ref_url="https://bugzilla.suse.com/1226618" source="BUGZILLA"/>
		<reference ref_id="1226619" ref_url="https://bugzilla.suse.com/1226619" source="BUGZILLA"/>
		<reference ref_id="1226621" ref_url="https://bugzilla.suse.com/1226621" source="BUGZILLA"/>
		<reference ref_id="1226624" ref_url="https://bugzilla.suse.com/1226624" source="BUGZILLA"/>
		<reference ref_id="1226626" ref_url="https://bugzilla.suse.com/1226626" source="BUGZILLA"/>
		<reference ref_id="1226628" ref_url="https://bugzilla.suse.com/1226628" source="BUGZILLA"/>
		<reference ref_id="1226629" ref_url="https://bugzilla.suse.com/1226629" source="BUGZILLA"/>
		<reference ref_id="1226643" ref_url="https://bugzilla.suse.com/1226643" source="BUGZILLA"/>
		<reference ref_id="1226644" ref_url="https://bugzilla.suse.com/1226644" source="BUGZILLA"/>
		<reference ref_id="1226645" ref_url="https://bugzilla.suse.com/1226645" source="BUGZILLA"/>
		<reference ref_id="1226650" ref_url="https://bugzilla.suse.com/1226650" source="BUGZILLA"/>
		<reference ref_id="1226653" ref_url="https://bugzilla.suse.com/1226653" source="BUGZILLA"/>
		<reference ref_id="1226662" ref_url="https://bugzilla.suse.com/1226662" source="BUGZILLA"/>
		<reference ref_id="1226669" ref_url="https://bugzilla.suse.com/1226669" source="BUGZILLA"/>
		<reference ref_id="1226670" ref_url="https://bugzilla.suse.com/1226670" source="BUGZILLA"/>
		<reference ref_id="1226672" ref_url="https://bugzilla.suse.com/1226672" source="BUGZILLA"/>
		<reference ref_id="1226673" ref_url="https://bugzilla.suse.com/1226673" source="BUGZILLA"/>
		<reference ref_id="1226674" ref_url="https://bugzilla.suse.com/1226674" source="BUGZILLA"/>
		<reference ref_id="1226675" ref_url="https://bugzilla.suse.com/1226675" source="BUGZILLA"/>
		<reference ref_id="1226679" ref_url="https://bugzilla.suse.com/1226679" source="BUGZILLA"/>
		<reference ref_id="1226683" ref_url="https://bugzilla.suse.com/1226683" source="BUGZILLA"/>
		<reference ref_id="1226685" ref_url="https://bugzilla.suse.com/1226685" source="BUGZILLA"/>
		<reference ref_id="1226686" ref_url="https://bugzilla.suse.com/1226686" source="BUGZILLA"/>
		<reference ref_id="1226690" ref_url="https://bugzilla.suse.com/1226690" source="BUGZILLA"/>
		<reference ref_id="1226691" ref_url="https://bugzilla.suse.com/1226691" source="BUGZILLA"/>
		<reference ref_id="1226692" ref_url="https://bugzilla.suse.com/1226692" source="BUGZILLA"/>
		<reference ref_id="1226696" ref_url="https://bugzilla.suse.com/1226696" source="BUGZILLA"/>
		<reference ref_id="1226697" ref_url="https://bugzilla.suse.com/1226697" source="BUGZILLA"/>
		<reference ref_id="1226698" ref_url="https://bugzilla.suse.com/1226698" source="BUGZILLA"/>
		<reference ref_id="1226699" ref_url="https://bugzilla.suse.com/1226699" source="BUGZILLA"/>
		<reference ref_id="1226701" ref_url="https://bugzilla.suse.com/1226701" source="BUGZILLA"/>
		<reference ref_id="1226702" ref_url="https://bugzilla.suse.com/1226702" source="BUGZILLA"/>
		<reference ref_id="1226703" ref_url="https://bugzilla.suse.com/1226703" source="BUGZILLA"/>
		<reference ref_id="1226705" ref_url="https://bugzilla.suse.com/1226705" source="BUGZILLA"/>
		<reference ref_id="1226708" ref_url="https://bugzilla.suse.com/1226708" source="BUGZILLA"/>
		<reference ref_id="1226709" ref_url="https://bugzilla.suse.com/1226709" source="BUGZILLA"/>
		<reference ref_id="1226710" ref_url="https://bugzilla.suse.com/1226710" source="BUGZILLA"/>
		<reference ref_id="1226711" ref_url="https://bugzilla.suse.com/1226711" source="BUGZILLA"/>
		<reference ref_id="1226712" ref_url="https://bugzilla.suse.com/1226712" source="BUGZILLA"/>
		<reference ref_id="1226713" ref_url="https://bugzilla.suse.com/1226713" source="BUGZILLA"/>
		<reference ref_id="1226715" ref_url="https://bugzilla.suse.com/1226715" source="BUGZILLA"/>
		<reference ref_id="1226716" ref_url="https://bugzilla.suse.com/1226716" source="BUGZILLA"/>
		<reference ref_id="1226719" ref_url="https://bugzilla.suse.com/1226719" source="BUGZILLA"/>
		<reference ref_id="1226720" ref_url="https://bugzilla.suse.com/1226720" source="BUGZILLA"/>
		<reference ref_id="1226721" ref_url="https://bugzilla.suse.com/1226721" source="BUGZILLA"/>
		<reference ref_id="1226732" ref_url="https://bugzilla.suse.com/1226732" source="BUGZILLA"/>
		<reference ref_id="1226762" ref_url="https://bugzilla.suse.com/1226762" source="BUGZILLA"/>
		<reference ref_id="1227090" ref_url="https://bugzilla.suse.com/1227090" source="BUGZILLA"/>
		<reference ref_id="1227383" ref_url="https://bugzilla.suse.com/1227383" source="BUGZILLA"/>
		<reference ref_id="1227487" ref_url="https://bugzilla.suse.com/1227487" source="BUGZILLA"/>
		<reference ref_id="1227549" ref_url="https://bugzilla.suse.com/1227549" source="BUGZILLA"/>
		<reference ref_id="1227716" ref_url="https://bugzilla.suse.com/1227716" source="BUGZILLA"/>
		<reference ref_id="1227750" ref_url="https://bugzilla.suse.com/1227750" source="BUGZILLA"/>
		<reference ref_id="1227764" ref_url="https://bugzilla.suse.com/1227764" source="BUGZILLA"/>
		<reference ref_id="1227808" ref_url="https://bugzilla.suse.com/1227808" source="BUGZILLA"/>
		<reference ref_id="1227810" ref_url="https://bugzilla.suse.com/1227810" source="BUGZILLA"/>
		<reference ref_id="1227823" ref_url="https://bugzilla.suse.com/1227823" source="BUGZILLA"/>
		<reference ref_id="1227829" ref_url="https://bugzilla.suse.com/1227829" source="BUGZILLA"/>
		<reference ref_id="1227836" ref_url="https://bugzilla.suse.com/1227836" source="BUGZILLA"/>
		<reference ref_id="1227917" ref_url="https://bugzilla.suse.com/1227917" source="BUGZILLA"/>
		<reference ref_id="1227920" ref_url="https://bugzilla.suse.com/1227920" source="BUGZILLA"/>
		<reference ref_id="1227921" ref_url="https://bugzilla.suse.com/1227921" source="BUGZILLA"/>
		<reference ref_id="1227922" ref_url="https://bugzilla.suse.com/1227922" source="BUGZILLA"/>
		<reference ref_id="1227923" ref_url="https://bugzilla.suse.com/1227923" source="BUGZILLA"/>
		<reference ref_id="1227924" ref_url="https://bugzilla.suse.com/1227924" source="BUGZILLA"/>
		<reference ref_id="1227925" ref_url="https://bugzilla.suse.com/1227925" source="BUGZILLA"/>
		<reference ref_id="1227928" ref_url="https://bugzilla.suse.com/1227928" source="BUGZILLA"/>
		<reference ref_id="1227931" ref_url="https://bugzilla.suse.com/1227931" source="BUGZILLA"/>
		<reference ref_id="1227932" ref_url="https://bugzilla.suse.com/1227932" source="BUGZILLA"/>
		<reference ref_id="1227933" ref_url="https://bugzilla.suse.com/1227933" source="BUGZILLA"/>
		<reference ref_id="1227935" ref_url="https://bugzilla.suse.com/1227935" source="BUGZILLA"/>
		<reference ref_id="1227938" ref_url="https://bugzilla.suse.com/1227938" source="BUGZILLA"/>
		<reference ref_id="1227941" ref_url="https://bugzilla.suse.com/1227941" source="BUGZILLA"/>
		<reference ref_id="1227942" ref_url="https://bugzilla.suse.com/1227942" source="BUGZILLA"/>
		<reference ref_id="1227944" ref_url="https://bugzilla.suse.com/1227944" source="BUGZILLA"/>
		<reference ref_id="1227945" ref_url="https://bugzilla.suse.com/1227945" source="BUGZILLA"/>
		<reference ref_id="1227948" ref_url="https://bugzilla.suse.com/1227948" source="BUGZILLA"/>
		<reference ref_id="1227949" ref_url="https://bugzilla.suse.com/1227949" source="BUGZILLA"/>
		<reference ref_id="1227952" ref_url="https://bugzilla.suse.com/1227952" source="BUGZILLA"/>
		<reference ref_id="1227953" ref_url="https://bugzilla.suse.com/1227953" source="BUGZILLA"/>
		<reference ref_id="1227954" ref_url="https://bugzilla.suse.com/1227954" source="BUGZILLA"/>
		<reference ref_id="1227956" ref_url="https://bugzilla.suse.com/1227956" source="BUGZILLA"/>
		<reference ref_id="1227963" ref_url="https://bugzilla.suse.com/1227963" source="BUGZILLA"/>
		<reference ref_id="1227964" ref_url="https://bugzilla.suse.com/1227964" source="BUGZILLA"/>
		<reference ref_id="1227965" ref_url="https://bugzilla.suse.com/1227965" source="BUGZILLA"/>
		<reference ref_id="1227968" ref_url="https://bugzilla.suse.com/1227968" source="BUGZILLA"/>
		<reference ref_id="1227969" ref_url="https://bugzilla.suse.com/1227969" source="BUGZILLA"/>
		<reference ref_id="1227970" ref_url="https://bugzilla.suse.com/1227970" source="BUGZILLA"/>
		<reference ref_id="1227971" ref_url="https://bugzilla.suse.com/1227971" source="BUGZILLA"/>
		<reference ref_id="1227972" ref_url="https://bugzilla.suse.com/1227972" source="BUGZILLA"/>
		<reference ref_id="1227975" ref_url="https://bugzilla.suse.com/1227975" source="BUGZILLA"/>
		<reference ref_id="1227976" ref_url="https://bugzilla.suse.com/1227976" source="BUGZILLA"/>
		<reference ref_id="1227981" ref_url="https://bugzilla.suse.com/1227981" source="BUGZILLA"/>
		<reference ref_id="1227982" ref_url="https://bugzilla.suse.com/1227982" source="BUGZILLA"/>
		<reference ref_id="1227985" ref_url="https://bugzilla.suse.com/1227985" source="BUGZILLA"/>
		<reference ref_id="1227986" ref_url="https://bugzilla.suse.com/1227986" source="BUGZILLA"/>
		<reference ref_id="1227987" ref_url="https://bugzilla.suse.com/1227987" source="BUGZILLA"/>
		<reference ref_id="1227988" ref_url="https://bugzilla.suse.com/1227988" source="BUGZILLA"/>
		<reference ref_id="1227989" ref_url="https://bugzilla.suse.com/1227989" source="BUGZILLA"/>
		<reference ref_id="1227990" ref_url="https://bugzilla.suse.com/1227990" source="BUGZILLA"/>
		<reference ref_id="1227991" ref_url="https://bugzilla.suse.com/1227991" source="BUGZILLA"/>
		<reference ref_id="1227993" ref_url="https://bugzilla.suse.com/1227993" source="BUGZILLA"/>
		<reference ref_id="1227995" ref_url="https://bugzilla.suse.com/1227995" source="BUGZILLA"/>
		<reference ref_id="1227996" ref_url="https://bugzilla.suse.com/1227996" source="BUGZILLA"/>
		<reference ref_id="1227997" ref_url="https://bugzilla.suse.com/1227997" source="BUGZILLA"/>
		<reference ref_id="1228000" ref_url="https://bugzilla.suse.com/1228000" source="BUGZILLA"/>
		<reference ref_id="1228002" ref_url="https://bugzilla.suse.com/1228002" source="BUGZILLA"/>
		<reference ref_id="1228004" ref_url="https://bugzilla.suse.com/1228004" source="BUGZILLA"/>
		<reference ref_id="1228005" ref_url="https://bugzilla.suse.com/1228005" source="BUGZILLA"/>
		<reference ref_id="1228006" ref_url="https://bugzilla.suse.com/1228006" source="BUGZILLA"/>
		<reference ref_id="1228007" ref_url="https://bugzilla.suse.com/1228007" source="BUGZILLA"/>
		<reference ref_id="1228008" ref_url="https://bugzilla.suse.com/1228008" source="BUGZILLA"/>
		<reference ref_id="1228009" ref_url="https://bugzilla.suse.com/1228009" source="BUGZILLA"/>
		<reference ref_id="1228010" ref_url="https://bugzilla.suse.com/1228010" source="BUGZILLA"/>
		<reference ref_id="1228013" ref_url="https://bugzilla.suse.com/1228013" source="BUGZILLA"/>
		<reference ref_id="1228014" ref_url="https://bugzilla.suse.com/1228014" source="BUGZILLA"/>
		<reference ref_id="1228015" ref_url="https://bugzilla.suse.com/1228015" source="BUGZILLA"/>
		<reference ref_id="1228019" ref_url="https://bugzilla.suse.com/1228019" source="BUGZILLA"/>
		<reference ref_id="1228025" ref_url="https://bugzilla.suse.com/1228025" source="BUGZILLA"/>
		<reference ref_id="1228028" ref_url="https://bugzilla.suse.com/1228028" source="BUGZILLA"/>
		<reference ref_id="1228035" ref_url="https://bugzilla.suse.com/1228035" source="BUGZILLA"/>
		<reference ref_id="1228037" ref_url="https://bugzilla.suse.com/1228037" source="BUGZILLA"/>
		<reference ref_id="1228038" ref_url="https://bugzilla.suse.com/1228038" source="BUGZILLA"/>
		<reference ref_id="1228039" ref_url="https://bugzilla.suse.com/1228039" source="BUGZILLA"/>
		<reference ref_id="1228040" ref_url="https://bugzilla.suse.com/1228040" source="BUGZILLA"/>
		<reference ref_id="1228045" ref_url="https://bugzilla.suse.com/1228045" source="BUGZILLA"/>
		<reference ref_id="1228054" ref_url="https://bugzilla.suse.com/1228054" source="BUGZILLA"/>
		<reference ref_id="1228055" ref_url="https://bugzilla.suse.com/1228055" source="BUGZILLA"/>
		<reference ref_id="1228056" ref_url="https://bugzilla.suse.com/1228056" source="BUGZILLA"/>
		<reference ref_id="1228060" ref_url="https://bugzilla.suse.com/1228060" source="BUGZILLA"/>
		<reference ref_id="1228061" ref_url="https://bugzilla.suse.com/1228061" source="BUGZILLA"/>
		<reference ref_id="1228062" ref_url="https://bugzilla.suse.com/1228062" source="BUGZILLA"/>
		<reference ref_id="1228063" ref_url="https://bugzilla.suse.com/1228063" source="BUGZILLA"/>
		<reference ref_id="1228064" ref_url="https://bugzilla.suse.com/1228064" source="BUGZILLA"/>
		<reference ref_id="1228066" ref_url="https://bugzilla.suse.com/1228066" source="BUGZILLA"/>
		<reference ref_id="1228114" ref_url="https://bugzilla.suse.com/1228114" source="BUGZILLA"/>
		<reference ref_id="1228247" ref_url="https://bugzilla.suse.com/1228247" source="BUGZILLA"/>
		<reference ref_id="1228328" ref_url="https://bugzilla.suse.com/1228328" source="BUGZILLA"/>
		<reference ref_id="1228561" ref_url="https://bugzilla.suse.com/1228561" source="BUGZILLA"/>
		<reference ref_id="1228644" ref_url="https://bugzilla.suse.com/1228644" source="BUGZILLA"/>
		<reference ref_id="1228680" ref_url="https://bugzilla.suse.com/1228680" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="1228801" ref_url="https://bugzilla.suse.com/1228801" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4439" ref_url="https://www.suse.com/security/cve/CVE-2021-4439/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2021-47576" ref_url="https://www.suse.com/security/cve/CVE-2021-47576/" source="CVE"/>
		<reference ref_id="CVE-2021-47578" ref_url="https://www.suse.com/security/cve/CVE-2021-47578/" source="CVE"/>
		<reference ref_id="CVE-2021-47580" ref_url="https://www.suse.com/security/cve/CVE-2021-47580/" source="CVE"/>
		<reference ref_id="CVE-2021-47582" ref_url="https://www.suse.com/security/cve/CVE-2021-47582/" source="CVE"/>
		<reference ref_id="CVE-2021-47583" ref_url="https://www.suse.com/security/cve/CVE-2021-47583/" source="CVE"/>
		<reference ref_id="CVE-2021-47584" ref_url="https://www.suse.com/security/cve/CVE-2021-47584/" source="CVE"/>
		<reference ref_id="CVE-2021-47585" ref_url="https://www.suse.com/security/cve/CVE-2021-47585/" source="CVE"/>
		<reference ref_id="CVE-2021-47586" ref_url="https://www.suse.com/security/cve/CVE-2021-47586/" source="CVE"/>
		<reference ref_id="CVE-2021-47587" ref_url="https://www.suse.com/security/cve/CVE-2021-47587/" source="CVE"/>
		<reference ref_id="CVE-2021-47589" ref_url="https://www.suse.com/security/cve/CVE-2021-47589/" source="CVE"/>
		<reference ref_id="CVE-2021-47592" ref_url="https://www.suse.com/security/cve/CVE-2021-47592/" source="CVE"/>
		<reference ref_id="CVE-2021-47596" ref_url="https://www.suse.com/security/cve/CVE-2021-47596/" source="CVE"/>
		<reference ref_id="CVE-2021-47597" ref_url="https://www.suse.com/security/cve/CVE-2021-47597/" source="CVE"/>
		<reference ref_id="CVE-2021-47598" ref_url="https://www.suse.com/security/cve/CVE-2021-47598/" source="CVE"/>
		<reference ref_id="CVE-2021-47600" ref_url="https://www.suse.com/security/cve/CVE-2021-47600/" source="CVE"/>
		<reference ref_id="CVE-2021-47601" ref_url="https://www.suse.com/security/cve/CVE-2021-47601/" source="CVE"/>
		<reference ref_id="CVE-2021-47602" ref_url="https://www.suse.com/security/cve/CVE-2021-47602/" source="CVE"/>
		<reference ref_id="CVE-2021-47603" ref_url="https://www.suse.com/security/cve/CVE-2021-47603/" source="CVE"/>
		<reference ref_id="CVE-2021-47607" ref_url="https://www.suse.com/security/cve/CVE-2021-47607/" source="CVE"/>
		<reference ref_id="CVE-2021-47608" ref_url="https://www.suse.com/security/cve/CVE-2021-47608/" source="CVE"/>
		<reference ref_id="CVE-2021-47609" ref_url="https://www.suse.com/security/cve/CVE-2021-47609/" source="CVE"/>
		<reference ref_id="CVE-2021-47611" ref_url="https://www.suse.com/security/cve/CVE-2021-47611/" source="CVE"/>
		<reference ref_id="CVE-2021-47612" ref_url="https://www.suse.com/security/cve/CVE-2021-47612/" source="CVE"/>
		<reference ref_id="CVE-2021-47614" ref_url="https://www.suse.com/security/cve/CVE-2021-47614/" source="CVE"/>
		<reference ref_id="CVE-2021-47615" ref_url="https://www.suse.com/security/cve/CVE-2021-47615/" source="CVE"/>
		<reference ref_id="CVE-2021-47616" ref_url="https://www.suse.com/security/cve/CVE-2021-47616/" source="CVE"/>
		<reference ref_id="CVE-2021-47617" ref_url="https://www.suse.com/security/cve/CVE-2021-47617/" source="CVE"/>
		<reference ref_id="CVE-2021-47618" ref_url="https://www.suse.com/security/cve/CVE-2021-47618/" source="CVE"/>
		<reference ref_id="CVE-2021-47619" ref_url="https://www.suse.com/security/cve/CVE-2021-47619/" source="CVE"/>
		<reference ref_id="CVE-2021-47620" ref_url="https://www.suse.com/security/cve/CVE-2021-47620/" source="CVE"/>
		<reference ref_id="CVE-2021-47622" ref_url="https://www.suse.com/security/cve/CVE-2021-47622/" source="CVE"/>
		<reference ref_id="CVE-2021-47624" ref_url="https://www.suse.com/security/cve/CVE-2021-47624/" source="CVE"/>
		<reference ref_id="CVE-2022-48711" ref_url="https://www.suse.com/security/cve/CVE-2022-48711/" source="CVE"/>
		<reference ref_id="CVE-2022-48712" ref_url="https://www.suse.com/security/cve/CVE-2022-48712/" source="CVE"/>
		<reference ref_id="CVE-2022-48713" ref_url="https://www.suse.com/security/cve/CVE-2022-48713/" source="CVE"/>
		<reference ref_id="CVE-2022-48715" ref_url="https://www.suse.com/security/cve/CVE-2022-48715/" source="CVE"/>
		<reference ref_id="CVE-2022-48717" ref_url="https://www.suse.com/security/cve/CVE-2022-48717/" source="CVE"/>
		<reference ref_id="CVE-2022-48720" ref_url="https://www.suse.com/security/cve/CVE-2022-48720/" source="CVE"/>
		<reference ref_id="CVE-2022-48721" ref_url="https://www.suse.com/security/cve/CVE-2022-48721/" source="CVE"/>
		<reference ref_id="CVE-2022-48722" ref_url="https://www.suse.com/security/cve/CVE-2022-48722/" source="CVE"/>
		<reference ref_id="CVE-2022-48723" ref_url="https://www.suse.com/security/cve/CVE-2022-48723/" source="CVE"/>
		<reference ref_id="CVE-2022-48724" ref_url="https://www.suse.com/security/cve/CVE-2022-48724/" source="CVE"/>
		<reference ref_id="CVE-2022-48725" ref_url="https://www.suse.com/security/cve/CVE-2022-48725/" source="CVE"/>
		<reference ref_id="CVE-2022-48726" ref_url="https://www.suse.com/security/cve/CVE-2022-48726/" source="CVE"/>
		<reference ref_id="CVE-2022-48727" ref_url="https://www.suse.com/security/cve/CVE-2022-48727/" source="CVE"/>
		<reference ref_id="CVE-2022-48728" ref_url="https://www.suse.com/security/cve/CVE-2022-48728/" source="CVE"/>
		<reference ref_id="CVE-2022-48729" ref_url="https://www.suse.com/security/cve/CVE-2022-48729/" source="CVE"/>
		<reference ref_id="CVE-2022-48730" ref_url="https://www.suse.com/security/cve/CVE-2022-48730/" source="CVE"/>
		<reference ref_id="CVE-2022-48732" ref_url="https://www.suse.com/security/cve/CVE-2022-48732/" source="CVE"/>
		<reference ref_id="CVE-2022-48734" ref_url="https://www.suse.com/security/cve/CVE-2022-48734/" source="CVE"/>
		<reference ref_id="CVE-2022-48735" ref_url="https://www.suse.com/security/cve/CVE-2022-48735/" source="CVE"/>
		<reference ref_id="CVE-2022-48736" ref_url="https://www.suse.com/security/cve/CVE-2022-48736/" source="CVE"/>
		<reference ref_id="CVE-2022-48737" ref_url="https://www.suse.com/security/cve/CVE-2022-48737/" source="CVE"/>
		<reference ref_id="CVE-2022-48738" ref_url="https://www.suse.com/security/cve/CVE-2022-48738/" source="CVE"/>
		<reference ref_id="CVE-2022-48739" ref_url="https://www.suse.com/security/cve/CVE-2022-48739/" source="CVE"/>
		<reference ref_id="CVE-2022-48740" ref_url="https://www.suse.com/security/cve/CVE-2022-48740/" source="CVE"/>
		<reference ref_id="CVE-2022-48743" ref_url="https://www.suse.com/security/cve/CVE-2022-48743/" source="CVE"/>
		<reference ref_id="CVE-2022-48744" ref_url="https://www.suse.com/security/cve/CVE-2022-48744/" source="CVE"/>
		<reference ref_id="CVE-2022-48745" ref_url="https://www.suse.com/security/cve/CVE-2022-48745/" source="CVE"/>
		<reference ref_id="CVE-2022-48746" ref_url="https://www.suse.com/security/cve/CVE-2022-48746/" source="CVE"/>
		<reference ref_id="CVE-2022-48747" ref_url="https://www.suse.com/security/cve/CVE-2022-48747/" source="CVE"/>
		<reference ref_id="CVE-2022-48749" ref_url="https://www.suse.com/security/cve/CVE-2022-48749/" source="CVE"/>
		<reference ref_id="CVE-2022-48751" ref_url="https://www.suse.com/security/cve/CVE-2022-48751/" source="CVE"/>
		<reference ref_id="CVE-2022-48752" ref_url="https://www.suse.com/security/cve/CVE-2022-48752/" source="CVE"/>
		<reference ref_id="CVE-2022-48754" ref_url="https://www.suse.com/security/cve/CVE-2022-48754/" source="CVE"/>
		<reference ref_id="CVE-2022-48756" ref_url="https://www.suse.com/security/cve/CVE-2022-48756/" source="CVE"/>
		<reference ref_id="CVE-2022-48758" ref_url="https://www.suse.com/security/cve/CVE-2022-48758/" source="CVE"/>
		<reference ref_id="CVE-2022-48759" ref_url="https://www.suse.com/security/cve/CVE-2022-48759/" source="CVE"/>
		<reference ref_id="CVE-2022-48760" ref_url="https://www.suse.com/security/cve/CVE-2022-48760/" source="CVE"/>
		<reference ref_id="CVE-2022-48761" ref_url="https://www.suse.com/security/cve/CVE-2022-48761/" source="CVE"/>
		<reference ref_id="CVE-2022-48763" ref_url="https://www.suse.com/security/cve/CVE-2022-48763/" source="CVE"/>
		<reference ref_id="CVE-2022-48765" ref_url="https://www.suse.com/security/cve/CVE-2022-48765/" source="CVE"/>
		<reference ref_id="CVE-2022-48767" ref_url="https://www.suse.com/security/cve/CVE-2022-48767/" source="CVE"/>
		<reference ref_id="CVE-2022-48768" ref_url="https://www.suse.com/security/cve/CVE-2022-48768/" source="CVE"/>
		<reference ref_id="CVE-2022-48769" ref_url="https://www.suse.com/security/cve/CVE-2022-48769/" source="CVE"/>
		<reference ref_id="CVE-2022-48771" ref_url="https://www.suse.com/security/cve/CVE-2022-48771/" source="CVE"/>
		<reference ref_id="CVE-2022-48773" ref_url="https://www.suse.com/security/cve/CVE-2022-48773/" source="CVE"/>
		<reference ref_id="CVE-2022-48774" ref_url="https://www.suse.com/security/cve/CVE-2022-48774/" source="CVE"/>
		<reference ref_id="CVE-2022-48775" ref_url="https://www.suse.com/security/cve/CVE-2022-48775/" source="CVE"/>
		<reference ref_id="CVE-2022-48776" ref_url="https://www.suse.com/security/cve/CVE-2022-48776/" source="CVE"/>
		<reference ref_id="CVE-2022-48777" ref_url="https://www.suse.com/security/cve/CVE-2022-48777/" source="CVE"/>
		<reference ref_id="CVE-2022-48778" ref_url="https://www.suse.com/security/cve/CVE-2022-48778/" source="CVE"/>
		<reference ref_id="CVE-2022-48780" ref_url="https://www.suse.com/security/cve/CVE-2022-48780/" source="CVE"/>
		<reference ref_id="CVE-2022-48783" ref_url="https://www.suse.com/security/cve/CVE-2022-48783/" source="CVE"/>
		<reference ref_id="CVE-2022-48784" ref_url="https://www.suse.com/security/cve/CVE-2022-48784/" source="CVE"/>
		<reference ref_id="CVE-2022-48786" ref_url="https://www.suse.com/security/cve/CVE-2022-48786/" source="CVE"/>
		<reference ref_id="CVE-2022-48787" ref_url="https://www.suse.com/security/cve/CVE-2022-48787/" source="CVE"/>
		<reference ref_id="CVE-2022-48788" ref_url="https://www.suse.com/security/cve/CVE-2022-48788/" source="CVE"/>
		<reference ref_id="CVE-2022-48789" ref_url="https://www.suse.com/security/cve/CVE-2022-48789/" source="CVE"/>
		<reference ref_id="CVE-2022-48790" ref_url="https://www.suse.com/security/cve/CVE-2022-48790/" source="CVE"/>
		<reference ref_id="CVE-2022-48791" ref_url="https://www.suse.com/security/cve/CVE-2022-48791/" source="CVE"/>
		<reference ref_id="CVE-2022-48792" ref_url="https://www.suse.com/security/cve/CVE-2022-48792/" source="CVE"/>
		<reference ref_id="CVE-2022-48793" ref_url="https://www.suse.com/security/cve/CVE-2022-48793/" source="CVE"/>
		<reference ref_id="CVE-2022-48794" ref_url="https://www.suse.com/security/cve/CVE-2022-48794/" source="CVE"/>
		<reference ref_id="CVE-2022-48796" ref_url="https://www.suse.com/security/cve/CVE-2022-48796/" source="CVE"/>
		<reference ref_id="CVE-2022-48797" ref_url="https://www.suse.com/security/cve/CVE-2022-48797/" source="CVE"/>
		<reference ref_id="CVE-2022-48798" ref_url="https://www.suse.com/security/cve/CVE-2022-48798/" source="CVE"/>
		<reference ref_id="CVE-2022-48799" ref_url="https://www.suse.com/security/cve/CVE-2022-48799/" source="CVE"/>
		<reference ref_id="CVE-2022-48800" ref_url="https://www.suse.com/security/cve/CVE-2022-48800/" source="CVE"/>
		<reference ref_id="CVE-2022-48801" ref_url="https://www.suse.com/security/cve/CVE-2022-48801/" source="CVE"/>
		<reference ref_id="CVE-2022-48802" ref_url="https://www.suse.com/security/cve/CVE-2022-48802/" source="CVE"/>
		<reference ref_id="CVE-2022-48803" ref_url="https://www.suse.com/security/cve/CVE-2022-48803/" source="CVE"/>
		<reference ref_id="CVE-2022-48804" ref_url="https://www.suse.com/security/cve/CVE-2022-48804/" source="CVE"/>
		<reference ref_id="CVE-2022-48805" ref_url="https://www.suse.com/security/cve/CVE-2022-48805/" source="CVE"/>
		<reference ref_id="CVE-2022-48806" ref_url="https://www.suse.com/security/cve/CVE-2022-48806/" source="CVE"/>
		<reference ref_id="CVE-2022-48807" ref_url="https://www.suse.com/security/cve/CVE-2022-48807/" source="CVE"/>
		<reference ref_id="CVE-2022-48811" ref_url="https://www.suse.com/security/cve/CVE-2022-48811/" source="CVE"/>
		<reference ref_id="CVE-2022-48812" ref_url="https://www.suse.com/security/cve/CVE-2022-48812/" source="CVE"/>
		<reference ref_id="CVE-2022-48813" ref_url="https://www.suse.com/security/cve/CVE-2022-48813/" source="CVE"/>
		<reference ref_id="CVE-2022-48814" ref_url="https://www.suse.com/security/cve/CVE-2022-48814/" source="CVE"/>
		<reference ref_id="CVE-2022-48815" ref_url="https://www.suse.com/security/cve/CVE-2022-48815/" source="CVE"/>
		<reference ref_id="CVE-2022-48816" ref_url="https://www.suse.com/security/cve/CVE-2022-48816/" source="CVE"/>
		<reference ref_id="CVE-2022-48817" ref_url="https://www.suse.com/security/cve/CVE-2022-48817/" source="CVE"/>
		<reference ref_id="CVE-2022-48818" ref_url="https://www.suse.com/security/cve/CVE-2022-48818/" source="CVE"/>
		<reference ref_id="CVE-2022-48820" ref_url="https://www.suse.com/security/cve/CVE-2022-48820/" source="CVE"/>
		<reference ref_id="CVE-2022-48821" ref_url="https://www.suse.com/security/cve/CVE-2022-48821/" source="CVE"/>
		<reference ref_id="CVE-2022-48822" ref_url="https://www.suse.com/security/cve/CVE-2022-48822/" source="CVE"/>
		<reference ref_id="CVE-2022-48823" ref_url="https://www.suse.com/security/cve/CVE-2022-48823/" source="CVE"/>
		<reference ref_id="CVE-2022-48824" ref_url="https://www.suse.com/security/cve/CVE-2022-48824/" source="CVE"/>
		<reference ref_id="CVE-2022-48825" ref_url="https://www.suse.com/security/cve/CVE-2022-48825/" source="CVE"/>
		<reference ref_id="CVE-2022-48826" ref_url="https://www.suse.com/security/cve/CVE-2022-48826/" source="CVE"/>
		<reference ref_id="CVE-2022-48827" ref_url="https://www.suse.com/security/cve/CVE-2022-48827/" source="CVE"/>
		<reference ref_id="CVE-2022-48828" ref_url="https://www.suse.com/security/cve/CVE-2022-48828/" source="CVE"/>
		<reference ref_id="CVE-2022-48829" ref_url="https://www.suse.com/security/cve/CVE-2022-48829/" source="CVE"/>
		<reference ref_id="CVE-2022-48830" ref_url="https://www.suse.com/security/cve/CVE-2022-48830/" source="CVE"/>
		<reference ref_id="CVE-2022-48831" ref_url="https://www.suse.com/security/cve/CVE-2022-48831/" source="CVE"/>
		<reference ref_id="CVE-2022-48834" ref_url="https://www.suse.com/security/cve/CVE-2022-48834/" source="CVE"/>
		<reference ref_id="CVE-2022-48835" ref_url="https://www.suse.com/security/cve/CVE-2022-48835/" source="CVE"/>
		<reference ref_id="CVE-2022-48836" ref_url="https://www.suse.com/security/cve/CVE-2022-48836/" source="CVE"/>
		<reference ref_id="CVE-2022-48837" ref_url="https://www.suse.com/security/cve/CVE-2022-48837/" source="CVE"/>
		<reference ref_id="CVE-2022-48838" ref_url="https://www.suse.com/security/cve/CVE-2022-48838/" source="CVE"/>
		<reference ref_id="CVE-2022-48839" ref_url="https://www.suse.com/security/cve/CVE-2022-48839/" source="CVE"/>
		<reference ref_id="CVE-2022-48840" ref_url="https://www.suse.com/security/cve/CVE-2022-48840/" source="CVE"/>
		<reference ref_id="CVE-2022-48841" ref_url="https://www.suse.com/security/cve/CVE-2022-48841/" source="CVE"/>
		<reference ref_id="CVE-2022-48842" ref_url="https://www.suse.com/security/cve/CVE-2022-48842/" source="CVE"/>
		<reference ref_id="CVE-2022-48843" ref_url="https://www.suse.com/security/cve/CVE-2022-48843/" source="CVE"/>
		<reference ref_id="CVE-2022-48847" ref_url="https://www.suse.com/security/cve/CVE-2022-48847/" source="CVE"/>
		<reference ref_id="CVE-2022-48849" ref_url="https://www.suse.com/security/cve/CVE-2022-48849/" source="CVE"/>
		<reference ref_id="CVE-2022-48851" ref_url="https://www.suse.com/security/cve/CVE-2022-48851/" source="CVE"/>
		<reference ref_id="CVE-2022-48853" ref_url="https://www.suse.com/security/cve/CVE-2022-48853/" source="CVE"/>
		<reference ref_id="CVE-2022-48856" ref_url="https://www.suse.com/security/cve/CVE-2022-48856/" source="CVE"/>
		<reference ref_id="CVE-2022-48857" ref_url="https://www.suse.com/security/cve/CVE-2022-48857/" source="CVE"/>
		<reference ref_id="CVE-2022-48858" ref_url="https://www.suse.com/security/cve/CVE-2022-48858/" source="CVE"/>
		<reference ref_id="CVE-2022-48859" ref_url="https://www.suse.com/security/cve/CVE-2022-48859/" source="CVE"/>
		<reference ref_id="CVE-2022-48860" ref_url="https://www.suse.com/security/cve/CVE-2022-48860/" source="CVE"/>
		<reference ref_id="CVE-2022-48861" ref_url="https://www.suse.com/security/cve/CVE-2022-48861/" source="CVE"/>
		<reference ref_id="CVE-2022-48862" ref_url="https://www.suse.com/security/cve/CVE-2022-48862/" source="CVE"/>
		<reference ref_id="CVE-2022-48863" ref_url="https://www.suse.com/security/cve/CVE-2022-48863/" source="CVE"/>
		<reference ref_id="CVE-2022-48866" ref_url="https://www.suse.com/security/cve/CVE-2022-48866/" source="CVE"/>
		<reference ref_id="CVE-2023-52762" ref_url="https://www.suse.com/security/cve/CVE-2023-52762/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52885" ref_url="https://www.suse.com/security/cve/CVE-2023-52885/" source="CVE"/>
		<reference ref_id="CVE-2023-52886" ref_url="https://www.suse.com/security/cve/CVE-2023-52886/" source="CVE"/>
		<reference ref_id="CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583/" source="CVE"/>
		<reference ref_id="CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584/" source="CVE"/>
		<reference ref_id="CVE-2024-26800" ref_url="https://www.suse.com/security/cve/CVE-2024-26800/" source="CVE"/>
		<reference ref_id="CVE-2024-26813" ref_url="https://www.suse.com/security/cve/CVE-2024-26813/" source="CVE"/>
		<reference ref_id="CVE-2024-26814" ref_url="https://www.suse.com/security/cve/CVE-2024-26814/" source="CVE"/>
		<reference ref_id="CVE-2024-26976" ref_url="https://www.suse.com/security/cve/CVE-2024-26976/" source="CVE"/>
		<reference ref_id="CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878/" source="CVE"/>
		<reference ref_id="CVE-2024-35901" ref_url="https://www.suse.com/security/cve/CVE-2024-35901/" source="CVE"/>
		<reference ref_id="CVE-2024-36974" ref_url="https://www.suse.com/security/cve/CVE-2024-36974/" source="CVE"/>
		<reference ref_id="CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555/" source="CVE"/>
		<reference ref_id="CVE-2024-39463" ref_url="https://www.suse.com/security/cve/CVE-2024-39463/" source="CVE"/>
		<reference ref_id="CVE-2024-39494" ref_url="https://www.suse.com/security/cve/CVE-2024-39494/" source="CVE"/>
		<reference ref_id="CVE-2024-40902" ref_url="https://www.suse.com/security/cve/CVE-2024-40902/" source="CVE"/>
		<reference ref_id="CVE-2024-40937" ref_url="https://www.suse.com/security/cve/CVE-2024-40937/" source="CVE"/>
		<reference ref_id="CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954/" source="CVE"/>
		<reference ref_id="CVE-2024-40956" ref_url="https://www.suse.com/security/cve/CVE-2024-40956/" source="CVE"/>
		<reference ref_id="CVE-2024-40989" ref_url="https://www.suse.com/security/cve/CVE-2024-40989/" source="CVE"/>
		<reference ref_id="CVE-2024-40994" ref_url="https://www.suse.com/security/cve/CVE-2024-40994/" source="CVE"/>
		<reference ref_id="CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011/" source="CVE"/>
		<reference ref_id="CVE-2024-41012" ref_url="https://www.suse.com/security/cve/CVE-2024-41012/" source="CVE"/>
		<reference ref_id="CVE-2024-41059" ref_url="https://www.suse.com/security/cve/CVE-2024-41059/" source="CVE"/>
		<reference ref_id="CVE-2024-41069" ref_url="https://www.suse.com/security/cve/CVE-2024-41069/" source="CVE"/>
		<reference ref_id="CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090/" source="CVE"/>
		<reference ref_id="CVE-2024-42093" ref_url="https://www.suse.com/security/cve/CVE-2024-42093/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).
- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2024-40937: gve: Clear napi-&gt;skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-35901: net: mana: Fix Rx DMA datasize and skb_over_panic (bsc#1224495).
- CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).

The following non-security bugs were fixed:

- NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662).
- NFS: Reduce use of uncached readdir (bsc#1226662).
- NFSv4.x: by default serialize open/close operations (bsc#1226226 bsc#1223863).
- X.509: Fix the parser of extended key usage for length (bsc#1218820).
- btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
- cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
- jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
- kABI: rtas: Workaround false positive due to lost definition (bsc#1227487).
- kernel-binary: vdso: Own module_dir
- net/dcb: check for detached device before executing callbacks (bsc#1215587).
- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
- powerpc/rtas: clean up includes (bsc#1227487).
- workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
- workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190336">SUSE bug 1190336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193454">SUSE bug 1193454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193554">SUSE bug 1193554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193787">SUSE bug 1193787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193883">SUSE bug 1193883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194324">SUSE bug 1194324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194826">SUSE bug 1194826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195341">SUSE bug 1195341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195349">SUSE bug 1195349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195357">SUSE bug 1195357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195668">SUSE bug 1195668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195927">SUSE bug 1195927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195957">SUSE bug 1195957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196746">SUSE bug 1196746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197146">SUSE bug 1197146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197246">SUSE bug 1197246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197762">SUSE bug 1197762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197915">SUSE bug 1197915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198014">SUSE bug 1198014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199295">SUSE bug 1199295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202767">SUSE bug 1202767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202780">SUSE bug 1202780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215587">SUSE bug 1215587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216834">SUSE bug 1216834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218820">SUSE bug 1218820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220185">SUSE bug 1220185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220186">SUSE bug 1220186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222728">SUSE bug 1222728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222809">SUSE bug 1222809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222810">SUSE bug 1222810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223635">SUSE bug 1223635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223863">SUSE bug 1223863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224495">SUSE bug 1224495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224671">SUSE bug 1224671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225573">SUSE bug 1225573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226168">SUSE bug 1226168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226226">SUSE bug 1226226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226519">SUSE bug 1226519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226537">SUSE bug 1226537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226539">SUSE bug 1226539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226550">SUSE bug 1226550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226553">SUSE bug 1226553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226554">SUSE bug 1226554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226556">SUSE bug 1226556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226557">SUSE bug 1226557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226558">SUSE bug 1226558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226559">SUSE bug 1226559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226561">SUSE bug 1226561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226562">SUSE bug 1226562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226563">SUSE bug 1226563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226564">SUSE bug 1226564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226567">SUSE bug 1226567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226569">SUSE bug 1226569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226572">SUSE bug 1226572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226574">SUSE bug 1226574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226575">SUSE bug 1226575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226576">SUSE bug 1226576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226577">SUSE bug 1226577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226580">SUSE bug 1226580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226583">SUSE bug 1226583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226585">SUSE bug 1226585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226587">SUSE bug 1226587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226601">SUSE bug 1226601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226602">SUSE bug 1226602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226603">SUSE bug 1226603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226607">SUSE bug 1226607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226614">SUSE bug 1226614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226617">SUSE bug 1226617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226618">SUSE bug 1226618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226619">SUSE bug 1226619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226621">SUSE bug 1226621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226624">SUSE bug 1226624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226626">SUSE bug 1226626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226628">SUSE bug 1226628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226629">SUSE bug 1226629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226643">SUSE bug 1226643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226644">SUSE bug 1226644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226645">SUSE bug 1226645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226650">SUSE bug 1226650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226653">SUSE bug 1226653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226662">SUSE bug 1226662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226669">SUSE bug 1226669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226670">SUSE bug 1226670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226672">SUSE bug 1226672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226673">SUSE bug 1226673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226674">SUSE bug 1226674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226675">SUSE bug 1226675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226679">SUSE bug 1226679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226683">SUSE bug 1226683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226685">SUSE bug 1226685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226686">SUSE bug 1226686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226690">SUSE bug 1226690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226691">SUSE bug 1226691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226692">SUSE bug 1226692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226696">SUSE bug 1226696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226697">SUSE bug 1226697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226698">SUSE bug 1226698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226699">SUSE bug 1226699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226701">SUSE bug 1226701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226702">SUSE bug 1226702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226703">SUSE bug 1226703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226705">SUSE bug 1226705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226708">SUSE bug 1226708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226709">SUSE bug 1226709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226710">SUSE bug 1226710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226711">SUSE bug 1226711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226712">SUSE bug 1226712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226713">SUSE bug 1226713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226715">SUSE bug 1226715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226716">SUSE bug 1226716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226719">SUSE bug 1226719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226720">SUSE bug 1226720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226721">SUSE bug 1226721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226732">SUSE bug 1226732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226762">SUSE bug 1226762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227090">SUSE bug 1227090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227383">SUSE bug 1227383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227487">SUSE bug 1227487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227549">SUSE bug 1227549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227716">SUSE bug 1227716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227750">SUSE bug 1227750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227764">SUSE bug 1227764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227808">SUSE bug 1227808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227810">SUSE bug 1227810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227823">SUSE bug 1227823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227829">SUSE bug 1227829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227836">SUSE bug 1227836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227917">SUSE bug 1227917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227920">SUSE bug 1227920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227921">SUSE bug 1227921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227922">SUSE bug 1227922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227923">SUSE bug 1227923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227924">SUSE bug 1227924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227925">SUSE bug 1227925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227928">SUSE bug 1227928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227931">SUSE bug 1227931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227932">SUSE bug 1227932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227933">SUSE bug 1227933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227935">SUSE bug 1227935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227938">SUSE bug 1227938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227941">SUSE bug 1227941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227942">SUSE bug 1227942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227944">SUSE bug 1227944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227945">SUSE bug 1227945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227948">SUSE bug 1227948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227949">SUSE bug 1227949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227952">SUSE bug 1227952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227953">SUSE bug 1227953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227954">SUSE bug 1227954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227956">SUSE bug 1227956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227963">SUSE bug 1227963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227964">SUSE bug 1227964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227965">SUSE bug 1227965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227968">SUSE bug 1227968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227969">SUSE bug 1227969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227970">SUSE bug 1227970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227971">SUSE bug 1227971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227972">SUSE bug 1227972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227975">SUSE bug 1227975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227976">SUSE bug 1227976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227981">SUSE bug 1227981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227982">SUSE bug 1227982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227985">SUSE bug 1227985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227986">SUSE bug 1227986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227987">SUSE bug 1227987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227988">SUSE bug 1227988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227989">SUSE bug 1227989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227990">SUSE bug 1227990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227991">SUSE bug 1227991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227993">SUSE bug 1227993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227995">SUSE bug 1227995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227996">SUSE bug 1227996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227997">SUSE bug 1227997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228000">SUSE bug 1228000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228002">SUSE bug 1228002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228004">SUSE bug 1228004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228005">SUSE bug 1228005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228006">SUSE bug 1228006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228007">SUSE bug 1228007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228008">SUSE bug 1228008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228009">SUSE bug 1228009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228010">SUSE bug 1228010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228013">SUSE bug 1228013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228014">SUSE bug 1228014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228015">SUSE bug 1228015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228019">SUSE bug 1228019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228025">SUSE bug 1228025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228028">SUSE bug 1228028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228035">SUSE bug 1228035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228037">SUSE bug 1228037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228038">SUSE bug 1228038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228039">SUSE bug 1228039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228040">SUSE bug 1228040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228045">SUSE bug 1228045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228054">SUSE bug 1228054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228055">SUSE bug 1228055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228056">SUSE bug 1228056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228060">SUSE bug 1228060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228061">SUSE bug 1228061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228062">SUSE bug 1228062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228063">SUSE bug 1228063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228064">SUSE bug 1228064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228066">SUSE bug 1228066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228114">SUSE bug 1228114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228247">SUSE bug 1228247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228328">SUSE bug 1228328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228561">SUSE bug 1228561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228644">SUSE bug 1228644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228680">SUSE bug 1228680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228801">SUSE bug 1228801</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4439/">CVE-2021-4439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4439">CVE-2021-4439 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47576/">CVE-2021-47576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47576">CVE-2021-47576 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47578/">CVE-2021-47578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47578">CVE-2021-47578 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47580/">CVE-2021-47580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47580">CVE-2021-47580 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47582/">CVE-2021-47582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47582">CVE-2021-47582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47583/">CVE-2021-47583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47583">CVE-2021-47583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47584/">CVE-2021-47584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47584">CVE-2021-47584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47585/">CVE-2021-47585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47585">CVE-2021-47585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47586/">CVE-2021-47586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47586">CVE-2021-47586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47587/">CVE-2021-47587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47587">CVE-2021-47587 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47589/">CVE-2021-47589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47589">CVE-2021-47589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47592/">CVE-2021-47592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47592">CVE-2021-47592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47596/">CVE-2021-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47596">CVE-2021-47596 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47597/">CVE-2021-47597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47597">CVE-2021-47597 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47598/">CVE-2021-47598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47598">CVE-2021-47598 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47600/">CVE-2021-47600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47600">CVE-2021-47600 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47601/">CVE-2021-47601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47601">CVE-2021-47601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47602/">CVE-2021-47602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47602">CVE-2021-47602 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47603/">CVE-2021-47603 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47603">CVE-2021-47603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47607/">CVE-2021-47607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47607">CVE-2021-47607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47608/">CVE-2021-47608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47608">CVE-2021-47608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47609/">CVE-2021-47609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47609">CVE-2021-47609 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47611/">CVE-2021-47611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47611">CVE-2021-47611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47612/">CVE-2021-47612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47612">CVE-2021-47612 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47614/">CVE-2021-47614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47614">CVE-2021-47614 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47615/">CVE-2021-47615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47615">CVE-2021-47615 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47616/">CVE-2021-47616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47616">CVE-2021-47616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47617/">CVE-2021-47617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47617">CVE-2021-47617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47618/">CVE-2021-47618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47618">CVE-2021-47618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47619/">CVE-2021-47619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47619">CVE-2021-47619 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47620/">CVE-2021-47620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47620">CVE-2021-47620 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47622/">CVE-2021-47622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47622">CVE-2021-47622 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47624/">CVE-2021-47624 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47624">CVE-2021-47624 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48711/">CVE-2022-48711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48711">CVE-2022-48711 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48712/">CVE-2022-48712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48712">CVE-2022-48712 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48713/">CVE-2022-48713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48713">CVE-2022-48713 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48715/">CVE-2022-48715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48715">CVE-2022-48715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48717/">CVE-2022-48717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48717">CVE-2022-48717 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48720/">CVE-2022-48720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48720">CVE-2022-48720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48721/">CVE-2022-48721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48721">CVE-2022-48721 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48722/">CVE-2022-48722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48722">CVE-2022-48722 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48723/">CVE-2022-48723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48723">CVE-2022-48723 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48724/">CVE-2022-48724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48724">CVE-2022-48724 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48725/">CVE-2022-48725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48725">CVE-2022-48725 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48726/">CVE-2022-48726 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48726">CVE-2022-48726 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48727/">CVE-2022-48727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48727">CVE-2022-48727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48728/">CVE-2022-48728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48728">CVE-2022-48728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48729/">CVE-2022-48729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48729">CVE-2022-48729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48730/">CVE-2022-48730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48730">CVE-2022-48730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48732/">CVE-2022-48732 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48732">CVE-2022-48732 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48734/">CVE-2022-48734 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48734">CVE-2022-48734 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48735/">CVE-2022-48735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48735">CVE-2022-48735 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48736/">CVE-2022-48736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48736">CVE-2022-48736 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48737/">CVE-2022-48737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48737">CVE-2022-48737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48738/">CVE-2022-48738 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48738">CVE-2022-48738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48739/">CVE-2022-48739 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48739">CVE-2022-48739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48740/">CVE-2022-48740 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48740">CVE-2022-48740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48743/">CVE-2022-48743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48743">CVE-2022-48743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48744/">CVE-2022-48744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48744">CVE-2022-48744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48745/">CVE-2022-48745 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48745">CVE-2022-48745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48746/">CVE-2022-48746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48746">CVE-2022-48746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48747/">CVE-2022-48747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48747">CVE-2022-48747 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48749/">CVE-2022-48749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48749">CVE-2022-48749 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48751/">CVE-2022-48751 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48751">CVE-2022-48751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48752/">CVE-2022-48752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48752">CVE-2022-48752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48754/">CVE-2022-48754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48754">CVE-2022-48754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48756/">CVE-2022-48756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48756">CVE-2022-48756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48758/">CVE-2022-48758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48758">CVE-2022-48758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48759/">CVE-2022-48759 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48759">CVE-2022-48759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48760/">CVE-2022-48760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48760">CVE-2022-48760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48761/">CVE-2022-48761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48761">CVE-2022-48761 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48763/">CVE-2022-48763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48763">CVE-2022-48763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48765/">CVE-2022-48765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48765">CVE-2022-48765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48767/">CVE-2022-48767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48767">CVE-2022-48767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48768/">CVE-2022-48768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48768">CVE-2022-48768 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48769/">CVE-2022-48769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48769">CVE-2022-48769 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48771/">CVE-2022-48771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48771">CVE-2022-48771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48773/">CVE-2022-48773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48773">CVE-2022-48773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48774/">CVE-2022-48774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48774">CVE-2022-48774 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48775/">CVE-2022-48775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48775">CVE-2022-48775 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48776/">CVE-2022-48776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48776">CVE-2022-48776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48777/">CVE-2022-48777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48777">CVE-2022-48777 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48778/">CVE-2022-48778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48778">CVE-2022-48778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48780/">CVE-2022-48780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48780">CVE-2022-48780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48783/">CVE-2022-48783 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48783">CVE-2022-48783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48784/">CVE-2022-48784 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48784">CVE-2022-48784 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-48786/">CVE-2022-48786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48786">CVE-2022-48786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48787/">CVE-2022-48787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48787">CVE-2022-48787 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48788/">CVE-2022-48788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48788">CVE-2022-48788 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48789/">CVE-2022-48789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48789">CVE-2022-48789 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48790/">CVE-2022-48790 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48790">CVE-2022-48790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48791/">CVE-2022-48791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48791">CVE-2022-48791 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48792/">CVE-2022-48792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48792">CVE-2022-48792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48793/">CVE-2022-48793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48793">CVE-2022-48793 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48794/">CVE-2022-48794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48794">CVE-2022-48794 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48796/">CVE-2022-48796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48796">CVE-2022-48796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48797/">CVE-2022-48797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48797">CVE-2022-48797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48798/">CVE-2022-48798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48798">CVE-2022-48798 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48799/">CVE-2022-48799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48799">CVE-2022-48799 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48800/">CVE-2022-48800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48800">CVE-2022-48800 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48801/">CVE-2022-48801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48801">CVE-2022-48801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48802/">CVE-2022-48802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48802">CVE-2022-48802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48803/">CVE-2022-48803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48803">CVE-2022-48803 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48804/">CVE-2022-48804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48804">CVE-2022-48804 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48805/">CVE-2022-48805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48805">CVE-2022-48805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48806/">CVE-2022-48806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48806">CVE-2022-48806 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48807/">CVE-2022-48807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48807">CVE-2022-48807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48811/">CVE-2022-48811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48811">CVE-2022-48811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48812/">CVE-2022-48812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48812">CVE-2022-48812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48813/">CVE-2022-48813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48813">CVE-2022-48813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48814/">CVE-2022-48814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48814">CVE-2022-48814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48815/">CVE-2022-48815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48815">CVE-2022-48815 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48816/">CVE-2022-48816 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48816">CVE-2022-48816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48817/">CVE-2022-48817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48817">CVE-2022-48817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48818/">CVE-2022-48818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48818">CVE-2022-48818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48820/">CVE-2022-48820 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48820">CVE-2022-48820 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48821/">CVE-2022-48821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48821">CVE-2022-48821 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48822/">CVE-2022-48822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48822">CVE-2022-48822 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48823/">CVE-2022-48823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48823">CVE-2022-48823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48824/">CVE-2022-48824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48824">CVE-2022-48824 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48825/">CVE-2022-48825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48825">CVE-2022-48825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48826/">CVE-2022-48826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48826">CVE-2022-48826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48827/">CVE-2022-48827 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48827">CVE-2022-48827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48828/">CVE-2022-48828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48828">CVE-2022-48828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48829/">CVE-2022-48829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48829">CVE-2022-48829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48830/">CVE-2022-48830 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48830">CVE-2022-48830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48831/">CVE-2022-48831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48831">CVE-2022-48831 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48834/">CVE-2022-48834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48834">CVE-2022-48834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48835/">CVE-2022-48835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48835">CVE-2022-48835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48836/">CVE-2022-48836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48836">CVE-2022-48836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48837/">CVE-2022-48837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48837">CVE-2022-48837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48838/">CVE-2022-48838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48838">CVE-2022-48838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48839/">CVE-2022-48839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48839">CVE-2022-48839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48840/">CVE-2022-48840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48840">CVE-2022-48840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48841/">CVE-2022-48841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48841">CVE-2022-48841 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48842/">CVE-2022-48842 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48842">CVE-2022-48842 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48843/">CVE-2022-48843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48843">CVE-2022-48843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48847/">CVE-2022-48847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48847">CVE-2022-48847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48849/">CVE-2022-48849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48849">CVE-2022-48849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48851/">CVE-2022-48851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48851">CVE-2022-48851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48853/">CVE-2022-48853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48853">CVE-2022-48853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48856/">CVE-2022-48856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48856">CVE-2022-48856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48857/">CVE-2022-48857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48857">CVE-2022-48857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48858/">CVE-2022-48858 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48858">CVE-2022-48858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48859/">CVE-2022-48859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48859">CVE-2022-48859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48860/">CVE-2022-48860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48860">CVE-2022-48860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48861/">CVE-2022-48861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48861">CVE-2022-48861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48862/">CVE-2022-48862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48862">CVE-2022-48862 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48863/">CVE-2022-48863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48863">CVE-2022-48863 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48866/">CVE-2022-48866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48866">CVE-2022-48866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52762/">CVE-2023-52762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52762">CVE-2023-52762 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52885/">CVE-2023-52885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52885">CVE-2023-52885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52886/">CVE-2023-52886 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52886">CVE-2023-52886 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26800/">CVE-2024-26800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26800">CVE-2024-26800 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26813/">CVE-2024-26813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26813">CVE-2024-26813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26814/">CVE-2024-26814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26814">CVE-2024-26814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26976/">CVE-2024-26976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26976">CVE-2024-26976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35901/">CVE-2024-35901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35901">CVE-2024-35901 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36974/">CVE-2024-36974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36974">CVE-2024-36974 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39463/">CVE-2024-39463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39463">CVE-2024-39463 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39494/">CVE-2024-39494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39494">CVE-2024-39494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40902/">CVE-2024-40902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40937/">CVE-2024-40937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40956/">CVE-2024-40956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40989/">CVE-2024-40989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40994/">CVE-2024-40994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41012/">CVE-2024-41012 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41012">CVE-2024-41012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41059/">CVE-2024-41059 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41069/">CVE-2024-41069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42093/">CVE-2024-42093 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879551" comment="kernel-rt-5.14.21-150400.15.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879552" comment="kernel-source-rt-5.14.21-150400.15.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206192" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1226463" ref_url="https://bugzilla.suse.com/1226463" source="BUGZILLA"/>
		<reference ref_id="1227138" ref_url="https://bugzilla.suse.com/1227138" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019203.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

  - CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)

Other fixes:
- Build with no-afalgeng (bsc#1226463)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-15"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226463">SUSE bug 1226463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227138">SUSE bug 1227138</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879792" comment="libopenssl-1_1-devel-1.1.1l-150400.7.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879793" comment="libopenssl1_1-1.1.1l-150400.7.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879794" comment="libopenssl1_1-hmac-1.1.1l-150400.7.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879795" comment="openssl-1_1-1.1.1l-150400.7.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206193" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1190336" ref_url="https://bugzilla.suse.com/1190336" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1193454" ref_url="https://bugzilla.suse.com/1193454" source="BUGZILLA"/>
		<reference ref_id="1193554" ref_url="https://bugzilla.suse.com/1193554" source="BUGZILLA"/>
		<reference ref_id="1193787" ref_url="https://bugzilla.suse.com/1193787" source="BUGZILLA"/>
		<reference ref_id="1193883" ref_url="https://bugzilla.suse.com/1193883" source="BUGZILLA"/>
		<reference ref_id="1194324" ref_url="https://bugzilla.suse.com/1194324" source="BUGZILLA"/>
		<reference ref_id="1194826" ref_url="https://bugzilla.suse.com/1194826" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195341" ref_url="https://bugzilla.suse.com/1195341" source="BUGZILLA"/>
		<reference ref_id="1195349" ref_url="https://bugzilla.suse.com/1195349" source="BUGZILLA"/>
		<reference ref_id="1195357" ref_url="https://bugzilla.suse.com/1195357" source="BUGZILLA"/>
		<reference ref_id="1195668" ref_url="https://bugzilla.suse.com/1195668" source="BUGZILLA"/>
		<reference ref_id="1195927" ref_url="https://bugzilla.suse.com/1195927" source="BUGZILLA"/>
		<reference ref_id="1195957" ref_url="https://bugzilla.suse.com/1195957" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196746" ref_url="https://bugzilla.suse.com/1196746" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1197146" ref_url="https://bugzilla.suse.com/1197146" source="BUGZILLA"/>
		<reference ref_id="1197246" ref_url="https://bugzilla.suse.com/1197246" source="BUGZILLA"/>
		<reference ref_id="1197762" ref_url="https://bugzilla.suse.com/1197762" source="BUGZILLA"/>
		<reference ref_id="1197915" ref_url="https://bugzilla.suse.com/1197915" source="BUGZILLA"/>
		<reference ref_id="1198014" ref_url="https://bugzilla.suse.com/1198014" source="BUGZILLA"/>
		<reference ref_id="1199295" ref_url="https://bugzilla.suse.com/1199295" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1202686" ref_url="https://bugzilla.suse.com/1202686" source="BUGZILLA"/>
		<reference ref_id="1202767" ref_url="https://bugzilla.suse.com/1202767" source="BUGZILLA"/>
		<reference ref_id="1202780" ref_url="https://bugzilla.suse.com/1202780" source="BUGZILLA"/>
		<reference ref_id="1209636" ref_url="https://bugzilla.suse.com/1209636" source="BUGZILLA"/>
		<reference ref_id="1213123" ref_url="https://bugzilla.suse.com/1213123" source="BUGZILLA"/>
		<reference ref_id="1215587" ref_url="https://bugzilla.suse.com/1215587" source="BUGZILLA"/>
		<reference ref_id="1216834" ref_url="https://bugzilla.suse.com/1216834" source="BUGZILLA"/>
		<reference ref_id="1218820" ref_url="https://bugzilla.suse.com/1218820" source="BUGZILLA"/>
		<reference ref_id="1220185" ref_url="https://bugzilla.suse.com/1220185" source="BUGZILLA"/>
		<reference ref_id="1220186" ref_url="https://bugzilla.suse.com/1220186" source="BUGZILLA"/>
		<reference ref_id="1220187" ref_url="https://bugzilla.suse.com/1220187" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1222011" ref_url="https://bugzilla.suse.com/1222011" source="BUGZILLA"/>
		<reference ref_id="1222728" ref_url="https://bugzilla.suse.com/1222728" source="BUGZILLA"/>
		<reference ref_id="1222809" ref_url="https://bugzilla.suse.com/1222809" source="BUGZILLA"/>
		<reference ref_id="1222810" ref_url="https://bugzilla.suse.com/1222810" source="BUGZILLA"/>
		<reference ref_id="1223635" ref_url="https://bugzilla.suse.com/1223635" source="BUGZILLA"/>
		<reference ref_id="1223863" ref_url="https://bugzilla.suse.com/1223863" source="BUGZILLA"/>
		<reference ref_id="1224488" ref_url="https://bugzilla.suse.com/1224488" source="BUGZILLA"/>
		<reference ref_id="1224495" ref_url="https://bugzilla.suse.com/1224495" source="BUGZILLA"/>
		<reference ref_id="1224671" ref_url="https://bugzilla.suse.com/1224671" source="BUGZILLA"/>
		<reference ref_id="1225573" ref_url="https://bugzilla.suse.com/1225573" source="BUGZILLA"/>
		<reference ref_id="1225829" ref_url="https://bugzilla.suse.com/1225829" source="BUGZILLA"/>
		<reference ref_id="1226168" ref_url="https://bugzilla.suse.com/1226168" source="BUGZILLA"/>
		<reference ref_id="1226226" ref_url="https://bugzilla.suse.com/1226226" source="BUGZILLA"/>
		<reference ref_id="1226519" ref_url="https://bugzilla.suse.com/1226519" source="BUGZILLA"/>
		<reference ref_id="1226537" ref_url="https://bugzilla.suse.com/1226537" source="BUGZILLA"/>
		<reference ref_id="1226539" ref_url="https://bugzilla.suse.com/1226539" source="BUGZILLA"/>
		<reference ref_id="1226550" ref_url="https://bugzilla.suse.com/1226550" source="BUGZILLA"/>
		<reference ref_id="1226553" ref_url="https://bugzilla.suse.com/1226553" source="BUGZILLA"/>
		<reference ref_id="1226554" ref_url="https://bugzilla.suse.com/1226554" source="BUGZILLA"/>
		<reference ref_id="1226556" ref_url="https://bugzilla.suse.com/1226556" source="BUGZILLA"/>
		<reference ref_id="1226557" ref_url="https://bugzilla.suse.com/1226557" source="BUGZILLA"/>
		<reference ref_id="1226558" ref_url="https://bugzilla.suse.com/1226558" source="BUGZILLA"/>
		<reference ref_id="1226559" ref_url="https://bugzilla.suse.com/1226559" source="BUGZILLA"/>
		<reference ref_id="1226561" ref_url="https://bugzilla.suse.com/1226561" source="BUGZILLA"/>
		<reference ref_id="1226562" ref_url="https://bugzilla.suse.com/1226562" source="BUGZILLA"/>
		<reference ref_id="1226563" ref_url="https://bugzilla.suse.com/1226563" source="BUGZILLA"/>
		<reference ref_id="1226564" ref_url="https://bugzilla.suse.com/1226564" source="BUGZILLA"/>
		<reference ref_id="1226567" ref_url="https://bugzilla.suse.com/1226567" source="BUGZILLA"/>
		<reference ref_id="1226569" ref_url="https://bugzilla.suse.com/1226569" source="BUGZILLA"/>
		<reference ref_id="1226572" ref_url="https://bugzilla.suse.com/1226572" source="BUGZILLA"/>
		<reference ref_id="1226574" ref_url="https://bugzilla.suse.com/1226574" source="BUGZILLA"/>
		<reference ref_id="1226575" ref_url="https://bugzilla.suse.com/1226575" source="BUGZILLA"/>
		<reference ref_id="1226576" ref_url="https://bugzilla.suse.com/1226576" source="BUGZILLA"/>
		<reference ref_id="1226577" ref_url="https://bugzilla.suse.com/1226577" source="BUGZILLA"/>
		<reference ref_id="1226580" ref_url="https://bugzilla.suse.com/1226580" source="BUGZILLA"/>
		<reference ref_id="1226583" ref_url="https://bugzilla.suse.com/1226583" source="BUGZILLA"/>
		<reference ref_id="1226585" ref_url="https://bugzilla.suse.com/1226585" source="BUGZILLA"/>
		<reference ref_id="1226587" ref_url="https://bugzilla.suse.com/1226587" source="BUGZILLA"/>
		<reference ref_id="1226601" ref_url="https://bugzilla.suse.com/1226601" source="BUGZILLA"/>
		<reference ref_id="1226602" ref_url="https://bugzilla.suse.com/1226602" source="BUGZILLA"/>
		<reference ref_id="1226603" ref_url="https://bugzilla.suse.com/1226603" source="BUGZILLA"/>
		<reference ref_id="1226607" ref_url="https://bugzilla.suse.com/1226607" source="BUGZILLA"/>
		<reference ref_id="1226614" ref_url="https://bugzilla.suse.com/1226614" source="BUGZILLA"/>
		<reference ref_id="1226617" ref_url="https://bugzilla.suse.com/1226617" source="BUGZILLA"/>
		<reference ref_id="1226618" ref_url="https://bugzilla.suse.com/1226618" source="BUGZILLA"/>
		<reference ref_id="1226619" ref_url="https://bugzilla.suse.com/1226619" source="BUGZILLA"/>
		<reference ref_id="1226621" ref_url="https://bugzilla.suse.com/1226621" source="BUGZILLA"/>
		<reference ref_id="1226624" ref_url="https://bugzilla.suse.com/1226624" source="BUGZILLA"/>
		<reference ref_id="1226626" ref_url="https://bugzilla.suse.com/1226626" source="BUGZILLA"/>
		<reference ref_id="1226628" ref_url="https://bugzilla.suse.com/1226628" source="BUGZILLA"/>
		<reference ref_id="1226629" ref_url="https://bugzilla.suse.com/1226629" source="BUGZILLA"/>
		<reference ref_id="1226643" ref_url="https://bugzilla.suse.com/1226643" source="BUGZILLA"/>
		<reference ref_id="1226644" ref_url="https://bugzilla.suse.com/1226644" source="BUGZILLA"/>
		<reference ref_id="1226645" ref_url="https://bugzilla.suse.com/1226645" source="BUGZILLA"/>
		<reference ref_id="1226650" ref_url="https://bugzilla.suse.com/1226650" source="BUGZILLA"/>
		<reference ref_id="1226653" ref_url="https://bugzilla.suse.com/1226653" source="BUGZILLA"/>
		<reference ref_id="1226662" ref_url="https://bugzilla.suse.com/1226662" source="BUGZILLA"/>
		<reference ref_id="1226669" ref_url="https://bugzilla.suse.com/1226669" source="BUGZILLA"/>
		<reference ref_id="1226670" ref_url="https://bugzilla.suse.com/1226670" source="BUGZILLA"/>
		<reference ref_id="1226672" ref_url="https://bugzilla.suse.com/1226672" source="BUGZILLA"/>
		<reference ref_id="1226673" ref_url="https://bugzilla.suse.com/1226673" source="BUGZILLA"/>
		<reference ref_id="1226674" ref_url="https://bugzilla.suse.com/1226674" source="BUGZILLA"/>
		<reference ref_id="1226675" ref_url="https://bugzilla.suse.com/1226675" source="BUGZILLA"/>
		<reference ref_id="1226679" ref_url="https://bugzilla.suse.com/1226679" source="BUGZILLA"/>
		<reference ref_id="1226683" ref_url="https://bugzilla.suse.com/1226683" source="BUGZILLA"/>
		<reference ref_id="1226685" ref_url="https://bugzilla.suse.com/1226685" source="BUGZILLA"/>
		<reference ref_id="1226686" ref_url="https://bugzilla.suse.com/1226686" source="BUGZILLA"/>
		<reference ref_id="1226690" ref_url="https://bugzilla.suse.com/1226690" source="BUGZILLA"/>
		<reference ref_id="1226691" ref_url="https://bugzilla.suse.com/1226691" source="BUGZILLA"/>
		<reference ref_id="1226692" ref_url="https://bugzilla.suse.com/1226692" source="BUGZILLA"/>
		<reference ref_id="1226696" ref_url="https://bugzilla.suse.com/1226696" source="BUGZILLA"/>
		<reference ref_id="1226697" ref_url="https://bugzilla.suse.com/1226697" source="BUGZILLA"/>
		<reference ref_id="1226698" ref_url="https://bugzilla.suse.com/1226698" source="BUGZILLA"/>
		<reference ref_id="1226699" ref_url="https://bugzilla.suse.com/1226699" source="BUGZILLA"/>
		<reference ref_id="1226701" ref_url="https://bugzilla.suse.com/1226701" source="BUGZILLA"/>
		<reference ref_id="1226702" ref_url="https://bugzilla.suse.com/1226702" source="BUGZILLA"/>
		<reference ref_id="1226703" ref_url="https://bugzilla.suse.com/1226703" source="BUGZILLA"/>
		<reference ref_id="1226705" ref_url="https://bugzilla.suse.com/1226705" source="BUGZILLA"/>
		<reference ref_id="1226708" ref_url="https://bugzilla.suse.com/1226708" source="BUGZILLA"/>
		<reference ref_id="1226709" ref_url="https://bugzilla.suse.com/1226709" source="BUGZILLA"/>
		<reference ref_id="1226710" ref_url="https://bugzilla.suse.com/1226710" source="BUGZILLA"/>
		<reference ref_id="1226711" ref_url="https://bugzilla.suse.com/1226711" source="BUGZILLA"/>
		<reference ref_id="1226712" ref_url="https://bugzilla.suse.com/1226712" source="BUGZILLA"/>
		<reference ref_id="1226713" ref_url="https://bugzilla.suse.com/1226713" source="BUGZILLA"/>
		<reference ref_id="1226715" ref_url="https://bugzilla.suse.com/1226715" source="BUGZILLA"/>
		<reference ref_id="1226716" ref_url="https://bugzilla.suse.com/1226716" source="BUGZILLA"/>
		<reference ref_id="1226719" ref_url="https://bugzilla.suse.com/1226719" source="BUGZILLA"/>
		<reference ref_id="1226720" ref_url="https://bugzilla.suse.com/1226720" source="BUGZILLA"/>
		<reference ref_id="1226721" ref_url="https://bugzilla.suse.com/1226721" source="BUGZILLA"/>
		<reference ref_id="1226732" ref_url="https://bugzilla.suse.com/1226732" source="BUGZILLA"/>
		<reference ref_id="1226758" ref_url="https://bugzilla.suse.com/1226758" source="BUGZILLA"/>
		<reference ref_id="1226762" ref_url="https://bugzilla.suse.com/1226762" source="BUGZILLA"/>
		<reference ref_id="1226785" ref_url="https://bugzilla.suse.com/1226785" source="BUGZILLA"/>
		<reference ref_id="1227090" ref_url="https://bugzilla.suse.com/1227090" source="BUGZILLA"/>
		<reference ref_id="1227383" ref_url="https://bugzilla.suse.com/1227383" source="BUGZILLA"/>
		<reference ref_id="1227487" ref_url="https://bugzilla.suse.com/1227487" source="BUGZILLA"/>
		<reference ref_id="1227549" ref_url="https://bugzilla.suse.com/1227549" source="BUGZILLA"/>
		<reference ref_id="1227716" ref_url="https://bugzilla.suse.com/1227716" source="BUGZILLA"/>
		<reference ref_id="1227750" ref_url="https://bugzilla.suse.com/1227750" source="BUGZILLA"/>
		<reference ref_id="1227764" ref_url="https://bugzilla.suse.com/1227764" source="BUGZILLA"/>
		<reference ref_id="1227808" ref_url="https://bugzilla.suse.com/1227808" source="BUGZILLA"/>
		<reference ref_id="1227810" ref_url="https://bugzilla.suse.com/1227810" source="BUGZILLA"/>
		<reference ref_id="1227823" ref_url="https://bugzilla.suse.com/1227823" source="BUGZILLA"/>
		<reference ref_id="1227829" ref_url="https://bugzilla.suse.com/1227829" source="BUGZILLA"/>
		<reference ref_id="1227836" ref_url="https://bugzilla.suse.com/1227836" source="BUGZILLA"/>
		<reference ref_id="1227917" ref_url="https://bugzilla.suse.com/1227917" source="BUGZILLA"/>
		<reference ref_id="1227920" ref_url="https://bugzilla.suse.com/1227920" source="BUGZILLA"/>
		<reference ref_id="1227921" ref_url="https://bugzilla.suse.com/1227921" source="BUGZILLA"/>
		<reference ref_id="1227922" ref_url="https://bugzilla.suse.com/1227922" source="BUGZILLA"/>
		<reference ref_id="1227923" ref_url="https://bugzilla.suse.com/1227923" source="BUGZILLA"/>
		<reference ref_id="1227924" ref_url="https://bugzilla.suse.com/1227924" source="BUGZILLA"/>
		<reference ref_id="1227925" ref_url="https://bugzilla.suse.com/1227925" source="BUGZILLA"/>
		<reference ref_id="1227928" ref_url="https://bugzilla.suse.com/1227928" source="BUGZILLA"/>
		<reference ref_id="1227931" ref_url="https://bugzilla.suse.com/1227931" source="BUGZILLA"/>
		<reference ref_id="1227932" ref_url="https://bugzilla.suse.com/1227932" source="BUGZILLA"/>
		<reference ref_id="1227933" ref_url="https://bugzilla.suse.com/1227933" source="BUGZILLA"/>
		<reference ref_id="1227935" ref_url="https://bugzilla.suse.com/1227935" source="BUGZILLA"/>
		<reference ref_id="1227938" ref_url="https://bugzilla.suse.com/1227938" source="BUGZILLA"/>
		<reference ref_id="1227941" ref_url="https://bugzilla.suse.com/1227941" source="BUGZILLA"/>
		<reference ref_id="1227942" ref_url="https://bugzilla.suse.com/1227942" source="BUGZILLA"/>
		<reference ref_id="1227944" ref_url="https://bugzilla.suse.com/1227944" source="BUGZILLA"/>
		<reference ref_id="1227945" ref_url="https://bugzilla.suse.com/1227945" source="BUGZILLA"/>
		<reference ref_id="1227948" ref_url="https://bugzilla.suse.com/1227948" source="BUGZILLA"/>
		<reference ref_id="1227949" ref_url="https://bugzilla.suse.com/1227949" source="BUGZILLA"/>
		<reference ref_id="1227952" ref_url="https://bugzilla.suse.com/1227952" source="BUGZILLA"/>
		<reference ref_id="1227953" ref_url="https://bugzilla.suse.com/1227953" source="BUGZILLA"/>
		<reference ref_id="1227954" ref_url="https://bugzilla.suse.com/1227954" source="BUGZILLA"/>
		<reference ref_id="1227956" ref_url="https://bugzilla.suse.com/1227956" source="BUGZILLA"/>
		<reference ref_id="1227963" ref_url="https://bugzilla.suse.com/1227963" source="BUGZILLA"/>
		<reference ref_id="1227964" ref_url="https://bugzilla.suse.com/1227964" source="BUGZILLA"/>
		<reference ref_id="1227965" ref_url="https://bugzilla.suse.com/1227965" source="BUGZILLA"/>
		<reference ref_id="1227968" ref_url="https://bugzilla.suse.com/1227968" source="BUGZILLA"/>
		<reference ref_id="1227969" ref_url="https://bugzilla.suse.com/1227969" source="BUGZILLA"/>
		<reference ref_id="1227970" ref_url="https://bugzilla.suse.com/1227970" source="BUGZILLA"/>
		<reference ref_id="1227971" ref_url="https://bugzilla.suse.com/1227971" source="BUGZILLA"/>
		<reference ref_id="1227972" ref_url="https://bugzilla.suse.com/1227972" source="BUGZILLA"/>
		<reference ref_id="1227975" ref_url="https://bugzilla.suse.com/1227975" source="BUGZILLA"/>
		<reference ref_id="1227976" ref_url="https://bugzilla.suse.com/1227976" source="BUGZILLA"/>
		<reference ref_id="1227981" ref_url="https://bugzilla.suse.com/1227981" source="BUGZILLA"/>
		<reference ref_id="1227982" ref_url="https://bugzilla.suse.com/1227982" source="BUGZILLA"/>
		<reference ref_id="1227985" ref_url="https://bugzilla.suse.com/1227985" source="BUGZILLA"/>
		<reference ref_id="1227986" ref_url="https://bugzilla.suse.com/1227986" source="BUGZILLA"/>
		<reference ref_id="1227987" ref_url="https://bugzilla.suse.com/1227987" source="BUGZILLA"/>
		<reference ref_id="1227988" ref_url="https://bugzilla.suse.com/1227988" source="BUGZILLA"/>
		<reference ref_id="1227989" ref_url="https://bugzilla.suse.com/1227989" source="BUGZILLA"/>
		<reference ref_id="1227990" ref_url="https://bugzilla.suse.com/1227990" source="BUGZILLA"/>
		<reference ref_id="1227991" ref_url="https://bugzilla.suse.com/1227991" source="BUGZILLA"/>
		<reference ref_id="1227993" ref_url="https://bugzilla.suse.com/1227993" source="BUGZILLA"/>
		<reference ref_id="1227995" ref_url="https://bugzilla.suse.com/1227995" source="BUGZILLA"/>
		<reference ref_id="1227996" ref_url="https://bugzilla.suse.com/1227996" source="BUGZILLA"/>
		<reference ref_id="1227997" ref_url="https://bugzilla.suse.com/1227997" source="BUGZILLA"/>
		<reference ref_id="1228000" ref_url="https://bugzilla.suse.com/1228000" source="BUGZILLA"/>
		<reference ref_id="1228002" ref_url="https://bugzilla.suse.com/1228002" source="BUGZILLA"/>
		<reference ref_id="1228004" ref_url="https://bugzilla.suse.com/1228004" source="BUGZILLA"/>
		<reference ref_id="1228005" ref_url="https://bugzilla.suse.com/1228005" source="BUGZILLA"/>
		<reference ref_id="1228006" ref_url="https://bugzilla.suse.com/1228006" source="BUGZILLA"/>
		<reference ref_id="1228007" ref_url="https://bugzilla.suse.com/1228007" source="BUGZILLA"/>
		<reference ref_id="1228008" ref_url="https://bugzilla.suse.com/1228008" source="BUGZILLA"/>
		<reference ref_id="1228009" ref_url="https://bugzilla.suse.com/1228009" source="BUGZILLA"/>
		<reference ref_id="1228010" ref_url="https://bugzilla.suse.com/1228010" source="BUGZILLA"/>
		<reference ref_id="1228013" ref_url="https://bugzilla.suse.com/1228013" source="BUGZILLA"/>
		<reference ref_id="1228014" ref_url="https://bugzilla.suse.com/1228014" source="BUGZILLA"/>
		<reference ref_id="1228015" ref_url="https://bugzilla.suse.com/1228015" source="BUGZILLA"/>
		<reference ref_id="1228019" ref_url="https://bugzilla.suse.com/1228019" source="BUGZILLA"/>
		<reference ref_id="1228025" ref_url="https://bugzilla.suse.com/1228025" source="BUGZILLA"/>
		<reference ref_id="1228028" ref_url="https://bugzilla.suse.com/1228028" source="BUGZILLA"/>
		<reference ref_id="1228035" ref_url="https://bugzilla.suse.com/1228035" source="BUGZILLA"/>
		<reference ref_id="1228037" ref_url="https://bugzilla.suse.com/1228037" source="BUGZILLA"/>
		<reference ref_id="1228038" ref_url="https://bugzilla.suse.com/1228038" source="BUGZILLA"/>
		<reference ref_id="1228039" ref_url="https://bugzilla.suse.com/1228039" source="BUGZILLA"/>
		<reference ref_id="1228040" ref_url="https://bugzilla.suse.com/1228040" source="BUGZILLA"/>
		<reference ref_id="1228045" ref_url="https://bugzilla.suse.com/1228045" source="BUGZILLA"/>
		<reference ref_id="1228054" ref_url="https://bugzilla.suse.com/1228054" source="BUGZILLA"/>
		<reference ref_id="1228055" ref_url="https://bugzilla.suse.com/1228055" source="BUGZILLA"/>
		<reference ref_id="1228056" ref_url="https://bugzilla.suse.com/1228056" source="BUGZILLA"/>
		<reference ref_id="1228060" ref_url="https://bugzilla.suse.com/1228060" source="BUGZILLA"/>
		<reference ref_id="1228061" ref_url="https://bugzilla.suse.com/1228061" source="BUGZILLA"/>
		<reference ref_id="1228062" ref_url="https://bugzilla.suse.com/1228062" source="BUGZILLA"/>
		<reference ref_id="1228063" ref_url="https://bugzilla.suse.com/1228063" source="BUGZILLA"/>
		<reference ref_id="1228064" ref_url="https://bugzilla.suse.com/1228064" source="BUGZILLA"/>
		<reference ref_id="1228066" ref_url="https://bugzilla.suse.com/1228066" source="BUGZILLA"/>
		<reference ref_id="1228114" ref_url="https://bugzilla.suse.com/1228114" source="BUGZILLA"/>
		<reference ref_id="1228247" ref_url="https://bugzilla.suse.com/1228247" source="BUGZILLA"/>
		<reference ref_id="1228328" ref_url="https://bugzilla.suse.com/1228328" source="BUGZILLA"/>
		<reference ref_id="1228440" ref_url="https://bugzilla.suse.com/1228440" source="BUGZILLA"/>
		<reference ref_id="1228561" ref_url="https://bugzilla.suse.com/1228561" source="BUGZILLA"/>
		<reference ref_id="1228644" ref_url="https://bugzilla.suse.com/1228644" source="BUGZILLA"/>
		<reference ref_id="1228680" ref_url="https://bugzilla.suse.com/1228680" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="1228801" ref_url="https://bugzilla.suse.com/1228801" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4439" ref_url="https://www.suse.com/security/cve/CVE-2021-4439/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2021-47576" ref_url="https://www.suse.com/security/cve/CVE-2021-47576/" source="CVE"/>
		<reference ref_id="CVE-2021-47578" ref_url="https://www.suse.com/security/cve/CVE-2021-47578/" source="CVE"/>
		<reference ref_id="CVE-2021-47580" ref_url="https://www.suse.com/security/cve/CVE-2021-47580/" source="CVE"/>
		<reference ref_id="CVE-2021-47582" ref_url="https://www.suse.com/security/cve/CVE-2021-47582/" source="CVE"/>
		<reference ref_id="CVE-2021-47583" ref_url="https://www.suse.com/security/cve/CVE-2021-47583/" source="CVE"/>
		<reference ref_id="CVE-2021-47584" ref_url="https://www.suse.com/security/cve/CVE-2021-47584/" source="CVE"/>
		<reference ref_id="CVE-2021-47585" ref_url="https://www.suse.com/security/cve/CVE-2021-47585/" source="CVE"/>
		<reference ref_id="CVE-2021-47586" ref_url="https://www.suse.com/security/cve/CVE-2021-47586/" source="CVE"/>
		<reference ref_id="CVE-2021-47587" ref_url="https://www.suse.com/security/cve/CVE-2021-47587/" source="CVE"/>
		<reference ref_id="CVE-2021-47589" ref_url="https://www.suse.com/security/cve/CVE-2021-47589/" source="CVE"/>
		<reference ref_id="CVE-2021-47592" ref_url="https://www.suse.com/security/cve/CVE-2021-47592/" source="CVE"/>
		<reference ref_id="CVE-2021-47596" ref_url="https://www.suse.com/security/cve/CVE-2021-47596/" source="CVE"/>
		<reference ref_id="CVE-2021-47597" ref_url="https://www.suse.com/security/cve/CVE-2021-47597/" source="CVE"/>
		<reference ref_id="CVE-2021-47598" ref_url="https://www.suse.com/security/cve/CVE-2021-47598/" source="CVE"/>
		<reference ref_id="CVE-2021-47600" ref_url="https://www.suse.com/security/cve/CVE-2021-47600/" source="CVE"/>
		<reference ref_id="CVE-2021-47601" ref_url="https://www.suse.com/security/cve/CVE-2021-47601/" source="CVE"/>
		<reference ref_id="CVE-2021-47602" ref_url="https://www.suse.com/security/cve/CVE-2021-47602/" source="CVE"/>
		<reference ref_id="CVE-2021-47603" ref_url="https://www.suse.com/security/cve/CVE-2021-47603/" source="CVE"/>
		<reference ref_id="CVE-2021-47607" ref_url="https://www.suse.com/security/cve/CVE-2021-47607/" source="CVE"/>
		<reference ref_id="CVE-2021-47608" ref_url="https://www.suse.com/security/cve/CVE-2021-47608/" source="CVE"/>
		<reference ref_id="CVE-2021-47609" ref_url="https://www.suse.com/security/cve/CVE-2021-47609/" source="CVE"/>
		<reference ref_id="CVE-2021-47611" ref_url="https://www.suse.com/security/cve/CVE-2021-47611/" source="CVE"/>
		<reference ref_id="CVE-2021-47612" ref_url="https://www.suse.com/security/cve/CVE-2021-47612/" source="CVE"/>
		<reference ref_id="CVE-2021-47614" ref_url="https://www.suse.com/security/cve/CVE-2021-47614/" source="CVE"/>
		<reference ref_id="CVE-2021-47615" ref_url="https://www.suse.com/security/cve/CVE-2021-47615/" source="CVE"/>
		<reference ref_id="CVE-2021-47616" ref_url="https://www.suse.com/security/cve/CVE-2021-47616/" source="CVE"/>
		<reference ref_id="CVE-2021-47617" ref_url="https://www.suse.com/security/cve/CVE-2021-47617/" source="CVE"/>
		<reference ref_id="CVE-2021-47618" ref_url="https://www.suse.com/security/cve/CVE-2021-47618/" source="CVE"/>
		<reference ref_id="CVE-2021-47619" ref_url="https://www.suse.com/security/cve/CVE-2021-47619/" source="CVE"/>
		<reference ref_id="CVE-2021-47620" ref_url="https://www.suse.com/security/cve/CVE-2021-47620/" source="CVE"/>
		<reference ref_id="CVE-2021-47622" ref_url="https://www.suse.com/security/cve/CVE-2021-47622/" source="CVE"/>
		<reference ref_id="CVE-2021-47624" ref_url="https://www.suse.com/security/cve/CVE-2021-47624/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-28748" ref_url="https://www.suse.com/security/cve/CVE-2022-28748/" source="CVE"/>
		<reference ref_id="CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964/" source="CVE"/>
		<reference ref_id="CVE-2022-48711" ref_url="https://www.suse.com/security/cve/CVE-2022-48711/" source="CVE"/>
		<reference ref_id="CVE-2022-48712" ref_url="https://www.suse.com/security/cve/CVE-2022-48712/" source="CVE"/>
		<reference ref_id="CVE-2022-48713" ref_url="https://www.suse.com/security/cve/CVE-2022-48713/" source="CVE"/>
		<reference ref_id="CVE-2022-48715" ref_url="https://www.suse.com/security/cve/CVE-2022-48715/" source="CVE"/>
		<reference ref_id="CVE-2022-48717" ref_url="https://www.suse.com/security/cve/CVE-2022-48717/" source="CVE"/>
		<reference ref_id="CVE-2022-48720" ref_url="https://www.suse.com/security/cve/CVE-2022-48720/" source="CVE"/>
		<reference ref_id="CVE-2022-48721" ref_url="https://www.suse.com/security/cve/CVE-2022-48721/" source="CVE"/>
		<reference ref_id="CVE-2022-48722" ref_url="https://www.suse.com/security/cve/CVE-2022-48722/" source="CVE"/>
		<reference ref_id="CVE-2022-48723" ref_url="https://www.suse.com/security/cve/CVE-2022-48723/" source="CVE"/>
		<reference ref_id="CVE-2022-48724" ref_url="https://www.suse.com/security/cve/CVE-2022-48724/" source="CVE"/>
		<reference ref_id="CVE-2022-48725" ref_url="https://www.suse.com/security/cve/CVE-2022-48725/" source="CVE"/>
		<reference ref_id="CVE-2022-48726" ref_url="https://www.suse.com/security/cve/CVE-2022-48726/" source="CVE"/>
		<reference ref_id="CVE-2022-48727" ref_url="https://www.suse.com/security/cve/CVE-2022-48727/" source="CVE"/>
		<reference ref_id="CVE-2022-48728" ref_url="https://www.suse.com/security/cve/CVE-2022-48728/" source="CVE"/>
		<reference ref_id="CVE-2022-48729" ref_url="https://www.suse.com/security/cve/CVE-2022-48729/" source="CVE"/>
		<reference ref_id="CVE-2022-48730" ref_url="https://www.suse.com/security/cve/CVE-2022-48730/" source="CVE"/>
		<reference ref_id="CVE-2022-48732" ref_url="https://www.suse.com/security/cve/CVE-2022-48732/" source="CVE"/>
		<reference ref_id="CVE-2022-48734" ref_url="https://www.suse.com/security/cve/CVE-2022-48734/" source="CVE"/>
		<reference ref_id="CVE-2022-48735" ref_url="https://www.suse.com/security/cve/CVE-2022-48735/" source="CVE"/>
		<reference ref_id="CVE-2022-48736" ref_url="https://www.suse.com/security/cve/CVE-2022-48736/" source="CVE"/>
		<reference ref_id="CVE-2022-48737" ref_url="https://www.suse.com/security/cve/CVE-2022-48737/" source="CVE"/>
		<reference ref_id="CVE-2022-48738" ref_url="https://www.suse.com/security/cve/CVE-2022-48738/" source="CVE"/>
		<reference ref_id="CVE-2022-48739" ref_url="https://www.suse.com/security/cve/CVE-2022-48739/" source="CVE"/>
		<reference ref_id="CVE-2022-48740" ref_url="https://www.suse.com/security/cve/CVE-2022-48740/" source="CVE"/>
		<reference ref_id="CVE-2022-48743" ref_url="https://www.suse.com/security/cve/CVE-2022-48743/" source="CVE"/>
		<reference ref_id="CVE-2022-48744" ref_url="https://www.suse.com/security/cve/CVE-2022-48744/" source="CVE"/>
		<reference ref_id="CVE-2022-48745" ref_url="https://www.suse.com/security/cve/CVE-2022-48745/" source="CVE"/>
		<reference ref_id="CVE-2022-48746" ref_url="https://www.suse.com/security/cve/CVE-2022-48746/" source="CVE"/>
		<reference ref_id="CVE-2022-48747" ref_url="https://www.suse.com/security/cve/CVE-2022-48747/" source="CVE"/>
		<reference ref_id="CVE-2022-48749" ref_url="https://www.suse.com/security/cve/CVE-2022-48749/" source="CVE"/>
		<reference ref_id="CVE-2022-48751" ref_url="https://www.suse.com/security/cve/CVE-2022-48751/" source="CVE"/>
		<reference ref_id="CVE-2022-48752" ref_url="https://www.suse.com/security/cve/CVE-2022-48752/" source="CVE"/>
		<reference ref_id="CVE-2022-48754" ref_url="https://www.suse.com/security/cve/CVE-2022-48754/" source="CVE"/>
		<reference ref_id="CVE-2022-48756" ref_url="https://www.suse.com/security/cve/CVE-2022-48756/" source="CVE"/>
		<reference ref_id="CVE-2022-48758" ref_url="https://www.suse.com/security/cve/CVE-2022-48758/" source="CVE"/>
		<reference ref_id="CVE-2022-48759" ref_url="https://www.suse.com/security/cve/CVE-2022-48759/" source="CVE"/>
		<reference ref_id="CVE-2022-48760" ref_url="https://www.suse.com/security/cve/CVE-2022-48760/" source="CVE"/>
		<reference ref_id="CVE-2022-48761" ref_url="https://www.suse.com/security/cve/CVE-2022-48761/" source="CVE"/>
		<reference ref_id="CVE-2022-48763" ref_url="https://www.suse.com/security/cve/CVE-2022-48763/" source="CVE"/>
		<reference ref_id="CVE-2022-48765" ref_url="https://www.suse.com/security/cve/CVE-2022-48765/" source="CVE"/>
		<reference ref_id="CVE-2022-48767" ref_url="https://www.suse.com/security/cve/CVE-2022-48767/" source="CVE"/>
		<reference ref_id="CVE-2022-48768" ref_url="https://www.suse.com/security/cve/CVE-2022-48768/" source="CVE"/>
		<reference ref_id="CVE-2022-48769" ref_url="https://www.suse.com/security/cve/CVE-2022-48769/" source="CVE"/>
		<reference ref_id="CVE-2022-48771" ref_url="https://www.suse.com/security/cve/CVE-2022-48771/" source="CVE"/>
		<reference ref_id="CVE-2022-48773" ref_url="https://www.suse.com/security/cve/CVE-2022-48773/" source="CVE"/>
		<reference ref_id="CVE-2022-48774" ref_url="https://www.suse.com/security/cve/CVE-2022-48774/" source="CVE"/>
		<reference ref_id="CVE-2022-48775" ref_url="https://www.suse.com/security/cve/CVE-2022-48775/" source="CVE"/>
		<reference ref_id="CVE-2022-48776" ref_url="https://www.suse.com/security/cve/CVE-2022-48776/" source="CVE"/>
		<reference ref_id="CVE-2022-48777" ref_url="https://www.suse.com/security/cve/CVE-2022-48777/" source="CVE"/>
		<reference ref_id="CVE-2022-48778" ref_url="https://www.suse.com/security/cve/CVE-2022-48778/" source="CVE"/>
		<reference ref_id="CVE-2022-48780" ref_url="https://www.suse.com/security/cve/CVE-2022-48780/" source="CVE"/>
		<reference ref_id="CVE-2022-48783" ref_url="https://www.suse.com/security/cve/CVE-2022-48783/" source="CVE"/>
		<reference ref_id="CVE-2022-48784" ref_url="https://www.suse.com/security/cve/CVE-2022-48784/" source="CVE"/>
		<reference ref_id="CVE-2022-48786" ref_url="https://www.suse.com/security/cve/CVE-2022-48786/" source="CVE"/>
		<reference ref_id="CVE-2022-48787" ref_url="https://www.suse.com/security/cve/CVE-2022-48787/" source="CVE"/>
		<reference ref_id="CVE-2022-48788" ref_url="https://www.suse.com/security/cve/CVE-2022-48788/" source="CVE"/>
		<reference ref_id="CVE-2022-48789" ref_url="https://www.suse.com/security/cve/CVE-2022-48789/" source="CVE"/>
		<reference ref_id="CVE-2022-48790" ref_url="https://www.suse.com/security/cve/CVE-2022-48790/" source="CVE"/>
		<reference ref_id="CVE-2022-48791" ref_url="https://www.suse.com/security/cve/CVE-2022-48791/" source="CVE"/>
		<reference ref_id="CVE-2022-48792" ref_url="https://www.suse.com/security/cve/CVE-2022-48792/" source="CVE"/>
		<reference ref_id="CVE-2022-48793" ref_url="https://www.suse.com/security/cve/CVE-2022-48793/" source="CVE"/>
		<reference ref_id="CVE-2022-48794" ref_url="https://www.suse.com/security/cve/CVE-2022-48794/" source="CVE"/>
		<reference ref_id="CVE-2022-48796" ref_url="https://www.suse.com/security/cve/CVE-2022-48796/" source="CVE"/>
		<reference ref_id="CVE-2022-48797" ref_url="https://www.suse.com/security/cve/CVE-2022-48797/" source="CVE"/>
		<reference ref_id="CVE-2022-48798" ref_url="https://www.suse.com/security/cve/CVE-2022-48798/" source="CVE"/>
		<reference ref_id="CVE-2022-48799" ref_url="https://www.suse.com/security/cve/CVE-2022-48799/" source="CVE"/>
		<reference ref_id="CVE-2022-48800" ref_url="https://www.suse.com/security/cve/CVE-2022-48800/" source="CVE"/>
		<reference ref_id="CVE-2022-48801" ref_url="https://www.suse.com/security/cve/CVE-2022-48801/" source="CVE"/>
		<reference ref_id="CVE-2022-48802" ref_url="https://www.suse.com/security/cve/CVE-2022-48802/" source="CVE"/>
		<reference ref_id="CVE-2022-48803" ref_url="https://www.suse.com/security/cve/CVE-2022-48803/" source="CVE"/>
		<reference ref_id="CVE-2022-48804" ref_url="https://www.suse.com/security/cve/CVE-2022-48804/" source="CVE"/>
		<reference ref_id="CVE-2022-48805" ref_url="https://www.suse.com/security/cve/CVE-2022-48805/" source="CVE"/>
		<reference ref_id="CVE-2022-48806" ref_url="https://www.suse.com/security/cve/CVE-2022-48806/" source="CVE"/>
		<reference ref_id="CVE-2022-48807" ref_url="https://www.suse.com/security/cve/CVE-2022-48807/" source="CVE"/>
		<reference ref_id="CVE-2022-48811" ref_url="https://www.suse.com/security/cve/CVE-2022-48811/" source="CVE"/>
		<reference ref_id="CVE-2022-48812" ref_url="https://www.suse.com/security/cve/CVE-2022-48812/" source="CVE"/>
		<reference ref_id="CVE-2022-48813" ref_url="https://www.suse.com/security/cve/CVE-2022-48813/" source="CVE"/>
		<reference ref_id="CVE-2022-48814" ref_url="https://www.suse.com/security/cve/CVE-2022-48814/" source="CVE"/>
		<reference ref_id="CVE-2022-48815" ref_url="https://www.suse.com/security/cve/CVE-2022-48815/" source="CVE"/>
		<reference ref_id="CVE-2022-48816" ref_url="https://www.suse.com/security/cve/CVE-2022-48816/" source="CVE"/>
		<reference ref_id="CVE-2022-48817" ref_url="https://www.suse.com/security/cve/CVE-2022-48817/" source="CVE"/>
		<reference ref_id="CVE-2022-48818" ref_url="https://www.suse.com/security/cve/CVE-2022-48818/" source="CVE"/>
		<reference ref_id="CVE-2022-48820" ref_url="https://www.suse.com/security/cve/CVE-2022-48820/" source="CVE"/>
		<reference ref_id="CVE-2022-48821" ref_url="https://www.suse.com/security/cve/CVE-2022-48821/" source="CVE"/>
		<reference ref_id="CVE-2022-48822" ref_url="https://www.suse.com/security/cve/CVE-2022-48822/" source="CVE"/>
		<reference ref_id="CVE-2022-48823" ref_url="https://www.suse.com/security/cve/CVE-2022-48823/" source="CVE"/>
		<reference ref_id="CVE-2022-48824" ref_url="https://www.suse.com/security/cve/CVE-2022-48824/" source="CVE"/>
		<reference ref_id="CVE-2022-48825" ref_url="https://www.suse.com/security/cve/CVE-2022-48825/" source="CVE"/>
		<reference ref_id="CVE-2022-48826" ref_url="https://www.suse.com/security/cve/CVE-2022-48826/" source="CVE"/>
		<reference ref_id="CVE-2022-48827" ref_url="https://www.suse.com/security/cve/CVE-2022-48827/" source="CVE"/>
		<reference ref_id="CVE-2022-48828" ref_url="https://www.suse.com/security/cve/CVE-2022-48828/" source="CVE"/>
		<reference ref_id="CVE-2022-48829" ref_url="https://www.suse.com/security/cve/CVE-2022-48829/" source="CVE"/>
		<reference ref_id="CVE-2022-48830" ref_url="https://www.suse.com/security/cve/CVE-2022-48830/" source="CVE"/>
		<reference ref_id="CVE-2022-48831" ref_url="https://www.suse.com/security/cve/CVE-2022-48831/" source="CVE"/>
		<reference ref_id="CVE-2022-48834" ref_url="https://www.suse.com/security/cve/CVE-2022-48834/" source="CVE"/>
		<reference ref_id="CVE-2022-48835" ref_url="https://www.suse.com/security/cve/CVE-2022-48835/" source="CVE"/>
		<reference ref_id="CVE-2022-48836" ref_url="https://www.suse.com/security/cve/CVE-2022-48836/" source="CVE"/>
		<reference ref_id="CVE-2022-48837" ref_url="https://www.suse.com/security/cve/CVE-2022-48837/" source="CVE"/>
		<reference ref_id="CVE-2022-48838" ref_url="https://www.suse.com/security/cve/CVE-2022-48838/" source="CVE"/>
		<reference ref_id="CVE-2022-48839" ref_url="https://www.suse.com/security/cve/CVE-2022-48839/" source="CVE"/>
		<reference ref_id="CVE-2022-48840" ref_url="https://www.suse.com/security/cve/CVE-2022-48840/" source="CVE"/>
		<reference ref_id="CVE-2022-48841" ref_url="https://www.suse.com/security/cve/CVE-2022-48841/" source="CVE"/>
		<reference ref_id="CVE-2022-48842" ref_url="https://www.suse.com/security/cve/CVE-2022-48842/" source="CVE"/>
		<reference ref_id="CVE-2022-48843" ref_url="https://www.suse.com/security/cve/CVE-2022-48843/" source="CVE"/>
		<reference ref_id="CVE-2022-48847" ref_url="https://www.suse.com/security/cve/CVE-2022-48847/" source="CVE"/>
		<reference ref_id="CVE-2022-48849" ref_url="https://www.suse.com/security/cve/CVE-2022-48849/" source="CVE"/>
		<reference ref_id="CVE-2022-48851" ref_url="https://www.suse.com/security/cve/CVE-2022-48851/" source="CVE"/>
		<reference ref_id="CVE-2022-48853" ref_url="https://www.suse.com/security/cve/CVE-2022-48853/" source="CVE"/>
		<reference ref_id="CVE-2022-48856" ref_url="https://www.suse.com/security/cve/CVE-2022-48856/" source="CVE"/>
		<reference ref_id="CVE-2022-48857" ref_url="https://www.suse.com/security/cve/CVE-2022-48857/" source="CVE"/>
		<reference ref_id="CVE-2022-48858" ref_url="https://www.suse.com/security/cve/CVE-2022-48858/" source="CVE"/>
		<reference ref_id="CVE-2022-48859" ref_url="https://www.suse.com/security/cve/CVE-2022-48859/" source="CVE"/>
		<reference ref_id="CVE-2022-48860" ref_url="https://www.suse.com/security/cve/CVE-2022-48860/" source="CVE"/>
		<reference ref_id="CVE-2022-48861" ref_url="https://www.suse.com/security/cve/CVE-2022-48861/" source="CVE"/>
		<reference ref_id="CVE-2022-48862" ref_url="https://www.suse.com/security/cve/CVE-2022-48862/" source="CVE"/>
		<reference ref_id="CVE-2022-48863" ref_url="https://www.suse.com/security/cve/CVE-2022-48863/" source="CVE"/>
		<reference ref_id="CVE-2022-48866" ref_url="https://www.suse.com/security/cve/CVE-2022-48866/" source="CVE"/>
		<reference ref_id="CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52762" ref_url="https://www.suse.com/security/cve/CVE-2023-52762/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52885" ref_url="https://www.suse.com/security/cve/CVE-2023-52885/" source="CVE"/>
		<reference ref_id="CVE-2023-52886" ref_url="https://www.suse.com/security/cve/CVE-2023-52886/" source="CVE"/>
		<reference ref_id="CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583/" source="CVE"/>
		<reference ref_id="CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26800" ref_url="https://www.suse.com/security/cve/CVE-2024-26800/" source="CVE"/>
		<reference ref_id="CVE-2024-26813" ref_url="https://www.suse.com/security/cve/CVE-2024-26813/" source="CVE"/>
		<reference ref_id="CVE-2024-26814" ref_url="https://www.suse.com/security/cve/CVE-2024-26814/" source="CVE"/>
		<reference ref_id="CVE-2024-26976" ref_url="https://www.suse.com/security/cve/CVE-2024-26976/" source="CVE"/>
		<reference ref_id="CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878/" source="CVE"/>
		<reference ref_id="CVE-2024-35901" ref_url="https://www.suse.com/security/cve/CVE-2024-35901/" source="CVE"/>
		<reference ref_id="CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905/" source="CVE"/>
		<reference ref_id="CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926/" source="CVE"/>
		<reference ref_id="CVE-2024-36974" ref_url="https://www.suse.com/security/cve/CVE-2024-36974/" source="CVE"/>
		<reference ref_id="CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541/" source="CVE"/>
		<reference ref_id="CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-39463" ref_url="https://www.suse.com/security/cve/CVE-2024-39463/" source="CVE"/>
		<reference ref_id="CVE-2024-39494" ref_url="https://www.suse.com/security/cve/CVE-2024-39494/" source="CVE"/>
		<reference ref_id="CVE-2024-40902" ref_url="https://www.suse.com/security/cve/CVE-2024-40902/" source="CVE"/>
		<reference ref_id="CVE-2024-40937" ref_url="https://www.suse.com/security/cve/CVE-2024-40937/" source="CVE"/>
		<reference ref_id="CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954/" source="CVE"/>
		<reference ref_id="CVE-2024-40956" ref_url="https://www.suse.com/security/cve/CVE-2024-40956/" source="CVE"/>
		<reference ref_id="CVE-2024-40989" ref_url="https://www.suse.com/security/cve/CVE-2024-40989/" source="CVE"/>
		<reference ref_id="CVE-2024-40994" ref_url="https://www.suse.com/security/cve/CVE-2024-40994/" source="CVE"/>
		<reference ref_id="CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011/" source="CVE"/>
		<reference ref_id="CVE-2024-41012" ref_url="https://www.suse.com/security/cve/CVE-2024-41012/" source="CVE"/>
		<reference ref_id="CVE-2024-41059" ref_url="https://www.suse.com/security/cve/CVE-2024-41059/" source="CVE"/>
		<reference ref_id="CVE-2024-41069" ref_url="https://www.suse.com/security/cve/CVE-2024-41069/" source="CVE"/>
		<reference ref_id="CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090/" source="CVE"/>
		<reference ref_id="CVE-2024-42093" ref_url="https://www.suse.com/security/cve/CVE-2024-42093/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2024-40937: gve: Clear napi-&gt;skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-35901: net: mana: Fix Rx DMA datasize and skb_over_panic (bsc#1224495).
- CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).

The following non-security bugs were fixed:

- NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662).
- NFS: Reduce use of uncached readdir (bsc#1226662).
- NFSv4.x: by default serialize open/close operations (bsc#1226226 bsc#1223863).
- X.509: Fix the parser of extended key usage for length (bsc#1218820).
- btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
- cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
- jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
- kABI: rtas: Workaround false positive due to lost definition (bsc#1227487).
- kernel-binary: vdso: Own module_dir
- net/dcb: check for detached device before executing callbacks (bsc#1215587).
- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
- powerpc/rtas: clean up includes (bsc#1227487).
- workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
- workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-15"/>
	<updated date="2024-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190336">SUSE bug 1190336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193454">SUSE bug 1193454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193554">SUSE bug 1193554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193787">SUSE bug 1193787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193883">SUSE bug 1193883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194324">SUSE bug 1194324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194826">SUSE bug 1194826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195341">SUSE bug 1195341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195349">SUSE bug 1195349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195357">SUSE bug 1195357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195668">SUSE bug 1195668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195927">SUSE bug 1195927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195957">SUSE bug 1195957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196746">SUSE bug 1196746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197146">SUSE bug 1197146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197246">SUSE bug 1197246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197762">SUSE bug 1197762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197915">SUSE bug 1197915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198014">SUSE bug 1198014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199295">SUSE bug 1199295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202767">SUSE bug 1202767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202780">SUSE bug 1202780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215587">SUSE bug 1215587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216834">SUSE bug 1216834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218820">SUSE bug 1218820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220185">SUSE bug 1220185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220186">SUSE bug 1220186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222011">SUSE bug 1222011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222728">SUSE bug 1222728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222809">SUSE bug 1222809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222810">SUSE bug 1222810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223635">SUSE bug 1223635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223863">SUSE bug 1223863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224495">SUSE bug 1224495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224671">SUSE bug 1224671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225573">SUSE bug 1225573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225829">SUSE bug 1225829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226168">SUSE bug 1226168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226226">SUSE bug 1226226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226519">SUSE bug 1226519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226537">SUSE bug 1226537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226539">SUSE bug 1226539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226550">SUSE bug 1226550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226553">SUSE bug 1226553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226554">SUSE bug 1226554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226556">SUSE bug 1226556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226557">SUSE bug 1226557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226558">SUSE bug 1226558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226559">SUSE bug 1226559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226561">SUSE bug 1226561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226562">SUSE bug 1226562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226563">SUSE bug 1226563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226564">SUSE bug 1226564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226567">SUSE bug 1226567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226569">SUSE bug 1226569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226572">SUSE bug 1226572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226574">SUSE bug 1226574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226575">SUSE bug 1226575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226576">SUSE bug 1226576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226577">SUSE bug 1226577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226580">SUSE bug 1226580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226583">SUSE bug 1226583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226585">SUSE bug 1226585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226587">SUSE bug 1226587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226601">SUSE bug 1226601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226602">SUSE bug 1226602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226603">SUSE bug 1226603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226607">SUSE bug 1226607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226614">SUSE bug 1226614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226617">SUSE bug 1226617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226618">SUSE bug 1226618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226619">SUSE bug 1226619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226621">SUSE bug 1226621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226624">SUSE bug 1226624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226626">SUSE bug 1226626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226628">SUSE bug 1226628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226629">SUSE bug 1226629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226643">SUSE bug 1226643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226644">SUSE bug 1226644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226645">SUSE bug 1226645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226650">SUSE bug 1226650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226653">SUSE bug 1226653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226662">SUSE bug 1226662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226669">SUSE bug 1226669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226670">SUSE bug 1226670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226672">SUSE bug 1226672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226673">SUSE bug 1226673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226674">SUSE bug 1226674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226675">SUSE bug 1226675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226679">SUSE bug 1226679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226683">SUSE bug 1226683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226685">SUSE bug 1226685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226686">SUSE bug 1226686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226690">SUSE bug 1226690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226691">SUSE bug 1226691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226692">SUSE bug 1226692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226696">SUSE bug 1226696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226697">SUSE bug 1226697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226698">SUSE bug 1226698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226699">SUSE bug 1226699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226701">SUSE bug 1226701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226702">SUSE bug 1226702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226703">SUSE bug 1226703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226705">SUSE bug 1226705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226708">SUSE bug 1226708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226709">SUSE bug 1226709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226710">SUSE bug 1226710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226711">SUSE bug 1226711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226712">SUSE bug 1226712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226713">SUSE bug 1226713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226715">SUSE bug 1226715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226716">SUSE bug 1226716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226719">SUSE bug 1226719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226720">SUSE bug 1226720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226721">SUSE bug 1226721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226732">SUSE bug 1226732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226758">SUSE bug 1226758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226762">SUSE bug 1226762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226785">SUSE bug 1226785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227090">SUSE bug 1227090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227383">SUSE bug 1227383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227487">SUSE bug 1227487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227549">SUSE bug 1227549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227716">SUSE bug 1227716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227750">SUSE bug 1227750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227764">SUSE bug 1227764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227808">SUSE bug 1227808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227810">SUSE bug 1227810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227823">SUSE bug 1227823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227829">SUSE bug 1227829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227836">SUSE bug 1227836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227917">SUSE bug 1227917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227920">SUSE bug 1227920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227921">SUSE bug 1227921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227922">SUSE bug 1227922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227923">SUSE bug 1227923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227924">SUSE bug 1227924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227925">SUSE bug 1227925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227928">SUSE bug 1227928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227931">SUSE bug 1227931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227932">SUSE bug 1227932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227933">SUSE bug 1227933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227935">SUSE bug 1227935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227938">SUSE bug 1227938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227941">SUSE bug 1227941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227942">SUSE bug 1227942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227944">SUSE bug 1227944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227945">SUSE bug 1227945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227948">SUSE bug 1227948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227949">SUSE bug 1227949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227952">SUSE bug 1227952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227953">SUSE bug 1227953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227954">SUSE bug 1227954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227956">SUSE bug 1227956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227963">SUSE bug 1227963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227964">SUSE bug 1227964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227965">SUSE bug 1227965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227968">SUSE bug 1227968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227969">SUSE bug 1227969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227970">SUSE bug 1227970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227971">SUSE bug 1227971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227972">SUSE bug 1227972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227975">SUSE bug 1227975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227976">SUSE bug 1227976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227981">SUSE bug 1227981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227982">SUSE bug 1227982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227985">SUSE bug 1227985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227986">SUSE bug 1227986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227987">SUSE bug 1227987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227988">SUSE bug 1227988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227989">SUSE bug 1227989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227990">SUSE bug 1227990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227991">SUSE bug 1227991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227993">SUSE bug 1227993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227995">SUSE bug 1227995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227996">SUSE bug 1227996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227997">SUSE bug 1227997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228000">SUSE bug 1228000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228002">SUSE bug 1228002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228004">SUSE bug 1228004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228005">SUSE bug 1228005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228006">SUSE bug 1228006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228007">SUSE bug 1228007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228008">SUSE bug 1228008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228009">SUSE bug 1228009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228010">SUSE bug 1228010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228013">SUSE bug 1228013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228014">SUSE bug 1228014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228015">SUSE bug 1228015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228019">SUSE bug 1228019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228025">SUSE bug 1228025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228028">SUSE bug 1228028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228035">SUSE bug 1228035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228037">SUSE bug 1228037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228038">SUSE bug 1228038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228039">SUSE bug 1228039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228040">SUSE bug 1228040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228045">SUSE bug 1228045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228054">SUSE bug 1228054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228055">SUSE bug 1228055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228056">SUSE bug 1228056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228060">SUSE bug 1228060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228061">SUSE bug 1228061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228062">SUSE bug 1228062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228063">SUSE bug 1228063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228064">SUSE bug 1228064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228066">SUSE bug 1228066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228114">SUSE bug 1228114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228247">SUSE bug 1228247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228328">SUSE bug 1228328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228440">SUSE bug 1228440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228561">SUSE bug 1228561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228644">SUSE bug 1228644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228680">SUSE bug 1228680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228801">SUSE bug 1228801</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4439/">CVE-2021-4439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4439">CVE-2021-4439 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47576/">CVE-2021-47576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47576">CVE-2021-47576 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47578/">CVE-2021-47578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47578">CVE-2021-47578 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47580/">CVE-2021-47580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47580">CVE-2021-47580 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47582/">CVE-2021-47582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47582">CVE-2021-47582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47583/">CVE-2021-47583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47583">CVE-2021-47583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47584/">CVE-2021-47584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47584">CVE-2021-47584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47585/">CVE-2021-47585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47585">CVE-2021-47585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47586/">CVE-2021-47586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47586">CVE-2021-47586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47587/">CVE-2021-47587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47587">CVE-2021-47587 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47589/">CVE-2021-47589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47589">CVE-2021-47589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47592/">CVE-2021-47592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47592">CVE-2021-47592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47596/">CVE-2021-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47596">CVE-2021-47596 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47597/">CVE-2021-47597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47597">CVE-2021-47597 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47598/">CVE-2021-47598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47598">CVE-2021-47598 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47600/">CVE-2021-47600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47600">CVE-2021-47600 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47601/">CVE-2021-47601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47601">CVE-2021-47601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47602/">CVE-2021-47602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47602">CVE-2021-47602 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47603/">CVE-2021-47603 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47603">CVE-2021-47603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47607/">CVE-2021-47607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47607">CVE-2021-47607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47608/">CVE-2021-47608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47608">CVE-2021-47608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47609/">CVE-2021-47609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47609">CVE-2021-47609 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47611/">CVE-2021-47611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47611">CVE-2021-47611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47612/">CVE-2021-47612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47612">CVE-2021-47612 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47614/">CVE-2021-47614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47614">CVE-2021-47614 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47615/">CVE-2021-47615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47615">CVE-2021-47615 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47616/">CVE-2021-47616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47616">CVE-2021-47616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47617/">CVE-2021-47617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47617">CVE-2021-47617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47618/">CVE-2021-47618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47618">CVE-2021-47618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47619/">CVE-2021-47619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47619">CVE-2021-47619 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47620/">CVE-2021-47620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47620">CVE-2021-47620 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47622/">CVE-2021-47622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47622">CVE-2021-47622 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47624/">CVE-2021-47624 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47624">CVE-2021-47624 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0854">CVE-2022-0854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28748/">CVE-2022-28748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-28748">CVE-2022-28748 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48711/">CVE-2022-48711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48711">CVE-2022-48711 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48712/">CVE-2022-48712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48712">CVE-2022-48712 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48713/">CVE-2022-48713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48713">CVE-2022-48713 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48715/">CVE-2022-48715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48715">CVE-2022-48715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48717/">CVE-2022-48717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48717">CVE-2022-48717 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48720/">CVE-2022-48720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48720">CVE-2022-48720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48721/">CVE-2022-48721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48721">CVE-2022-48721 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48722/">CVE-2022-48722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48722">CVE-2022-48722 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48723/">CVE-2022-48723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48723">CVE-2022-48723 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48724/">CVE-2022-48724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48724">CVE-2022-48724 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48725/">CVE-2022-48725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48725">CVE-2022-48725 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48726/">CVE-2022-48726 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48726">CVE-2022-48726 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48727/">CVE-2022-48727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48727">CVE-2022-48727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48728/">CVE-2022-48728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48728">CVE-2022-48728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48729/">CVE-2022-48729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48729">CVE-2022-48729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48730/">CVE-2022-48730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48730">CVE-2022-48730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48732/">CVE-2022-48732 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48732">CVE-2022-48732 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48734/">CVE-2022-48734 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48734">CVE-2022-48734 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48735/">CVE-2022-48735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48735">CVE-2022-48735 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48736/">CVE-2022-48736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48736">CVE-2022-48736 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48737/">CVE-2022-48737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48737">CVE-2022-48737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48738/">CVE-2022-48738 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48738">CVE-2022-48738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48739/">CVE-2022-48739 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48739">CVE-2022-48739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48740/">CVE-2022-48740 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48740">CVE-2022-48740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48743/">CVE-2022-48743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48743">CVE-2022-48743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48744/">CVE-2022-48744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48744">CVE-2022-48744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48745/">CVE-2022-48745 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48745">CVE-2022-48745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48746/">CVE-2022-48746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48746">CVE-2022-48746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48747/">CVE-2022-48747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48747">CVE-2022-48747 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48749/">CVE-2022-48749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48749">CVE-2022-48749 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48751/">CVE-2022-48751 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48751">CVE-2022-48751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48752/">CVE-2022-48752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48752">CVE-2022-48752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48754/">CVE-2022-48754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48754">CVE-2022-48754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48756/">CVE-2022-48756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48756">CVE-2022-48756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48758/">CVE-2022-48758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48758">CVE-2022-48758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48759/">CVE-2022-48759 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48759">CVE-2022-48759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48760/">CVE-2022-48760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48760">CVE-2022-48760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48761/">CVE-2022-48761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48761">CVE-2022-48761 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48763/">CVE-2022-48763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48763">CVE-2022-48763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48765/">CVE-2022-48765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48765">CVE-2022-48765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48767/">CVE-2022-48767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48767">CVE-2022-48767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48768/">CVE-2022-48768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48768">CVE-2022-48768 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48769/">CVE-2022-48769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48769">CVE-2022-48769 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48771/">CVE-2022-48771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48771">CVE-2022-48771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48773/">CVE-2022-48773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48773">CVE-2022-48773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48774/">CVE-2022-48774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48774">CVE-2022-48774 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48775/">CVE-2022-48775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48775">CVE-2022-48775 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48776/">CVE-2022-48776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48776">CVE-2022-48776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48777/">CVE-2022-48777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48777">CVE-2022-48777 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48778/">CVE-2022-48778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48778">CVE-2022-48778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48780/">CVE-2022-48780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48780">CVE-2022-48780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48783/">CVE-2022-48783 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48783">CVE-2022-48783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48784/">CVE-2022-48784 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48784">CVE-2022-48784 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-48786/">CVE-2022-48786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48786">CVE-2022-48786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48787/">CVE-2022-48787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48787">CVE-2022-48787 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48788/">CVE-2022-48788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48788">CVE-2022-48788 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48789/">CVE-2022-48789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48789">CVE-2022-48789 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48790/">CVE-2022-48790 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48790">CVE-2022-48790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48791/">CVE-2022-48791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48791">CVE-2022-48791 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48792/">CVE-2022-48792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48792">CVE-2022-48792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48793/">CVE-2022-48793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48793">CVE-2022-48793 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48794/">CVE-2022-48794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48794">CVE-2022-48794 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48796/">CVE-2022-48796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48796">CVE-2022-48796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48797/">CVE-2022-48797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48797">CVE-2022-48797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48798/">CVE-2022-48798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48798">CVE-2022-48798 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48799/">CVE-2022-48799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48799">CVE-2022-48799 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48800/">CVE-2022-48800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48800">CVE-2022-48800 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48801/">CVE-2022-48801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48801">CVE-2022-48801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48802/">CVE-2022-48802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48802">CVE-2022-48802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48803/">CVE-2022-48803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48803">CVE-2022-48803 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48804/">CVE-2022-48804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48804">CVE-2022-48804 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48805/">CVE-2022-48805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48805">CVE-2022-48805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48806/">CVE-2022-48806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48806">CVE-2022-48806 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48807/">CVE-2022-48807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48807">CVE-2022-48807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48811/">CVE-2022-48811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48811">CVE-2022-48811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48812/">CVE-2022-48812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48812">CVE-2022-48812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48813/">CVE-2022-48813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48813">CVE-2022-48813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48814/">CVE-2022-48814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48814">CVE-2022-48814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48815/">CVE-2022-48815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48815">CVE-2022-48815 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48816/">CVE-2022-48816 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48816">CVE-2022-48816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48817/">CVE-2022-48817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48817">CVE-2022-48817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48818/">CVE-2022-48818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48818">CVE-2022-48818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48820/">CVE-2022-48820 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48820">CVE-2022-48820 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48821/">CVE-2022-48821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48821">CVE-2022-48821 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48822/">CVE-2022-48822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48822">CVE-2022-48822 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48823/">CVE-2022-48823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48823">CVE-2022-48823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48824/">CVE-2022-48824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48824">CVE-2022-48824 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48825/">CVE-2022-48825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48825">CVE-2022-48825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48826/">CVE-2022-48826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48826">CVE-2022-48826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48827/">CVE-2022-48827 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48827">CVE-2022-48827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48828/">CVE-2022-48828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48828">CVE-2022-48828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48829/">CVE-2022-48829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48829">CVE-2022-48829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48830/">CVE-2022-48830 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48830">CVE-2022-48830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48831/">CVE-2022-48831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48831">CVE-2022-48831 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48834/">CVE-2022-48834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48834">CVE-2022-48834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48835/">CVE-2022-48835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48835">CVE-2022-48835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48836/">CVE-2022-48836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48836">CVE-2022-48836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48837/">CVE-2022-48837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48837">CVE-2022-48837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48838/">CVE-2022-48838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48838">CVE-2022-48838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48839/">CVE-2022-48839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48839">CVE-2022-48839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48840/">CVE-2022-48840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48840">CVE-2022-48840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48841/">CVE-2022-48841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48841">CVE-2022-48841 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48842/">CVE-2022-48842 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48842">CVE-2022-48842 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48843/">CVE-2022-48843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48843">CVE-2022-48843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48847/">CVE-2022-48847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48847">CVE-2022-48847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48849/">CVE-2022-48849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48849">CVE-2022-48849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48851/">CVE-2022-48851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48851">CVE-2022-48851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48853/">CVE-2022-48853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48853">CVE-2022-48853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48856/">CVE-2022-48856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48856">CVE-2022-48856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48857/">CVE-2022-48857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48857">CVE-2022-48857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48858/">CVE-2022-48858 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48858">CVE-2022-48858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48859/">CVE-2022-48859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48859">CVE-2022-48859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48860/">CVE-2022-48860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48860">CVE-2022-48860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48861/">CVE-2022-48861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48861">CVE-2022-48861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48862/">CVE-2022-48862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48862">CVE-2022-48862 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48863/">CVE-2022-48863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48863">CVE-2022-48863 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48866/">CVE-2022-48866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48866">CVE-2022-48866 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52762/">CVE-2023-52762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52762">CVE-2023-52762 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52885/">CVE-2023-52885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52885">CVE-2023-52885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52886/">CVE-2023-52886 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52886">CVE-2023-52886 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26800/">CVE-2024-26800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26800">CVE-2024-26800 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26813/">CVE-2024-26813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26813">CVE-2024-26813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26814/">CVE-2024-26814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26814">CVE-2024-26814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26976/">CVE-2024-26976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26976">CVE-2024-26976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35901/">CVE-2024-35901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35901">CVE-2024-35901 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36974/">CVE-2024-36974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36974">CVE-2024-36974 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39463/">CVE-2024-39463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39463">CVE-2024-39463 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39494/">CVE-2024-39494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39494">CVE-2024-39494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40902/">CVE-2024-40902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40937/">CVE-2024-40937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40956/">CVE-2024-40956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40989/">CVE-2024-40989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40994/">CVE-2024-40994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41012/">CVE-2024-41012 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41012">CVE-2024-41012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41059/">CVE-2024-41059 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41069/">CVE-2024-41069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42093/">CVE-2024-42093 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879796" comment="kernel-default-5.14.21-150400.24.128.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879678" comment="kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206194" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1226463" ref_url="https://bugzilla.suse.com/1226463" source="BUGZILLA"/>
		<reference ref_id="1227138" ref_url="https://bugzilla.suse.com/1227138" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019207.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)

Other fixes:
- Build with no-afalgeng (bsc#1226463)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-15"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226463">SUSE bug 1226463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227138">SUSE bug 1227138</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879797" comment="libopenssl3-3.0.8-150400.4.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206195" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218894" ref_url="https://bugzilla.suse.com/1218894" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017833.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

Update to runc v1.1.11:

- CVE-2024-21626: Fixed container breakout. (bsc#1218894)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-01"/>
	<updated date="2024-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218894">SUSE bug 1218894</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845233" comment="runc-1.1.11-150000.58.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206196" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1229069" ref_url="https://bugzilla.suse.com/1229069" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31315" ref_url="https://www.suse.com/security/cve/CVE-2023-31315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036646.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

CVE-2023-31315: Fixed validation in a model specific register (MSR) that lead to modification of SMM configuration by malicious program with ring0 access (bsc#1229069)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229069">SUSE bug 1229069</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31315/">CVE-2023-31315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880480" comment="kernel-firmware-all-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880481" comment="kernel-firmware-amdgpu-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880482" comment="kernel-firmware-ath10k-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880483" comment="kernel-firmware-ath11k-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880484" comment="kernel-firmware-atheros-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880485" comment="kernel-firmware-bluetooth-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880486" comment="kernel-firmware-bnx2-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880487" comment="kernel-firmware-brcm-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880488" comment="kernel-firmware-chelsio-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880489" comment="kernel-firmware-dpaa2-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880490" comment="kernel-firmware-i915-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880491" comment="kernel-firmware-intel-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880492" comment="kernel-firmware-iwlwifi-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880493" comment="kernel-firmware-liquidio-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880494" comment="kernel-firmware-marvell-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880495" comment="kernel-firmware-media-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880496" comment="kernel-firmware-mediatek-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880497" comment="kernel-firmware-mellanox-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880498" comment="kernel-firmware-mwifiex-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880499" comment="kernel-firmware-network-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880500" comment="kernel-firmware-nfp-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880501" comment="kernel-firmware-nvidia-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880502" comment="kernel-firmware-platform-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880503" comment="kernel-firmware-prestera-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880504" comment="kernel-firmware-qcom-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880505" comment="kernel-firmware-qlogic-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880506" comment="kernel-firmware-radeon-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880507" comment="kernel-firmware-realtek-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880508" comment="kernel-firmware-serial-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880509" comment="kernel-firmware-sound-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880510" comment="kernel-firmware-ti-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880511" comment="kernel-firmware-ueagle-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880512" comment="kernel-firmware-usb-network-20220509-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880513" comment="ucode-amd-20220509-150400.4.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206197" version="1" class="patch">
	<metadata>
		<title>Security update for keepalived (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1228123" ref_url="https://bugzilla.suse.com/1228123" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-41184" ref_url="https://www.suse.com/security/cve/CVE-2024-41184/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036692.html" source="SUSE-SU"/>
		<description>
This update for keepalived fixes the following issues:

- CVE-2024-41184: Fixed integer overflow in vrrp_ipsets_handler (bsc#1228123)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228123">SUSE bug 1228123</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-41184/">CVE-2024-41184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41184">CVE-2024-41184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881294" comment="keepalived-2.2.2-150400.3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206198" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218571" ref_url="https://bugzilla.suse.com/1218571" source="BUGZILLA"/>
		<reference ref_id="1219238" ref_url="https://bugzilla.suse.com/1219238" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-7207" ref_url="https://www.suse.com/security/cve/CVE-2023-7207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017842.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- Fixed cpio not extracting correctly when using --no-absolute-filenames option the security fix for CVE-2023-7207 (bsc#1218571, bsc#1219238)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-11"/>
	<updated date="2024-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218571">SUSE bug 1218571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219238">SUSE bug 1219238</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-7207/">CVE-2023-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7207">CVE-2023-7207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845234" comment="cpio-2.13-150400.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206199" version="1" class="patch">
	<metadata>
		<title>Security update for python3-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1228105" ref_url="https://bugzilla.suse.com/1228105" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036709.html" source="SUSE-SU"/>
		<description>
This update for python3-setuptools fixes the following issues:

- CVE-2024-6345: Fixed code execution via download functions in the package_index module (bsc#1228105)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228105">SUSE bug 1228105</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881385" comment="python3-setuptools-44.1.1-150400.9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206200" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1228535" ref_url="https://bugzilla.suse.com/1228535" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7264" ref_url="https://www.suse.com/security/cve/CVE-2024-7264/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036722.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

  - CVE-2024-7264: Fixed out-of-bounds read in ASN.1 date parser GTime2str() (bsc#1228535)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228535">SUSE bug 1228535</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7264/">CVE-2024-7264 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940478" comment="curl-8.0.1-150400.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940479" comment="libcurl4-8.0.1-150400.5.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206201" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1224044" ref_url="https://bugzilla.suse.com/1224044" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019344.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- Fixed a possible use after free regression introduced by CVE-2024-34397 patch (bsc#1224044).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1224044">SUSE bug 1224044</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941063" comment="glib2-tools-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941064" comment="libgio-2_0-0-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941065" comment="libglib-2_0-0-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941066" comment="libgmodule-2_0-0-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941067" comment="libgobject-2_0-0-2.70.5-150400.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206202" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1229129" ref_url="https://bugzilla.suse.com/1229129" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42667" ref_url="https://www.suse.com/security/cve/CVE-2023-42667/" source="CVE"/>
		<reference ref_id="CVE-2023-49141" ref_url="https://www.suse.com/security/cve/CVE-2023-49141/" source="CVE"/>
		<reference ref_id="CVE-2024-24853" ref_url="https://www.suse.com/security/cve/CVE-2024-24853/" source="CVE"/>
		<reference ref_id="CVE-2024-24980" ref_url="https://www.suse.com/security/cve/CVE-2024-24980/" source="CVE"/>
		<reference ref_id="CVE-2024-25939" ref_url="https://www.suse.com/security/cve/CVE-2024-25939/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036777.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode was updated to the 20240813 release (bsc#1229129)
  - CVE-2024-24853: Security updates for [INTEL-SA-01083](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html)
  - CVE-2024-25939: Security updates for [INTEL-SA-01118](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html)
  - CVE-2024-24980: Security updates for [INTEL-SA-01100](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html)
  - CVE-2023-42667: Security updates for [INTEL-SA-01038](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html)
  - CVE-2023-49141: Security updates for [INTEL-SA-01046](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html)
  Other issues fixed:
  - Update for functional issues. Refer to [Intel Core Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
  - Update for functional issues. Refer to [3rd Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
  - Update for functional issues. Refer to [3rd Generation Intel Xeon Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/634897) for details.
  - Update for functional issues. Refer to [2nd Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details
  - Update for functional issues. Refer to [Intel Xeon D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
  - Update for functional issues. Refer to [Intel Xeon E-2300 Processor Specification Update ](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details.
  - Update for functional issues. Refer to [13th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
  - Update for functional issues. Refer to [12th Generation Intel Core Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
  - Update for functional issues. Refer to [11th Gen Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details.
  - Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/341079) for details.
  - Update for functional issues. Refer to [10th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/615213) for details.
  - Update for functional issues. Refer to [8th and 9th Generation Intel Core Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details.
  - Update for functional issues. Refer to [8th Generation Intel Core Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338025) for details.
  - Update for functional issues. Refer to [7th and 8th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/334663) for details.
  - Update for functional issues. Refer to [Intel Processors and Intel Core i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details.
  - Update for functional issues. Refer to [Intel Atom x6000E Series, and Intel Pentium and Celeron N and J Series Processors for Internet of Things (IoT) Applications](https://cdrdv2.intel.com/v1/dl/getContent/636674) for details.
 Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | AML-Y22        | H0       | 06-8e-09/10 | 000000f4 | 000000f6 | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile
  | CFL-H          | R0       | 06-9e-0d/22 | 000000fc | 00000100 | Core Gen9 Mobile
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000f6 | 000000f8 | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000f4 | 000000f6 | Core Gen8
  | CFL-S          | P0       | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 Desktop
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile
  | CLX-SP         | B1       | 06-55-07/bf | 05003605 | 05003707 | Xeon Scalable Gen2
  | CML-H          | R1       | 06-a5-02/20 | 000000fa | 000000fc | Core Gen10 Mobile
  | CML-S102       | Q0       | 06-a5-05/22 | 000000fa | 000000fc | Core Gen10
  | CML-S62        | G1       | 06-a5-03/22 | 000000fa | 000000fc | Core Gen10
  | CML-U42        | V0       | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile
  | CML-U62 V1     | A0       | 06-a6-00/80 | 000000fa | 000000fe | Core Gen10 Mobile
  | CML-U62 V2     | K1       | 06-a6-01/80 | 000000fa | 000000fc | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf | 07002802 | 07002904 | Xeon Scalable Gen3
  | EHL            | B1       | 06-96-01/01 | 00000019 | 0000001a | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
  | ICL-D          | B0       | 06-6c-01/10 | 01000290 | 010002b0 | Xeon D-17xx, D-27xx
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000c4 | 000000c6 | Core Gen10 Mobile
  | ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003d1 | 0d0003e7 | Xeon Scalable Gen3
  | KBL-R U        | Y0       | 06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile
  | KBL-U23e       | J1       | 06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile
  | MTL            | C-0      | 06-aa-04/e6 | 0000001c | 0000001e | Core Ultra Processor
  | RKL-S          | B0       | 06-a7-01/02 | 0000005e | 00000062 | Core Gen11
  | TGL            | B0/B1    | 06-8c-01/80 | 000000b6 | 000000b8 | Core Gen11 Mobile
  | TGL-H          | R0       | 06-8d-01/c2 | 00000050 | 00000052 | Core Gen11 Mobile
  | TGL-R          | C0       | 06-8c-02/c2 | 00000036 | 00000038 | Core Gen11 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000f4 | 000000f6 | Core Gen8 Mobile

- update to 20240531:
  * Update for functional issues. Refer to Intel Pentium Silver
    and Intel Celeron Processor Specification Update
  - Updated Platforms:
    | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
    |:---------------|:---------|:------------|:---------|:---------|:---------
    | GLK            | B0       | 06-7a-01/01 | 00000040 | 00000042 | Pentium Silver N/J5xxx, Celeron N/J4xxx
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42667/">CVE-2023-42667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42667">CVE-2023-42667 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49141/">CVE-2023-49141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49141">CVE-2023-49141 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-24853/">CVE-2024-24853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24980/">CVE-2024-24980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24980">CVE-2024-24980 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-25939/">CVE-2024-25939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25939">CVE-2024-25939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940580" comment="ucode-intel-20240813-150200.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206203" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1229465" ref_url="https://bugzilla.suse.com/1229465" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6119" ref_url="https://www.suse.com/security/cve/CVE-2024-6119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036765.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-6119: Fixed denial of service in X.509 name checks (bsc#1229465)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229465">SUSE bug 1229465</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6119/">CVE-2024-6119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6119">CVE-2024-6119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941068" comment="libopenssl3-3.0.8-150400.4.63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206204" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1228924" ref_url="https://bugzilla.suse.com/1228924" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7006" ref_url="https://www.suse.com/security/cve/CVE-2024-7006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3115-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036756.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2024-7006: Fixed null pointer dereference in tif_dirinfo.c (bsc#1228924)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228924">SUSE bug 1228924</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7006/">CVE-2024-7006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7006">CVE-2024-7006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941062" comment="libtiff5-4.0.9-150000.45.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206205" version="1" class="patch">
	<metadata>
		<title>Security update for buildah, docker (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214855" ref_url="https://bugzilla.suse.com/1214855" source="BUGZILLA"/>
		<reference ref_id="1219267" ref_url="https://bugzilla.suse.com/1219267" source="BUGZILLA"/>
		<reference ref_id="1219268" ref_url="https://bugzilla.suse.com/1219268" source="BUGZILLA"/>
		<reference ref_id="1219438" ref_url="https://bugzilla.suse.com/1219438" source="BUGZILLA"/>
		<reference ref_id="1221243" ref_url="https://bugzilla.suse.com/1221243" source="BUGZILLA"/>
		<reference ref_id="1221677" ref_url="https://bugzilla.suse.com/1221677" source="BUGZILLA"/>
		<reference ref_id="1221916" ref_url="https://bugzilla.suse.com/1221916" source="BUGZILLA"/>
		<reference ref_id="1223409" ref_url="https://bugzilla.suse.com/1223409" source="BUGZILLA"/>
		<reference ref_id="1224117" ref_url="https://bugzilla.suse.com/1224117" source="BUGZILLA"/>
		<reference ref_id="1228324" ref_url="https://bugzilla.suse.com/1228324" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651/" source="CVE"/>
		<reference ref_id="CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652/" source="CVE"/>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<description>
This update for buildah, docker fixes the following issues:

Changes in docker:
- CVE-2024-23651: Fixed arbitrary files write due to race condition on mounts (bsc#1219267)
- CVE-2024-23652: Fixed insufficient validation of parent directory on mount (bsc#1219268)
- CVE-2024-23653: Fixed insufficient validation on entitlement on container creation via buildkit (bsc#1219438)
- CVE-2024-41110: A Authz zero length regression that could lead to authentication bypass was fixed (bsc#1228324)

Other fixes:

- Update to Docker 25.0.6-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/25.0/#2506&gt;
- Update to Docker 25.0.5-ce (bsc#1223409)

- Fix BuildKit's symlink resolution logic to correctly handle non-lexical
  symlinks. (bsc#1221916)
- Write volume options atomically so sudden system crashes won't result in
  future Docker starts failing due to empty files. (bsc#1214855)

Changes in buildah:
- Update to version 1.35.4:
  * [release-1.35] Bump to Buildah v1.35.4
  * [release-1.35] CVE-2024-3727 updates (bsc#1224117)
  * integration test: handle new labels in 'bud and test --unsetlabel'
  * [release-1.35] Bump go-jose CVE-2024-28180
  * [release-1.35] Bump ocicrypt and go-jose CVE-2024-28180

- Update to version 1.35.3:
  * [release-1.35] Bump to Buildah v1.35.3
  * [release-1.35] correctly configure /etc/hosts and resolv.conf
  * [release-1.35] buildah: refactor resolv/hosts setup.
  * [release-1.35] rename the hostFile var to reflect
  * [release-1.35] Bump c/common to v0.58.1
  * [release-1.35] Bump Buildah to v1.35.2
  * [release-1.35] CVE-2024-24786 protobuf to 1.33
  * [release-1.35] Bump to v1.35.2-dev

- Update to version 1.35.1:
  * [release-1.35] Bump to v1.35.1
  * [release-1.35] CVE-2024-1753 container escape fix (bsc#1221677)

- Buildah dropped cni support, require netavark instead (bsc#1221243)

- Remove obsolete requires libcontainers-image &amp; libcontainers-storage

- Require passt for rootless networking (poo#156955)
  Buildah moved to passt/pasta for rootless networking from slirp4netns
  (https://github.com/containers/common/pull/1846)

- Update to version 1.35.0:
  * Bump v1.35.0
  * Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0
  * conformance tests: don't break on trailing zeroes in layer blobs
  * Add a conformance test for copying to a mounted prior stage
  * fix(deps): update module github.com/stretchr/testify to v1.9.0
  * cgroups: reuse version check from c/common
  * Update vendor of containers/(common,image)
  * fix(deps): update github.com/containers/storage digest to eadc620
  * fix(deps): update github.com/containers/luksy digest to ceb12d4
  * fix(deps): update github.com/containers/image/v5 digest to cdc6802
  * manifest add: complain if we get artifact flags without --artifact
  * Use retry logic from containers/common
  * Vendor in containers/(storage,image,common)
  * Update module golang.org/x/crypto to v0.20.0
  * Add comment re: Total Success task name
  * tests: skip_if_no_unshare(): check for --setuid
  * Properly handle build --pull=false
  * [skip-ci] Update tim-actions/get-pr-commits action to v1.3.1
  * Update module go.etcd.io/bbolt to v1.3.9
  * Revert 'Reduce official image size'
  * Update module github.com/opencontainers/image-spec to v1.1.0
  * Reduce official image size
  * Build with CNI support on FreeBSD
  * build --all-platforms: skip some base 'image' platforms
  * Bump main to v1.35.0-dev
  * Vendor in latest containers/(storage,image,common)
  * Split up error messages for missing --sbom related flags
  * `buildah manifest`: add artifact-related options
  * cmd/buildah/manifest.go: lock lists before adding/annotating/pushing
  * cmd/buildah/manifest.go: don't make struct declarations aliases
  * Use golang.org/x/exp/slices.Contains
  * Disable loong64 again
  * Fix a couple of typos in one-line comments
  * egrep is obsolescent; use grep -E
  * Try Cirrus with a newer VM version
  * Set CONTAINERS_CONF in the chroot-mount-flags integration test
  * Update to match dependency API update
  * Update github.com/openshift/imagebuilder and containers/common
  * docs: correct default authfile path
  * fix(deps): update module github.com/containerd/containerd to v1.7.13
  * tests: retrofit test for heredoc summary
  * build, heredoc: show heredoc summary in build output
  * manifest, push: add support for --retry and --retry-delay
  * fix(deps): update github.com/openshift/imagebuilder digest to b767bc3
  * imagebuildah: fix crash with empty RUN
  * fix(deps): update github.com/containers/luksy digest to b62d551
  * fix(deps): update module github.com/opencontainers/runc to v1.1.12 [security]
  * fix(deps): update module github.com/moby/buildkit to v0.12.5 [security]
  * Make buildah match podman for handling of ulimits
  * docs: move footnotes to where they're applicable
  * Allow users to specify no-dereference
  * Run codespell on code
  * Fix FreeBSD version parsing
  * Fix a build break on FreeBSD
  * Remove a bad FROM line
  * fix(deps): update module github.com/onsi/gomega to v1.31.1
  * fix(deps): update module github.com/opencontainers/image-spec to v1.1.0-rc6
  * docs: use reversed logo for dark theme in README
  * build,commit: add --sbom to scan and produce SBOMs when committing
  * commit: force omitHistory if the parent has layers but no history
  * docs: fix a couple of typos
  * internal/mkcw.Archive(): handle extra image content
  * stage_executor,heredoc: honor interpreter in heredoc
  * stage_executor,layers: burst cache if heredoc content is changed
  * fix(deps): update module golang.org/x/crypto to v0.18.0
  * Replace map[K]bool with map[K]struct{} where it makes sense
  * fix(deps): update module golang.org/x/sync to v0.6.0
  * fix(deps): update module golang.org/x/term to v0.16.0
  * Bump CI VMs
  * Replace strings.SplitN with strings.Cut
  * fix(deps): update github.com/containers/storage digest to ef81e9b
  * fix(deps): update github.com/containers/image/v5 digest to 1b221d4
  * fix(deps): update module github.com/fsouza/go-dockerclient to v1.10.1
  * Document use of containers-transports values in buildah
  * fix(deps): update module golang.org/x/crypto to v0.17.0 [security]
  * chore(deps): update dependency containers/automation_images to v20231208
  * manifest: addCompression use default from containers.conf
  * commit: add a --add-file flag
  * mkcw: populate the rootfs using an overlay
  * chore(deps): update dependency containers/automation_images to v20230517
  * [skip-ci] Update actions/stale action to v9
  * fix(deps): update module github.com/containernetworking/plugins to v1.4.0
  * fix(deps): update github.com/containers/image/v5 digest to 7a40fee
  * Bump to v1.34.1-dev
  * Ignore errors if label.Relabel returns ENOSUP
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1214855">SUSE bug 1214855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219267">SUSE bug 1219267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219268">SUSE bug 1219268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219438">SUSE bug 1219438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221243">SUSE bug 1221243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221677">SUSE bug 1221677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221916">SUSE bug 1221916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223409">SUSE bug 1223409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224117">SUSE bug 1224117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228324">SUSE bug 1228324</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941061" comment="docker-25.0.6_ce-150000.207.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206206" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218297" ref_url="https://bugzilla.suse.com/1218297" source="BUGZILLA"/>
		<reference ref_id="1221479" ref_url="https://bugzilla.suse.com/1221479" source="BUGZILLA"/>
		<reference ref_id="1226414" ref_url="https://bugzilla.suse.com/1226414" source="BUGZILLA"/>
		<reference ref_id="1228091" ref_url="https://bugzilla.suse.com/1228091" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-7008" ref_url="https://www.suse.com/security/cve/CVE-2023-7008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019374.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2023-7008: Fixed man-in-the-middle due to unsigned name response in signed zone not refused when DNSSEC=yes (bsc#1218297)

Other fixes:
- Unit: drop ProtectClock=yes from systemd-udevd.service (bsc#1226414)
- Don't mention any rpm macros inside comments, even if escaped (bsc#1228091)
- Skip redundant dependencies specified the LSB description that references the file name of the service itself for early boot scripts (bsc#1221479).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-05"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218297">SUSE bug 1218297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221479">SUSE bug 1221479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226414">SUSE bug 1226414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228091">SUSE bug 1228091</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-7008/">CVE-2023-7008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7008">CVE-2023-7008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941349" comment="libsystemd0-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941350" comment="libudev1-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941351" comment="systemd-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941352" comment="systemd-container-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941353" comment="systemd-journal-remote-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941354" comment="systemd-sysvinit-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941355" comment="udev-249.17-150400.8.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206207" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230020" ref_url="https://bugzilla.suse.com/1230020" source="BUGZILLA"/>
		<reference ref_id="1230034" ref_url="https://bugzilla.suse.com/1230034" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-7256" ref_url="https://www.suse.com/security/cve/CVE-2023-7256/" source="CVE"/>
		<reference ref_id="CVE-2024-8006" ref_url="https://www.suse.com/security/cve/CVE-2024-8006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036856.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2024-8006: NULL pointer dereference in function pcap_findalldevs_ex(). (bsc#1230034)
- CVE-2023-7256: double free via struct addrinfo in function sock_initaddress(). (bsc#1230020) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2024-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230020">SUSE bug 1230020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230034">SUSE bug 1230034</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-7256/">CVE-2023-7256 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7256">CVE-2023-7256 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-8006/">CVE-2024-8006 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8006">CVE-2024-8006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942412" comment="libpcap1-1.10.1-150400.3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206208" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230093" ref_url="https://bugzilla.suse.com/1230093" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8096" ref_url="https://www.suse.com/security/cve/CVE-2024-8096/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036855.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2024-8096: OCSP stapling bypass with GnuTLS. (bsc#1230093)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2024-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230093">SUSE bug 1230093</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8096/">CVE-2024-8096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8096">CVE-2024-8096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942413" comment="curl-8.0.1-150400.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942414" comment="libcurl4-8.0.1-150400.5.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206209" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1229930" ref_url="https://bugzilla.suse.com/1229930" source="BUGZILLA"/>
		<reference ref_id="1229931" ref_url="https://bugzilla.suse.com/1229931" source="BUGZILLA"/>
		<reference ref_id="1229932" ref_url="https://bugzilla.suse.com/1229932" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019424.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2024-45492: integer overflow in function nextScaffoldPart. (bsc#1229932)
- CVE-2024-45491: integer overflow in dtdCopy. (bsc#1229931)
- CVE-2024-45490: negative length for XML_ParseBuffer not rejected. (bsc#1229930)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229930">SUSE bug 1229930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229931">SUSE bug 1229931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229932">SUSE bug 1229932</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942542" comment="libexpat1-2.4.4-150400.3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206210" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1200528" ref_url="https://bugzilla.suse.com/1200528" source="BUGZILLA"/>
		<reference ref_id="1217070" ref_url="https://bugzilla.suse.com/1217070" source="BUGZILLA"/>
		<reference ref_id="1228553" ref_url="https://bugzilla.suse.com/1228553" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019420.html" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

- Update to containerd v1.7.21
- CVE-2023-47108: Fixed DoS vulnerability in otelgrpc (uncontrolled resource consumption) due to unbound cardinality metrics. (bsc#1217070)
- CVE-2023-45142: Fixed DoS vulnerability in otelhttp. (bsc#1228553)
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200528">SUSE bug 1200528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217070">SUSE bug 1217070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228553">SUSE bug 1228553</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942538" comment="containerd-1.7.21-150000.117.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206211" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230092" ref_url="https://bugzilla.suse.com/1230092" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45310" ref_url="https://www.suse.com/security/cve/CVE-2024-45310/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019419.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

- Update to runc v1.1.14
- CVE-2024-45310: Fixed an issue where runc can be tricked into creating empty files/directories on host. (bsc#1230092)
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-12"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1230092">SUSE bug 1230092</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45310/">CVE-2024-45310 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942539" comment="runc-1.1.14-150000.70.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206212" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194111" ref_url="https://bugzilla.suse.com/1194111" source="BUGZILLA"/>
		<reference ref_id="1194765" ref_url="https://bugzilla.suse.com/1194765" source="BUGZILLA"/>
		<reference ref_id="1196261" ref_url="https://bugzilla.suse.com/1196261" source="BUGZILLA"/>
		<reference ref_id="1196516" ref_url="https://bugzilla.suse.com/1196516" source="BUGZILLA"/>
		<reference ref_id="1196894" ref_url="https://bugzilla.suse.com/1196894" source="BUGZILLA"/>
		<reference ref_id="1198017" ref_url="https://bugzilla.suse.com/1198017" source="BUGZILLA"/>
		<reference ref_id="1203360" ref_url="https://bugzilla.suse.com/1203360" source="BUGZILLA"/>
		<reference ref_id="1206006" ref_url="https://bugzilla.suse.com/1206006" source="BUGZILLA"/>
		<reference ref_id="1206258" ref_url="https://bugzilla.suse.com/1206258" source="BUGZILLA"/>
		<reference ref_id="1207158" ref_url="https://bugzilla.suse.com/1207158" source="BUGZILLA"/>
		<reference ref_id="1216834" ref_url="https://bugzilla.suse.com/1216834" source="BUGZILLA"/>
		<reference ref_id="1221326" ref_url="https://bugzilla.suse.com/1221326" source="BUGZILLA"/>
		<reference ref_id="1221645" ref_url="https://bugzilla.suse.com/1221645" source="BUGZILLA"/>
		<reference ref_id="1223191" ref_url="https://bugzilla.suse.com/1223191" source="BUGZILLA"/>
		<reference ref_id="1224105" ref_url="https://bugzilla.suse.com/1224105" source="BUGZILLA"/>
		<reference ref_id="1227832" ref_url="https://bugzilla.suse.com/1227832" source="BUGZILLA"/>
		<reference ref_id="1228020" ref_url="https://bugzilla.suse.com/1228020" source="BUGZILLA"/>
		<reference ref_id="1228466" ref_url="https://bugzilla.suse.com/1228466" source="BUGZILLA"/>
		<reference ref_id="1228516" ref_url="https://bugzilla.suse.com/1228516" source="BUGZILLA"/>
		<reference ref_id="1228576" ref_url="https://bugzilla.suse.com/1228576" source="BUGZILLA"/>
		<reference ref_id="1228718" ref_url="https://bugzilla.suse.com/1228718" source="BUGZILLA"/>
		<reference ref_id="1228801" ref_url="https://bugzilla.suse.com/1228801" source="BUGZILLA"/>
		<reference ref_id="1228959" ref_url="https://bugzilla.suse.com/1228959" source="BUGZILLA"/>
		<reference ref_id="1229042" ref_url="https://bugzilla.suse.com/1229042" source="BUGZILLA"/>
		<reference ref_id="1229292" ref_url="https://bugzilla.suse.com/1229292" source="BUGZILLA"/>
		<reference ref_id="1229400" ref_url="https://bugzilla.suse.com/1229400" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229500" ref_url="https://bugzilla.suse.com/1229500" source="BUGZILLA"/>
		<reference ref_id="1229503" ref_url="https://bugzilla.suse.com/1229503" source="BUGZILLA"/>
		<reference ref_id="1229506" ref_url="https://bugzilla.suse.com/1229506" source="BUGZILLA"/>
		<reference ref_id="1229507" ref_url="https://bugzilla.suse.com/1229507" source="BUGZILLA"/>
		<reference ref_id="1229508" ref_url="https://bugzilla.suse.com/1229508" source="BUGZILLA"/>
		<reference ref_id="1229509" ref_url="https://bugzilla.suse.com/1229509" source="BUGZILLA"/>
		<reference ref_id="1229510" ref_url="https://bugzilla.suse.com/1229510" source="BUGZILLA"/>
		<reference ref_id="1229512" ref_url="https://bugzilla.suse.com/1229512" source="BUGZILLA"/>
		<reference ref_id="1229516" ref_url="https://bugzilla.suse.com/1229516" source="BUGZILLA"/>
		<reference ref_id="1229522" ref_url="https://bugzilla.suse.com/1229522" source="BUGZILLA"/>
		<reference ref_id="1229526" ref_url="https://bugzilla.suse.com/1229526" source="BUGZILLA"/>
		<reference ref_id="1229528" ref_url="https://bugzilla.suse.com/1229528" source="BUGZILLA"/>
		<reference ref_id="1229531" ref_url="https://bugzilla.suse.com/1229531" source="BUGZILLA"/>
		<reference ref_id="1229533" ref_url="https://bugzilla.suse.com/1229533" source="BUGZILLA"/>
		<reference ref_id="1229535" ref_url="https://bugzilla.suse.com/1229535" source="BUGZILLA"/>
		<reference ref_id="1229536" ref_url="https://bugzilla.suse.com/1229536" source="BUGZILLA"/>
		<reference ref_id="1229537" ref_url="https://bugzilla.suse.com/1229537" source="BUGZILLA"/>
		<reference ref_id="1229540" ref_url="https://bugzilla.suse.com/1229540" source="BUGZILLA"/>
		<reference ref_id="1229544" ref_url="https://bugzilla.suse.com/1229544" source="BUGZILLA"/>
		<reference ref_id="1229554" ref_url="https://bugzilla.suse.com/1229554" source="BUGZILLA"/>
		<reference ref_id="1229557" ref_url="https://bugzilla.suse.com/1229557" source="BUGZILLA"/>
		<reference ref_id="1229565" ref_url="https://bugzilla.suse.com/1229565" source="BUGZILLA"/>
		<reference ref_id="1229566" ref_url="https://bugzilla.suse.com/1229566" source="BUGZILLA"/>
		<reference ref_id="1229568" ref_url="https://bugzilla.suse.com/1229568" source="BUGZILLA"/>
		<reference ref_id="1229581" ref_url="https://bugzilla.suse.com/1229581" source="BUGZILLA"/>
		<reference ref_id="1229598" ref_url="https://bugzilla.suse.com/1229598" source="BUGZILLA"/>
		<reference ref_id="1229603" ref_url="https://bugzilla.suse.com/1229603" source="BUGZILLA"/>
		<reference ref_id="1229604" ref_url="https://bugzilla.suse.com/1229604" source="BUGZILLA"/>
		<reference ref_id="1229608" ref_url="https://bugzilla.suse.com/1229608" source="BUGZILLA"/>
		<reference ref_id="1229611" ref_url="https://bugzilla.suse.com/1229611" source="BUGZILLA"/>
		<reference ref_id="1229612" ref_url="https://bugzilla.suse.com/1229612" source="BUGZILLA"/>
		<reference ref_id="1229613" ref_url="https://bugzilla.suse.com/1229613" source="BUGZILLA"/>
		<reference ref_id="1229614" ref_url="https://bugzilla.suse.com/1229614" source="BUGZILLA"/>
		<reference ref_id="1229617" ref_url="https://bugzilla.suse.com/1229617" source="BUGZILLA"/>
		<reference ref_id="1229619" ref_url="https://bugzilla.suse.com/1229619" source="BUGZILLA"/>
		<reference ref_id="1229620" ref_url="https://bugzilla.suse.com/1229620" source="BUGZILLA"/>
		<reference ref_id="1229622" ref_url="https://bugzilla.suse.com/1229622" source="BUGZILLA"/>
		<reference ref_id="1229623" ref_url="https://bugzilla.suse.com/1229623" source="BUGZILLA"/>
		<reference ref_id="1229624" ref_url="https://bugzilla.suse.com/1229624" source="BUGZILLA"/>
		<reference ref_id="1229625" ref_url="https://bugzilla.suse.com/1229625" source="BUGZILLA"/>
		<reference ref_id="1229626" ref_url="https://bugzilla.suse.com/1229626" source="BUGZILLA"/>
		<reference ref_id="1229628" ref_url="https://bugzilla.suse.com/1229628" source="BUGZILLA"/>
		<reference ref_id="1229629" ref_url="https://bugzilla.suse.com/1229629" source="BUGZILLA"/>
		<reference ref_id="1229630" ref_url="https://bugzilla.suse.com/1229630" source="BUGZILLA"/>
		<reference ref_id="1229631" ref_url="https://bugzilla.suse.com/1229631" source="BUGZILLA"/>
		<reference ref_id="1229635" ref_url="https://bugzilla.suse.com/1229635" source="BUGZILLA"/>
		<reference ref_id="1229636" ref_url="https://bugzilla.suse.com/1229636" source="BUGZILLA"/>
		<reference ref_id="1229637" ref_url="https://bugzilla.suse.com/1229637" source="BUGZILLA"/>
		<reference ref_id="1229638" ref_url="https://bugzilla.suse.com/1229638" source="BUGZILLA"/>
		<reference ref_id="1229639" ref_url="https://bugzilla.suse.com/1229639" source="BUGZILLA"/>
		<reference ref_id="1229641" ref_url="https://bugzilla.suse.com/1229641" source="BUGZILLA"/>
		<reference ref_id="1229642" ref_url="https://bugzilla.suse.com/1229642" source="BUGZILLA"/>
		<reference ref_id="1229643" ref_url="https://bugzilla.suse.com/1229643" source="BUGZILLA"/>
		<reference ref_id="1229645" ref_url="https://bugzilla.suse.com/1229645" source="BUGZILLA"/>
		<reference ref_id="1229657" ref_url="https://bugzilla.suse.com/1229657" source="BUGZILLA"/>
		<reference ref_id="1229664" ref_url="https://bugzilla.suse.com/1229664" source="BUGZILLA"/>
		<reference ref_id="1229707" ref_url="https://bugzilla.suse.com/1229707" source="BUGZILLA"/>
		<reference ref_id="1229792" ref_url="https://bugzilla.suse.com/1229792" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4441" ref_url="https://www.suse.com/security/cve/CVE-2021-4441/" source="CVE"/>
		<reference ref_id="CVE-2022-48868" ref_url="https://www.suse.com/security/cve/CVE-2022-48868/" source="CVE"/>
		<reference ref_id="CVE-2022-48869" ref_url="https://www.suse.com/security/cve/CVE-2022-48869/" source="CVE"/>
		<reference ref_id="CVE-2022-48870" ref_url="https://www.suse.com/security/cve/CVE-2022-48870/" source="CVE"/>
		<reference ref_id="CVE-2022-48871" ref_url="https://www.suse.com/security/cve/CVE-2022-48871/" source="CVE"/>
		<reference ref_id="CVE-2022-48872" ref_url="https://www.suse.com/security/cve/CVE-2022-48872/" source="CVE"/>
		<reference ref_id="CVE-2022-48873" ref_url="https://www.suse.com/security/cve/CVE-2022-48873/" source="CVE"/>
		<reference ref_id="CVE-2022-48875" ref_url="https://www.suse.com/security/cve/CVE-2022-48875/" source="CVE"/>
		<reference ref_id="CVE-2022-48878" ref_url="https://www.suse.com/security/cve/CVE-2022-48878/" source="CVE"/>
		<reference ref_id="CVE-2022-48880" ref_url="https://www.suse.com/security/cve/CVE-2022-48880/" source="CVE"/>
		<reference ref_id="CVE-2022-48890" ref_url="https://www.suse.com/security/cve/CVE-2022-48890/" source="CVE"/>
		<reference ref_id="CVE-2022-48891" ref_url="https://www.suse.com/security/cve/CVE-2022-48891/" source="CVE"/>
		<reference ref_id="CVE-2022-48896" ref_url="https://www.suse.com/security/cve/CVE-2022-48896/" source="CVE"/>
		<reference ref_id="CVE-2022-48898" ref_url="https://www.suse.com/security/cve/CVE-2022-48898/" source="CVE"/>
		<reference ref_id="CVE-2022-48899" ref_url="https://www.suse.com/security/cve/CVE-2022-48899/" source="CVE"/>
		<reference ref_id="CVE-2022-48903" ref_url="https://www.suse.com/security/cve/CVE-2022-48903/" source="CVE"/>
		<reference ref_id="CVE-2022-48904" ref_url="https://www.suse.com/security/cve/CVE-2022-48904/" source="CVE"/>
		<reference ref_id="CVE-2022-48905" ref_url="https://www.suse.com/security/cve/CVE-2022-48905/" source="CVE"/>
		<reference ref_id="CVE-2022-48907" ref_url="https://www.suse.com/security/cve/CVE-2022-48907/" source="CVE"/>
		<reference ref_id="CVE-2022-48909" ref_url="https://www.suse.com/security/cve/CVE-2022-48909/" source="CVE"/>
		<reference ref_id="CVE-2022-48912" ref_url="https://www.suse.com/security/cve/CVE-2022-48912/" source="CVE"/>
		<reference ref_id="CVE-2022-48913" ref_url="https://www.suse.com/security/cve/CVE-2022-48913/" source="CVE"/>
		<reference ref_id="CVE-2022-48914" ref_url="https://www.suse.com/security/cve/CVE-2022-48914/" source="CVE"/>
		<reference ref_id="CVE-2022-48915" ref_url="https://www.suse.com/security/cve/CVE-2022-48915/" source="CVE"/>
		<reference ref_id="CVE-2022-48916" ref_url="https://www.suse.com/security/cve/CVE-2022-48916/" source="CVE"/>
		<reference ref_id="CVE-2022-48917" ref_url="https://www.suse.com/security/cve/CVE-2022-48917/" source="CVE"/>
		<reference ref_id="CVE-2022-48918" ref_url="https://www.suse.com/security/cve/CVE-2022-48918/" source="CVE"/>
		<reference ref_id="CVE-2022-48919" ref_url="https://www.suse.com/security/cve/CVE-2022-48919/" source="CVE"/>
		<reference ref_id="CVE-2022-48921" ref_url="https://www.suse.com/security/cve/CVE-2022-48921/" source="CVE"/>
		<reference ref_id="CVE-2022-48924" ref_url="https://www.suse.com/security/cve/CVE-2022-48924/" source="CVE"/>
		<reference ref_id="CVE-2022-48925" ref_url="https://www.suse.com/security/cve/CVE-2022-48925/" source="CVE"/>
		<reference ref_id="CVE-2022-48926" ref_url="https://www.suse.com/security/cve/CVE-2022-48926/" source="CVE"/>
		<reference ref_id="CVE-2022-48927" ref_url="https://www.suse.com/security/cve/CVE-2022-48927/" source="CVE"/>
		<reference ref_id="CVE-2022-48928" ref_url="https://www.suse.com/security/cve/CVE-2022-48928/" source="CVE"/>
		<reference ref_id="CVE-2022-48929" ref_url="https://www.suse.com/security/cve/CVE-2022-48929/" source="CVE"/>
		<reference ref_id="CVE-2022-48930" ref_url="https://www.suse.com/security/cve/CVE-2022-48930/" source="CVE"/>
		<reference ref_id="CVE-2022-48931" ref_url="https://www.suse.com/security/cve/CVE-2022-48931/" source="CVE"/>
		<reference ref_id="CVE-2022-48932" ref_url="https://www.suse.com/security/cve/CVE-2022-48932/" source="CVE"/>
		<reference ref_id="CVE-2022-48934" ref_url="https://www.suse.com/security/cve/CVE-2022-48934/" source="CVE"/>
		<reference ref_id="CVE-2022-48935" ref_url="https://www.suse.com/security/cve/CVE-2022-48935/" source="CVE"/>
		<reference ref_id="CVE-2022-48937" ref_url="https://www.suse.com/security/cve/CVE-2022-48937/" source="CVE"/>
		<reference ref_id="CVE-2022-48938" ref_url="https://www.suse.com/security/cve/CVE-2022-48938/" source="CVE"/>
		<reference ref_id="CVE-2022-48941" ref_url="https://www.suse.com/security/cve/CVE-2022-48941/" source="CVE"/>
		<reference ref_id="CVE-2022-48942" ref_url="https://www.suse.com/security/cve/CVE-2022-48942/" source="CVE"/>
		<reference ref_id="CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943/" source="CVE"/>
		<reference ref_id="CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489/" source="CVE"/>
		<reference ref_id="CVE-2023-52893" ref_url="https://www.suse.com/security/cve/CVE-2023-52893/" source="CVE"/>
		<reference ref_id="CVE-2023-52894" ref_url="https://www.suse.com/security/cve/CVE-2023-52894/" source="CVE"/>
		<reference ref_id="CVE-2023-52896" ref_url="https://www.suse.com/security/cve/CVE-2023-52896/" source="CVE"/>
		<reference ref_id="CVE-2023-52898" ref_url="https://www.suse.com/security/cve/CVE-2023-52898/" source="CVE"/>
		<reference ref_id="CVE-2023-52900" ref_url="https://www.suse.com/security/cve/CVE-2023-52900/" source="CVE"/>
		<reference ref_id="CVE-2023-52901" ref_url="https://www.suse.com/security/cve/CVE-2023-52901/" source="CVE"/>
		<reference ref_id="CVE-2023-52905" ref_url="https://www.suse.com/security/cve/CVE-2023-52905/" source="CVE"/>
		<reference ref_id="CVE-2023-52907" ref_url="https://www.suse.com/security/cve/CVE-2023-52907/" source="CVE"/>
		<reference ref_id="CVE-2023-52911" ref_url="https://www.suse.com/security/cve/CVE-2023-52911/" source="CVE"/>
		<reference ref_id="CVE-2024-40910" ref_url="https://www.suse.com/security/cve/CVE-2024-40910/" source="CVE"/>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-42077" ref_url="https://www.suse.com/security/cve/CVE-2024-42077/" source="CVE"/>
		<reference ref_id="CVE-2024-42126" ref_url="https://www.suse.com/security/cve/CVE-2024-42126/" source="CVE"/>
		<reference ref_id="CVE-2024-42232" ref_url="https://www.suse.com/security/cve/CVE-2024-42232/" source="CVE"/>
		<reference ref_id="CVE-2024-42271" ref_url="https://www.suse.com/security/cve/CVE-2024-42271/" source="CVE"/>
		<reference ref_id="CVE-2024-43853" ref_url="https://www.suse.com/security/cve/CVE-2024-43853/" source="CVE"/>
		<reference ref_id="CVE-2024-43861" ref_url="https://www.suse.com/security/cve/CVE-2024-43861/" source="CVE"/>
		<reference ref_id="CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882/" source="CVE"/>
		<reference ref_id="CVE-2024-43883" ref_url="https://www.suse.com/security/cve/CVE-2024-43883/" source="CVE"/>
		<reference ref_id="CVE-2024-44938" ref_url="https://www.suse.com/security/cve/CVE-2024-44938/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release (bsc#1228576).
- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section-&gt;usage (bsc#1221326).
- CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
- CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619)
- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
- CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).

The following non-security bugs were fixed:

- Bluetooth: L2CAP: Fix deadlock (git-fixes).
- mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
- mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
- nvme_core: scan namespaces asynchronously (bsc#1224105).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194111">SUSE bug 1194111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194765">SUSE bug 1194765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196261">SUSE bug 1196261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196516">SUSE bug 1196516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196894">SUSE bug 1196894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198017">SUSE bug 1198017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203360">SUSE bug 1203360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206006">SUSE bug 1206006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206258">SUSE bug 1206258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207158">SUSE bug 1207158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216834">SUSE bug 1216834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221326">SUSE bug 1221326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221645">SUSE bug 1221645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223191">SUSE bug 1223191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224105">SUSE bug 1224105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227832">SUSE bug 1227832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228020">SUSE bug 1228020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228466">SUSE bug 1228466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228516">SUSE bug 1228516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228576">SUSE bug 1228576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228718">SUSE bug 1228718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228801">SUSE bug 1228801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228959">SUSE bug 1228959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229042">SUSE bug 1229042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229292">SUSE bug 1229292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229400">SUSE bug 1229400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229500">SUSE bug 1229500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229503">SUSE bug 1229503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229506">SUSE bug 1229506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229507">SUSE bug 1229507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229508">SUSE bug 1229508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229509">SUSE bug 1229509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229510">SUSE bug 1229510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229512">SUSE bug 1229512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229516">SUSE bug 1229516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229522">SUSE bug 1229522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229526">SUSE bug 1229526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229528">SUSE bug 1229528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229531">SUSE bug 1229531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229533">SUSE bug 1229533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229535">SUSE bug 1229535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229536">SUSE bug 1229536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229537">SUSE bug 1229537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229540">SUSE bug 1229540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229544">SUSE bug 1229544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229554">SUSE bug 1229554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229557">SUSE bug 1229557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229565">SUSE bug 1229565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229566">SUSE bug 1229566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229568">SUSE bug 1229568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229581">SUSE bug 1229581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229598">SUSE bug 1229598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229603">SUSE bug 1229603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229604">SUSE bug 1229604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229608">SUSE bug 1229608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229611">SUSE bug 1229611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229612">SUSE bug 1229612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229613">SUSE bug 1229613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229614">SUSE bug 1229614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229617">SUSE bug 1229617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229619">SUSE bug 1229619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229620">SUSE bug 1229620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229622">SUSE bug 1229622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229623">SUSE bug 1229623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229624">SUSE bug 1229624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229625">SUSE bug 1229625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229626">SUSE bug 1229626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229628">SUSE bug 1229628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229629">SUSE bug 1229629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229630">SUSE bug 1229630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229631">SUSE bug 1229631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229635">SUSE bug 1229635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229636">SUSE bug 1229636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229637">SUSE bug 1229637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229638">SUSE bug 1229638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229639">SUSE bug 1229639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229641">SUSE bug 1229641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229642">SUSE bug 1229642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229643">SUSE bug 1229643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229645">SUSE bug 1229645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229657">SUSE bug 1229657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229664">SUSE bug 1229664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229707">SUSE bug 1229707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229792">SUSE bug 1229792</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4441/">CVE-2021-4441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4441">CVE-2021-4441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48868/">CVE-2022-48868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48868">CVE-2022-48868 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48869/">CVE-2022-48869 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48869">CVE-2022-48869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48870/">CVE-2022-48870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48870">CVE-2022-48870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48871/">CVE-2022-48871 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48871">CVE-2022-48871 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48872/">CVE-2022-48872 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48872">CVE-2022-48872 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48873/">CVE-2022-48873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48873">CVE-2022-48873 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48875/">CVE-2022-48875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48875">CVE-2022-48875 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48878/">CVE-2022-48878 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48878">CVE-2022-48878 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48880/">CVE-2022-48880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48880">CVE-2022-48880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48890/">CVE-2022-48890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48890">CVE-2022-48890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48891/">CVE-2022-48891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48891">CVE-2022-48891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48896/">CVE-2022-48896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48896">CVE-2022-48896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48898/">CVE-2022-48898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48898">CVE-2022-48898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48899/">CVE-2022-48899 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48899">CVE-2022-48899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48903/">CVE-2022-48903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48903">CVE-2022-48903 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48904/">CVE-2022-48904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48904">CVE-2022-48904 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48905/">CVE-2022-48905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48905">CVE-2022-48905 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48907/">CVE-2022-48907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48907">CVE-2022-48907 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48909/">CVE-2022-48909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48909">CVE-2022-48909 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48912/">CVE-2022-48912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48912">CVE-2022-48912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48913/">CVE-2022-48913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48913">CVE-2022-48913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48914/">CVE-2022-48914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48914">CVE-2022-48914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48915/">CVE-2022-48915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48915">CVE-2022-48915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48916/">CVE-2022-48916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48916">CVE-2022-48916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48917/">CVE-2022-48917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48917">CVE-2022-48917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48918/">CVE-2022-48918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48918">CVE-2022-48918 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48919/">CVE-2022-48919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48919">CVE-2022-48919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48921/">CVE-2022-48921 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48921">CVE-2022-48921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48924/">CVE-2022-48924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48924">CVE-2022-48924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48925/">CVE-2022-48925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48925">CVE-2022-48925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48926/">CVE-2022-48926 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48926">CVE-2022-48926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48927/">CVE-2022-48927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48927">CVE-2022-48927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48928/">CVE-2022-48928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48928">CVE-2022-48928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48929/">CVE-2022-48929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48929">CVE-2022-48929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48930/">CVE-2022-48930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48930">CVE-2022-48930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48931/">CVE-2022-48931 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48931">CVE-2022-48931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48932/">CVE-2022-48932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48932">CVE-2022-48932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48934/">CVE-2022-48934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48934">CVE-2022-48934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48935/">CVE-2022-48935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48935">CVE-2022-48935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48937/">CVE-2022-48937 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48937">CVE-2022-48937 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48938/">CVE-2022-48938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48938">CVE-2022-48938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48941/">CVE-2022-48941 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48941">CVE-2022-48941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48942/">CVE-2022-48942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48942">CVE-2022-48942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52893/">CVE-2023-52893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52893">CVE-2023-52893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52894/">CVE-2023-52894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52894">CVE-2023-52894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52896/">CVE-2023-52896 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52896">CVE-2023-52896 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52898/">CVE-2023-52898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52898">CVE-2023-52898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52900/">CVE-2023-52900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52900">CVE-2023-52900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52901/">CVE-2023-52901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52901">CVE-2023-52901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52905/">CVE-2023-52905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52905">CVE-2023-52905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52907/">CVE-2023-52907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52907">CVE-2023-52907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52911/">CVE-2023-52911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52911">CVE-2023-52911 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40910/">CVE-2024-40910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40910">CVE-2024-40910 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42077/">CVE-2024-42077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42126/">CVE-2024-42126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42232/">CVE-2024-42232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42232">CVE-2024-42232 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42271/">CVE-2024-42271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43853/">CVE-2024-43853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43861/">CVE-2024-43861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43883/">CVE-2024-43883 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44938/">CVE-2024-44938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942543" comment="kernel-rt-5.14.21-150400.15.91.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942544" comment="kernel-source-rt-5.14.21-150400.15.91.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206213" version="1" class="patch">
	<metadata>
		<title>Security update for python-dnspython (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230353" ref_url="https://bugzilla.suse.com/1230353" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019447.html" source="SUSE-SU"/>
		<description>
This update for python-dnspython fixes the following issue:

- Fix CVE-2023-29483 (bsc#1230353).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2024-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230353">SUSE bug 1230353</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943081" comment="python3-dnspython-1.15.0-150000.3.10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206214" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230400" ref_url="https://bugzilla.suse.com/1230400" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23984" ref_url="https://www.suse.com/security/cve/CVE-2024-23984/" source="CVE"/>
		<reference ref_id="CVE-2024-24968" ref_url="https://www.suse.com/security/cve/CVE-2024-24968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019465.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode was updated to the 20240910 release (bsc#1230400)
- CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access.
- CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230400">SUSE bug 1230400</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23984/">CVE-2024-23984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23984">CVE-2024-23984 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24968/">CVE-2024-24968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24968">CVE-2024-24968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943528" comment="ucode-intel-20240910-150200.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206215" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1227322" ref_url="https://bugzilla.suse.com/1227322" source="BUGZILLA"/>
		<reference ref_id="1230363" ref_url="https://bugzilla.suse.com/1230363" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4467" ref_url="https://www.suse.com/security/cve/CVE-2024-4467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019504.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2024-4467: Fixed denial of service and file read/write via qemu-img info command (bsc#1227322)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-23"/>
	<updated date="2024-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227322">SUSE bug 1227322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230363">SUSE bug 1230363</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4467/">CVE-2024-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4467">CVE-2024-4467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944358" comment="qemu-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944207" comment="qemu-accel-tcg-x86-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944208" comment="qemu-arm-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944359" comment="qemu-audio-spice-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944360" comment="qemu-chardev-spice-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944361" comment="qemu-guest-agent-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944362" comment="qemu-hw-display-qxl-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944363" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944364" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944365" comment="qemu-hw-usb-redirect-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944225" comment="qemu-ipxe-1.0.0+-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944260" comment="qemu-s390x-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944229" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944230" comment="qemu-sgabios-8-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944366" comment="qemu-tools-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944367" comment="qemu-ui-opengl-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944368" comment="qemu-ui-spice-core-6.2.0-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944237" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944238" comment="qemu-x86-6.2.0-150400.37.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206216" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230245" ref_url="https://bugzilla.suse.com/1230245" source="BUGZILLA"/>
		<reference ref_id="1230413" ref_url="https://bugzilla.suse.com/1230413" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45003" ref_url="https://www.suse.com/security/cve/CVE-2024-45003/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019501.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-45003: Don't evict inode under the inode lru traversing context. (bsc#1230245) 

The following non-security bugs were fixed:

- Revert 'mm, kmsan: fix infinite recursion due to RCU critical section'. (bsc#1230413)
- Revert 'mm/sparsemem: fix race in accessing memory_section-&gt;usage'. (bsc#1230413)
- Revert 'mm: prevent derefencing NULL ptr in pfn_section_valid()'. (bsc#1230413)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-23"/>
	<updated date="2024-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230245">SUSE bug 1230245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230413">SUSE bug 1230413</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45003/">CVE-2024-45003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45003">CVE-2024-45003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944369" comment="kernel-rt-5.14.21-150400.15.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944370" comment="kernel-source-rt-5.14.21-150400.15.94.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206217" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194111" ref_url="https://bugzilla.suse.com/1194111" source="BUGZILLA"/>
		<reference ref_id="1194765" ref_url="https://bugzilla.suse.com/1194765" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1196261" ref_url="https://bugzilla.suse.com/1196261" source="BUGZILLA"/>
		<reference ref_id="1196516" ref_url="https://bugzilla.suse.com/1196516" source="BUGZILLA"/>
		<reference ref_id="1196894" ref_url="https://bugzilla.suse.com/1196894" source="BUGZILLA"/>
		<reference ref_id="1198017" ref_url="https://bugzilla.suse.com/1198017" source="BUGZILLA"/>
		<reference ref_id="1203360" ref_url="https://bugzilla.suse.com/1203360" source="BUGZILLA"/>
		<reference ref_id="1206006" ref_url="https://bugzilla.suse.com/1206006" source="BUGZILLA"/>
		<reference ref_id="1206258" ref_url="https://bugzilla.suse.com/1206258" source="BUGZILLA"/>
		<reference ref_id="1207158" ref_url="https://bugzilla.suse.com/1207158" source="BUGZILLA"/>
		<reference ref_id="1216834" ref_url="https://bugzilla.suse.com/1216834" source="BUGZILLA"/>
		<reference ref_id="1221326" ref_url="https://bugzilla.suse.com/1221326" source="BUGZILLA"/>
		<reference ref_id="1221645" ref_url="https://bugzilla.suse.com/1221645" source="BUGZILLA"/>
		<reference ref_id="1223191" ref_url="https://bugzilla.suse.com/1223191" source="BUGZILLA"/>
		<reference ref_id="1224105" ref_url="https://bugzilla.suse.com/1224105" source="BUGZILLA"/>
		<reference ref_id="1227832" ref_url="https://bugzilla.suse.com/1227832" source="BUGZILLA"/>
		<reference ref_id="1228020" ref_url="https://bugzilla.suse.com/1228020" source="BUGZILLA"/>
		<reference ref_id="1228114" ref_url="https://bugzilla.suse.com/1228114" source="BUGZILLA"/>
		<reference ref_id="1228466" ref_url="https://bugzilla.suse.com/1228466" source="BUGZILLA"/>
		<reference ref_id="1228489" ref_url="https://bugzilla.suse.com/1228489" source="BUGZILLA"/>
		<reference ref_id="1228516" ref_url="https://bugzilla.suse.com/1228516" source="BUGZILLA"/>
		<reference ref_id="1228576" ref_url="https://bugzilla.suse.com/1228576" source="BUGZILLA"/>
		<reference ref_id="1228718" ref_url="https://bugzilla.suse.com/1228718" source="BUGZILLA"/>
		<reference ref_id="1228801" ref_url="https://bugzilla.suse.com/1228801" source="BUGZILLA"/>
		<reference ref_id="1228959" ref_url="https://bugzilla.suse.com/1228959" source="BUGZILLA"/>
		<reference ref_id="1229042" ref_url="https://bugzilla.suse.com/1229042" source="BUGZILLA"/>
		<reference ref_id="1229292" ref_url="https://bugzilla.suse.com/1229292" source="BUGZILLA"/>
		<reference ref_id="1229400" ref_url="https://bugzilla.suse.com/1229400" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229500" ref_url="https://bugzilla.suse.com/1229500" source="BUGZILLA"/>
		<reference ref_id="1229503" ref_url="https://bugzilla.suse.com/1229503" source="BUGZILLA"/>
		<reference ref_id="1229506" ref_url="https://bugzilla.suse.com/1229506" source="BUGZILLA"/>
		<reference ref_id="1229507" ref_url="https://bugzilla.suse.com/1229507" source="BUGZILLA"/>
		<reference ref_id="1229508" ref_url="https://bugzilla.suse.com/1229508" source="BUGZILLA"/>
		<reference ref_id="1229509" ref_url="https://bugzilla.suse.com/1229509" source="BUGZILLA"/>
		<reference ref_id="1229510" ref_url="https://bugzilla.suse.com/1229510" source="BUGZILLA"/>
		<reference ref_id="1229512" ref_url="https://bugzilla.suse.com/1229512" source="BUGZILLA"/>
		<reference ref_id="1229516" ref_url="https://bugzilla.suse.com/1229516" source="BUGZILLA"/>
		<reference ref_id="1229522" ref_url="https://bugzilla.suse.com/1229522" source="BUGZILLA"/>
		<reference ref_id="1229526" ref_url="https://bugzilla.suse.com/1229526" source="BUGZILLA"/>
		<reference ref_id="1229528" ref_url="https://bugzilla.suse.com/1229528" source="BUGZILLA"/>
		<reference ref_id="1229531" ref_url="https://bugzilla.suse.com/1229531" source="BUGZILLA"/>
		<reference ref_id="1229533" ref_url="https://bugzilla.suse.com/1229533" source="BUGZILLA"/>
		<reference ref_id="1229535" ref_url="https://bugzilla.suse.com/1229535" source="BUGZILLA"/>
		<reference ref_id="1229536" ref_url="https://bugzilla.suse.com/1229536" source="BUGZILLA"/>
		<reference ref_id="1229537" ref_url="https://bugzilla.suse.com/1229537" source="BUGZILLA"/>
		<reference ref_id="1229540" ref_url="https://bugzilla.suse.com/1229540" source="BUGZILLA"/>
		<reference ref_id="1229544" ref_url="https://bugzilla.suse.com/1229544" source="BUGZILLA"/>
		<reference ref_id="1229554" ref_url="https://bugzilla.suse.com/1229554" source="BUGZILLA"/>
		<reference ref_id="1229557" ref_url="https://bugzilla.suse.com/1229557" source="BUGZILLA"/>
		<reference ref_id="1229565" ref_url="https://bugzilla.suse.com/1229565" source="BUGZILLA"/>
		<reference ref_id="1229566" ref_url="https://bugzilla.suse.com/1229566" source="BUGZILLA"/>
		<reference ref_id="1229568" ref_url="https://bugzilla.suse.com/1229568" source="BUGZILLA"/>
		<reference ref_id="1229581" ref_url="https://bugzilla.suse.com/1229581" source="BUGZILLA"/>
		<reference ref_id="1229598" ref_url="https://bugzilla.suse.com/1229598" source="BUGZILLA"/>
		<reference ref_id="1229603" ref_url="https://bugzilla.suse.com/1229603" source="BUGZILLA"/>
		<reference ref_id="1229604" ref_url="https://bugzilla.suse.com/1229604" source="BUGZILLA"/>
		<reference ref_id="1229608" ref_url="https://bugzilla.suse.com/1229608" source="BUGZILLA"/>
		<reference ref_id="1229611" ref_url="https://bugzilla.suse.com/1229611" source="BUGZILLA"/>
		<reference ref_id="1229612" ref_url="https://bugzilla.suse.com/1229612" source="BUGZILLA"/>
		<reference ref_id="1229613" ref_url="https://bugzilla.suse.com/1229613" source="BUGZILLA"/>
		<reference ref_id="1229614" ref_url="https://bugzilla.suse.com/1229614" source="BUGZILLA"/>
		<reference ref_id="1229617" ref_url="https://bugzilla.suse.com/1229617" source="BUGZILLA"/>
		<reference ref_id="1229619" ref_url="https://bugzilla.suse.com/1229619" source="BUGZILLA"/>
		<reference ref_id="1229620" ref_url="https://bugzilla.suse.com/1229620" source="BUGZILLA"/>
		<reference ref_id="1229622" ref_url="https://bugzilla.suse.com/1229622" source="BUGZILLA"/>
		<reference ref_id="1229623" ref_url="https://bugzilla.suse.com/1229623" source="BUGZILLA"/>
		<reference ref_id="1229624" ref_url="https://bugzilla.suse.com/1229624" source="BUGZILLA"/>
		<reference ref_id="1229625" ref_url="https://bugzilla.suse.com/1229625" source="BUGZILLA"/>
		<reference ref_id="1229626" ref_url="https://bugzilla.suse.com/1229626" source="BUGZILLA"/>
		<reference ref_id="1229628" ref_url="https://bugzilla.suse.com/1229628" source="BUGZILLA"/>
		<reference ref_id="1229629" ref_url="https://bugzilla.suse.com/1229629" source="BUGZILLA"/>
		<reference ref_id="1229630" ref_url="https://bugzilla.suse.com/1229630" source="BUGZILLA"/>
		<reference ref_id="1229631" ref_url="https://bugzilla.suse.com/1229631" source="BUGZILLA"/>
		<reference ref_id="1229635" ref_url="https://bugzilla.suse.com/1229635" source="BUGZILLA"/>
		<reference ref_id="1229636" ref_url="https://bugzilla.suse.com/1229636" source="BUGZILLA"/>
		<reference ref_id="1229637" ref_url="https://bugzilla.suse.com/1229637" source="BUGZILLA"/>
		<reference ref_id="1229638" ref_url="https://bugzilla.suse.com/1229638" source="BUGZILLA"/>
		<reference ref_id="1229639" ref_url="https://bugzilla.suse.com/1229639" source="BUGZILLA"/>
		<reference ref_id="1229641" ref_url="https://bugzilla.suse.com/1229641" source="BUGZILLA"/>
		<reference ref_id="1229642" ref_url="https://bugzilla.suse.com/1229642" source="BUGZILLA"/>
		<reference ref_id="1229643" ref_url="https://bugzilla.suse.com/1229643" source="BUGZILLA"/>
		<reference ref_id="1229645" ref_url="https://bugzilla.suse.com/1229645" source="BUGZILLA"/>
		<reference ref_id="1229657" ref_url="https://bugzilla.suse.com/1229657" source="BUGZILLA"/>
		<reference ref_id="1229664" ref_url="https://bugzilla.suse.com/1229664" source="BUGZILLA"/>
		<reference ref_id="1229707" ref_url="https://bugzilla.suse.com/1229707" source="BUGZILLA"/>
		<reference ref_id="1229792" ref_url="https://bugzilla.suse.com/1229792" source="BUGZILLA"/>
		<reference ref_id="1230245" ref_url="https://bugzilla.suse.com/1230245" source="BUGZILLA"/>
		<reference ref_id="1230413" ref_url="https://bugzilla.suse.com/1230413" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4441" ref_url="https://www.suse.com/security/cve/CVE-2021-4441/" source="CVE"/>
		<reference ref_id="CVE-2022-4382" ref_url="https://www.suse.com/security/cve/CVE-2022-4382/" source="CVE"/>
		<reference ref_id="CVE-2022-48868" ref_url="https://www.suse.com/security/cve/CVE-2022-48868/" source="CVE"/>
		<reference ref_id="CVE-2022-48869" ref_url="https://www.suse.com/security/cve/CVE-2022-48869/" source="CVE"/>
		<reference ref_id="CVE-2022-48870" ref_url="https://www.suse.com/security/cve/CVE-2022-48870/" source="CVE"/>
		<reference ref_id="CVE-2022-48871" ref_url="https://www.suse.com/security/cve/CVE-2022-48871/" source="CVE"/>
		<reference ref_id="CVE-2022-48872" ref_url="https://www.suse.com/security/cve/CVE-2022-48872/" source="CVE"/>
		<reference ref_id="CVE-2022-48873" ref_url="https://www.suse.com/security/cve/CVE-2022-48873/" source="CVE"/>
		<reference ref_id="CVE-2022-48875" ref_url="https://www.suse.com/security/cve/CVE-2022-48875/" source="CVE"/>
		<reference ref_id="CVE-2022-48878" ref_url="https://www.suse.com/security/cve/CVE-2022-48878/" source="CVE"/>
		<reference ref_id="CVE-2022-48880" ref_url="https://www.suse.com/security/cve/CVE-2022-48880/" source="CVE"/>
		<reference ref_id="CVE-2022-48890" ref_url="https://www.suse.com/security/cve/CVE-2022-48890/" source="CVE"/>
		<reference ref_id="CVE-2022-48891" ref_url="https://www.suse.com/security/cve/CVE-2022-48891/" source="CVE"/>
		<reference ref_id="CVE-2022-48896" ref_url="https://www.suse.com/security/cve/CVE-2022-48896/" source="CVE"/>
		<reference ref_id="CVE-2022-48898" ref_url="https://www.suse.com/security/cve/CVE-2022-48898/" source="CVE"/>
		<reference ref_id="CVE-2022-48899" ref_url="https://www.suse.com/security/cve/CVE-2022-48899/" source="CVE"/>
		<reference ref_id="CVE-2022-48903" ref_url="https://www.suse.com/security/cve/CVE-2022-48903/" source="CVE"/>
		<reference ref_id="CVE-2022-48904" ref_url="https://www.suse.com/security/cve/CVE-2022-48904/" source="CVE"/>
		<reference ref_id="CVE-2022-48905" ref_url="https://www.suse.com/security/cve/CVE-2022-48905/" source="CVE"/>
		<reference ref_id="CVE-2022-48907" ref_url="https://www.suse.com/security/cve/CVE-2022-48907/" source="CVE"/>
		<reference ref_id="CVE-2022-48909" ref_url="https://www.suse.com/security/cve/CVE-2022-48909/" source="CVE"/>
		<reference ref_id="CVE-2022-48912" ref_url="https://www.suse.com/security/cve/CVE-2022-48912/" source="CVE"/>
		<reference ref_id="CVE-2022-48913" ref_url="https://www.suse.com/security/cve/CVE-2022-48913/" source="CVE"/>
		<reference ref_id="CVE-2022-48914" ref_url="https://www.suse.com/security/cve/CVE-2022-48914/" source="CVE"/>
		<reference ref_id="CVE-2022-48915" ref_url="https://www.suse.com/security/cve/CVE-2022-48915/" source="CVE"/>
		<reference ref_id="CVE-2022-48916" ref_url="https://www.suse.com/security/cve/CVE-2022-48916/" source="CVE"/>
		<reference ref_id="CVE-2022-48917" ref_url="https://www.suse.com/security/cve/CVE-2022-48917/" source="CVE"/>
		<reference ref_id="CVE-2022-48918" ref_url="https://www.suse.com/security/cve/CVE-2022-48918/" source="CVE"/>
		<reference ref_id="CVE-2022-48919" ref_url="https://www.suse.com/security/cve/CVE-2022-48919/" source="CVE"/>
		<reference ref_id="CVE-2022-48921" ref_url="https://www.suse.com/security/cve/CVE-2022-48921/" source="CVE"/>
		<reference ref_id="CVE-2022-48924" ref_url="https://www.suse.com/security/cve/CVE-2022-48924/" source="CVE"/>
		<reference ref_id="CVE-2022-48925" ref_url="https://www.suse.com/security/cve/CVE-2022-48925/" source="CVE"/>
		<reference ref_id="CVE-2022-48926" ref_url="https://www.suse.com/security/cve/CVE-2022-48926/" source="CVE"/>
		<reference ref_id="CVE-2022-48927" ref_url="https://www.suse.com/security/cve/CVE-2022-48927/" source="CVE"/>
		<reference ref_id="CVE-2022-48928" ref_url="https://www.suse.com/security/cve/CVE-2022-48928/" source="CVE"/>
		<reference ref_id="CVE-2022-48929" ref_url="https://www.suse.com/security/cve/CVE-2022-48929/" source="CVE"/>
		<reference ref_id="CVE-2022-48930" ref_url="https://www.suse.com/security/cve/CVE-2022-48930/" source="CVE"/>
		<reference ref_id="CVE-2022-48931" ref_url="https://www.suse.com/security/cve/CVE-2022-48931/" source="CVE"/>
		<reference ref_id="CVE-2022-48932" ref_url="https://www.suse.com/security/cve/CVE-2022-48932/" source="CVE"/>
		<reference ref_id="CVE-2022-48934" ref_url="https://www.suse.com/security/cve/CVE-2022-48934/" source="CVE"/>
		<reference ref_id="CVE-2022-48935" ref_url="https://www.suse.com/security/cve/CVE-2022-48935/" source="CVE"/>
		<reference ref_id="CVE-2022-48937" ref_url="https://www.suse.com/security/cve/CVE-2022-48937/" source="CVE"/>
		<reference ref_id="CVE-2022-48938" ref_url="https://www.suse.com/security/cve/CVE-2022-48938/" source="CVE"/>
		<reference ref_id="CVE-2022-48941" ref_url="https://www.suse.com/security/cve/CVE-2022-48941/" source="CVE"/>
		<reference ref_id="CVE-2022-48942" ref_url="https://www.suse.com/security/cve/CVE-2022-48942/" source="CVE"/>
		<reference ref_id="CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943/" source="CVE"/>
		<reference ref_id="CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489/" source="CVE"/>
		<reference ref_id="CVE-2023-52893" ref_url="https://www.suse.com/security/cve/CVE-2023-52893/" source="CVE"/>
		<reference ref_id="CVE-2023-52894" ref_url="https://www.suse.com/security/cve/CVE-2023-52894/" source="CVE"/>
		<reference ref_id="CVE-2023-52896" ref_url="https://www.suse.com/security/cve/CVE-2023-52896/" source="CVE"/>
		<reference ref_id="CVE-2023-52898" ref_url="https://www.suse.com/security/cve/CVE-2023-52898/" source="CVE"/>
		<reference ref_id="CVE-2023-52900" ref_url="https://www.suse.com/security/cve/CVE-2023-52900/" source="CVE"/>
		<reference ref_id="CVE-2023-52901" ref_url="https://www.suse.com/security/cve/CVE-2023-52901/" source="CVE"/>
		<reference ref_id="CVE-2023-52905" ref_url="https://www.suse.com/security/cve/CVE-2023-52905/" source="CVE"/>
		<reference ref_id="CVE-2023-52907" ref_url="https://www.suse.com/security/cve/CVE-2023-52907/" source="CVE"/>
		<reference ref_id="CVE-2023-52911" ref_url="https://www.suse.com/security/cve/CVE-2023-52911/" source="CVE"/>
		<reference ref_id="CVE-2024-40910" ref_url="https://www.suse.com/security/cve/CVE-2024-40910/" source="CVE"/>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011/" source="CVE"/>
		<reference ref_id="CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-42077" ref_url="https://www.suse.com/security/cve/CVE-2024-42077/" source="CVE"/>
		<reference ref_id="CVE-2024-42126" ref_url="https://www.suse.com/security/cve/CVE-2024-42126/" source="CVE"/>
		<reference ref_id="CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230/" source="CVE"/>
		<reference ref_id="CVE-2024-42232" ref_url="https://www.suse.com/security/cve/CVE-2024-42232/" source="CVE"/>
		<reference ref_id="CVE-2024-42271" ref_url="https://www.suse.com/security/cve/CVE-2024-42271/" source="CVE"/>
		<reference ref_id="CVE-2024-43853" ref_url="https://www.suse.com/security/cve/CVE-2024-43853/" source="CVE"/>
		<reference ref_id="CVE-2024-43861" ref_url="https://www.suse.com/security/cve/CVE-2024-43861/" source="CVE"/>
		<reference ref_id="CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882/" source="CVE"/>
		<reference ref_id="CVE-2024-43883" ref_url="https://www.suse.com/security/cve/CVE-2024-43883/" source="CVE"/>
		<reference ref_id="CVE-2024-44938" ref_url="https://www.suse.com/security/cve/CVE-2024-44938/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="CVE-2024-45003" ref_url="https://www.suse.com/security/cve/CVE-2024-45003/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2023-52489: Fix race in accessing memory_section-&gt;usage (bsc#1221326).
- CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
- CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619)
- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
- CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245).

The following non-security bugs were fixed:

- Bluetooth: L2CAP: Fix deadlock (git-fixes).
- mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
- mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
- Revert 'mm: prevent derefencing NULL ptr in pfn_section_valid()' (bsc#1230413).
- Revert 'mm, kmsan: fix infinite recursion due to RCU critical section' (bsc#1230413).
- Revert 'mm/sparsemem: fix race in accessing memory_section-&gt;usage' (bsc#1230413).
- nvme_core: scan namespaces asynchronously (bsc#1224105).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194111">SUSE bug 1194111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194765">SUSE bug 1194765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196261">SUSE bug 1196261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196516">SUSE bug 1196516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196894">SUSE bug 1196894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198017">SUSE bug 1198017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203360">SUSE bug 1203360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206006">SUSE bug 1206006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206258">SUSE bug 1206258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207158">SUSE bug 1207158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216834">SUSE bug 1216834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221326">SUSE bug 1221326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221645">SUSE bug 1221645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223191">SUSE bug 1223191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224105">SUSE bug 1224105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227832">SUSE bug 1227832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228020">SUSE bug 1228020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228114">SUSE bug 1228114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228466">SUSE bug 1228466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228489">SUSE bug 1228489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228516">SUSE bug 1228516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228576">SUSE bug 1228576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228718">SUSE bug 1228718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228801">SUSE bug 1228801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228959">SUSE bug 1228959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229042">SUSE bug 1229042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229292">SUSE bug 1229292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229400">SUSE bug 1229400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229500">SUSE bug 1229500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229503">SUSE bug 1229503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229506">SUSE bug 1229506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229507">SUSE bug 1229507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229508">SUSE bug 1229508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229509">SUSE bug 1229509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229510">SUSE bug 1229510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229512">SUSE bug 1229512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229516">SUSE bug 1229516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229522">SUSE bug 1229522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229526">SUSE bug 1229526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229528">SUSE bug 1229528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229531">SUSE bug 1229531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229533">SUSE bug 1229533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229535">SUSE bug 1229535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229536">SUSE bug 1229536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229537">SUSE bug 1229537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229540">SUSE bug 1229540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229544">SUSE bug 1229544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229554">SUSE bug 1229554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229557">SUSE bug 1229557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229565">SUSE bug 1229565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229566">SUSE bug 1229566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229568">SUSE bug 1229568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229581">SUSE bug 1229581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229598">SUSE bug 1229598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229603">SUSE bug 1229603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229604">SUSE bug 1229604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229608">SUSE bug 1229608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229611">SUSE bug 1229611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229612">SUSE bug 1229612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229613">SUSE bug 1229613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229614">SUSE bug 1229614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229617">SUSE bug 1229617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229619">SUSE bug 1229619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229620">SUSE bug 1229620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229622">SUSE bug 1229622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229623">SUSE bug 1229623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229624">SUSE bug 1229624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229625">SUSE bug 1229625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229626">SUSE bug 1229626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229628">SUSE bug 1229628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229629">SUSE bug 1229629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229630">SUSE bug 1229630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229631">SUSE bug 1229631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229635">SUSE bug 1229635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229636">SUSE bug 1229636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229637">SUSE bug 1229637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229638">SUSE bug 1229638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229639">SUSE bug 1229639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229641">SUSE bug 1229641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229642">SUSE bug 1229642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229643">SUSE bug 1229643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229645">SUSE bug 1229645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229657">SUSE bug 1229657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229664">SUSE bug 1229664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229707">SUSE bug 1229707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229792">SUSE bug 1229792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230245">SUSE bug 1230245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230413">SUSE bug 1230413</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4441/">CVE-2021-4441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4441">CVE-2021-4441 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4382/">CVE-2022-4382 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48868/">CVE-2022-48868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48868">CVE-2022-48868 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48869/">CVE-2022-48869 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48869">CVE-2022-48869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48870/">CVE-2022-48870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48870">CVE-2022-48870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48871/">CVE-2022-48871 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48871">CVE-2022-48871 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48872/">CVE-2022-48872 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48872">CVE-2022-48872 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48873/">CVE-2022-48873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48873">CVE-2022-48873 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48875/">CVE-2022-48875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48875">CVE-2022-48875 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48878/">CVE-2022-48878 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48878">CVE-2022-48878 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48880/">CVE-2022-48880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48880">CVE-2022-48880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48890/">CVE-2022-48890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48890">CVE-2022-48890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48891/">CVE-2022-48891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48891">CVE-2022-48891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48896/">CVE-2022-48896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48896">CVE-2022-48896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48898/">CVE-2022-48898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48898">CVE-2022-48898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48899/">CVE-2022-48899 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48899">CVE-2022-48899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48903/">CVE-2022-48903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48903">CVE-2022-48903 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48904/">CVE-2022-48904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48904">CVE-2022-48904 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48905/">CVE-2022-48905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48905">CVE-2022-48905 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48907/">CVE-2022-48907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48907">CVE-2022-48907 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48909/">CVE-2022-48909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48909">CVE-2022-48909 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48912/">CVE-2022-48912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48912">CVE-2022-48912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48913/">CVE-2022-48913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48913">CVE-2022-48913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48914/">CVE-2022-48914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48914">CVE-2022-48914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48915/">CVE-2022-48915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48915">CVE-2022-48915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48916/">CVE-2022-48916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48916">CVE-2022-48916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48917/">CVE-2022-48917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48917">CVE-2022-48917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48918/">CVE-2022-48918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48918">CVE-2022-48918 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48919/">CVE-2022-48919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48919">CVE-2022-48919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48921/">CVE-2022-48921 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48921">CVE-2022-48921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48924/">CVE-2022-48924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48924">CVE-2022-48924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48925/">CVE-2022-48925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48925">CVE-2022-48925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48926/">CVE-2022-48926 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48926">CVE-2022-48926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48927/">CVE-2022-48927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48927">CVE-2022-48927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48928/">CVE-2022-48928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48928">CVE-2022-48928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48929/">CVE-2022-48929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48929">CVE-2022-48929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48930/">CVE-2022-48930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48930">CVE-2022-48930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48931/">CVE-2022-48931 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48931">CVE-2022-48931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48932/">CVE-2022-48932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48932">CVE-2022-48932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48934/">CVE-2022-48934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48934">CVE-2022-48934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48935/">CVE-2022-48935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48935">CVE-2022-48935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48937/">CVE-2022-48937 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48937">CVE-2022-48937 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48938/">CVE-2022-48938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48938">CVE-2022-48938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48941/">CVE-2022-48941 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48941">CVE-2022-48941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48942/">CVE-2022-48942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48942">CVE-2022-48942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52893/">CVE-2023-52893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52893">CVE-2023-52893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52894/">CVE-2023-52894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52894">CVE-2023-52894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52896/">CVE-2023-52896 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52896">CVE-2023-52896 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52898/">CVE-2023-52898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52898">CVE-2023-52898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52900/">CVE-2023-52900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52900">CVE-2023-52900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52901/">CVE-2023-52901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52901">CVE-2023-52901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52905/">CVE-2023-52905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52905">CVE-2023-52905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52907/">CVE-2023-52907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52907">CVE-2023-52907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52911/">CVE-2023-52911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52911">CVE-2023-52911 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40910/">CVE-2024-40910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40910">CVE-2024-40910 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42077/">CVE-2024-42077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42126/">CVE-2024-42126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42232/">CVE-2024-42232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42232">CVE-2024-42232 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42271/">CVE-2024-42271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43853/">CVE-2024-43853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43861/">CVE-2024-43861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43883/">CVE-2024-43883 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44938/">CVE-2024-44938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45003/">CVE-2024-45003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45003">CVE-2024-45003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944673" comment="kernel-default-5.14.21-150400.24.133.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944559" comment="kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206218" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1222453" ref_url="https://bugzilla.suse.com/1222453" source="BUGZILLA"/>
		<reference ref_id="1227355" ref_url="https://bugzilla.suse.com/1227355" source="BUGZILLA"/>
		<reference ref_id="1228574" ref_url="https://bugzilla.suse.com/1228574" source="BUGZILLA"/>
		<reference ref_id="1228575" ref_url="https://bugzilla.suse.com/1228575" source="BUGZILLA"/>
		<reference ref_id="1230366" ref_url="https://bugzilla.suse.com/1230366" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-31143" ref_url="https://www.suse.com/security/cve/CVE-2024-31143/" source="CVE"/>
		<reference ref_id="CVE-2024-31145" ref_url="https://www.suse.com/security/cve/CVE-2024-31145/" source="CVE"/>
		<reference ref_id="CVE-2024-31146" ref_url="https://www.suse.com/security/cve/CVE-2024-31146/" source="CVE"/>
		<reference ref_id="CVE-2024-45817" ref_url="https://www.suse.com/security/cve/CVE-2024-45817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019508.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2024-2201: Mitigation for Native Branch History Injection (XSA-456, bsc#1222453)
- CVE-2024-31143: Fixed double unlock in x86 guest IRQ handling (XSA-458, bsc#1227355)
- CVE-2024-31145: Fixed error handling in x86 IOMMU identity mapping (XSA-460, bsc#1228574)
- CVE-2024-31146: Fixed PCI device pass-through with shared resources (XSA-461, bsc#1228575)
- CVE-2024-45817: Fixed a deadlock in vlapic_error (XSA-462, bsc#1230366)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222453">SUSE bug 1222453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227355">SUSE bug 1227355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228574">SUSE bug 1228574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228575">SUSE bug 1228575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230366">SUSE bug 1230366</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31143/">CVE-2024-31143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31143">CVE-2024-31143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31145/">CVE-2024-31145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31145">CVE-2024-31145 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-31146/">CVE-2024-31146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31146">CVE-2024-31146 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45817/">CVE-2024-45817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45817">CVE-2024-45817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944581" comment="xen-libs-4.16.6_04-150400.4.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206219" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1217722" ref_url="https://bugzilla.suse.com/1217722" source="BUGZILLA"/>
		<reference ref_id="1230071" ref_url="https://bugzilla.suse.com/1230071" source="BUGZILLA"/>
		<reference ref_id="1230072" ref_url="https://bugzilla.suse.com/1230072" source="BUGZILLA"/>
		<reference ref_id="1230073" ref_url="https://bugzilla.suse.com/1230073" source="BUGZILLA"/>
		<reference ref_id="1230074" ref_url="https://bugzilla.suse.com/1230074" source="BUGZILLA"/>
		<reference ref_id="1230075" ref_url="https://bugzilla.suse.com/1230075" source="BUGZILLA"/>
		<reference ref_id="1230076" ref_url="https://bugzilla.suse.com/1230076" source="BUGZILLA"/>
		<reference ref_id="1230364" ref_url="https://bugzilla.suse.com/1230364" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45615" ref_url="https://www.suse.com/security/cve/CVE-2024-45615/" source="CVE"/>
		<reference ref_id="CVE-2024-45616" ref_url="https://www.suse.com/security/cve/CVE-2024-45616/" source="CVE"/>
		<reference ref_id="CVE-2024-45617" ref_url="https://www.suse.com/security/cve/CVE-2024-45617/" source="CVE"/>
		<reference ref_id="CVE-2024-45618" ref_url="https://www.suse.com/security/cve/CVE-2024-45618/" source="CVE"/>
		<reference ref_id="CVE-2024-45619" ref_url="https://www.suse.com/security/cve/CVE-2024-45619/" source="CVE"/>
		<reference ref_id="CVE-2024-45620" ref_url="https://www.suse.com/security/cve/CVE-2024-45620/" source="CVE"/>
		<reference ref_id="CVE-2024-8443" ref_url="https://www.suse.com/security/cve/CVE-2024-8443/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019520.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2024-45620: Incorrect handling of the length of buffers or files in pkcs15init. (bsc#1230076)
- CVE-2024-45619: Incorrect handling length of buffers or files in libopensc. (bsc#1230075)
- CVE-2024-45618: Uninitialized values after incorrect or missing checking return values of functions in pkcs15init. (bsc#1230074)
- CVE-2024-45617: Uninitialized values after incorrect or missing checking return values of functions in libopensc. (bsc#1230073)
- CVE-2024-45616: Uninitialized values after incorrect check or usage of APDU response values in libopensc. (bsc#1230072)
- CVE-2024-45615: Usage of uninitialized values in libopensc and pkcs15init. (bsc#1230071)
- CVE-2024-8443: Heap buffer overflow in OpenPGP driver when generating key. (bsc#1230364)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-25"/>
	<updated date="2024-09-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1217722">SUSE bug 1217722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230071">SUSE bug 1230071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230072">SUSE bug 1230072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230073">SUSE bug 1230073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230074">SUSE bug 1230074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230075">SUSE bug 1230075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230076">SUSE bug 1230076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230364">SUSE bug 1230364</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45615/">CVE-2024-45615 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45615">CVE-2024-45615 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45616/">CVE-2024-45616 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45616">CVE-2024-45616 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45617/">CVE-2024-45617 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45617">CVE-2024-45617 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45618/">CVE-2024-45618 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45618">CVE-2024-45618 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45619/">CVE-2024-45619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45619">CVE-2024-45619 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45620/">CVE-2024-45620 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45620">CVE-2024-45620 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8443/">CVE-2024-8443 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8443">CVE-2024-8443 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944754" comment="opensc-0.22.0-150400.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206220" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1227233" ref_url="https://bugzilla.suse.com/1227233" source="BUGZILLA"/>
		<reference ref_id="1227378" ref_url="https://bugzilla.suse.com/1227378" source="BUGZILLA"/>
		<reference ref_id="1227999" ref_url="https://bugzilla.suse.com/1227999" source="BUGZILLA"/>
		<reference ref_id="1228780" ref_url="https://bugzilla.suse.com/1228780" source="BUGZILLA"/>
		<reference ref_id="1229596" ref_url="https://bugzilla.suse.com/1229596" source="BUGZILLA"/>
		<reference ref_id="1230227" ref_url="https://bugzilla.suse.com/1230227" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5642" ref_url="https://www.suse.com/security/cve/CVE-2024-5642/" source="CVE"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037102.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2024-6923: Fixed uncontrolled CPU resource consumption when in http.cookies module (bsc#1228780).
- CVE-2024-5642: Fixed buffer overread when NPN is used and invalid values are sent to the OpenSSL API (bsc#1227233).
- CVE-2024-7592: Fixed Email header injection due to unquoted newlines (bsc#1229596).
- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)

Bug fixes:

- %{profileopt} variable is set according to the variable %{do_profiling} (bsc#1227999).
- Stop using %%defattr, it seems to be breaking proper executable attributes on /usr/bin/ scripts (bsc#1227378).
- Remove %suse_update_desktop_file macro as it is not useful any more.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-27"/>
	<updated date="2024-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227233">SUSE bug 1227233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227378">SUSE bug 1227378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227999">SUSE bug 1227999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228780">SUSE bug 1228780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229596">SUSE bug 1229596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230227">SUSE bug 1230227</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5642/">CVE-2024-5642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5642">CVE-2024-5642 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945179" comment="libpython3_6m1_0-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945180" comment="python3-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945181" comment="python3-base-3.6.15-150300.10.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206221" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230698" ref_url="https://bugzilla.suse.com/1230698" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-41996" ref_url="https://www.suse.com/security/cve/CVE-2024-41996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037149.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-41996: Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers to trigger expensive server-side DHE (bsc#1230698)
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-04"/>
	<updated date="2024-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230698">SUSE bug 1230698</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41996/">CVE-2024-41996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41996">CVE-2024-41996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945785" comment="libopenssl3-3.0.8-150400.4.66.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206222" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1222040" ref_url="https://bugzilla.suse.com/1222040" source="BUGZILLA"/>
		<reference ref_id="1222041" ref_url="https://bugzilla.suse.com/1222041" source="BUGZILLA"/>
		<reference ref_id="1222042" ref_url="https://bugzilla.suse.com/1222042" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45913" ref_url="https://www.suse.com/security/cve/CVE-2023-45913/" source="CVE"/>
		<reference ref_id="CVE-2023-45919" ref_url="https://www.suse.com/security/cve/CVE-2023-45919/" source="CVE"/>
		<reference ref_id="CVE-2023-45922" ref_url="https://www.suse.com/security/cve/CVE-2023-45922/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3544-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037170.html" source="SUSE-SU"/>
		<description>
This update for Mesa fixes the following issues:

- CVE-2023-45919: Fixed buffer over-read in glXQueryServerString() (bsc#1222041).
- CVE-2023-45913: Fixed NULL pointer dereference via dri2GetGlxDrawableFromXDrawableId() (bsc#1222040).
- CVE-2023-45922: Fixed segmentation violation in __glXGetDrawableAttribute() (bsc#CVE-2023-45922).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222040">SUSE bug 1222040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222041">SUSE bug 1222041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222042">SUSE bug 1222042</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45913/">CVE-2023-45913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45913">CVE-2023-45913 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45919/">CVE-2023-45919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45919">CVE-2023-45919 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45922/">CVE-2023-45922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45922">CVE-2023-45922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946112" comment="libgbm1-21.2.4-150400.68.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206223" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216223" ref_url="https://bugzilla.suse.com/1216223" source="BUGZILLA"/>
		<reference ref_id="1223600" ref_url="https://bugzilla.suse.com/1223600" source="BUGZILLA"/>
		<reference ref_id="1223958" ref_url="https://bugzilla.suse.com/1223958" source="BUGZILLA"/>
		<reference ref_id="1225272" ref_url="https://bugzilla.suse.com/1225272" source="BUGZILLA"/>
		<reference ref_id="1227487" ref_url="https://bugzilla.suse.com/1227487" source="BUGZILLA"/>
		<reference ref_id="1228466" ref_url="https://bugzilla.suse.com/1228466" source="BUGZILLA"/>
		<reference ref_id="1229407" ref_url="https://bugzilla.suse.com/1229407" source="BUGZILLA"/>
		<reference ref_id="1229633" ref_url="https://bugzilla.suse.com/1229633" source="BUGZILLA"/>
		<reference ref_id="1229662" ref_url="https://bugzilla.suse.com/1229662" source="BUGZILLA"/>
		<reference ref_id="1229947" ref_url="https://bugzilla.suse.com/1229947" source="BUGZILLA"/>
		<reference ref_id="1230015" ref_url="https://bugzilla.suse.com/1230015" source="BUGZILLA"/>
		<reference ref_id="1230398" ref_url="https://bugzilla.suse.com/1230398" source="BUGZILLA"/>
		<reference ref_id="1230434" ref_url="https://bugzilla.suse.com/1230434" source="BUGZILLA"/>
		<reference ref_id="1230507" ref_url="https://bugzilla.suse.com/1230507" source="BUGZILLA"/>
		<reference ref_id="1230767" ref_url="https://bugzilla.suse.com/1230767" source="BUGZILLA"/>
		<reference ref_id="1231016" ref_url="https://bugzilla.suse.com/1231016" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48911" ref_url="https://www.suse.com/security/cve/CVE-2022-48911/" source="CVE"/>
		<reference ref_id="CVE-2022-48923" ref_url="https://www.suse.com/security/cve/CVE-2022-48923/" source="CVE"/>
		<reference ref_id="CVE-2022-48944" ref_url="https://www.suse.com/security/cve/CVE-2022-48944/" source="CVE"/>
		<reference ref_id="CVE-2022-48945" ref_url="https://www.suse.com/security/cve/CVE-2022-48945/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-42301" ref_url="https://www.suse.com/security/cve/CVE-2024-42301/" source="CVE"/>
		<reference ref_id="CVE-2024-44946" ref_url="https://www.suse.com/security/cve/CVE-2024-44946/" source="CVE"/>
		<reference ref_id="CVE-2024-45021" ref_url="https://www.suse.com/security/cve/CVE-2024-45021/" source="CVE"/>
		<reference ref_id="CVE-2024-46674" ref_url="https://www.suse.com/security/cve/CVE-2024-46674/" source="CVE"/>
		<reference ref_id="CVE-2024-46774" ref_url="https://www.suse.com/security/cve/CVE-2024-46774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.  (bsc#1229633).
- CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662)
- CVE-2024-41087: Fix double free on error (bsc#1228466).
- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).
- CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe  error path (bsc#1230507).

The following non-security bugs were fixed:

- blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600).
- blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).
- kabi: add __nf_queue_get_refs() for kabi compliance.
- scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223). 
- scsi: smartpqi: Expose SAS address for SATA drives (bsc#1223958).
- SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272 bsc#1231016).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216223">SUSE bug 1216223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223600">SUSE bug 1223600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223958">SUSE bug 1223958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225272">SUSE bug 1225272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227487">SUSE bug 1227487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228466">SUSE bug 1228466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229407">SUSE bug 1229407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229633">SUSE bug 1229633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229662">SUSE bug 1229662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229947">SUSE bug 1229947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230015">SUSE bug 1230015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230398">SUSE bug 1230398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230434">SUSE bug 1230434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230507">SUSE bug 1230507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230767">SUSE bug 1230767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231016">SUSE bug 1231016</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48911/">CVE-2022-48911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48911">CVE-2022-48911 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48923/">CVE-2022-48923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48923">CVE-2022-48923 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48944/">CVE-2022-48944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48944">CVE-2022-48944 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48945/">CVE-2022-48945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48945">CVE-2022-48945 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42301/">CVE-2024-42301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44946/">CVE-2024-44946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45021/">CVE-2024-45021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45021">CVE-2024-45021 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46674/">CVE-2024-46674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46774/">CVE-2024-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46774">CVE-2024-46774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946113" comment="kernel-default-5.14.21-150400.24.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946020" comment="kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206224" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216223" ref_url="https://bugzilla.suse.com/1216223" source="BUGZILLA"/>
		<reference ref_id="1223600" ref_url="https://bugzilla.suse.com/1223600" source="BUGZILLA"/>
		<reference ref_id="1223958" ref_url="https://bugzilla.suse.com/1223958" source="BUGZILLA"/>
		<reference ref_id="1225272" ref_url="https://bugzilla.suse.com/1225272" source="BUGZILLA"/>
		<reference ref_id="1227487" ref_url="https://bugzilla.suse.com/1227487" source="BUGZILLA"/>
		<reference ref_id="1229407" ref_url="https://bugzilla.suse.com/1229407" source="BUGZILLA"/>
		<reference ref_id="1229633" ref_url="https://bugzilla.suse.com/1229633" source="BUGZILLA"/>
		<reference ref_id="1229662" ref_url="https://bugzilla.suse.com/1229662" source="BUGZILLA"/>
		<reference ref_id="1229947" ref_url="https://bugzilla.suse.com/1229947" source="BUGZILLA"/>
		<reference ref_id="1230015" ref_url="https://bugzilla.suse.com/1230015" source="BUGZILLA"/>
		<reference ref_id="1230398" ref_url="https://bugzilla.suse.com/1230398" source="BUGZILLA"/>
		<reference ref_id="1230434" ref_url="https://bugzilla.suse.com/1230434" source="BUGZILLA"/>
		<reference ref_id="1230507" ref_url="https://bugzilla.suse.com/1230507" source="BUGZILLA"/>
		<reference ref_id="1230767" ref_url="https://bugzilla.suse.com/1230767" source="BUGZILLA"/>
		<reference ref_id="1231016" ref_url="https://bugzilla.suse.com/1231016" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48911" ref_url="https://www.suse.com/security/cve/CVE-2022-48911/" source="CVE"/>
		<reference ref_id="CVE-2022-48923" ref_url="https://www.suse.com/security/cve/CVE-2022-48923/" source="CVE"/>
		<reference ref_id="CVE-2022-48944" ref_url="https://www.suse.com/security/cve/CVE-2022-48944/" source="CVE"/>
		<reference ref_id="CVE-2022-48945" ref_url="https://www.suse.com/security/cve/CVE-2022-48945/" source="CVE"/>
		<reference ref_id="CVE-2024-42301" ref_url="https://www.suse.com/security/cve/CVE-2024-42301/" source="CVE"/>
		<reference ref_id="CVE-2024-44946" ref_url="https://www.suse.com/security/cve/CVE-2024-44946/" source="CVE"/>
		<reference ref_id="CVE-2024-45021" ref_url="https://www.suse.com/security/cve/CVE-2024-45021/" source="CVE"/>
		<reference ref_id="CVE-2024-46674" ref_url="https://www.suse.com/security/cve/CVE-2024-46674/" source="CVE"/>
		<reference ref_id="CVE-2024-46774" ref_url="https://www.suse.com/security/cve/CVE-2024-46774/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.  (bsc#1229633).
- CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662)
- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).
- CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe  error path (bsc#1230507).

The following non-security bugs were fixed:

- SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272 bsc#1231016).
- blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600).
- blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).
- kabi: add __nf_queue_get_refs() for kabi compliance.
- scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).
- scsi: smartpqi: Expose SAS address for SATA drives (bsc#1223958).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-09"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216223">SUSE bug 1216223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223600">SUSE bug 1223600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223958">SUSE bug 1223958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225272">SUSE bug 1225272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227487">SUSE bug 1227487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229407">SUSE bug 1229407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229633">SUSE bug 1229633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229662">SUSE bug 1229662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229947">SUSE bug 1229947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230015">SUSE bug 1230015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230398">SUSE bug 1230398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230434">SUSE bug 1230434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230507">SUSE bug 1230507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230767">SUSE bug 1230767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231016">SUSE bug 1231016</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48911/">CVE-2022-48911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48911">CVE-2022-48911 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48923/">CVE-2022-48923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48923">CVE-2022-48923 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48944/">CVE-2022-48944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48944">CVE-2022-48944 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48945/">CVE-2022-48945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48945">CVE-2022-48945 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42301/">CVE-2024-42301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44946/">CVE-2024-44946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45021/">CVE-2024-45021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45021">CVE-2024-45021 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46674/">CVE-2024-46674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46774/">CVE-2024-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46774">CVE-2024-46774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946416" comment="kernel-rt-5.14.21-150400.15.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946417" comment="kernel-source-rt-5.14.21-150400.15.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206225" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230778" ref_url="https://bugzilla.suse.com/1230778" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7254" ref_url="https://www.suse.com/security/cve/CVE-2024-7254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019666.html" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:

- CVE-2024-7254: Fixed stack overflow vulnerability in Protocol Buffer (bsc#1230778)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230778">SUSE bug 1230778</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-7254/">CVE-2024-7254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7254">CVE-2024-7254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948408" comment="libprotobuf-lite25_1_0-25.1-150400.9.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206226" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1220262" ref_url="https://bugzilla.suse.com/1220262" source="BUGZILLA"/>
		<reference ref_id="1230698" ref_url="https://bugzilla.suse.com/1230698" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50782" ref_url="https://www.suse.com/security/cve/CVE-2023-50782/" source="CVE"/>
		<reference ref_id="CVE-2024-41996" ref_url="https://www.suse.com/security/cve/CVE-2024-41996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019759.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)
- CVE-2024-41996: Avoid expensive public key validation for known safe-prime groups (DHEATATTACK) (bsc#1230698)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220262">SUSE bug 1220262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230698">SUSE bug 1230698</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-50782/">CVE-2023-50782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50782">CVE-2023-50782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41996/">CVE-2024-41996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41996">CVE-2024-41996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950733" comment="libopenssl3-3.0.8-150400.4.69.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206227" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1220262" ref_url="https://bugzilla.suse.com/1220262" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50782" ref_url="https://www.suse.com/security/cve/CVE-2023-50782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019758.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220262">SUSE bug 1220262</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-50782/">CVE-2023-50782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50782">CVE-2023-50782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950734" comment="libopenssl-1_1-devel-1.1.1l-150400.7.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950735" comment="libopenssl1_1-1.1.1l-150400.7.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950736" comment="libopenssl1_1-hmac-1.1.1l-150400.7.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950737" comment="openssl-1_1-1.1.1l-150400.7.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206228" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230906" ref_url="https://bugzilla.suse.com/1230906" source="BUGZILLA"/>
		<reference ref_id="1232241" ref_url="https://bugzilla.suse.com/1232241" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019766.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security fixes:

- CVE-2024-9287: properly quote path names provided when creating a virtual environment (bsc#1232241)

Other fixes:

- Drop .pyc files from docdir for reproducible builds (bsc#1230906)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230906">SUSE bug 1230906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232241">SUSE bug 1232241</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950730" comment="libpython3_6m1_0-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950731" comment="python3-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950732" comment="python3-base-3.6.15-150300.10.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206229" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1232528" ref_url="https://bugzilla.suse.com/1232528" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9681" ref_url="https://www.suse.com/security/cve/CVE-2024-9681/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019778.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2024-9681: Fixed HSTS subdomain overwrites parent cache entry (bsc#1232528)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232528">SUSE bug 1232528</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9681/">CVE-2024-9681 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9681">CVE-2024-9681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951188" comment="curl-8.0.1-150400.5.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951189" comment="libcurl4-8.0.1-150400.5.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206230" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1232579" ref_url="https://bugzilla.suse.com/1232579" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019824.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2024-50602: Fixed a denial of service via XML_ResumeParser (bsc#1232579).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-18"/>
	<updated date="2024-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232579">SUSE bug 1232579</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953447" comment="libexpat1-2.4.4-150400.3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206231" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1233313" ref_url="https://bugzilla.suse.com/1233313" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21820" ref_url="https://www.suse.com/security/cve/CVE-2024-21820/" source="CVE"/>
		<reference ref_id="CVE-2024-21853" ref_url="https://www.suse.com/security/cve/CVE-2024-21853/" source="CVE"/>
		<reference ref_id="CVE-2024-23918" ref_url="https://www.suse.com/security/cve/CVE-2024-23918/" source="CVE"/>
		<reference ref_id="CVE-2024-23984" ref_url="https://www.suse.com/security/cve/CVE-2024-23984/" source="CVE"/>
		<reference ref_id="CVE-2024-24968" ref_url="https://www.suse.com/security/cve/CVE-2024-24968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019845.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode was updated to the 20241112 release (bsc#1233313)
  - CVE-2024-21853: Faulty finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel Xeon Processors may allow an authorized user to potentially enable denial of service via local access.
  - CVE-2024-23918: Improper conditions check in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access.
  - CVE-2024-21820: Incorrect default permissions in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access.
  - CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access.
  - CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access.
  - Update for functional issues. 
  New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL            | C0       | 06-97-02/07 | 00000036 | 00000037 | Core Gen12
  | ADL            | H0       | 06-97-05/07 | 00000036 | 00000037 | Core Gen12
  | ADL            | L0       | 06-9a-03/80 | 00000434 | 00000435 | Core Gen12
  | ADL            | R0       | 06-9a-04/80 | 00000434 | 00000435 | Core Gen12
  | EMR-SP         | A0       | 06-cf-01/87 | 21000230 | 21000283 | Xeon Scalable Gen5
  | EMR-SP         | A1       | 06-cf-02/87 | 21000230 | 21000283 | Xeon Scalable Gen5
  | MTL            | C0       | 06-aa-04/e6 | 0000001f | 00000020 | Core™ Ultra Processor
  | RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004122 | 00004123 | Core Gen13
  | RPL-HX/S       | C0       | 06-bf-02/07 | 00000036 | 00000037 | Core Gen13/Gen14
  | RPL-S          | H0       | 06-bf-05/07 | 00000036 | 00000037 | Core Gen13/Gen14
  | RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004122 | 00004123 | Core Gen13
  | SPR-SP         | E3       | 06-8f-06/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
  | SPR-SP         | E4/S2    | 06-8f-07/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
  | SPR-SP         | E5/S3    | 06-8f-08/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
  New Disclosures Updated in Prior Releases:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ICL-D          | B0       | 06-6c-01/10 | 010002b0 | N/A      | Xeon D-17xx/D-18xx, D-27xx/D-28xx
  | ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003e7 | N/A      | Xeon Scalable Gen3

- Intel CPU Microcode was updated to the 20241029 release
  Update for functional issues. 
  Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | RPL-E/HX/S     | B0       | 06-b7-01/32 | 00000129 | 0000012b | Core Gen13/Gen14
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-26"/>
	<updated date="2024-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233313">SUSE bug 1233313</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21820/">CVE-2024-21820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21820">CVE-2024-21820 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21853/">CVE-2024-21853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21853">CVE-2024-21853 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-23918/">CVE-2024-23918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23918">CVE-2024-23918 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23984/">CVE-2024-23984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23984">CVE-2024-23984 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24968/">CVE-2024-24968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24968">CVE-2024-24968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954845" comment="ucode-intel-20241112-150200.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206232" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1233282" ref_url="https://bugzilla.suse.com/1233282" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52533" ref_url="https://www.suse.com/security/cve/CVE-2024-52533/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019854.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2024-52533: Fixed a single byte buffer overflow (bsc#1233282).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233282">SUSE bug 1233282</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52533/">CVE-2024-52533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52533">CVE-2024-52533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955219" comment="glib2-tools-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955220" comment="libgio-2_0-0-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955221" comment="libglib-2_0-0-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955222" comment="libgmodule-2_0-0-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955223" comment="libgobject-2_0-0-2.70.5-150400.3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206233" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1204171" ref_url="https://bugzilla.suse.com/1204171" source="BUGZILLA"/>
		<reference ref_id="1205796" ref_url="https://bugzilla.suse.com/1205796" source="BUGZILLA"/>
		<reference ref_id="1206188" ref_url="https://bugzilla.suse.com/1206188" source="BUGZILLA"/>
		<reference ref_id="1206344" ref_url="https://bugzilla.suse.com/1206344" source="BUGZILLA"/>
		<reference ref_id="1209290" ref_url="https://bugzilla.suse.com/1209290" source="BUGZILLA"/>
		<reference ref_id="1210449" ref_url="https://bugzilla.suse.com/1210449" source="BUGZILLA"/>
		<reference ref_id="1210627" ref_url="https://bugzilla.suse.com/1210627" source="BUGZILLA"/>
		<reference ref_id="1213034" ref_url="https://bugzilla.suse.com/1213034" source="BUGZILLA"/>
		<reference ref_id="1216223" ref_url="https://bugzilla.suse.com/1216223" source="BUGZILLA"/>
		<reference ref_id="1216813" ref_url="https://bugzilla.suse.com/1216813" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223524" ref_url="https://bugzilla.suse.com/1223524" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="1225189" ref_url="https://bugzilla.suse.com/1225189" source="BUGZILLA"/>
		<reference ref_id="1225336" ref_url="https://bugzilla.suse.com/1225336" source="BUGZILLA"/>
		<reference ref_id="1225611" ref_url="https://bugzilla.suse.com/1225611" source="BUGZILLA"/>
		<reference ref_id="1226666" ref_url="https://bugzilla.suse.com/1226666" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229456" ref_url="https://bugzilla.suse.com/1229456" source="BUGZILLA"/>
		<reference ref_id="1229556" ref_url="https://bugzilla.suse.com/1229556" source="BUGZILLA"/>
		<reference ref_id="1230429" ref_url="https://bugzilla.suse.com/1230429" source="BUGZILLA"/>
		<reference ref_id="1230442" ref_url="https://bugzilla.suse.com/1230442" source="BUGZILLA"/>
		<reference ref_id="1230454" ref_url="https://bugzilla.suse.com/1230454" source="BUGZILLA"/>
		<reference ref_id="1230600" ref_url="https://bugzilla.suse.com/1230600" source="BUGZILLA"/>
		<reference ref_id="1230620" ref_url="https://bugzilla.suse.com/1230620" source="BUGZILLA"/>
		<reference ref_id="1230715" ref_url="https://bugzilla.suse.com/1230715" source="BUGZILLA"/>
		<reference ref_id="1230903" ref_url="https://bugzilla.suse.com/1230903" source="BUGZILLA"/>
		<reference ref_id="1231016" ref_url="https://bugzilla.suse.com/1231016" source="BUGZILLA"/>
		<reference ref_id="1231073" ref_url="https://bugzilla.suse.com/1231073" source="BUGZILLA"/>
		<reference ref_id="1231191" ref_url="https://bugzilla.suse.com/1231191" source="BUGZILLA"/>
		<reference ref_id="1231193" ref_url="https://bugzilla.suse.com/1231193" source="BUGZILLA"/>
		<reference ref_id="1231195" ref_url="https://bugzilla.suse.com/1231195" source="BUGZILLA"/>
		<reference ref_id="1231197" ref_url="https://bugzilla.suse.com/1231197" source="BUGZILLA"/>
		<reference ref_id="1231200" ref_url="https://bugzilla.suse.com/1231200" source="BUGZILLA"/>
		<reference ref_id="1231203" ref_url="https://bugzilla.suse.com/1231203" source="BUGZILLA"/>
		<reference ref_id="1231293" ref_url="https://bugzilla.suse.com/1231293" source="BUGZILLA"/>
		<reference ref_id="1231375" ref_url="https://bugzilla.suse.com/1231375" source="BUGZILLA"/>
		<reference ref_id="1231502" ref_url="https://bugzilla.suse.com/1231502" source="BUGZILLA"/>
		<reference ref_id="1231673" ref_url="https://bugzilla.suse.com/1231673" source="BUGZILLA"/>
		<reference ref_id="1231861" ref_url="https://bugzilla.suse.com/1231861" source="BUGZILLA"/>
		<reference ref_id="1231883" ref_url="https://bugzilla.suse.com/1231883" source="BUGZILLA"/>
		<reference ref_id="1231885" ref_url="https://bugzilla.suse.com/1231885" source="BUGZILLA"/>
		<reference ref_id="1231887" ref_url="https://bugzilla.suse.com/1231887" source="BUGZILLA"/>
		<reference ref_id="1231888" ref_url="https://bugzilla.suse.com/1231888" source="BUGZILLA"/>
		<reference ref_id="1231890" ref_url="https://bugzilla.suse.com/1231890" source="BUGZILLA"/>
		<reference ref_id="1231892" ref_url="https://bugzilla.suse.com/1231892" source="BUGZILLA"/>
		<reference ref_id="1231893" ref_url="https://bugzilla.suse.com/1231893" source="BUGZILLA"/>
		<reference ref_id="1231895" ref_url="https://bugzilla.suse.com/1231895" source="BUGZILLA"/>
		<reference ref_id="1231896" ref_url="https://bugzilla.suse.com/1231896" source="BUGZILLA"/>
		<reference ref_id="1231897" ref_url="https://bugzilla.suse.com/1231897" source="BUGZILLA"/>
		<reference ref_id="1231929" ref_url="https://bugzilla.suse.com/1231929" source="BUGZILLA"/>
		<reference ref_id="1231936" ref_url="https://bugzilla.suse.com/1231936" source="BUGZILLA"/>
		<reference ref_id="1231937" ref_url="https://bugzilla.suse.com/1231937" source="BUGZILLA"/>
		<reference ref_id="1231938" ref_url="https://bugzilla.suse.com/1231938" source="BUGZILLA"/>
		<reference ref_id="1231939" ref_url="https://bugzilla.suse.com/1231939" source="BUGZILLA"/>
		<reference ref_id="1231940" ref_url="https://bugzilla.suse.com/1231940" source="BUGZILLA"/>
		<reference ref_id="1231941" ref_url="https://bugzilla.suse.com/1231941" source="BUGZILLA"/>
		<reference ref_id="1231942" ref_url="https://bugzilla.suse.com/1231942" source="BUGZILLA"/>
		<reference ref_id="1231958" ref_url="https://bugzilla.suse.com/1231958" source="BUGZILLA"/>
		<reference ref_id="1231960" ref_url="https://bugzilla.suse.com/1231960" source="BUGZILLA"/>
		<reference ref_id="1231961" ref_url="https://bugzilla.suse.com/1231961" source="BUGZILLA"/>
		<reference ref_id="1231962" ref_url="https://bugzilla.suse.com/1231962" source="BUGZILLA"/>
		<reference ref_id="1231972" ref_url="https://bugzilla.suse.com/1231972" source="BUGZILLA"/>
		<reference ref_id="1231976" ref_url="https://bugzilla.suse.com/1231976" source="BUGZILLA"/>
		<reference ref_id="1231979" ref_url="https://bugzilla.suse.com/1231979" source="BUGZILLA"/>
		<reference ref_id="1231987" ref_url="https://bugzilla.suse.com/1231987" source="BUGZILLA"/>
		<reference ref_id="1231988" ref_url="https://bugzilla.suse.com/1231988" source="BUGZILLA"/>
		<reference ref_id="1231991" ref_url="https://bugzilla.suse.com/1231991" source="BUGZILLA"/>
		<reference ref_id="1231992" ref_url="https://bugzilla.suse.com/1231992" source="BUGZILLA"/>
		<reference ref_id="1231995" ref_url="https://bugzilla.suse.com/1231995" source="BUGZILLA"/>
		<reference ref_id="1231996" ref_url="https://bugzilla.suse.com/1231996" source="BUGZILLA"/>
		<reference ref_id="1231997" ref_url="https://bugzilla.suse.com/1231997" source="BUGZILLA"/>
		<reference ref_id="1232001" ref_url="https://bugzilla.suse.com/1232001" source="BUGZILLA"/>
		<reference ref_id="1232005" ref_url="https://bugzilla.suse.com/1232005" source="BUGZILLA"/>
		<reference ref_id="1232006" ref_url="https://bugzilla.suse.com/1232006" source="BUGZILLA"/>
		<reference ref_id="1232007" ref_url="https://bugzilla.suse.com/1232007" source="BUGZILLA"/>
		<reference ref_id="1232025" ref_url="https://bugzilla.suse.com/1232025" source="BUGZILLA"/>
		<reference ref_id="1232026" ref_url="https://bugzilla.suse.com/1232026" source="BUGZILLA"/>
		<reference ref_id="1232033" ref_url="https://bugzilla.suse.com/1232033" source="BUGZILLA"/>
		<reference ref_id="1232035" ref_url="https://bugzilla.suse.com/1232035" source="BUGZILLA"/>
		<reference ref_id="1232036" ref_url="https://bugzilla.suse.com/1232036" source="BUGZILLA"/>
		<reference ref_id="1232037" ref_url="https://bugzilla.suse.com/1232037" source="BUGZILLA"/>
		<reference ref_id="1232038" ref_url="https://bugzilla.suse.com/1232038" source="BUGZILLA"/>
		<reference ref_id="1232039" ref_url="https://bugzilla.suse.com/1232039" source="BUGZILLA"/>
		<reference ref_id="1232067" ref_url="https://bugzilla.suse.com/1232067" source="BUGZILLA"/>
		<reference ref_id="1232069" ref_url="https://bugzilla.suse.com/1232069" source="BUGZILLA"/>
		<reference ref_id="1232070" ref_url="https://bugzilla.suse.com/1232070" source="BUGZILLA"/>
		<reference ref_id="1232071" ref_url="https://bugzilla.suse.com/1232071" source="BUGZILLA"/>
		<reference ref_id="1232097" ref_url="https://bugzilla.suse.com/1232097" source="BUGZILLA"/>
		<reference ref_id="1232108" ref_url="https://bugzilla.suse.com/1232108" source="BUGZILLA"/>
		<reference ref_id="1232119" ref_url="https://bugzilla.suse.com/1232119" source="BUGZILLA"/>
		<reference ref_id="1232120" ref_url="https://bugzilla.suse.com/1232120" source="BUGZILLA"/>
		<reference ref_id="1232123" ref_url="https://bugzilla.suse.com/1232123" source="BUGZILLA"/>
		<reference ref_id="1232133" ref_url="https://bugzilla.suse.com/1232133" source="BUGZILLA"/>
		<reference ref_id="1232136" ref_url="https://bugzilla.suse.com/1232136" source="BUGZILLA"/>
		<reference ref_id="1232145" ref_url="https://bugzilla.suse.com/1232145" source="BUGZILLA"/>
		<reference ref_id="1232150" ref_url="https://bugzilla.suse.com/1232150" source="BUGZILLA"/>
		<reference ref_id="1232163" ref_url="https://bugzilla.suse.com/1232163" source="BUGZILLA"/>
		<reference ref_id="1232170" ref_url="https://bugzilla.suse.com/1232170" source="BUGZILLA"/>
		<reference ref_id="1232172" ref_url="https://bugzilla.suse.com/1232172" source="BUGZILLA"/>
		<reference ref_id="1232174" ref_url="https://bugzilla.suse.com/1232174" source="BUGZILLA"/>
		<reference ref_id="1232229" ref_url="https://bugzilla.suse.com/1232229" source="BUGZILLA"/>
		<reference ref_id="1232237" ref_url="https://bugzilla.suse.com/1232237" source="BUGZILLA"/>
		<reference ref_id="1232260" ref_url="https://bugzilla.suse.com/1232260" source="BUGZILLA"/>
		<reference ref_id="1232262" ref_url="https://bugzilla.suse.com/1232262" source="BUGZILLA"/>
		<reference ref_id="1232282" ref_url="https://bugzilla.suse.com/1232282" source="BUGZILLA"/>
		<reference ref_id="1232286" ref_url="https://bugzilla.suse.com/1232286" source="BUGZILLA"/>
		<reference ref_id="1232304" ref_url="https://bugzilla.suse.com/1232304" source="BUGZILLA"/>
		<reference ref_id="1232383" ref_url="https://bugzilla.suse.com/1232383" source="BUGZILLA"/>
		<reference ref_id="1232395" ref_url="https://bugzilla.suse.com/1232395" source="BUGZILLA"/>
		<reference ref_id="1232418" ref_url="https://bugzilla.suse.com/1232418" source="BUGZILLA"/>
		<reference ref_id="1232424" ref_url="https://bugzilla.suse.com/1232424" source="BUGZILLA"/>
		<reference ref_id="1232432" ref_url="https://bugzilla.suse.com/1232432" source="BUGZILLA"/>
		<reference ref_id="1232519" ref_url="https://bugzilla.suse.com/1232519" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="CVE-2022-48664" ref_url="https://www.suse.com/security/cve/CVE-2022-48664/" source="CVE"/>
		<reference ref_id="CVE-2022-48879" ref_url="https://www.suse.com/security/cve/CVE-2022-48879/" source="CVE"/>
		<reference ref_id="CVE-2022-48946" ref_url="https://www.suse.com/security/cve/CVE-2022-48946/" source="CVE"/>
		<reference ref_id="CVE-2022-48947" ref_url="https://www.suse.com/security/cve/CVE-2022-48947/" source="CVE"/>
		<reference ref_id="CVE-2022-48948" ref_url="https://www.suse.com/security/cve/CVE-2022-48948/" source="CVE"/>
		<reference ref_id="CVE-2022-48949" ref_url="https://www.suse.com/security/cve/CVE-2022-48949/" source="CVE"/>
		<reference ref_id="CVE-2022-48951" ref_url="https://www.suse.com/security/cve/CVE-2022-48951/" source="CVE"/>
		<reference ref_id="CVE-2022-48953" ref_url="https://www.suse.com/security/cve/CVE-2022-48953/" source="CVE"/>
		<reference ref_id="CVE-2022-48954" ref_url="https://www.suse.com/security/cve/CVE-2022-48954/" source="CVE"/>
		<reference ref_id="CVE-2022-48955" ref_url="https://www.suse.com/security/cve/CVE-2022-48955/" source="CVE"/>
		<reference ref_id="CVE-2022-48956" ref_url="https://www.suse.com/security/cve/CVE-2022-48956/" source="CVE"/>
		<reference ref_id="CVE-2022-48959" ref_url="https://www.suse.com/security/cve/CVE-2022-48959/" source="CVE"/>
		<reference ref_id="CVE-2022-48960" ref_url="https://www.suse.com/security/cve/CVE-2022-48960/" source="CVE"/>
		<reference ref_id="CVE-2022-48961" ref_url="https://www.suse.com/security/cve/CVE-2022-48961/" source="CVE"/>
		<reference ref_id="CVE-2022-48962" ref_url="https://www.suse.com/security/cve/CVE-2022-48962/" source="CVE"/>
		<reference ref_id="CVE-2022-48967" ref_url="https://www.suse.com/security/cve/CVE-2022-48967/" source="CVE"/>
		<reference ref_id="CVE-2022-48968" ref_url="https://www.suse.com/security/cve/CVE-2022-48968/" source="CVE"/>
		<reference ref_id="CVE-2022-48969" ref_url="https://www.suse.com/security/cve/CVE-2022-48969/" source="CVE"/>
		<reference ref_id="CVE-2022-48970" ref_url="https://www.suse.com/security/cve/CVE-2022-48970/" source="CVE"/>
		<reference ref_id="CVE-2022-48971" ref_url="https://www.suse.com/security/cve/CVE-2022-48971/" source="CVE"/>
		<reference ref_id="CVE-2022-48972" ref_url="https://www.suse.com/security/cve/CVE-2022-48972/" source="CVE"/>
		<reference ref_id="CVE-2022-48973" ref_url="https://www.suse.com/security/cve/CVE-2022-48973/" source="CVE"/>
		<reference ref_id="CVE-2022-48975" ref_url="https://www.suse.com/security/cve/CVE-2022-48975/" source="CVE"/>
		<reference ref_id="CVE-2022-48977" ref_url="https://www.suse.com/security/cve/CVE-2022-48977/" source="CVE"/>
		<reference ref_id="CVE-2022-48978" ref_url="https://www.suse.com/security/cve/CVE-2022-48978/" source="CVE"/>
		<reference ref_id="CVE-2022-48981" ref_url="https://www.suse.com/security/cve/CVE-2022-48981/" source="CVE"/>
		<reference ref_id="CVE-2022-48985" ref_url="https://www.suse.com/security/cve/CVE-2022-48985/" source="CVE"/>
		<reference ref_id="CVE-2022-48987" ref_url="https://www.suse.com/security/cve/CVE-2022-48987/" source="CVE"/>
		<reference ref_id="CVE-2022-48988" ref_url="https://www.suse.com/security/cve/CVE-2022-48988/" source="CVE"/>
		<reference ref_id="CVE-2022-48991" ref_url="https://www.suse.com/security/cve/CVE-2022-48991/" source="CVE"/>
		<reference ref_id="CVE-2022-48992" ref_url="https://www.suse.com/security/cve/CVE-2022-48992/" source="CVE"/>
		<reference ref_id="CVE-2022-48994" ref_url="https://www.suse.com/security/cve/CVE-2022-48994/" source="CVE"/>
		<reference ref_id="CVE-2022-48995" ref_url="https://www.suse.com/security/cve/CVE-2022-48995/" source="CVE"/>
		<reference ref_id="CVE-2022-48997" ref_url="https://www.suse.com/security/cve/CVE-2022-48997/" source="CVE"/>
		<reference ref_id="CVE-2022-48999" ref_url="https://www.suse.com/security/cve/CVE-2022-48999/" source="CVE"/>
		<reference ref_id="CVE-2022-49000" ref_url="https://www.suse.com/security/cve/CVE-2022-49000/" source="CVE"/>
		<reference ref_id="CVE-2022-49002" ref_url="https://www.suse.com/security/cve/CVE-2022-49002/" source="CVE"/>
		<reference ref_id="CVE-2022-49003" ref_url="https://www.suse.com/security/cve/CVE-2022-49003/" source="CVE"/>
		<reference ref_id="CVE-2022-49005" ref_url="https://www.suse.com/security/cve/CVE-2022-49005/" source="CVE"/>
		<reference ref_id="CVE-2022-49006" ref_url="https://www.suse.com/security/cve/CVE-2022-49006/" source="CVE"/>
		<reference ref_id="CVE-2022-49007" ref_url="https://www.suse.com/security/cve/CVE-2022-49007/" source="CVE"/>
		<reference ref_id="CVE-2022-49010" ref_url="https://www.suse.com/security/cve/CVE-2022-49010/" source="CVE"/>
		<reference ref_id="CVE-2022-49011" ref_url="https://www.suse.com/security/cve/CVE-2022-49011/" source="CVE"/>
		<reference ref_id="CVE-2022-49012" ref_url="https://www.suse.com/security/cve/CVE-2022-49012/" source="CVE"/>
		<reference ref_id="CVE-2022-49014" ref_url="https://www.suse.com/security/cve/CVE-2022-49014/" source="CVE"/>
		<reference ref_id="CVE-2022-49015" ref_url="https://www.suse.com/security/cve/CVE-2022-49015/" source="CVE"/>
		<reference ref_id="CVE-2022-49016" ref_url="https://www.suse.com/security/cve/CVE-2022-49016/" source="CVE"/>
		<reference ref_id="CVE-2022-49019" ref_url="https://www.suse.com/security/cve/CVE-2022-49019/" source="CVE"/>
		<reference ref_id="CVE-2022-49021" ref_url="https://www.suse.com/security/cve/CVE-2022-49021/" source="CVE"/>
		<reference ref_id="CVE-2022-49022" ref_url="https://www.suse.com/security/cve/CVE-2022-49022/" source="CVE"/>
		<reference ref_id="CVE-2022-49023" ref_url="https://www.suse.com/security/cve/CVE-2022-49023/" source="CVE"/>
		<reference ref_id="CVE-2022-49024" ref_url="https://www.suse.com/security/cve/CVE-2022-49024/" source="CVE"/>
		<reference ref_id="CVE-2022-49025" ref_url="https://www.suse.com/security/cve/CVE-2022-49025/" source="CVE"/>
		<reference ref_id="CVE-2022-49026" ref_url="https://www.suse.com/security/cve/CVE-2022-49026/" source="CVE"/>
		<reference ref_id="CVE-2022-49027" ref_url="https://www.suse.com/security/cve/CVE-2022-49027/" source="CVE"/>
		<reference ref_id="CVE-2022-49028" ref_url="https://www.suse.com/security/cve/CVE-2022-49028/" source="CVE"/>
		<reference ref_id="CVE-2022-49029" ref_url="https://www.suse.com/security/cve/CVE-2022-49029/" source="CVE"/>
		<reference ref_id="CVE-2022-49031" ref_url="https://www.suse.com/security/cve/CVE-2022-49031/" source="CVE"/>
		<reference ref_id="CVE-2022-49032" ref_url="https://www.suse.com/security/cve/CVE-2022-49032/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2023-52919" ref_url="https://www.suse.com/security/cve/CVE-2023-52919/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="CVE-2024-45013" ref_url="https://www.suse.com/security/cve/CVE-2024-45013/" source="CVE"/>
		<reference ref_id="CVE-2024-45016" ref_url="https://www.suse.com/security/cve/CVE-2024-45016/" source="CVE"/>
		<reference ref_id="CVE-2024-45026" ref_url="https://www.suse.com/security/cve/CVE-2024-45026/" source="CVE"/>
		<reference ref_id="CVE-2024-46716" ref_url="https://www.suse.com/security/cve/CVE-2024-46716/" source="CVE"/>
		<reference ref_id="CVE-2024-46813" ref_url="https://www.suse.com/security/cve/CVE-2024-46813/" source="CVE"/>
		<reference ref_id="CVE-2024-46814" ref_url="https://www.suse.com/security/cve/CVE-2024-46814/" source="CVE"/>
		<reference ref_id="CVE-2024-46815" ref_url="https://www.suse.com/security/cve/CVE-2024-46815/" source="CVE"/>
		<reference ref_id="CVE-2024-46816" ref_url="https://www.suse.com/security/cve/CVE-2024-46816/" source="CVE"/>
		<reference ref_id="CVE-2024-46817" ref_url="https://www.suse.com/security/cve/CVE-2024-46817/" source="CVE"/>
		<reference ref_id="CVE-2024-46818" ref_url="https://www.suse.com/security/cve/CVE-2024-46818/" source="CVE"/>
		<reference ref_id="CVE-2024-46849" ref_url="https://www.suse.com/security/cve/CVE-2024-46849/" source="CVE"/>
		<reference ref_id="CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668/" source="CVE"/>
		<reference ref_id="CVE-2024-47674" ref_url="https://www.suse.com/security/cve/CVE-2024-47674/" source="CVE"/>
		<reference ref_id="CVE-2024-47684" ref_url="https://www.suse.com/security/cve/CVE-2024-47684/" source="CVE"/>
		<reference ref_id="CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706/" source="CVE"/>
		<reference ref_id="CVE-2024-47747" ref_url="https://www.suse.com/security/cve/CVE-2024-47747/" source="CVE"/>
		<reference ref_id="CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748/" source="CVE"/>
		<reference ref_id="CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860/" source="CVE"/>
		<reference ref_id="CVE-2024-49867" ref_url="https://www.suse.com/security/cve/CVE-2024-49867/" source="CVE"/>
		<reference ref_id="CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930/" source="CVE"/>
		<reference ref_id="CVE-2024-49936" ref_url="https://www.suse.com/security/cve/CVE-2024-49936/" source="CVE"/>
		<reference ref_id="CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960/" source="CVE"/>
		<reference ref_id="CVE-2024-49969" ref_url="https://www.suse.com/security/cve/CVE-2024-49969/" source="CVE"/>
		<reference ref_id="CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974/" source="CVE"/>
		<reference ref_id="CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982/" source="CVE"/>
		<reference ref_id="CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991/" source="CVE"/>
		<reference ref_id="CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995/" source="CVE"/>
		<reference ref_id="CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-45026: s390/dasd: fix error recovery leading to data corruption on ESE devices (bsc#1230454).
- CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc-&gt;links (bsc#1231191).
- CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193).
- CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
- CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq-&gt;bic with merge chain (bsc#1231942).
- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).
- CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395).
- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).
- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).

The following non-security bugs were fixed:

- NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016).
- PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).
- RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (bsc#1232036).
- bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375).
- dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
- ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).
- ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).
- net: mana: Fix the extra HZ in mana_hwc_send_request (bsc#1232033).
- xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204171">SUSE bug 1204171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206188">SUSE bug 1206188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206344">SUSE bug 1206344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210449">SUSE bug 1210449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213034">SUSE bug 1213034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216223">SUSE bug 1216223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216813">SUSE bug 1216813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223524">SUSE bug 1223524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226666">SUSE bug 1226666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229456">SUSE bug 1229456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229556">SUSE bug 1229556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230429">SUSE bug 1230429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230442">SUSE bug 1230442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230454">SUSE bug 1230454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230600">SUSE bug 1230600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230620">SUSE bug 1230620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230715">SUSE bug 1230715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230903">SUSE bug 1230903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231016">SUSE bug 1231016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231073">SUSE bug 1231073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231191">SUSE bug 1231191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231193">SUSE bug 1231193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231195">SUSE bug 1231195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231197">SUSE bug 1231197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231200">SUSE bug 1231200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231203">SUSE bug 1231203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231293">SUSE bug 1231293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231375">SUSE bug 1231375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231502">SUSE bug 1231502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231673">SUSE bug 1231673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231861">SUSE bug 1231861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231883">SUSE bug 1231883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231885">SUSE bug 1231885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231887">SUSE bug 1231887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231888">SUSE bug 1231888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231890">SUSE bug 1231890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231892">SUSE bug 1231892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231893">SUSE bug 1231893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231895">SUSE bug 1231895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231896">SUSE bug 1231896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231897">SUSE bug 1231897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231929">SUSE bug 1231929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231936">SUSE bug 1231936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231937">SUSE bug 1231937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231938">SUSE bug 1231938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231939">SUSE bug 1231939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231940">SUSE bug 1231940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231941">SUSE bug 1231941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231942">SUSE bug 1231942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231958">SUSE bug 1231958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231960">SUSE bug 1231960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231961">SUSE bug 1231961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231962">SUSE bug 1231962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231972">SUSE bug 1231972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231976">SUSE bug 1231976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231979">SUSE bug 1231979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231987">SUSE bug 1231987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231988">SUSE bug 1231988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231991">SUSE bug 1231991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231992">SUSE bug 1231992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231995">SUSE bug 1231995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231996">SUSE bug 1231996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231997">SUSE bug 1231997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232001">SUSE bug 1232001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232005">SUSE bug 1232005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232006">SUSE bug 1232006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232007">SUSE bug 1232007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232025">SUSE bug 1232025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232026">SUSE bug 1232026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232033">SUSE bug 1232033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232035">SUSE bug 1232035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232036">SUSE bug 1232036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232037">SUSE bug 1232037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232038">SUSE bug 1232038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232039">SUSE bug 1232039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232067">SUSE bug 1232067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232069">SUSE bug 1232069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232070">SUSE bug 1232070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232071">SUSE bug 1232071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232097">SUSE bug 1232097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232108">SUSE bug 1232108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232119">SUSE bug 1232119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232120">SUSE bug 1232120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232123">SUSE bug 1232123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232133">SUSE bug 1232133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232136">SUSE bug 1232136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232145">SUSE bug 1232145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232150">SUSE bug 1232150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232163">SUSE bug 1232163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232170">SUSE bug 1232170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232172">SUSE bug 1232172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232174">SUSE bug 1232174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232229">SUSE bug 1232229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232237">SUSE bug 1232237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232260">SUSE bug 1232260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232262">SUSE bug 1232262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232282">SUSE bug 1232282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232286">SUSE bug 1232286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232304">SUSE bug 1232304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232383">SUSE bug 1232383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232395">SUSE bug 1232395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232418">SUSE bug 1232418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232424">SUSE bug 1232424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232432">SUSE bug 1232432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232519">SUSE bug 1232519</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48664/">CVE-2022-48664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48664">CVE-2022-48664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48879/">CVE-2022-48879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48879">CVE-2022-48879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48946/">CVE-2022-48946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48946">CVE-2022-48946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48947/">CVE-2022-48947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48947">CVE-2022-48947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48948/">CVE-2022-48948 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48948">CVE-2022-48948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48949/">CVE-2022-48949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48949">CVE-2022-48949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48951/">CVE-2022-48951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48951">CVE-2022-48951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48953/">CVE-2022-48953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48953">CVE-2022-48953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48954/">CVE-2022-48954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48954">CVE-2022-48954 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48955/">CVE-2022-48955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48955">CVE-2022-48955 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48956/">CVE-2022-48956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48956">CVE-2022-48956 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48959/">CVE-2022-48959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48959">CVE-2022-48959 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48960/">CVE-2022-48960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48960">CVE-2022-48960 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48961/">CVE-2022-48961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48961">CVE-2022-48961 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48962/">CVE-2022-48962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48962">CVE-2022-48962 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48967/">CVE-2022-48967 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48967">CVE-2022-48967 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48968/">CVE-2022-48968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48968">CVE-2022-48968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48969/">CVE-2022-48969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48969">CVE-2022-48969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48970/">CVE-2022-48970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48970">CVE-2022-48970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48971/">CVE-2022-48971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48971">CVE-2022-48971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48972/">CVE-2022-48972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48972">CVE-2022-48972 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48973/">CVE-2022-48973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48973">CVE-2022-48973 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48975/">CVE-2022-48975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48975">CVE-2022-48975 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48977/">CVE-2022-48977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48977">CVE-2022-48977 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48978/">CVE-2022-48978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48978">CVE-2022-48978 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48981/">CVE-2022-48981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48981">CVE-2022-48981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48985/">CVE-2022-48985 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48985">CVE-2022-48985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48987/">CVE-2022-48987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48987">CVE-2022-48987 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48988/">CVE-2022-48988 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48988">CVE-2022-48988 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48991/">CVE-2022-48991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48991">CVE-2022-48991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48992/">CVE-2022-48992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48992">CVE-2022-48992 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48994/">CVE-2022-48994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48994">CVE-2022-48994 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48995/">CVE-2022-48995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48995">CVE-2022-48995 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48997/">CVE-2022-48997 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48997">CVE-2022-48997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48999/">CVE-2022-48999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48999">CVE-2022-48999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49000/">CVE-2022-49000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49000">CVE-2022-49000 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49002/">CVE-2022-49002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49002">CVE-2022-49002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49003/">CVE-2022-49003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49003">CVE-2022-49003 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49005/">CVE-2022-49005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49005">CVE-2022-49005 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49006/">CVE-2022-49006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49006">CVE-2022-49006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49007/">CVE-2022-49007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49007">CVE-2022-49007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49010/">CVE-2022-49010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49010">CVE-2022-49010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49011/">CVE-2022-49011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49011">CVE-2022-49011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49012/">CVE-2022-49012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49012">CVE-2022-49012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49014/">CVE-2022-49014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49014">CVE-2022-49014 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49015/">CVE-2022-49015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49015">CVE-2022-49015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49016/">CVE-2022-49016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49016">CVE-2022-49016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49019/">CVE-2022-49019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49019">CVE-2022-49019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49021/">CVE-2022-49021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49021">CVE-2022-49021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49022/">CVE-2022-49022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49022">CVE-2022-49022 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49023/">CVE-2022-49023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49023">CVE-2022-49023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49024/">CVE-2022-49024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49024">CVE-2022-49024 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49025/">CVE-2022-49025 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49025">CVE-2022-49025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49026/">CVE-2022-49026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49026">CVE-2022-49026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49027/">CVE-2022-49027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49027">CVE-2022-49027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49028/">CVE-2022-49028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49028">CVE-2022-49028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49029/">CVE-2022-49029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49029">CVE-2022-49029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49031/">CVE-2022-49031 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49031">CVE-2022-49031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49032/">CVE-2022-49032 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49032">CVE-2022-49032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52919/">CVE-2023-52919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52919">CVE-2023-52919 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45013/">CVE-2024-45013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45013">CVE-2024-45013 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45016/">CVE-2024-45016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45016">CVE-2024-45016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45026/">CVE-2024-45026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45026">CVE-2024-45026 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46716/">CVE-2024-46716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46813/">CVE-2024-46813 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46813">CVE-2024-46813 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46814/">CVE-2024-46814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46815/">CVE-2024-46815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46816/">CVE-2024-46816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46816">CVE-2024-46816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46817/">CVE-2024-46817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46818/">CVE-2024-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46849/">CVE-2024-46849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47674/">CVE-2024-47674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47674">CVE-2024-47674 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47684/">CVE-2024-47684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47684">CVE-2024-47684 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47747/">CVE-2024-47747 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49867/">CVE-2024-49867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49936/">CVE-2024-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49969/">CVE-2024-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955224" comment="kernel-rt-5.14.21-150400.15.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955225" comment="kernel-source-rt-5.14.21-150400.15.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206234" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1232542" ref_url="https://bugzilla.suse.com/1232542" source="BUGZILLA"/>
		<reference ref_id="1232622" ref_url="https://bugzilla.suse.com/1232622" source="BUGZILLA"/>
		<reference ref_id="1232624" ref_url="https://bugzilla.suse.com/1232624" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45818" ref_url="https://www.suse.com/security/cve/CVE-2024-45818/" source="CVE"/>
		<reference ref_id="CVE-2024-45819" ref_url="https://www.suse.com/security/cve/CVE-2024-45819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019878.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2024-45818: Fixed deadlock in x86 HVM standard VGA handling (XSA-463) (bsc#1232622).
- CVE-2024-45819: Fixed libxl data leaks to PVH guests via ACPI tables (XSA-464) (bsc#1232624).

Bug fixes:

- Remove usage of net-tools-deprecated from supportconfig plugin (bsc#1232542).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-29"/>
	<updated date="2024-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1232542">SUSE bug 1232542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232622">SUSE bug 1232622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232624">SUSE bug 1232624</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45818/">CVE-2024-45818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45818">CVE-2024-45818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45819/">CVE-2024-45819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45819">CVE-2024-45819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955577" comment="xen-libs-4.16.6_06-150400.4.65.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206235" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1204171" ref_url="https://bugzilla.suse.com/1204171" source="BUGZILLA"/>
		<reference ref_id="1205796" ref_url="https://bugzilla.suse.com/1205796" source="BUGZILLA"/>
		<reference ref_id="1206188" ref_url="https://bugzilla.suse.com/1206188" source="BUGZILLA"/>
		<reference ref_id="1206344" ref_url="https://bugzilla.suse.com/1206344" source="BUGZILLA"/>
		<reference ref_id="1209290" ref_url="https://bugzilla.suse.com/1209290" source="BUGZILLA"/>
		<reference ref_id="1210449" ref_url="https://bugzilla.suse.com/1210449" source="BUGZILLA"/>
		<reference ref_id="1210627" ref_url="https://bugzilla.suse.com/1210627" source="BUGZILLA"/>
		<reference ref_id="1213034" ref_url="https://bugzilla.suse.com/1213034" source="BUGZILLA"/>
		<reference ref_id="1216223" ref_url="https://bugzilla.suse.com/1216223" source="BUGZILLA"/>
		<reference ref_id="1216813" ref_url="https://bugzilla.suse.com/1216813" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1220382" ref_url="https://bugzilla.suse.com/1220382" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223524" ref_url="https://bugzilla.suse.com/1223524" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="1225189" ref_url="https://bugzilla.suse.com/1225189" source="BUGZILLA"/>
		<reference ref_id="1225336" ref_url="https://bugzilla.suse.com/1225336" source="BUGZILLA"/>
		<reference ref_id="1225611" ref_url="https://bugzilla.suse.com/1225611" source="BUGZILLA"/>
		<reference ref_id="1226666" ref_url="https://bugzilla.suse.com/1226666" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="1229345" ref_url="https://bugzilla.suse.com/1229345" source="BUGZILLA"/>
		<reference ref_id="1229452" ref_url="https://bugzilla.suse.com/1229452" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229456" ref_url="https://bugzilla.suse.com/1229456" source="BUGZILLA"/>
		<reference ref_id="1229556" ref_url="https://bugzilla.suse.com/1229556" source="BUGZILLA"/>
		<reference ref_id="1230429" ref_url="https://bugzilla.suse.com/1230429" source="BUGZILLA"/>
		<reference ref_id="1230442" ref_url="https://bugzilla.suse.com/1230442" source="BUGZILLA"/>
		<reference ref_id="1230454" ref_url="https://bugzilla.suse.com/1230454" source="BUGZILLA"/>
		<reference ref_id="1230600" ref_url="https://bugzilla.suse.com/1230600" source="BUGZILLA"/>
		<reference ref_id="1230620" ref_url="https://bugzilla.suse.com/1230620" source="BUGZILLA"/>
		<reference ref_id="1230715" ref_url="https://bugzilla.suse.com/1230715" source="BUGZILLA"/>
		<reference ref_id="1230903" ref_url="https://bugzilla.suse.com/1230903" source="BUGZILLA"/>
		<reference ref_id="1231016" ref_url="https://bugzilla.suse.com/1231016" source="BUGZILLA"/>
		<reference ref_id="1231073" ref_url="https://bugzilla.suse.com/1231073" source="BUGZILLA"/>
		<reference ref_id="1231191" ref_url="https://bugzilla.suse.com/1231191" source="BUGZILLA"/>
		<reference ref_id="1231193" ref_url="https://bugzilla.suse.com/1231193" source="BUGZILLA"/>
		<reference ref_id="1231195" ref_url="https://bugzilla.suse.com/1231195" source="BUGZILLA"/>
		<reference ref_id="1231197" ref_url="https://bugzilla.suse.com/1231197" source="BUGZILLA"/>
		<reference ref_id="1231200" ref_url="https://bugzilla.suse.com/1231200" source="BUGZILLA"/>
		<reference ref_id="1231203" ref_url="https://bugzilla.suse.com/1231203" source="BUGZILLA"/>
		<reference ref_id="1231293" ref_url="https://bugzilla.suse.com/1231293" source="BUGZILLA"/>
		<reference ref_id="1231375" ref_url="https://bugzilla.suse.com/1231375" source="BUGZILLA"/>
		<reference ref_id="1231502" ref_url="https://bugzilla.suse.com/1231502" source="BUGZILLA"/>
		<reference ref_id="1231673" ref_url="https://bugzilla.suse.com/1231673" source="BUGZILLA"/>
		<reference ref_id="1231861" ref_url="https://bugzilla.suse.com/1231861" source="BUGZILLA"/>
		<reference ref_id="1231883" ref_url="https://bugzilla.suse.com/1231883" source="BUGZILLA"/>
		<reference ref_id="1231885" ref_url="https://bugzilla.suse.com/1231885" source="BUGZILLA"/>
		<reference ref_id="1231887" ref_url="https://bugzilla.suse.com/1231887" source="BUGZILLA"/>
		<reference ref_id="1231888" ref_url="https://bugzilla.suse.com/1231888" source="BUGZILLA"/>
		<reference ref_id="1231890" ref_url="https://bugzilla.suse.com/1231890" source="BUGZILLA"/>
		<reference ref_id="1231892" ref_url="https://bugzilla.suse.com/1231892" source="BUGZILLA"/>
		<reference ref_id="1231893" ref_url="https://bugzilla.suse.com/1231893" source="BUGZILLA"/>
		<reference ref_id="1231895" ref_url="https://bugzilla.suse.com/1231895" source="BUGZILLA"/>
		<reference ref_id="1231896" ref_url="https://bugzilla.suse.com/1231896" source="BUGZILLA"/>
		<reference ref_id="1231897" ref_url="https://bugzilla.suse.com/1231897" source="BUGZILLA"/>
		<reference ref_id="1231929" ref_url="https://bugzilla.suse.com/1231929" source="BUGZILLA"/>
		<reference ref_id="1231936" ref_url="https://bugzilla.suse.com/1231936" source="BUGZILLA"/>
		<reference ref_id="1231937" ref_url="https://bugzilla.suse.com/1231937" source="BUGZILLA"/>
		<reference ref_id="1231938" ref_url="https://bugzilla.suse.com/1231938" source="BUGZILLA"/>
		<reference ref_id="1231939" ref_url="https://bugzilla.suse.com/1231939" source="BUGZILLA"/>
		<reference ref_id="1231940" ref_url="https://bugzilla.suse.com/1231940" source="BUGZILLA"/>
		<reference ref_id="1231941" ref_url="https://bugzilla.suse.com/1231941" source="BUGZILLA"/>
		<reference ref_id="1231942" ref_url="https://bugzilla.suse.com/1231942" source="BUGZILLA"/>
		<reference ref_id="1231958" ref_url="https://bugzilla.suse.com/1231958" source="BUGZILLA"/>
		<reference ref_id="1231960" ref_url="https://bugzilla.suse.com/1231960" source="BUGZILLA"/>
		<reference ref_id="1231961" ref_url="https://bugzilla.suse.com/1231961" source="BUGZILLA"/>
		<reference ref_id="1231962" ref_url="https://bugzilla.suse.com/1231962" source="BUGZILLA"/>
		<reference ref_id="1231972" ref_url="https://bugzilla.suse.com/1231972" source="BUGZILLA"/>
		<reference ref_id="1231976" ref_url="https://bugzilla.suse.com/1231976" source="BUGZILLA"/>
		<reference ref_id="1231979" ref_url="https://bugzilla.suse.com/1231979" source="BUGZILLA"/>
		<reference ref_id="1231987" ref_url="https://bugzilla.suse.com/1231987" source="BUGZILLA"/>
		<reference ref_id="1231988" ref_url="https://bugzilla.suse.com/1231988" source="BUGZILLA"/>
		<reference ref_id="1231991" ref_url="https://bugzilla.suse.com/1231991" source="BUGZILLA"/>
		<reference ref_id="1231992" ref_url="https://bugzilla.suse.com/1231992" source="BUGZILLA"/>
		<reference ref_id="1231995" ref_url="https://bugzilla.suse.com/1231995" source="BUGZILLA"/>
		<reference ref_id="1231996" ref_url="https://bugzilla.suse.com/1231996" source="BUGZILLA"/>
		<reference ref_id="1231997" ref_url="https://bugzilla.suse.com/1231997" source="BUGZILLA"/>
		<reference ref_id="1232001" ref_url="https://bugzilla.suse.com/1232001" source="BUGZILLA"/>
		<reference ref_id="1232005" ref_url="https://bugzilla.suse.com/1232005" source="BUGZILLA"/>
		<reference ref_id="1232006" ref_url="https://bugzilla.suse.com/1232006" source="BUGZILLA"/>
		<reference ref_id="1232007" ref_url="https://bugzilla.suse.com/1232007" source="BUGZILLA"/>
		<reference ref_id="1232025" ref_url="https://bugzilla.suse.com/1232025" source="BUGZILLA"/>
		<reference ref_id="1232026" ref_url="https://bugzilla.suse.com/1232026" source="BUGZILLA"/>
		<reference ref_id="1232033" ref_url="https://bugzilla.suse.com/1232033" source="BUGZILLA"/>
		<reference ref_id="1232035" ref_url="https://bugzilla.suse.com/1232035" source="BUGZILLA"/>
		<reference ref_id="1232036" ref_url="https://bugzilla.suse.com/1232036" source="BUGZILLA"/>
		<reference ref_id="1232037" ref_url="https://bugzilla.suse.com/1232037" source="BUGZILLA"/>
		<reference ref_id="1232038" ref_url="https://bugzilla.suse.com/1232038" source="BUGZILLA"/>
		<reference ref_id="1232039" ref_url="https://bugzilla.suse.com/1232039" source="BUGZILLA"/>
		<reference ref_id="1232067" ref_url="https://bugzilla.suse.com/1232067" source="BUGZILLA"/>
		<reference ref_id="1232069" ref_url="https://bugzilla.suse.com/1232069" source="BUGZILLA"/>
		<reference ref_id="1232070" ref_url="https://bugzilla.suse.com/1232070" source="BUGZILLA"/>
		<reference ref_id="1232071" ref_url="https://bugzilla.suse.com/1232071" source="BUGZILLA"/>
		<reference ref_id="1232097" ref_url="https://bugzilla.suse.com/1232097" source="BUGZILLA"/>
		<reference ref_id="1232108" ref_url="https://bugzilla.suse.com/1232108" source="BUGZILLA"/>
		<reference ref_id="1232119" ref_url="https://bugzilla.suse.com/1232119" source="BUGZILLA"/>
		<reference ref_id="1232120" ref_url="https://bugzilla.suse.com/1232120" source="BUGZILLA"/>
		<reference ref_id="1232123" ref_url="https://bugzilla.suse.com/1232123" source="BUGZILLA"/>
		<reference ref_id="1232133" ref_url="https://bugzilla.suse.com/1232133" source="BUGZILLA"/>
		<reference ref_id="1232136" ref_url="https://bugzilla.suse.com/1232136" source="BUGZILLA"/>
		<reference ref_id="1232145" ref_url="https://bugzilla.suse.com/1232145" source="BUGZILLA"/>
		<reference ref_id="1232150" ref_url="https://bugzilla.suse.com/1232150" source="BUGZILLA"/>
		<reference ref_id="1232163" ref_url="https://bugzilla.suse.com/1232163" source="BUGZILLA"/>
		<reference ref_id="1232165" ref_url="https://bugzilla.suse.com/1232165" source="BUGZILLA"/>
		<reference ref_id="1232170" ref_url="https://bugzilla.suse.com/1232170" source="BUGZILLA"/>
		<reference ref_id="1232172" ref_url="https://bugzilla.suse.com/1232172" source="BUGZILLA"/>
		<reference ref_id="1232174" ref_url="https://bugzilla.suse.com/1232174" source="BUGZILLA"/>
		<reference ref_id="1232224" ref_url="https://bugzilla.suse.com/1232224" source="BUGZILLA"/>
		<reference ref_id="1232229" ref_url="https://bugzilla.suse.com/1232229" source="BUGZILLA"/>
		<reference ref_id="1232237" ref_url="https://bugzilla.suse.com/1232237" source="BUGZILLA"/>
		<reference ref_id="1232260" ref_url="https://bugzilla.suse.com/1232260" source="BUGZILLA"/>
		<reference ref_id="1232262" ref_url="https://bugzilla.suse.com/1232262" source="BUGZILLA"/>
		<reference ref_id="1232281" ref_url="https://bugzilla.suse.com/1232281" source="BUGZILLA"/>
		<reference ref_id="1232282" ref_url="https://bugzilla.suse.com/1232282" source="BUGZILLA"/>
		<reference ref_id="1232286" ref_url="https://bugzilla.suse.com/1232286" source="BUGZILLA"/>
		<reference ref_id="1232304" ref_url="https://bugzilla.suse.com/1232304" source="BUGZILLA"/>
		<reference ref_id="1232383" ref_url="https://bugzilla.suse.com/1232383" source="BUGZILLA"/>
		<reference ref_id="1232395" ref_url="https://bugzilla.suse.com/1232395" source="BUGZILLA"/>
		<reference ref_id="1232418" ref_url="https://bugzilla.suse.com/1232418" source="BUGZILLA"/>
		<reference ref_id="1232424" ref_url="https://bugzilla.suse.com/1232424" source="BUGZILLA"/>
		<reference ref_id="1232432" ref_url="https://bugzilla.suse.com/1232432" source="BUGZILLA"/>
		<reference ref_id="1232436" ref_url="https://bugzilla.suse.com/1232436" source="BUGZILLA"/>
		<reference ref_id="1232519" ref_url="https://bugzilla.suse.com/1232519" source="BUGZILLA"/>
		<reference ref_id="1233117" ref_url="https://bugzilla.suse.com/1233117" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="CVE-2022-48664" ref_url="https://www.suse.com/security/cve/CVE-2022-48664/" source="CVE"/>
		<reference ref_id="CVE-2022-48879" ref_url="https://www.suse.com/security/cve/CVE-2022-48879/" source="CVE"/>
		<reference ref_id="CVE-2022-48946" ref_url="https://www.suse.com/security/cve/CVE-2022-48946/" source="CVE"/>
		<reference ref_id="CVE-2022-48947" ref_url="https://www.suse.com/security/cve/CVE-2022-48947/" source="CVE"/>
		<reference ref_id="CVE-2022-48948" ref_url="https://www.suse.com/security/cve/CVE-2022-48948/" source="CVE"/>
		<reference ref_id="CVE-2022-48949" ref_url="https://www.suse.com/security/cve/CVE-2022-48949/" source="CVE"/>
		<reference ref_id="CVE-2022-48951" ref_url="https://www.suse.com/security/cve/CVE-2022-48951/" source="CVE"/>
		<reference ref_id="CVE-2022-48953" ref_url="https://www.suse.com/security/cve/CVE-2022-48953/" source="CVE"/>
		<reference ref_id="CVE-2022-48954" ref_url="https://www.suse.com/security/cve/CVE-2022-48954/" source="CVE"/>
		<reference ref_id="CVE-2022-48955" ref_url="https://www.suse.com/security/cve/CVE-2022-48955/" source="CVE"/>
		<reference ref_id="CVE-2022-48956" ref_url="https://www.suse.com/security/cve/CVE-2022-48956/" source="CVE"/>
		<reference ref_id="CVE-2022-48959" ref_url="https://www.suse.com/security/cve/CVE-2022-48959/" source="CVE"/>
		<reference ref_id="CVE-2022-48960" ref_url="https://www.suse.com/security/cve/CVE-2022-48960/" source="CVE"/>
		<reference ref_id="CVE-2022-48961" ref_url="https://www.suse.com/security/cve/CVE-2022-48961/" source="CVE"/>
		<reference ref_id="CVE-2022-48962" ref_url="https://www.suse.com/security/cve/CVE-2022-48962/" source="CVE"/>
		<reference ref_id="CVE-2022-48967" ref_url="https://www.suse.com/security/cve/CVE-2022-48967/" source="CVE"/>
		<reference ref_id="CVE-2022-48968" ref_url="https://www.suse.com/security/cve/CVE-2022-48968/" source="CVE"/>
		<reference ref_id="CVE-2022-48969" ref_url="https://www.suse.com/security/cve/CVE-2022-48969/" source="CVE"/>
		<reference ref_id="CVE-2022-48970" ref_url="https://www.suse.com/security/cve/CVE-2022-48970/" source="CVE"/>
		<reference ref_id="CVE-2022-48971" ref_url="https://www.suse.com/security/cve/CVE-2022-48971/" source="CVE"/>
		<reference ref_id="CVE-2022-48972" ref_url="https://www.suse.com/security/cve/CVE-2022-48972/" source="CVE"/>
		<reference ref_id="CVE-2022-48973" ref_url="https://www.suse.com/security/cve/CVE-2022-48973/" source="CVE"/>
		<reference ref_id="CVE-2022-48975" ref_url="https://www.suse.com/security/cve/CVE-2022-48975/" source="CVE"/>
		<reference ref_id="CVE-2022-48977" ref_url="https://www.suse.com/security/cve/CVE-2022-48977/" source="CVE"/>
		<reference ref_id="CVE-2022-48978" ref_url="https://www.suse.com/security/cve/CVE-2022-48978/" source="CVE"/>
		<reference ref_id="CVE-2022-48981" ref_url="https://www.suse.com/security/cve/CVE-2022-48981/" source="CVE"/>
		<reference ref_id="CVE-2022-48985" ref_url="https://www.suse.com/security/cve/CVE-2022-48985/" source="CVE"/>
		<reference ref_id="CVE-2022-48987" ref_url="https://www.suse.com/security/cve/CVE-2022-48987/" source="CVE"/>
		<reference ref_id="CVE-2022-48988" ref_url="https://www.suse.com/security/cve/CVE-2022-48988/" source="CVE"/>
		<reference ref_id="CVE-2022-48991" ref_url="https://www.suse.com/security/cve/CVE-2022-48991/" source="CVE"/>
		<reference ref_id="CVE-2022-48992" ref_url="https://www.suse.com/security/cve/CVE-2022-48992/" source="CVE"/>
		<reference ref_id="CVE-2022-48994" ref_url="https://www.suse.com/security/cve/CVE-2022-48994/" source="CVE"/>
		<reference ref_id="CVE-2022-48995" ref_url="https://www.suse.com/security/cve/CVE-2022-48995/" source="CVE"/>
		<reference ref_id="CVE-2022-48997" ref_url="https://www.suse.com/security/cve/CVE-2022-48997/" source="CVE"/>
		<reference ref_id="CVE-2022-48999" ref_url="https://www.suse.com/security/cve/CVE-2022-48999/" source="CVE"/>
		<reference ref_id="CVE-2022-49000" ref_url="https://www.suse.com/security/cve/CVE-2022-49000/" source="CVE"/>
		<reference ref_id="CVE-2022-49002" ref_url="https://www.suse.com/security/cve/CVE-2022-49002/" source="CVE"/>
		<reference ref_id="CVE-2022-49003" ref_url="https://www.suse.com/security/cve/CVE-2022-49003/" source="CVE"/>
		<reference ref_id="CVE-2022-49005" ref_url="https://www.suse.com/security/cve/CVE-2022-49005/" source="CVE"/>
		<reference ref_id="CVE-2022-49006" ref_url="https://www.suse.com/security/cve/CVE-2022-49006/" source="CVE"/>
		<reference ref_id="CVE-2022-49007" ref_url="https://www.suse.com/security/cve/CVE-2022-49007/" source="CVE"/>
		<reference ref_id="CVE-2022-49010" ref_url="https://www.suse.com/security/cve/CVE-2022-49010/" source="CVE"/>
		<reference ref_id="CVE-2022-49011" ref_url="https://www.suse.com/security/cve/CVE-2022-49011/" source="CVE"/>
		<reference ref_id="CVE-2022-49012" ref_url="https://www.suse.com/security/cve/CVE-2022-49012/" source="CVE"/>
		<reference ref_id="CVE-2022-49014" ref_url="https://www.suse.com/security/cve/CVE-2022-49014/" source="CVE"/>
		<reference ref_id="CVE-2022-49015" ref_url="https://www.suse.com/security/cve/CVE-2022-49015/" source="CVE"/>
		<reference ref_id="CVE-2022-49016" ref_url="https://www.suse.com/security/cve/CVE-2022-49016/" source="CVE"/>
		<reference ref_id="CVE-2022-49019" ref_url="https://www.suse.com/security/cve/CVE-2022-49019/" source="CVE"/>
		<reference ref_id="CVE-2022-49021" ref_url="https://www.suse.com/security/cve/CVE-2022-49021/" source="CVE"/>
		<reference ref_id="CVE-2022-49022" ref_url="https://www.suse.com/security/cve/CVE-2022-49022/" source="CVE"/>
		<reference ref_id="CVE-2022-49023" ref_url="https://www.suse.com/security/cve/CVE-2022-49023/" source="CVE"/>
		<reference ref_id="CVE-2022-49024" ref_url="https://www.suse.com/security/cve/CVE-2022-49024/" source="CVE"/>
		<reference ref_id="CVE-2022-49025" ref_url="https://www.suse.com/security/cve/CVE-2022-49025/" source="CVE"/>
		<reference ref_id="CVE-2022-49026" ref_url="https://www.suse.com/security/cve/CVE-2022-49026/" source="CVE"/>
		<reference ref_id="CVE-2022-49027" ref_url="https://www.suse.com/security/cve/CVE-2022-49027/" source="CVE"/>
		<reference ref_id="CVE-2022-49028" ref_url="https://www.suse.com/security/cve/CVE-2022-49028/" source="CVE"/>
		<reference ref_id="CVE-2022-49029" ref_url="https://www.suse.com/security/cve/CVE-2022-49029/" source="CVE"/>
		<reference ref_id="CVE-2022-49031" ref_url="https://www.suse.com/security/cve/CVE-2022-49031/" source="CVE"/>
		<reference ref_id="CVE-2022-49032" ref_url="https://www.suse.com/security/cve/CVE-2022-49032/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2023-52919" ref_url="https://www.suse.com/security/cve/CVE-2023-52919/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="CVE-2024-45013" ref_url="https://www.suse.com/security/cve/CVE-2024-45013/" source="CVE"/>
		<reference ref_id="CVE-2024-45016" ref_url="https://www.suse.com/security/cve/CVE-2024-45016/" source="CVE"/>
		<reference ref_id="CVE-2024-45026" ref_url="https://www.suse.com/security/cve/CVE-2024-45026/" source="CVE"/>
		<reference ref_id="CVE-2024-46716" ref_url="https://www.suse.com/security/cve/CVE-2024-46716/" source="CVE"/>
		<reference ref_id="CVE-2024-46813" ref_url="https://www.suse.com/security/cve/CVE-2024-46813/" source="CVE"/>
		<reference ref_id="CVE-2024-46814" ref_url="https://www.suse.com/security/cve/CVE-2024-46814/" source="CVE"/>
		<reference ref_id="CVE-2024-46815" ref_url="https://www.suse.com/security/cve/CVE-2024-46815/" source="CVE"/>
		<reference ref_id="CVE-2024-46816" ref_url="https://www.suse.com/security/cve/CVE-2024-46816/" source="CVE"/>
		<reference ref_id="CVE-2024-46817" ref_url="https://www.suse.com/security/cve/CVE-2024-46817/" source="CVE"/>
		<reference ref_id="CVE-2024-46818" ref_url="https://www.suse.com/security/cve/CVE-2024-46818/" source="CVE"/>
		<reference ref_id="CVE-2024-46849" ref_url="https://www.suse.com/security/cve/CVE-2024-46849/" source="CVE"/>
		<reference ref_id="CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668/" source="CVE"/>
		<reference ref_id="CVE-2024-47674" ref_url="https://www.suse.com/security/cve/CVE-2024-47674/" source="CVE"/>
		<reference ref_id="CVE-2024-47684" ref_url="https://www.suse.com/security/cve/CVE-2024-47684/" source="CVE"/>
		<reference ref_id="CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706/" source="CVE"/>
		<reference ref_id="CVE-2024-47747" ref_url="https://www.suse.com/security/cve/CVE-2024-47747/" source="CVE"/>
		<reference ref_id="CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748/" source="CVE"/>
		<reference ref_id="CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860/" source="CVE"/>
		<reference ref_id="CVE-2024-49867" ref_url="https://www.suse.com/security/cve/CVE-2024-49867/" source="CVE"/>
		<reference ref_id="CVE-2024-49925" ref_url="https://www.suse.com/security/cve/CVE-2024-49925/" source="CVE"/>
		<reference ref_id="CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930/" source="CVE"/>
		<reference ref_id="CVE-2024-49936" ref_url="https://www.suse.com/security/cve/CVE-2024-49936/" source="CVE"/>
		<reference ref_id="CVE-2024-49945" ref_url="https://www.suse.com/security/cve/CVE-2024-49945/" source="CVE"/>
		<reference ref_id="CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960/" source="CVE"/>
		<reference ref_id="CVE-2024-49969" ref_url="https://www.suse.com/security/cve/CVE-2024-49969/" source="CVE"/>
		<reference ref_id="CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974/" source="CVE"/>
		<reference ref_id="CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982/" source="CVE"/>
		<reference ref_id="CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991/" source="CVE"/>
		<reference ref_id="CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995/" source="CVE"/>
		<reference ref_id="CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047/" source="CVE"/>
		<reference ref_id="CVE-2024-50208" ref_url="https://www.suse.com/security/cve/CVE-2024-50208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).
- CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-45026: s390/dasd: fix error recovery leading to data corruption on ESE devices (bsc#1230454).
- CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc-&gt;links (bsc#1231191).
- CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193).
- CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
- CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq-&gt;bic with merge chain (bsc#1231942).
- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).
- CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395).
- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).
- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).

The following non-security bugs were fixed:

- NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016).
- PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).
- RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (bsc#1232036).
- bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375).
- dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
- initramfs: avoid filename buffer overrun (bsc#1232436).
- ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).
- ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).
- net: mana: Fix the extra HZ in mana_hwc_send_request (bsc#1232033).
- x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382).
- x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382).
- xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-02"/>
	<updated date="2024-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204171">SUSE bug 1204171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206188">SUSE bug 1206188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206344">SUSE bug 1206344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210449">SUSE bug 1210449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213034">SUSE bug 1213034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216223">SUSE bug 1216223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216813">SUSE bug 1216813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220382">SUSE bug 1220382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223524">SUSE bug 1223524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226666">SUSE bug 1226666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229345">SUSE bug 1229345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229452">SUSE bug 1229452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229456">SUSE bug 1229456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229556">SUSE bug 1229556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230429">SUSE bug 1230429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230442">SUSE bug 1230442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230454">SUSE bug 1230454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230600">SUSE bug 1230600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230620">SUSE bug 1230620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230715">SUSE bug 1230715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230903">SUSE bug 1230903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231016">SUSE bug 1231016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231073">SUSE bug 1231073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231191">SUSE bug 1231191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231193">SUSE bug 1231193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231195">SUSE bug 1231195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231197">SUSE bug 1231197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231200">SUSE bug 1231200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231203">SUSE bug 1231203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231293">SUSE bug 1231293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231375">SUSE bug 1231375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231502">SUSE bug 1231502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231673">SUSE bug 1231673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231861">SUSE bug 1231861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231883">SUSE bug 1231883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231885">SUSE bug 1231885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231887">SUSE bug 1231887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231888">SUSE bug 1231888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231890">SUSE bug 1231890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231892">SUSE bug 1231892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231893">SUSE bug 1231893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231895">SUSE bug 1231895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231896">SUSE bug 1231896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231897">SUSE bug 1231897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231929">SUSE bug 1231929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231936">SUSE bug 1231936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231937">SUSE bug 1231937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231938">SUSE bug 1231938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231939">SUSE bug 1231939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231940">SUSE bug 1231940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231941">SUSE bug 1231941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231942">SUSE bug 1231942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231958">SUSE bug 1231958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231960">SUSE bug 1231960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231961">SUSE bug 1231961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231962">SUSE bug 1231962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231972">SUSE bug 1231972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231976">SUSE bug 1231976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231979">SUSE bug 1231979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231987">SUSE bug 1231987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231988">SUSE bug 1231988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231991">SUSE bug 1231991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231992">SUSE bug 1231992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231995">SUSE bug 1231995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231996">SUSE bug 1231996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231997">SUSE bug 1231997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232001">SUSE bug 1232001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232005">SUSE bug 1232005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232006">SUSE bug 1232006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232007">SUSE bug 1232007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232025">SUSE bug 1232025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232026">SUSE bug 1232026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232033">SUSE bug 1232033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232035">SUSE bug 1232035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232036">SUSE bug 1232036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232037">SUSE bug 1232037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232038">SUSE bug 1232038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232039">SUSE bug 1232039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232067">SUSE bug 1232067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232069">SUSE bug 1232069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232070">SUSE bug 1232070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232071">SUSE bug 1232071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232097">SUSE bug 1232097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232108">SUSE bug 1232108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232119">SUSE bug 1232119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232120">SUSE bug 1232120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232123">SUSE bug 1232123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232133">SUSE bug 1232133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232136">SUSE bug 1232136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232145">SUSE bug 1232145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232150">SUSE bug 1232150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232163">SUSE bug 1232163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232165">SUSE bug 1232165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232170">SUSE bug 1232170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232172">SUSE bug 1232172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232174">SUSE bug 1232174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232224">SUSE bug 1232224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232229">SUSE bug 1232229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232237">SUSE bug 1232237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232260">SUSE bug 1232260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232262">SUSE bug 1232262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232281">SUSE bug 1232281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232282">SUSE bug 1232282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232286">SUSE bug 1232286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232304">SUSE bug 1232304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232383">SUSE bug 1232383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232395">SUSE bug 1232395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232418">SUSE bug 1232418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232424">SUSE bug 1232424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232432">SUSE bug 1232432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232436">SUSE bug 1232436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232519">SUSE bug 1232519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233117">SUSE bug 1233117</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48664/">CVE-2022-48664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48664">CVE-2022-48664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48879/">CVE-2022-48879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48879">CVE-2022-48879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48946/">CVE-2022-48946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48946">CVE-2022-48946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48947/">CVE-2022-48947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48947">CVE-2022-48947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48948/">CVE-2022-48948 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48948">CVE-2022-48948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48949/">CVE-2022-48949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48949">CVE-2022-48949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48951/">CVE-2022-48951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48951">CVE-2022-48951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48953/">CVE-2022-48953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48953">CVE-2022-48953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48954/">CVE-2022-48954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48954">CVE-2022-48954 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48955/">CVE-2022-48955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48955">CVE-2022-48955 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48956/">CVE-2022-48956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48956">CVE-2022-48956 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48959/">CVE-2022-48959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48959">CVE-2022-48959 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48960/">CVE-2022-48960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48960">CVE-2022-48960 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48961/">CVE-2022-48961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48961">CVE-2022-48961 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48962/">CVE-2022-48962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48962">CVE-2022-48962 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48967/">CVE-2022-48967 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48967">CVE-2022-48967 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48968/">CVE-2022-48968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48968">CVE-2022-48968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48969/">CVE-2022-48969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48969">CVE-2022-48969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48970/">CVE-2022-48970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48970">CVE-2022-48970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48971/">CVE-2022-48971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48971">CVE-2022-48971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48972/">CVE-2022-48972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48972">CVE-2022-48972 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48973/">CVE-2022-48973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48973">CVE-2022-48973 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48975/">CVE-2022-48975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48975">CVE-2022-48975 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48977/">CVE-2022-48977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48977">CVE-2022-48977 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48978/">CVE-2022-48978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48978">CVE-2022-48978 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48981/">CVE-2022-48981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48981">CVE-2022-48981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48985/">CVE-2022-48985 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48985">CVE-2022-48985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48987/">CVE-2022-48987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48987">CVE-2022-48987 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48988/">CVE-2022-48988 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48988">CVE-2022-48988 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48991/">CVE-2022-48991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48991">CVE-2022-48991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48992/">CVE-2022-48992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48992">CVE-2022-48992 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48994/">CVE-2022-48994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48994">CVE-2022-48994 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48995/">CVE-2022-48995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48995">CVE-2022-48995 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48997/">CVE-2022-48997 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48997">CVE-2022-48997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48999/">CVE-2022-48999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48999">CVE-2022-48999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49000/">CVE-2022-49000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49000">CVE-2022-49000 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49002/">CVE-2022-49002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49002">CVE-2022-49002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49003/">CVE-2022-49003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49003">CVE-2022-49003 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49005/">CVE-2022-49005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49005">CVE-2022-49005 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49006/">CVE-2022-49006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49006">CVE-2022-49006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49007/">CVE-2022-49007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49007">CVE-2022-49007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49010/">CVE-2022-49010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49010">CVE-2022-49010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49011/">CVE-2022-49011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49011">CVE-2022-49011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49012/">CVE-2022-49012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49012">CVE-2022-49012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49014/">CVE-2022-49014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49014">CVE-2022-49014 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49015/">CVE-2022-49015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49015">CVE-2022-49015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49016/">CVE-2022-49016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49016">CVE-2022-49016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49019/">CVE-2022-49019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49019">CVE-2022-49019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49021/">CVE-2022-49021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49021">CVE-2022-49021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49022/">CVE-2022-49022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49022">CVE-2022-49022 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49023/">CVE-2022-49023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49023">CVE-2022-49023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49024/">CVE-2022-49024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49024">CVE-2022-49024 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49025/">CVE-2022-49025 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49025">CVE-2022-49025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49026/">CVE-2022-49026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49026">CVE-2022-49026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49027/">CVE-2022-49027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49027">CVE-2022-49027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49028/">CVE-2022-49028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49028">CVE-2022-49028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49029/">CVE-2022-49029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49029">CVE-2022-49029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49031/">CVE-2022-49031 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49031">CVE-2022-49031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49032/">CVE-2022-49032 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49032">CVE-2022-49032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52919/">CVE-2023-52919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52919">CVE-2023-52919 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45013/">CVE-2024-45013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45013">CVE-2024-45013 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45016/">CVE-2024-45016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45016">CVE-2024-45016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45026/">CVE-2024-45026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45026">CVE-2024-45026 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46716/">CVE-2024-46716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46813/">CVE-2024-46813 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46813">CVE-2024-46813 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46814/">CVE-2024-46814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46815/">CVE-2024-46815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46816/">CVE-2024-46816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46816">CVE-2024-46816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46817/">CVE-2024-46817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46818/">CVE-2024-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46849/">CVE-2024-46849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47674/">CVE-2024-47674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47674">CVE-2024-47674 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47684/">CVE-2024-47684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47684">CVE-2024-47684 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47747/">CVE-2024-47747 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49867/">CVE-2024-49867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49925/">CVE-2024-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49936/">CVE-2024-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49945/">CVE-2024-49945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49945">CVE-2024-49945 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49969/">CVE-2024-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50208/">CVE-2024-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955870" comment="kernel-default-5.14.21-150400.24.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955821" comment="kernel-default-base-5.14.21-150400.24.141.1.150400.24.68.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206236" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1231795" ref_url="https://bugzilla.suse.com/1231795" source="BUGZILLA"/>
		<reference ref_id="1233307" ref_url="https://bugzilla.suse.com/1233307" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019921.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307)

Other fixes:
- Remove -IVendor/ from python-config (bsc#1231795)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1231795">SUSE bug 1231795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233307">SUSE bug 1233307</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956787" comment="libpython3_6m1_0-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956788" comment="python3-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956789" comment="python3-base-3.6.15-150300.10.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206237" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1225462" ref_url="https://bugzilla.suse.com/1225462" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-54661" ref_url="https://www.suse.com/security/cve/CVE-2024-54661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019990.html" source="SUSE-SU"/>
		<description>
This update for socat fixes the following issues:

 - CVE-2024-54661: Fixed arbitrary file overwrite via predictable /tmp directory (bsc#1225462)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-12"/>
	<updated date="2024-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1225462">SUSE bug 1225462</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-54661/">CVE-2024-54661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54661">CVE-2024-54661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958009" comment="socat-1.8.0.0-150400.14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206238" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1229007" ref_url="https://bugzilla.suse.com/1229007" source="BUGZILLA"/>
		<reference ref_id="1230834" ref_url="https://bugzilla.suse.com/1230834" source="BUGZILLA"/>
		<reference ref_id="1230915" ref_url="https://bugzilla.suse.com/1230915" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7409" ref_url="https://www.suse.com/security/cve/CVE-2024-7409/" source="CVE"/>
		<reference ref_id="CVE-2024-8354" ref_url="https://www.suse.com/security/cve/CVE-2024-8354/" source="CVE"/>
		<reference ref_id="CVE-2024-8612" ref_url="https://www.suse.com/security/cve/CVE-2024-8612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019995.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2024-7409: Fixed denial of service via improper synchronization in QEMU NBD Server during socket closure (bsc#1229007)
- CVE-2024-8354: Fixed assertion failure in usb_ep_get() in usb (bsc#1230834)
- CVE-2024-8612: Fixed information leak in virtio devices (bsc#1230915)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-12"/>
	<updated date="2024-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229007">SUSE bug 1229007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230834">SUSE bug 1230834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230915">SUSE bug 1230915</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7409/">CVE-2024-7409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7409">CVE-2024-7409 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8354/">CVE-2024-8354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8354">CVE-2024-8354 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8612/">CVE-2024-8612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8612">CVE-2024-8612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958010" comment="qemu-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957657" comment="qemu-accel-tcg-x86-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957658" comment="qemu-arm-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958011" comment="qemu-audio-spice-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958012" comment="qemu-chardev-spice-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958013" comment="qemu-guest-agent-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958014" comment="qemu-hw-display-qxl-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958015" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958016" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958017" comment="qemu-hw-usb-redirect-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957675" comment="qemu-ipxe-1.0.0+-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957710" comment="qemu-s390x-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957679" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957680" comment="qemu-sgabios-8-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958018" comment="qemu-tools-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958019" comment="qemu-ui-opengl-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958020" comment="qemu-ui-spice-core-6.2.0-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957687" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957688" comment="qemu-x86-6.2.0-150400.37.37.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206239" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218644" ref_url="https://bugzilla.suse.com/1218644" source="BUGZILLA"/>
		<reference ref_id="1220382" ref_url="https://bugzilla.suse.com/1220382" source="BUGZILLA"/>
		<reference ref_id="1221309" ref_url="https://bugzilla.suse.com/1221309" source="BUGZILLA"/>
		<reference ref_id="1222590" ref_url="https://bugzilla.suse.com/1222590" source="BUGZILLA"/>
		<reference ref_id="1229345" ref_url="https://bugzilla.suse.com/1229345" source="BUGZILLA"/>
		<reference ref_id="1229808" ref_url="https://bugzilla.suse.com/1229808" source="BUGZILLA"/>
		<reference ref_id="1230220" ref_url="https://bugzilla.suse.com/1230220" source="BUGZILLA"/>
		<reference ref_id="1231646" ref_url="https://bugzilla.suse.com/1231646" source="BUGZILLA"/>
		<reference ref_id="1232165" ref_url="https://bugzilla.suse.com/1232165" source="BUGZILLA"/>
		<reference ref_id="1232187" ref_url="https://bugzilla.suse.com/1232187" source="BUGZILLA"/>
		<reference ref_id="1232224" ref_url="https://bugzilla.suse.com/1232224" source="BUGZILLA"/>
		<reference ref_id="1232312" ref_url="https://bugzilla.suse.com/1232312" source="BUGZILLA"/>
		<reference ref_id="1232436" ref_url="https://bugzilla.suse.com/1232436" source="BUGZILLA"/>
		<reference ref_id="1232860" ref_url="https://bugzilla.suse.com/1232860" source="BUGZILLA"/>
		<reference ref_id="1232907" ref_url="https://bugzilla.suse.com/1232907" source="BUGZILLA"/>
		<reference ref_id="1232919" ref_url="https://bugzilla.suse.com/1232919" source="BUGZILLA"/>
		<reference ref_id="1232928" ref_url="https://bugzilla.suse.com/1232928" source="BUGZILLA"/>
		<reference ref_id="1233070" ref_url="https://bugzilla.suse.com/1233070" source="BUGZILLA"/>
		<reference ref_id="1233117" ref_url="https://bugzilla.suse.com/1233117" source="BUGZILLA"/>
		<reference ref_id="1233214" ref_url="https://bugzilla.suse.com/1233214" source="BUGZILLA"/>
		<reference ref_id="1233293" ref_url="https://bugzilla.suse.com/1233293" source="BUGZILLA"/>
		<reference ref_id="1233453" ref_url="https://bugzilla.suse.com/1233453" source="BUGZILLA"/>
		<reference ref_id="1233456" ref_url="https://bugzilla.suse.com/1233456" source="BUGZILLA"/>
		<reference ref_id="1233463" ref_url="https://bugzilla.suse.com/1233463" source="BUGZILLA"/>
		<reference ref_id="1233468" ref_url="https://bugzilla.suse.com/1233468" source="BUGZILLA"/>
		<reference ref_id="1233479" ref_url="https://bugzilla.suse.com/1233479" source="BUGZILLA"/>
		<reference ref_id="1233490" ref_url="https://bugzilla.suse.com/1233490" source="BUGZILLA"/>
		<reference ref_id="1233491" ref_url="https://bugzilla.suse.com/1233491" source="BUGZILLA"/>
		<reference ref_id="1233555" ref_url="https://bugzilla.suse.com/1233555" source="BUGZILLA"/>
		<reference ref_id="1233557" ref_url="https://bugzilla.suse.com/1233557" source="BUGZILLA"/>
		<reference ref_id="1233561" ref_url="https://bugzilla.suse.com/1233561" source="BUGZILLA"/>
		<reference ref_id="1233977" ref_url="https://bugzilla.suse.com/1233977" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922/" source="CVE"/>
		<reference ref_id="CVE-2024-26782" ref_url="https://www.suse.com/security/cve/CVE-2024-26782/" source="CVE"/>
		<reference ref_id="CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854/" source="CVE"/>
		<reference ref_id="CVE-2024-44932" ref_url="https://www.suse.com/security/cve/CVE-2024-44932/" source="CVE"/>
		<reference ref_id="CVE-2024-44964" ref_url="https://www.suse.com/security/cve/CVE-2024-44964/" source="CVE"/>
		<reference ref_id="CVE-2024-47757" ref_url="https://www.suse.com/security/cve/CVE-2024-47757/" source="CVE"/>
		<reference ref_id="CVE-2024-49925" ref_url="https://www.suse.com/security/cve/CVE-2024-49925/" source="CVE"/>
		<reference ref_id="CVE-2024-49945" ref_url="https://www.suse.com/security/cve/CVE-2024-49945/" source="CVE"/>
		<reference ref_id="CVE-2024-50017" ref_url="https://www.suse.com/security/cve/CVE-2024-50017/" source="CVE"/>
		<reference ref_id="CVE-2024-50089" ref_url="https://www.suse.com/security/cve/CVE-2024-50089/" source="CVE"/>
		<reference ref_id="CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115/" source="CVE"/>
		<reference ref_id="CVE-2024-50125" ref_url="https://www.suse.com/security/cve/CVE-2024-50125/" source="CVE"/>
		<reference ref_id="CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127/" source="CVE"/>
		<reference ref_id="CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154/" source="CVE"/>
		<reference ref_id="CVE-2024-50205" ref_url="https://www.suse.com/security/cve/CVE-2024-50205/" source="CVE"/>
		<reference ref_id="CVE-2024-50208" ref_url="https://www.suse.com/security/cve/CVE-2024-50208/" source="CVE"/>
		<reference ref_id="CVE-2024-50259" ref_url="https://www.suse.com/security/cve/CVE-2024-50259/" source="CVE"/>
		<reference ref_id="CVE-2024-50264" ref_url="https://www.suse.com/security/cve/CVE-2024-50264/" source="CVE"/>
		<reference ref_id="CVE-2024-50267" ref_url="https://www.suse.com/security/cve/CVE-2024-50267/" source="CVE"/>
		<reference ref_id="CVE-2024-50274" ref_url="https://www.suse.com/security/cve/CVE-2024-50274/" source="CVE"/>
		<reference ref_id="CVE-2024-50279" ref_url="https://www.suse.com/security/cve/CVE-2024-50279/" source="CVE"/>
		<reference ref_id="CVE-2024-50290" ref_url="https://www.suse.com/security/cve/CVE-2024-50290/" source="CVE"/>
		<reference ref_id="CVE-2024-50301" ref_url="https://www.suse.com/security/cve/CVE-2024-50301/" source="CVE"/>
		<reference ref_id="CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302/" source="CVE"/>
		<reference ref_id="CVE-2024-53061" ref_url="https://www.suse.com/security/cve/CVE-2024-53061/" source="CVE"/>
		<reference ref_id="CVE-2024-53063" ref_url="https://www.suse.com/security/cve/CVE-2024-53063/" source="CVE"/>
		<reference ref_id="CVE-2024-53068" ref_url="https://www.suse.com/security/cve/CVE-2024-53068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)
- CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
- CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220).
- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).
- CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070).
- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).
- CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans (bsc#1233453).
- CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479).
- CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490).
- CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
- CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561).

The following non-security bugs were fixed:

- Update config files (bsc#1218644).
- Update config files. Enabled IDPF for ARM64 (bsc#1221309)
- initramfs: avoid filename buffer overrun (bsc#1232436).
- kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644).
- mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646).
- rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644)
- x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382).
- x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218644">SUSE bug 1218644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220382">SUSE bug 1220382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221309">SUSE bug 1221309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222590">SUSE bug 1222590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229345">SUSE bug 1229345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229808">SUSE bug 1229808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230220">SUSE bug 1230220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231646">SUSE bug 1231646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232165">SUSE bug 1232165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232187">SUSE bug 1232187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232224">SUSE bug 1232224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232312">SUSE bug 1232312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232436">SUSE bug 1232436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232860">SUSE bug 1232860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232907">SUSE bug 1232907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232919">SUSE bug 1232919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232928">SUSE bug 1232928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233070">SUSE bug 1233070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233117">SUSE bug 1233117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233214">SUSE bug 1233214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233293">SUSE bug 1233293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233453">SUSE bug 1233453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233456">SUSE bug 1233456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233463">SUSE bug 1233463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233468">SUSE bug 1233468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233479">SUSE bug 1233479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233490">SUSE bug 1233490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233491">SUSE bug 1233491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233555">SUSE bug 1233555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233557">SUSE bug 1233557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233561">SUSE bug 1233561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233977">SUSE bug 1233977</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26782/">CVE-2024-26782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44932/">CVE-2024-44932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44932">CVE-2024-44932 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44964/">CVE-2024-44964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44964">CVE-2024-44964 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47757/">CVE-2024-47757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49925/">CVE-2024-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49945/">CVE-2024-49945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49945">CVE-2024-49945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50017/">CVE-2024-50017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50017">CVE-2024-50017 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50089/">CVE-2024-50089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50125/">CVE-2024-50125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50205/">CVE-2024-50205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50208/">CVE-2024-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50259/">CVE-2024-50259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50264/">CVE-2024-50264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50267/">CVE-2024-50267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50267">CVE-2024-50267 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50274/">CVE-2024-50274 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50274">CVE-2024-50274 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50279/">CVE-2024-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50279">CVE-2024-50279 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50290/">CVE-2024-50290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50301/">CVE-2024-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53061/">CVE-2024-53061 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53061">CVE-2024-53061 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53063/">CVE-2024-53063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53068/">CVE-2024-53068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53068">CVE-2024-53068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958504" comment="kernel-rt-5.14.21-150400.15.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958505" comment="kernel-source-rt-5.14.21-150400.15.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206240" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218644" ref_url="https://bugzilla.suse.com/1218644" source="BUGZILLA"/>
		<reference ref_id="1220382" ref_url="https://bugzilla.suse.com/1220382" source="BUGZILLA"/>
		<reference ref_id="1221309" ref_url="https://bugzilla.suse.com/1221309" source="BUGZILLA"/>
		<reference ref_id="1222590" ref_url="https://bugzilla.suse.com/1222590" source="BUGZILLA"/>
		<reference ref_id="1229808" ref_url="https://bugzilla.suse.com/1229808" source="BUGZILLA"/>
		<reference ref_id="1230220" ref_url="https://bugzilla.suse.com/1230220" source="BUGZILLA"/>
		<reference ref_id="1231646" ref_url="https://bugzilla.suse.com/1231646" source="BUGZILLA"/>
		<reference ref_id="1232187" ref_url="https://bugzilla.suse.com/1232187" source="BUGZILLA"/>
		<reference ref_id="1232312" ref_url="https://bugzilla.suse.com/1232312" source="BUGZILLA"/>
		<reference ref_id="1232860" ref_url="https://bugzilla.suse.com/1232860" source="BUGZILLA"/>
		<reference ref_id="1232907" ref_url="https://bugzilla.suse.com/1232907" source="BUGZILLA"/>
		<reference ref_id="1232919" ref_url="https://bugzilla.suse.com/1232919" source="BUGZILLA"/>
		<reference ref_id="1232928" ref_url="https://bugzilla.suse.com/1232928" source="BUGZILLA"/>
		<reference ref_id="1233070" ref_url="https://bugzilla.suse.com/1233070" source="BUGZILLA"/>
		<reference ref_id="1233214" ref_url="https://bugzilla.suse.com/1233214" source="BUGZILLA"/>
		<reference ref_id="1233293" ref_url="https://bugzilla.suse.com/1233293" source="BUGZILLA"/>
		<reference ref_id="1233453" ref_url="https://bugzilla.suse.com/1233453" source="BUGZILLA"/>
		<reference ref_id="1233456" ref_url="https://bugzilla.suse.com/1233456" source="BUGZILLA"/>
		<reference ref_id="1233463" ref_url="https://bugzilla.suse.com/1233463" source="BUGZILLA"/>
		<reference ref_id="1233468" ref_url="https://bugzilla.suse.com/1233468" source="BUGZILLA"/>
		<reference ref_id="1233479" ref_url="https://bugzilla.suse.com/1233479" source="BUGZILLA"/>
		<reference ref_id="1233490" ref_url="https://bugzilla.suse.com/1233490" source="BUGZILLA"/>
		<reference ref_id="1233491" ref_url="https://bugzilla.suse.com/1233491" source="BUGZILLA"/>
		<reference ref_id="1233555" ref_url="https://bugzilla.suse.com/1233555" source="BUGZILLA"/>
		<reference ref_id="1233557" ref_url="https://bugzilla.suse.com/1233557" source="BUGZILLA"/>
		<reference ref_id="1233561" ref_url="https://bugzilla.suse.com/1233561" source="BUGZILLA"/>
		<reference ref_id="1233977" ref_url="https://bugzilla.suse.com/1233977" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922/" source="CVE"/>
		<reference ref_id="CVE-2024-26782" ref_url="https://www.suse.com/security/cve/CVE-2024-26782/" source="CVE"/>
		<reference ref_id="CVE-2024-44932" ref_url="https://www.suse.com/security/cve/CVE-2024-44932/" source="CVE"/>
		<reference ref_id="CVE-2024-44964" ref_url="https://www.suse.com/security/cve/CVE-2024-44964/" source="CVE"/>
		<reference ref_id="CVE-2024-47757" ref_url="https://www.suse.com/security/cve/CVE-2024-47757/" source="CVE"/>
		<reference ref_id="CVE-2024-50017" ref_url="https://www.suse.com/security/cve/CVE-2024-50017/" source="CVE"/>
		<reference ref_id="CVE-2024-50089" ref_url="https://www.suse.com/security/cve/CVE-2024-50089/" source="CVE"/>
		<reference ref_id="CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115/" source="CVE"/>
		<reference ref_id="CVE-2024-50125" ref_url="https://www.suse.com/security/cve/CVE-2024-50125/" source="CVE"/>
		<reference ref_id="CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127/" source="CVE"/>
		<reference ref_id="CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154/" source="CVE"/>
		<reference ref_id="CVE-2024-50205" ref_url="https://www.suse.com/security/cve/CVE-2024-50205/" source="CVE"/>
		<reference ref_id="CVE-2024-50259" ref_url="https://www.suse.com/security/cve/CVE-2024-50259/" source="CVE"/>
		<reference ref_id="CVE-2024-50264" ref_url="https://www.suse.com/security/cve/CVE-2024-50264/" source="CVE"/>
		<reference ref_id="CVE-2024-50267" ref_url="https://www.suse.com/security/cve/CVE-2024-50267/" source="CVE"/>
		<reference ref_id="CVE-2024-50274" ref_url="https://www.suse.com/security/cve/CVE-2024-50274/" source="CVE"/>
		<reference ref_id="CVE-2024-50279" ref_url="https://www.suse.com/security/cve/CVE-2024-50279/" source="CVE"/>
		<reference ref_id="CVE-2024-50290" ref_url="https://www.suse.com/security/cve/CVE-2024-50290/" source="CVE"/>
		<reference ref_id="CVE-2024-50301" ref_url="https://www.suse.com/security/cve/CVE-2024-50301/" source="CVE"/>
		<reference ref_id="CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302/" source="CVE"/>
		<reference ref_id="CVE-2024-53061" ref_url="https://www.suse.com/security/cve/CVE-2024-53061/" source="CVE"/>
		<reference ref_id="CVE-2024-53063" ref_url="https://www.suse.com/security/cve/CVE-2024-53063/" source="CVE"/>
		<reference ref_id="CVE-2024-53068" ref_url="https://www.suse.com/security/cve/CVE-2024-53068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
- CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
- CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220).
- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).
- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).
- CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070).
- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).
- CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans (bsc#1233453).
- CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479).
- CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490).
- CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
- CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561).

The following non-security bugs were fixed:

- Update config files (bsc#1218644). 
- Update config files. Enabled IDPF for ARM64 (bsc#1221309)
- kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644).
- mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646).
- rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218644">SUSE bug 1218644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220382">SUSE bug 1220382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221309">SUSE bug 1221309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222590">SUSE bug 1222590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229808">SUSE bug 1229808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230220">SUSE bug 1230220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231646">SUSE bug 1231646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232187">SUSE bug 1232187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232312">SUSE bug 1232312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232860">SUSE bug 1232860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232907">SUSE bug 1232907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232919">SUSE bug 1232919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232928">SUSE bug 1232928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233070">SUSE bug 1233070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233214">SUSE bug 1233214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233293">SUSE bug 1233293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233453">SUSE bug 1233453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233456">SUSE bug 1233456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233463">SUSE bug 1233463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233468">SUSE bug 1233468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233479">SUSE bug 1233479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233490">SUSE bug 1233490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233491">SUSE bug 1233491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233555">SUSE bug 1233555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233557">SUSE bug 1233557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233561">SUSE bug 1233561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233977">SUSE bug 1233977</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26782/">CVE-2024-26782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44932/">CVE-2024-44932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44932">CVE-2024-44932 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44964/">CVE-2024-44964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44964">CVE-2024-44964 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47757/">CVE-2024-47757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50017/">CVE-2024-50017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50017">CVE-2024-50017 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50089/">CVE-2024-50089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50125/">CVE-2024-50125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50205/">CVE-2024-50205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50259/">CVE-2024-50259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50264/">CVE-2024-50264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50267/">CVE-2024-50267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50267">CVE-2024-50267 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50274/">CVE-2024-50274 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50274">CVE-2024-50274 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50279/">CVE-2024-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50279">CVE-2024-50279 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50290/">CVE-2024-50290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50301/">CVE-2024-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53061/">CVE-2024-53061 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53061">CVE-2024-53061 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53063/">CVE-2024-53063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53068/">CVE-2024-53068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53068">CVE-2024-53068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958506" comment="kernel-default-5.14.21-150400.24.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958409" comment="kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206241" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1233285" ref_url="https://bugzilla.suse.com/1233285" source="BUGZILLA"/>
		<reference ref_id="1233287" ref_url="https://bugzilla.suse.com/1233287" source="BUGZILLA"/>
		<reference ref_id="1233292" ref_url="https://bugzilla.suse.com/1233292" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52530" ref_url="https://www.suse.com/security/cve/CVE-2024-52530/" source="CVE"/>
		<reference ref_id="CVE-2024-52531" ref_url="https://www.suse.com/security/cve/CVE-2024-52531/" source="CVE"/>
		<reference ref_id="CVE-2024-52532" ref_url="https://www.suse.com/security/cve/CVE-2024-52532/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020014.html" source="SUSE-SU"/>
		<description>
This update for libsoup2 fixes the following issues:

 - CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285)
 - CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292)
 - CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233285">SUSE bug 1233285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233287">SUSE bug 1233287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233292">SUSE bug 1233292</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52530/">CVE-2024-52530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52530">CVE-2024-52530 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52531/">CVE-2024-52531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52531">CVE-2024-52531 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52532/">CVE-2024-52532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52532">CVE-2024-52532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958510" comment="libsoup-2_4-1-2.74.2-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206242" version="1" class="patch">
	<metadata>
		<title>Security update for installation-images (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1233813" ref_url="https://bugzilla.suse.com/1233813" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:4350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020013.html" source="SUSE-SU"/>
		<description>

This update updates installation-images and tftpboot images to contain the latest shim for secure boot.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233813">SUSE bug 1233813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958513" comment="tftpboot-installation-SLE-Micro-5.4-aarch64-16.57.26-150400.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958514" comment="tftpboot-installation-SLE-Micro-5.4-s390x-16.57.26-150400.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958515" comment="tftpboot-installation-SLE-Micro-5.4-x86_64-16.57.26-150400.3.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206243" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234068" ref_url="https://bugzilla.suse.com/1234068" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11053" ref_url="https://www.suse.com/security/cve/CVE-2024-11053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020021.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

 - CVE-2024-11053: Fixed password leak in curl used for the first host to the followed-to host under certain circumstances (bsc#1234068)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1234068">SUSE bug 1234068</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-11053/">CVE-2024-11053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11053">CVE-2024-11053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958511" comment="curl-8.0.1-150400.5.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958512" comment="libcurl4-8.0.1-150400.5.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206244" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1217070" ref_url="https://bugzilla.suse.com/1217070" source="BUGZILLA"/>
		<reference ref_id="1228324" ref_url="https://bugzilla.suse.com/1228324" source="BUGZILLA"/>
		<reference ref_id="1228553" ref_url="https://bugzilla.suse.com/1228553" source="BUGZILLA"/>
		<reference ref_id="1229806" ref_url="https://bugzilla.suse.com/1229806" source="BUGZILLA"/>
		<reference ref_id="1230294" ref_url="https://bugzilla.suse.com/1230294" source="BUGZILLA"/>
		<reference ref_id="1230331" ref_url="https://bugzilla.suse.com/1230331" source="BUGZILLA"/>
		<reference ref_id="1230333" ref_url="https://bugzilla.suse.com/1230333" source="BUGZILLA"/>
		<reference ref_id="1231348" ref_url="https://bugzilla.suse.com/1231348" source="BUGZILLA"/>
		<reference ref_id="1232999" ref_url="https://bugzilla.suse.com/1232999" source="BUGZILLA"/>
		<reference ref_id="1233819" ref_url="https://bugzilla.suse.com/1233819" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020020.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

- Update docker-buildx to v0.19.2. See upstream changelog online at
  &lt;https://github.com/docker/buildx/releases/tag/v0.19.2&gt;.

  Some notable changelogs from the last update:
    * &lt;https://github.com/docker/buildx/releases/tag/v0.19.0&gt;
    * &lt;https://github.com/docker/buildx/releases/tag/v0.18.0&gt;

- Add a new toggle file /etc/docker/suse-secrets-enable which allows users to
  disable the SUSEConnect integration with Docker (which creates special mounts
  in /run/secrets to allow container-suseconnect to authenticate containers
  with registries on registered hosts). bsc#1231348 bsc#1232999

  In order to disable these mounts, just do

    echo 0 &gt; /etc/docker/suse-secrets-enable

  and restart Docker. In order to re-enable them, just do

    echo 1 &gt; /etc/docker/suse-secrets-enable

  and restart Docker. Docker will output information on startup to tell you
  whether the SUSE secrets feature is enabled or not.

- Disable docker-buildx builds for SLES. It turns out that build containers
  with docker-buildx don't currently get the SUSE secrets mounts applied,
  meaning that container-suseconnect doesn't work when building images.
  bsc#1233819

- Remove DOCKER_NETWORK_OPTS from docker.service. This was removed from
  sysconfig a long time ago, and apparently this causes issues with systemd in
  some cases.

- Allow a parallel docker-stable RPM to exists in repositories.

- Update to docker-buildx v0.17.1 to match standalone docker-buildx package we
  are replacing. See upstream changelog online at
  &lt;https://github.com/docker/buildx/releases/tag/v0.17.1&gt;

- Allow users to disable SUSE secrets support by setting
  DOCKER_SUSE_SECRETS_ENABLE=0 in /etc/sysconfig/docker. (bsc#1231348)

- Mark docker-buildx as required since classic 'docker build' has been
  deprecated since Docker 23.0. (bsc#1230331)

- Import docker-buildx v0.16.2 as a subpackage. Previously this was a separate
  package, but with docker-stable it will be necessary to maintain the packages
  together and it makes more sense to have them live in the same OBS package.
  (bsc#1230333)

- Update to Docker 26.1.5-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/26.1/#2615&gt;
  bsc#1230294

- This update includes fixes for:
  * CVE-2024-41110. bsc#1228324
  * CVE-2023-47108. bsc#1217070 bsc#1229806
  * CVE-2023-45142. bsc#1228553 bsc#1229806

- Update to Docker 26.1.4-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/26.1/#2614&gt;

- Update to Docker 26.1.0-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/26.1/#2610&gt;

- Update --add-runtime to point to correct binary path.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217070">SUSE bug 1217070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228324">SUSE bug 1228324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228553">SUSE bug 1228553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229806">SUSE bug 1229806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230294">SUSE bug 1230294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230331">SUSE bug 1230331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230333">SUSE bug 1230333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231348">SUSE bug 1231348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232999">SUSE bug 1232999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233819">SUSE bug 1233819</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958498" comment="docker-26.1.5_ce-150000.212.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206245" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1226586" ref_url="https://bugzilla.suse.com/1226586" source="BUGZILLA"/>
		<reference ref_id="1233420" ref_url="https://bugzilla.suse.com/1233420" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52616" ref_url="https://www.suse.com/security/cve/CVE-2024-52616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020033.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2024-52616: Fixed Avahi Wide-Area DNS Predictable Transaction IDs (bsc#1233420)

  Other fixes: 
  - no longer supply bogus services to callbacks (bsc#1226586).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-19"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226586">SUSE bug 1226586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233420">SUSE bug 1233420</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52616/">CVE-2024-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52616">CVE-2024-52616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958672" comment="avahi-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958673" comment="libavahi-client3-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958674" comment="libavahi-common3-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958675" comment="libavahi-core7-0.8-150400.7.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206246" version="1" class="patch">
	<metadata>
		<title>Security update for suse-build-key (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219123" ref_url="https://bugzilla.suse.com/1219123" source="BUGZILLA"/>
		<reference ref_id="1219189" ref_url="https://bugzilla.suse.com/1219189" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:0444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017898.html" source="SUSE-SU"/>
		<description>
This update for suse-build-key fixes the following issues:

This update runs a import-suse-build-key script.

The previous libzypp-post-script based installation is replaced
with a systemd timer and service (bsc#1217215 bsc#1216410 jsc#PED-2777).
  - suse-build-key-import.service
  - suse-build-key-import.timer

It imports the future SUSE Linux Enterprise 15 4096 bit RSA key primary and reserve keys.
After successful import the timer is disabled.

To manually import them you can also run:

# rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-3fa1d6ce-63c9481c.asc
# rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-d588dc46-63c939db.asc

Bugfix added since last update:

- run rpm commands in import script only when libzypp is not 
  active. bsc#1219189 bsc#1219123
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-09"/>
	<updated date="2024-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219123">SUSE bug 1219123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219189">SUSE bug 1219189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846162" comment="suse-build-key-12.0-150000.8.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206247" version="1" class="patch">
	<metadata>
		<title>Security update for gcc13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1206480" ref_url="https://bugzilla.suse.com/1206480" source="BUGZILLA"/>
		<reference ref_id="1206684" ref_url="https://bugzilla.suse.com/1206684" source="BUGZILLA"/>
		<reference ref_id="1210557" ref_url="https://bugzilla.suse.com/1210557" source="BUGZILLA"/>
		<reference ref_id="1211427" ref_url="https://bugzilla.suse.com/1211427" source="BUGZILLA"/>
		<reference ref_id="1212101" ref_url="https://bugzilla.suse.com/1212101" source="BUGZILLA"/>
		<reference ref_id="1213915" ref_url="https://bugzilla.suse.com/1213915" source="BUGZILLA"/>
		<reference ref_id="1214052" ref_url="https://bugzilla.suse.com/1214052" source="BUGZILLA"/>
		<reference ref_id="1214460" ref_url="https://bugzilla.suse.com/1214460" source="BUGZILLA"/>
		<reference ref_id="1215427" ref_url="https://bugzilla.suse.com/1215427" source="BUGZILLA"/>
		<reference ref_id="1216664" ref_url="https://bugzilla.suse.com/1216664" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017600.html" source="SUSE-SU"/>
		<description>
This update for gcc13 fixes the following issues:

This update ship the GCC 13.2 compiler suite and its base libraries.

The compiler base libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 12 ones.

The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.

The Go, D, Ada and Modula 2 language compiler parts are available
unsupported via the PackageHub repositories.

To use gcc13 compilers use:

- install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.
- override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages.

For a full changelog with all new GCC13 features, check out

        https://gcc.gnu.org/gcc-13/changes.html


Detailed changes:


* CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable
  length stack allocations.  (bsc#1214052)

- Work around third party app crash during C++ standard library initialization.  [bsc#1216664]
- Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427)
- Bump included newlib to version 4.3.0.
- Update to GCC trunk head (r13-5254-g05b9868b182bb9)
- Redo floatn fixinclude pick-up to simply keep what is there.
- Turn cross compiler to s390x to a glibc cross. [bsc#1214460]

- Also handle -static-pie in the default-PIE specs
- Fixed missed optimization in Skia resulting in Firefox crashes when
  building with LTO.  [bsc#1212101]
- Make libstdc++6-devel packages own their directories since they
  can be installed standalone.  [bsc#1211427]
- Add new x86-related intrinsics (amxcomplexintrin.h).
- RISC-V: Add support for inlining subword atomic operations
- Use --enable-link-serialization rather that --enable-link-mutex,
  the benefit of the former one is that the linker jobs are not
  holding tokens of the make's jobserver.
- Add cross-bpf packages.  See https://gcc.gnu.org/wiki/BPFBackEnd
  for the general state of BPF with GCC.
- Add bootstrap conditional to allow --without=bootstrap to be
  specified to speed up local builds for testing.
- Bump included newlib to version 4.3.0. 
- Also package libhwasan_preinit.o on aarch64.
- Configure external timezone database provided by the timezone
  package.  Make libstdc++6 recommend timezone to get a fully
  working std::chrono.  Install timezone when running the testsuite.
- Package libhwasan_preinit.o on x86_64.
- Fixed unwinding on aarch64 with pointer signing.  [bsc#1206684]
- Enable PRU flavour for gcc13
- update floatn fixinclude pickup to check each header separately (bsc#1206480)
- Redo floatn fixinclude pick-up to simply keep what is there. 
- Bump libgo SONAME to libgo22.
- Do not package libhwasan for biarch (32-bit architecture)
  as the extension depends on 64-bit pointers.
- Adjust floatn fixincludes guard to work with SLE12 and earlier
  SLE15.
- Depend on at least LLVM 13 for GCN cross compiler.
- Update embedded newlib to version 4.2.0
- Allow cross-pru-gcc12-bootstrap for armv7l architecture.
  PRU architecture is used for real-time MCUs embedded into TI
  armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for
  armv7l in order to build both host applications and PRU firmware
  during the same build.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-07"/>
	<updated date="2024-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206480">SUSE bug 1206480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206684">SUSE bug 1206684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210557">SUSE bug 1210557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211427">SUSE bug 1211427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212101">SUSE bug 1212101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213915">SUSE bug 1213915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214460">SUSE bug 1214460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215427">SUSE bug 1215427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216664">SUSE bug 1216664</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818999" comment="libatomic1-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809550" comment="libgcc_s1-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809551" comment="libstdc++6-13.2.1+git7813-150000.1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206248" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218894" ref_url="https://bugzilla.suse.com/1218894" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017910.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

- Update to runc v1.1.12 (bsc#1218894)                                                         
                                                                                               
The following CVE was already fixed with the previous release.                                 
                                                                                               
- CVE-2024-21626: Fixed container breakout.                                                                                                                                                    
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-13"/>
	<updated date="2024-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218894">SUSE bug 1218894</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847023" comment="runc-1.1.12-150000.61.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206249" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1108281" ref_url="https://bugzilla.suse.com/1108281" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1209834" ref_url="https://bugzilla.suse.com/1209834" source="BUGZILLA"/>
		<reference ref_id="1212091" ref_url="https://bugzilla.suse.com/1212091" source="BUGZILLA"/>
		<reference ref_id="1215885" ref_url="https://bugzilla.suse.com/1215885" source="BUGZILLA"/>
		<reference ref_id="1216016" ref_url="https://bugzilla.suse.com/1216016" source="BUGZILLA"/>
		<reference ref_id="1216702" ref_url="https://bugzilla.suse.com/1216702" source="BUGZILLA"/>
		<reference ref_id="1217217" ref_url="https://bugzilla.suse.com/1217217" source="BUGZILLA"/>
		<reference ref_id="1217670" ref_url="https://bugzilla.suse.com/1217670" source="BUGZILLA"/>
		<reference ref_id="1217895" ref_url="https://bugzilla.suse.com/1217895" source="BUGZILLA"/>
		<reference ref_id="1217987" ref_url="https://bugzilla.suse.com/1217987" source="BUGZILLA"/>
		<reference ref_id="1217988" ref_url="https://bugzilla.suse.com/1217988" source="BUGZILLA"/>
		<reference ref_id="1217989" ref_url="https://bugzilla.suse.com/1217989" source="BUGZILLA"/>
		<reference ref_id="1218689" ref_url="https://bugzilla.suse.com/1218689" source="BUGZILLA"/>
		<reference ref_id="1218713" ref_url="https://bugzilla.suse.com/1218713" source="BUGZILLA"/>
		<reference ref_id="1218730" ref_url="https://bugzilla.suse.com/1218730" source="BUGZILLA"/>
		<reference ref_id="1218752" ref_url="https://bugzilla.suse.com/1218752" source="BUGZILLA"/>
		<reference ref_id="1218757" ref_url="https://bugzilla.suse.com/1218757" source="BUGZILLA"/>
		<reference ref_id="1218768" ref_url="https://bugzilla.suse.com/1218768" source="BUGZILLA"/>
		<reference ref_id="1218804" ref_url="https://bugzilla.suse.com/1218804" source="BUGZILLA"/>
		<reference ref_id="1218832" ref_url="https://bugzilla.suse.com/1218832" source="BUGZILLA"/>
		<reference ref_id="1218836" ref_url="https://bugzilla.suse.com/1218836" source="BUGZILLA"/>
		<reference ref_id="1218916" ref_url="https://bugzilla.suse.com/1218916" source="BUGZILLA"/>
		<reference ref_id="1218929" ref_url="https://bugzilla.suse.com/1218929" source="BUGZILLA"/>
		<reference ref_id="1218930" ref_url="https://bugzilla.suse.com/1218930" source="BUGZILLA"/>
		<reference ref_id="1218968" ref_url="https://bugzilla.suse.com/1218968" source="BUGZILLA"/>
		<reference ref_id="1219053" ref_url="https://bugzilla.suse.com/1219053" source="BUGZILLA"/>
		<reference ref_id="1219120" ref_url="https://bugzilla.suse.com/1219120" source="BUGZILLA"/>
		<reference ref_id="1219128" ref_url="https://bugzilla.suse.com/1219128" source="BUGZILLA"/>
		<reference ref_id="1219349" ref_url="https://bugzilla.suse.com/1219349" source="BUGZILLA"/>
		<reference ref_id="1219412" ref_url="https://bugzilla.suse.com/1219412" source="BUGZILLA"/>
		<reference ref_id="1219429" ref_url="https://bugzilla.suse.com/1219429" source="BUGZILLA"/>
		<reference ref_id="1219434" ref_url="https://bugzilla.suse.com/1219434" source="BUGZILLA"/>
		<reference ref_id="1219490" ref_url="https://bugzilla.suse.com/1219490" source="BUGZILLA"/>
		<reference ref_id="1219608" ref_url="https://bugzilla.suse.com/1219608" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33631" ref_url="https://www.suse.com/security/cve/CVE-2021-33631/" source="CVE"/>
		<reference ref_id="CVE-2023-46838" ref_url="https://www.suse.com/security/cve/CVE-2023-46838/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042/" source="CVE"/>
		<reference ref_id="CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043/" source="CVE"/>
		<reference ref_id="CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780/" source="CVE"/>
		<reference ref_id="CVE-2023-51782" ref_url="https://www.suse.com/security/cve/CVE-2023-51782/" source="CVE"/>
		<reference ref_id="CVE-2023-6040" ref_url="https://www.suse.com/security/cve/CVE-2023-6040/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915/" source="CVE"/>
		<reference ref_id="CVE-2024-0340" ref_url="https://www.suse.com/security/cve/CVE-2024-0340/" source="CVE"/>
		<reference ref_id="CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565/" source="CVE"/>
		<reference ref_id="CVE-2024-0641" ref_url="https://www.suse.com/security/cve/CVE-2024-0641/" source="CVE"/>
		<reference ref_id="CVE-2024-0775" ref_url="https://www.suse.com/security/cve/CVE-2024-0775/" source="CVE"/>
		<reference ref_id="CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085/" source="CVE"/>
		<reference ref_id="CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086/" source="CVE"/>
		<reference ref_id="CVE-2024-24860" ref_url="https://www.suse.com/security/cve/CVE-2024-24860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).
- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).
- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).

The following non-security bugs were fixed:

- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).
- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).
- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).
- bcache: avoid NULL checking to c-&gt;root in run_cache_set() (git-fixes).
- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).
- bcache: check return value from btree_node_alloc_replacement() (git-fixes).
- bcache: fixup btree_cache_wait list damage (git-fixes).
- bcache: fixup init dirty data errors (git-fixes).
- bcache: fixup lock c-&gt;root error (git-fixes).
- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).
- bcache: prevent potential division by zero error (git-fixes).
- bcache: remove redundant assignment to variable cur_idx (git-fixes).
- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).
- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).
- block: Fix kabi header include (bsc#1218929).
- block: free the extended dev_t minor later (bsc#1218930).
- clocksource: Skip watchdog check for large watchdog intervals (bsc#1217217).
- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).
- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).
- dm cache: add cond_resched() to various workqueue loops (git-fixes).
- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).
- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).
- dm crypt: avoid accessing uninitialized tasklet (git-fixes).
- dm flakey: do not corrupt the zero page (git-fixes).
- dm flakey: fix a crash with invalid table line (git-fixes).
- dm flakey: fix logic when corrupting a bio (git-fixes).
- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).
- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).
- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).
- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).
- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).
- dm stats: check for and propagate alloc_percpu failure (git-fixes).
- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).
- dm thin metadata: check fail_io before using data_sm (git-fixes).
- dm thin: add cond_resched() to various workqueue loops (git-fixes).
- dm thin: fix deadlock when swapping to thin device (bsc#1177529).
- dm verity: do not perform FEC for failed readahead IO (git-fixes).
- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).
- dm verity: skip redundant verity_handle_err() on I/O errors (git-fixes).
- dm zoned: free dmz-&gt;ddev array in dmz_put_zoned_devices (git-fixes).
- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).
- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).
- dm-verity: align struct dm_verity_fec_io properly (git-fixes).
- dm: add cond_resched() to dm_wq_work() (git-fixes).
- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).
- dm: do not lock fs when the map is NULL in process of resume (git-fixes).
- dm: remove flush_scheduled_work() during local_exit() (git-fixes).
- dm: send just one event on resize, not two (git-fixes).
- doc/README.KSYMS: Add to repo.
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- intel_idle: add Emerald Rapids Xeon support (bsc#1216016).
- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- kernel-source: Fix description typo
- loop: suppress uevents while reconfiguring the device (git-fixes).
- nbd: Fix debugfs_create_dir error checking (git-fixes).
- nbd: fix incomplete validation of ioctl arg (git-fixes).
- nbd: use the correct block_device in nbd_bdev_reset (git-fixes).
- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).
- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).
- null_blk: Always check queue mode setting from configfs (git-fixes).
- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).
- rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails (git-fixes).
- rbd: decouple header read-in from updating rbd_dev-&gt;header (git-fixes).
- rbd: decouple parent info read-in from updating rbd_dev (git-fixes).
- rbd: get snapshot context after exclusive lock is ensured to be held (git-fixes).
- rbd: harden get_lock_owner_info() a bit (git-fixes).
- rbd: make get_lock_owner_info() return a single locker or NULL (git-fixes).
- rbd: move RBD_OBJ_FLAG_COPYUP_ENABLED flag setting (git-fixes).
- rbd: move rbd_dev_refresh() definition (git-fixes).
- rbd: prevent busy loop when requesting exclusive lock (git-fixes).
- rbd: retrieve and check lock owner twice before blocklisting (git-fixes).
- rbd: take header_rwsem in rbd_dev_refresh() only when updating (git-fixes).
- sched/isolation: add cpu_is_isolated() API (bsc#1217895).
- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).
- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).
- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).
- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-14"/>
	<updated date="2024-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108281">SUSE bug 1108281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209834">SUSE bug 1209834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212091">SUSE bug 1212091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215885">SUSE bug 1215885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216016">SUSE bug 1216016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217217">SUSE bug 1217217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217670">SUSE bug 1217670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217895">SUSE bug 1217895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218689">SUSE bug 1218689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218713">SUSE bug 1218713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218730">SUSE bug 1218730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218752">SUSE bug 1218752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218757">SUSE bug 1218757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218768">SUSE bug 1218768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218804">SUSE bug 1218804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218832">SUSE bug 1218832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218836">SUSE bug 1218836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218916">SUSE bug 1218916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218929">SUSE bug 1218929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218930">SUSE bug 1218930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218968">SUSE bug 1218968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219053">SUSE bug 1219053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219120">SUSE bug 1219120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219128">SUSE bug 1219128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219349">SUSE bug 1219349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219412">SUSE bug 1219412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219429">SUSE bug 1219429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219434">SUSE bug 1219434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219490">SUSE bug 1219490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219608">SUSE bug 1219608</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33631/">CVE-2021-33631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33631">CVE-2021-33631 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46838/">CVE-2023-46838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51782/">CVE-2023-51782 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6040/">CVE-2023-6040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6040">CVE-2023-6040 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0340/">CVE-2024-0340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0340">CVE-2024-0340 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0641/">CVE-2024-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0775/">CVE-2024-0775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24860/">CVE-2024-24860 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847037" comment="kernel-rt-5.14.21-150400.15.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206250" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1193948" ref_url="https://bugzilla.suse.com/1193948" source="BUGZILLA"/>
		<reference ref_id="1211649" ref_url="https://bugzilla.suse.com/1211649" source="BUGZILLA"/>
		<reference ref_id="1215963" ref_url="https://bugzilla.suse.com/1215963" source="BUGZILLA"/>
		<reference ref_id="1216284" ref_url="https://bugzilla.suse.com/1216284" source="BUGZILLA"/>
		<reference ref_id="1219430" ref_url="https://bugzilla.suse.com/1219430" source="BUGZILLA"/>
		<reference ref_id="1219431" ref_url="https://bugzilla.suse.com/1219431" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22231" ref_url="https://www.suse.com/security/cve/CVE-2024-22231/" source="CVE"/>
		<reference ref_id="CVE-2024-22232" ref_url="https://www.suse.com/security/cve/CVE-2024-22232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017927.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Security issues fixed:

- CVE-2024-22231: Prevent directory traversal when creating syndic cache directory
  on the master (bsc#1219430)
- CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file
  method (bsc#1219431)

Bugs fixed:

- Ensure that pillar refresh loads beacons from pillar without restart
- Fix the aptpkg.py unit test failure
- Prefer unittest.mock to python-mock in test suite
- Enable 'KeepAlive' probes for Salt SSH executions (bsc#1211649)
- Revert changes to set Salt configured user early in the stack (bsc#1216284)
- Align behavior of some modules when using salt-call via symlink (bsc#1215963)
- Fix gitfs '__env__' and improve cache cleaning (bsc#1193948)
- Remove python-boto dependency for the python3-salt-testsuite package for Tumbleweed
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193948">SUSE bug 1193948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211649">SUSE bug 1211649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215963">SUSE bug 1215963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216284">SUSE bug 1216284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219430">SUSE bug 1219430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219431">SUSE bug 1219431</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22231/">CVE-2024-22231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22231">CVE-2024-22231 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22232/">CVE-2024-22232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22232">CVE-2024-22232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847038" comment="python3-salt-3006.0-150400.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847039" comment="salt-3006.0-150400.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847040" comment="salt-minion-3006.0-150400.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847041" comment="salt-transactional-update-3006.0-150400.8.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206251" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1108281" ref_url="https://bugzilla.suse.com/1108281" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1209834" ref_url="https://bugzilla.suse.com/1209834" source="BUGZILLA"/>
		<reference ref_id="1212091" ref_url="https://bugzilla.suse.com/1212091" source="BUGZILLA"/>
		<reference ref_id="1215275" ref_url="https://bugzilla.suse.com/1215275" source="BUGZILLA"/>
		<reference ref_id="1215885" ref_url="https://bugzilla.suse.com/1215885" source="BUGZILLA"/>
		<reference ref_id="1216016" ref_url="https://bugzilla.suse.com/1216016" source="BUGZILLA"/>
		<reference ref_id="1216702" ref_url="https://bugzilla.suse.com/1216702" source="BUGZILLA"/>
		<reference ref_id="1217217" ref_url="https://bugzilla.suse.com/1217217" source="BUGZILLA"/>
		<reference ref_id="1217670" ref_url="https://bugzilla.suse.com/1217670" source="BUGZILLA"/>
		<reference ref_id="1217895" ref_url="https://bugzilla.suse.com/1217895" source="BUGZILLA"/>
		<reference ref_id="1217987" ref_url="https://bugzilla.suse.com/1217987" source="BUGZILLA"/>
		<reference ref_id="1217988" ref_url="https://bugzilla.suse.com/1217988" source="BUGZILLA"/>
		<reference ref_id="1217989" ref_url="https://bugzilla.suse.com/1217989" source="BUGZILLA"/>
		<reference ref_id="1218689" ref_url="https://bugzilla.suse.com/1218689" source="BUGZILLA"/>
		<reference ref_id="1218713" ref_url="https://bugzilla.suse.com/1218713" source="BUGZILLA"/>
		<reference ref_id="1218730" ref_url="https://bugzilla.suse.com/1218730" source="BUGZILLA"/>
		<reference ref_id="1218752" ref_url="https://bugzilla.suse.com/1218752" source="BUGZILLA"/>
		<reference ref_id="1218757" ref_url="https://bugzilla.suse.com/1218757" source="BUGZILLA"/>
		<reference ref_id="1218768" ref_url="https://bugzilla.suse.com/1218768" source="BUGZILLA"/>
		<reference ref_id="1218804" ref_url="https://bugzilla.suse.com/1218804" source="BUGZILLA"/>
		<reference ref_id="1218832" ref_url="https://bugzilla.suse.com/1218832" source="BUGZILLA"/>
		<reference ref_id="1218836" ref_url="https://bugzilla.suse.com/1218836" source="BUGZILLA"/>
		<reference ref_id="1218916" ref_url="https://bugzilla.suse.com/1218916" source="BUGZILLA"/>
		<reference ref_id="1218929" ref_url="https://bugzilla.suse.com/1218929" source="BUGZILLA"/>
		<reference ref_id="1218930" ref_url="https://bugzilla.suse.com/1218930" source="BUGZILLA"/>
		<reference ref_id="1218968" ref_url="https://bugzilla.suse.com/1218968" source="BUGZILLA"/>
		<reference ref_id="1219053" ref_url="https://bugzilla.suse.com/1219053" source="BUGZILLA"/>
		<reference ref_id="1219120" ref_url="https://bugzilla.suse.com/1219120" source="BUGZILLA"/>
		<reference ref_id="1219128" ref_url="https://bugzilla.suse.com/1219128" source="BUGZILLA"/>
		<reference ref_id="1219349" ref_url="https://bugzilla.suse.com/1219349" source="BUGZILLA"/>
		<reference ref_id="1219412" ref_url="https://bugzilla.suse.com/1219412" source="BUGZILLA"/>
		<reference ref_id="1219429" ref_url="https://bugzilla.suse.com/1219429" source="BUGZILLA"/>
		<reference ref_id="1219434" ref_url="https://bugzilla.suse.com/1219434" source="BUGZILLA"/>
		<reference ref_id="1219490" ref_url="https://bugzilla.suse.com/1219490" source="BUGZILLA"/>
		<reference ref_id="1219608" ref_url="https://bugzilla.suse.com/1219608" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33631" ref_url="https://www.suse.com/security/cve/CVE-2021-33631/" source="CVE"/>
		<reference ref_id="CVE-2023-46838" ref_url="https://www.suse.com/security/cve/CVE-2023-46838/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042/" source="CVE"/>
		<reference ref_id="CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043/" source="CVE"/>
		<reference ref_id="CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780/" source="CVE"/>
		<reference ref_id="CVE-2023-51782" ref_url="https://www.suse.com/security/cve/CVE-2023-51782/" source="CVE"/>
		<reference ref_id="CVE-2023-6040" ref_url="https://www.suse.com/security/cve/CVE-2023-6040/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915/" source="CVE"/>
		<reference ref_id="CVE-2024-0340" ref_url="https://www.suse.com/security/cve/CVE-2024-0340/" source="CVE"/>
		<reference ref_id="CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565/" source="CVE"/>
		<reference ref_id="CVE-2024-0641" ref_url="https://www.suse.com/security/cve/CVE-2024-0641/" source="CVE"/>
		<reference ref_id="CVE-2024-0775" ref_url="https://www.suse.com/security/cve/CVE-2024-0775/" source="CVE"/>
		<reference ref_id="CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085/" source="CVE"/>
		<reference ref_id="CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086/" source="CVE"/>
		<reference ref_id="CVE-2024-24860" ref_url="https://www.suse.com/security/cve/CVE-2024-24860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).
- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).

The following non-security bugs were fixed:

- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).
- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).
- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).
- bcache: avoid NULL checking to c-&gt;root in run_cache_set() (git-fixes).
- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).
- bcache: check return value from btree_node_alloc_replacement() (git-fixes).
- bcache: fixup btree_cache_wait list damage (git-fixes).
- bcache: fixup init dirty data errors (git-fixes).
- bcache: fixup lock c-&gt;root error (git-fixes).
- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).
- bcache: prevent potential division by zero error (git-fixes).
- bcache: remove redundant assignment to variable cur_idx (git-fixes).
- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).
- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).
- block: Fix kabi header include (bsc#1218929).
- block: free the extended dev_t minor later (bsc#1218930).
- clocksource: Skip watchdog check for large watchdog intervals (bsc#1217217).
- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).
- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).
- dm cache: add cond_resched() to various workqueue loops (git-fixes).
- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).
- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).
- dm crypt: avoid accessing uninitialized tasklet (git-fixes).
- dm flakey: do not corrupt the zero page (git-fixes).
- dm flakey: fix a crash with invalid table line (git-fixes).
- dm flakey: fix logic when corrupting a bio (git-fixes).
- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).
- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).
- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).
- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).
- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).
- dm stats: check for and propagate alloc_percpu failure (git-fixes).
- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).
- dm thin metadata: check fail_io before using data_sm (git-fixes).
- dm thin: add cond_resched() to various workqueue loops (git-fixes).
- dm thin: fix deadlock when swapping to thin device (bsc#1177529).
- dm verity: do not perform FEC for failed readahead IO (git-fixes).
- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).
- dm verity: skip redundant verity_handle_err() on I/O errors (git-fixes).
- dm zoned: free dmz-&gt;ddev array in dmz_put_zoned_devices (git-fixes).
- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).
- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).
- dm-verity: align struct dm_verity_fec_io properly (git-fixes).
- dm: add cond_resched() to dm_wq_work() (git-fixes).
- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).
- dm: do not lock fs when the map is NULL in process of resume (git-fixes).
- dm: remove flush_scheduled_work() during local_exit() (git-fixes).
- dm: send just one event on resize, not two (git-fixes).
- doc/README.KSYMS: Add to repo.
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- intel_idle: add Emerald Rapids Xeon support (bsc#1216016).
- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- loop: suppress uevents while reconfiguring the device (git-fixes).
- nbd: Fix debugfs_create_dir error checking (git-fixes).
- nbd: fix incomplete validation of ioctl arg (git-fixes).
- nbd: use the correct block_device in nbd_bdev_reset (git-fixes).
- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).
- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).
- null_blk: Always check queue mode setting from configfs (git-fixes).
- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).
- rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails (git-fixes).
- rbd: decouple header read-in from updating rbd_dev-&gt;header (git-fixes).
- rbd: decouple parent info read-in from updating rbd_dev (git-fixes).
- rbd: get snapshot context after exclusive lock is ensured to be held (git-fixes).
- rbd: harden get_lock_owner_info() a bit (git-fixes).
- rbd: make get_lock_owner_info() return a single locker or NULL (git-fixes).
- rbd: move RBD_OBJ_FLAG_COPYUP_ENABLED flag setting (git-fixes).
- rbd: move rbd_dev_refresh() definition (git-fixes).
- rbd: prevent busy loop when requesting exclusive lock (git-fixes).
- rbd: retrieve and check lock owner twice before blocklisting (git-fixes).
- rbd: take header_rwsem in rbd_dev_refresh() only when updating (git-fixes).
- sched/isolation: add cpu_is_isolated() API (bsc#1217895).
- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).
- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).
- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).
- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108281">SUSE bug 1108281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209834">SUSE bug 1209834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212091">SUSE bug 1212091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215275">SUSE bug 1215275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215885">SUSE bug 1215885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216016">SUSE bug 1216016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217217">SUSE bug 1217217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217670">SUSE bug 1217670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217895">SUSE bug 1217895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218689">SUSE bug 1218689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218713">SUSE bug 1218713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218730">SUSE bug 1218730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218752">SUSE bug 1218752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218757">SUSE bug 1218757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218768">SUSE bug 1218768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218804">SUSE bug 1218804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218832">SUSE bug 1218832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218836">SUSE bug 1218836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218916">SUSE bug 1218916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218929">SUSE bug 1218929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218930">SUSE bug 1218930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218968">SUSE bug 1218968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219053">SUSE bug 1219053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219120">SUSE bug 1219120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219128">SUSE bug 1219128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219349">SUSE bug 1219349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219412">SUSE bug 1219412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219429">SUSE bug 1219429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219434">SUSE bug 1219434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219490">SUSE bug 1219490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219608">SUSE bug 1219608</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33631/">CVE-2021-33631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33631">CVE-2021-33631 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46838/">CVE-2023-46838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51782/">CVE-2023-51782 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6040/">CVE-2023-6040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6040">CVE-2023-6040 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0340/">CVE-2024-0340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0340">CVE-2024-0340 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0641/">CVE-2024-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0775/">CVE-2024-0775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24860/">CVE-2024-24860 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847042" comment="kernel-default-5.14.21-150400.24.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846724" comment="kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206252" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218690" ref_url="https://bugzilla.suse.com/1218690" source="BUGZILLA"/>
		<reference ref_id="1218810" ref_url="https://bugzilla.suse.com/1218810" source="BUGZILLA"/>
		<reference ref_id="1219243" ref_url="https://bugzilla.suse.com/1219243" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6129" ref_url="https://www.suse.com/security/cve/CVE-2023-6129/" source="CVE"/>
		<reference ref_id="CVE-2023-6237" ref_url="https://www.suse.com/security/cve/CVE-2023-6237/" source="CVE"/>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017939.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-6129: Fixed vector register clobbering on PowerPC. (bsc#1218690)
- CVE-2023-6237: Fixed excessive time spent checking invalid RSA public keys. (bsc#1218810)
- CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218690">SUSE bug 1218690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218810">SUSE bug 1218810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219243">SUSE bug 1219243</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6129/">CVE-2023-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6237/">CVE-2023-6237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847043" comment="libopenssl3-3.0.8-150400.4.49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206253" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218971" ref_url="https://bugzilla.suse.com/1218971" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017960.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Always add the KEX pseudo-methods 'ext-info-c' and 'kex-strict-c-v00@openssh.com'
  when configuring custom method list. [bsc#1218971, CVE-2023-48795]

  * The strict-kex extension is announced in the list of available
    KEX methods. However, when the default KEX method list is modified
    or replaced, the extension is not added back automatically.

		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218971">SUSE bug 1218971</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848194" comment="libssh2-1-1.11.0-150000.4.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206254" version="1" class="patch">
	<metadata>
		<title>Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1133277" ref_url="https://bugzilla.suse.com/1133277" source="BUGZILLA"/>
		<reference ref_id="1182659" ref_url="https://bugzilla.suse.com/1182659" source="BUGZILLA"/>
		<reference ref_id="1203378" ref_url="https://bugzilla.suse.com/1203378" source="BUGZILLA"/>
		<reference ref_id="1208794" ref_url="https://bugzilla.suse.com/1208794" source="BUGZILLA"/>
		<reference ref_id="1212180" ref_url="https://bugzilla.suse.com/1212180" source="BUGZILLA"/>
		<reference ref_id="1212182" ref_url="https://bugzilla.suse.com/1212182" source="BUGZILLA"/>
		<reference ref_id="1214148" ref_url="https://bugzilla.suse.com/1214148" source="BUGZILLA"/>
		<reference ref_id="1215334" ref_url="https://bugzilla.suse.com/1215334" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32731" ref_url="https://www.suse.com/security/cve/CVE-2023-32731/" source="CVE"/>
		<reference ref_id="CVE-2023-32732" ref_url="https://www.suse.com/security/cve/CVE-2023-32732/" source="CVE"/>
		<reference ref_id="CVE-2023-33953" ref_url="https://www.suse.com/security/cve/CVE-2023-33953/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-4785" ref_url="https://www.suse.com/security/cve/CVE-2023-4785/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
		<description>
This update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 fixes the following issues:

abseil-cpp was updated to:

Update to 20230802.1:

* Add StdcppWaiter to the end of the list of waiter implementations

Update to 20230802.0

  What's New:

  * Added the nullability library for designating the expected
    nullability of pointers. Currently these serve as annotations
    only, but it is expected that compilers will one day be able
    to use these annotations for diagnostic purposes.
  * Added the prefetch library as a portable layer for moving data
    into caches before it is read.
  * Abseil's hash tables now detect many more programming errors
    in debug and sanitizer builds.
  * Abseil's synchronization objects now differentiate absolute
    waits (when passed an absl::Time) from relative waits (when
    passed an absl::Duration) when the underlying platform supports
    differentiating these cases. This only makes a difference when
    system clocks are adjusted.
  * Abseil's flag parsing library includes additional methods that
    make it easier to use when another library also expects to be
    able to parse flags.
  * absl::string_view is now available as a smaller target,
    @com_google_absl//absl/strings:string_view, so that users may
    use this library without depending on the much larger
    @com_google_absl//absl/strings target.

Update to 20230125.3

Details can be found on:

    https://github.com/abseil/abseil-cpp/releases/tag/20230125.3

Update to 20230125.2

What's New:

    The Abseil logging library has been released. This library
    provides facilities for writing short text messages about the
    status of a program to stderr, disk files, or other sinks
    (via an extension API). See the logging library documentation
    for more information.
      An extension point, AbslStringify(), allows user-defined types
    to seamlessly work with Abseil's string formatting functions
    like absl::StrCat() and absl::StrFormat().
      A library for computing CRC32C checksums has been added.
      Floating-point parsing now uses the Eisel-Lemire algorithm,
    which provides a significant speed improvement.
      The flags library now provides suggestions for the closest
    flag(s) in the case of misspelled flags.
      Using CMake to install Abseil now makes the installed artifacts
    (in particular absl/base/options.h) reflect the compiled ABI.

  Breaking Changes:

    Abseil now requires at least C++14 and follows Google's Foundational
    C++ Support Policy. See this table for a list of currently supported
    versions compilers, platforms, and build tools.
      The legacy spellings of the thread annotation macros/functions
    (e.g. GUARDED_BY()) have been removed by default in favor of the
    ABSL_ prefixed versions (e.g. ABSL_GUARDED_BY()) due to clashes with
    other libraries. The compatibility macro ABSL_LEGACY_THREAD_ANNOTATIONS
    can be defined on the compile command-line to temporarily restore these
    spellings, but this compatibility macro will be removed in the future.

  Known Issues

    The Abseil logging library in this release is not a feature-complete
    replacement for glog yet. VLOG and DFATAL are examples of features
    that have not yet been released.

Update to version 20220623.0

  What's New:

  * Added absl::AnyInvocable, a move-only function type.
  * Added absl::CordBuffer, a type for buffering data for eventual inclusion an
    absl::Cord, which is useful for writing zero-copy code.
  * Added support for command-line flags of type absl::optional&lt;T&gt;.

  Breaking Changes:

  * CMake builds now use the flag ABSL_BUILD_TESTING (default: OFF) to control
    whether or not unit tests are built.
  * The ABSL_DEPRECATED macro now works with the GCC compiler. GCC users that
    are experiencing new warnings can use -Wno-deprecated-declatations silence
	the warnings or use -Wno-error=deprecated-declarations to see warnings but
	not fail the build.
  * ABSL_CONST_INIT uses the C++20 keyword constinit when available. Some
    compilers are more strict about where this keyword must appear compared to
	the pre-C++20 implementation.
  * Bazel builds now depend on the bazelbuild/bazel-skylib repository.
    See Abseil's WORKSPACE file for an example of how to add this dependency.

  Other:

  * This will be the last release to support C++11. Future releases will require at least C++14.

grpc was updated to 1.60:

Update to release 1.60

* Implemented dualstack IPv4 and IPv6 backend support, as per
  draft gRFC A61. xDS support currently guarded by
  GRPC_EXPERIMENTAL_XDS_DUALSTACK_ENDPOINTS env var.
* Support for setting proxy for addresses.
* Add v1 reflection.

update to 1.59.3:

* Security - Revocation: Crl backport to 1.59. (#34926)

Update to release 1.59.2

* Fixes for CVE-2023-44487

Update to version 1.59.1:

* C++: Fix MakeCordFromSlice memory bug (gh#grpc/grpc#34552).

Update to version 1.59.0:

* xds ssa: Remove environment variable protection for stateful
  affinity (gh#grpc/grpc#34435).
* c-ares: fix spin loop bug when c-ares gives up on a socket
  that still has data left in its read buffer
  (gh#grpc/grpc#34185).
* Deps: Adding upb as a submodule (gh#grpc/grpc#34199).
* EventEngine: Update Cancel contract on closure deletion
  timeline (gh#grpc/grpc#34167).
* csharp codegen: Handle empty base_namespace option value to
  fix gh#grpc/grpc#34113 (gh#grpc/grpc#34137).
* Ruby:
  - replace strdup with gpr_strdup (gh#grpc/grpc#34177).
  - drop ruby 2.6 support (gh#grpc/grpc#34198).

Update to release 1.58.1

* Reintroduced c-ares 1.14 or later support

Update to release 1.58

* ruby extension: remove unnecessary background thread startup
  wait logic that interferes with forking

Update to release 1.57 (CVE-2023-4785, bsc#1215334, CVE-2023-33953, bsc#1214148)

* EventEngine: Change GetDNSResolver to return
  absl::StatusOr&lt;std::unique_ptr&lt;DNSResolver&gt;&gt;.
* Improve server handling of file descriptor exhaustion.
* Add a channel argument to set DSCP on streams.

Update to release 1.56.2

* Improve server handling of file descriptor exhaustion

Update to release 1.56.0 (CVE-2023-32731, bsc#1212180)

* core: Add support for vsock transport.
* EventEngine: Change TXT lookup result type to
  std::vector&lt;std::string&gt;.
* C++/Authz: support customizable audit functionality for
  authorization policy.

Update to release 1.54.1

* Bring declarations and definitions to be in sync

Update to release 1.54 (CVE-2023-32732, bsc#1212182)

* XDS: enable XDS federation by default
* TlsCreds: Support revocation of intermediate in chain

Update to release 1.51.1

* Only a macOS/aarch64-related change

Update to release 1.51

* c-ares DNS resolver: fix logical race between resolution
  timeout/cancellation and fd readability.
* Remove support for pthread TLS

Update to release 1.50.0

* Core

  - Derive EventEngine from std::enable_shared_from_this. (#31060)
  - Revert 'Revert '[chttp2] fix stream leak with queued flow control
    update and absence of writes (#30907)' (#30991)'. (#30992)
  - [chttp2] fix stream leak with queued flow control update and absence of writes. (#30907)
  - Remove gpr_codegen. (#30899)
  - client_channel: allow LB policy to communicate update errors to resolver. (#30809)
  - FaultInjection: Fix random number generation. (#30623)

* C++

  - OpenCensus Plugin: Add measure and views for started RPCs. (#31034)

* C#

  - Grpc.Tools: Parse warnings from libprotobuf (fix #27502). (#30371)
  - Grpc.Tools add support for env variable GRPC_PROTOC_PLUGIN (fix #27099). (#30411)
  - Grpc.Tools document AdditionalImportDirs. (#30405)
  - Fix OutputOptions and GrpcOutputOptions (issue #25950). (#30410)

Update to release 1.49.1

* All

  - Update protobuf to v21.6 on 1.49.x. (#31028)

* Ruby

  - Backport 'Fix ruby windows ucrt build #31051' to 1.49.x. (#31053)

Update to release 1.49.0

* Core
  - Backport: 'stabilize the C2P resolver URI scheme' to v1.49.x. (#30654)
  - Bump core version. (#30588)
  - Update OpenCensus to HEAD. (#30567)
  - Update protobuf submodule to 3.21.5. (#30548)
  - Update third_party/protobuf to 3.21.4. (#30377)
  - [core] Remove GRPC_INITIAL_METADATA_CORKED flag. (#30443)
  - HTTP2: Fix keepalive time throttling. (#30164)
  - Use AnyInvocable in EventEngine APIs. (#30220)

* Python

  - Add type stub generation support to grpcio-tools. (#30498)

Update to release 1.48.1

* Backport EventEngine Forkables

Update to release 1.48.0
 
* C++14 is now required
* xDS: Workaround to get gRPC clients working with istio

Update to release 1.46.3

* backport: xds: use federation env var to guard new-style
  resource name parsing (#29725) #29727

Update to release 1.46

* Added HTTP/1.1 support in httpcli
* HTTP2: Add graceful goaway

Update to release 1.45.2

* Various fixes related to XDS
* HTTP2: Should not run cancelling logic on servers when
  receiving GOAWAY

Update to release 1.45.1

* Switched to epoll1 as a default polling engine for Linux

Update to version 1.45.0:

* Core:

  - Backport 'Include ADS stream error in XDS error updates
    (#29014)' to 1.45.x [gh#grpc/grpc#29121].
  - Bump core version to 23.0.0 for upcoming release
    [gh#grpc/grpc#29026].
  - Fix memory leak in HTTP request security handshake
    cancellation [gh#grpc/grpc#28971].
  - CompositeChannelCredentials: Comparator implementation
    [gh#grpc/grpc#28902].
  - Delete custom iomgr [gh#grpc/grpc#28816].
  - Implement transparent retries [gh#grpc/grpc#28548].
  - Uniquify channel args keys [gh#grpc/grpc#28799].
  - Set trailing_metadata_available for recv_initial_metadata
    ops when generating a fake status [gh#grpc/grpc#28827].
  - Eliminate gRPC insecure build [gh#grpc/grpc#25586].
  - Fix for a racy WorkSerializer shutdown [gh#grpc/grpc#28769].
  - InsecureCredentials: singleton object [gh#grpc/grpc#28777].
  - Add http cancel api [gh#grpc/grpc#28354].
  - Memory leak fix on windows in grpc_tcp_create()
    [gh#grpc/grpc#27457].
  - xDS: Rbac filter updates [gh#grpc/grpc#28568].

* C++

  - Bump the minimum gcc to 5 [gh#grpc/grpc#28786].
  - Add experimental API for CRL checking support to gRPC C++
    TlsCredentials [gh#grpc/grpc#28407].

Update to release 1.44.0

* Add a trace to list which filters are contained in a
  channel stack.
* Remove grpc_httpcli_context.
* xDS: Add support for RBAC HTTP filter.
* API to cancel grpc_resolve_address.

Update to version 1.43.2:

* Fix google-c2p-experimental issue (gh#grpc/grpc#28692).

Changes from version 1.43.0:

* Core:

  - Remove redundant work serializer usage in c-ares windows
    code (gh#grpc/grpc#28016).
  - Support RDS updates on the server (gh#grpc/grpc#27851).
  - Use WorkSerializer in XdsClient to propagate updates in a
    synchronized manner (gh#grpc/grpc#27975).
  - Support Custom Post-handshake Verification in TlsCredentials
    (gh#grpc/grpc#25631).
  - Reintroduce the EventEngine default factory
    (gh#grpc/grpc#27920).
  - Assert Android API &gt;= v21 (gh#grpc/grpc#27943).
  - Add support for abstract unix domain sockets
    (gh#grpc/grpc#27906).
* C++:

  - OpenCensus: Move metadata storage to arena
    (gh#grpc/grpc#27948).

* [C#] Add nullable type attributes to Grpc.Core.Api
  (gh#grpc/grpc#27887).
- Update package name libgrpc++1 to libgrpc++1_43 in keeping with
  updated so number.

Update to release 1.41.0

* xDS: Remove environmental variable guard for security.
* xDS Security: Use new way to fetch certificate provider
  plugin instance config.
* xDS server serving status: Use a struct to allow more fields
  to be added in the future.

Update to release 1.39.1

* Fix C# protoc plugin argument parsing on 1.39.x

Update to version 1.39.0:

* Core

  - Initialize tcp_posix for CFStream when needed
    (gh#grpc/grpc#26530).
  - Update boringssl submodule (gh#grpc/grpc#26520).
  - Fix backup poller races (gh#grpc/grpc#26446).
  - Use default port 443 in HTTP CONNECT request
    (gh#grpc/grpc#26331).
* C++

  - New iomgr implementation backed by the EventEngine API
    (gh#grpc/grpc#26026).
  - async_unary_call: add a Destroy method, called by
    std::default_delete (gh#grpc/grpc#26389).
  - De-experimentalize C++ callback API (gh#grpc/grpc#25728).

* PHP: stop reading composer.json file just to read the version
  string (gh#grpc/grpc#26156).

* Ruby: Set XDS user agent in ruby via macros
  (gh#grpc/grpc#26268).

Update to release 1.38.0

* Invalidate ExecCtx now before computing timeouts in all
  repeating timer events using a WorkSerializer or combiner.
* Fix use-after-unref bug in fault_injection_filter
* New gRPC EventEngine Interface
* Allow the AWS_DEFAULT_REGION environment variable
* s/OnServingStatusChange/OnServingStatusUpdate/

Update to release 1.37.1

* Use URI form of address for channelz listen node
* Implementation CSDS (xDS Config Dump)
* xDS status notifier
* Remove CAS loops in global subchannel pool and simplify
  subchannel refcounting

Update to release 1.36.4

* A fix for DNS SRV lookups on Windows

Update to 1.36.1:

* Core:
  * Remove unnecessary internal pollset set in c-ares DNS resolver
  * Support Default Root Certs in Tls Credentials
  * back-port: add env var protection for google-c2p resolver
* C++:
  * Move third party identity C++ api out of experimental namespace
  * refactor!: change error_details functions to templates
  * Support ServerContext for callback API
* PHP:
  * support for PSM security
  * fixed segfault on reused call object
  * fixed phpunit 8 warnings
* Python:
  * Implement Python Client and Server xDS Creds

Update to version 1.34.1:

* Backport 'Lazily import grpc_tools when using runtime
  stub/message generation' to 1.34.x (gh#grpc/grpc#25011).
* Backport 'do not use &lt;PublicSign&gt;true&lt;/PublicSign&gt; on
  non-windows' to 1.34.x (gh#grpc/grpc#24995).

Update to version 1.34.0:

* Core:

- Protect xds security code with the environment variable
    'GRPC_XDS_EXPERIMENTAL_SECURITY_SUPPORT'
    (gh#grpc/grpc#24782).
  - Add support for 'unix-abstract:' URIs to support abstract
    unix domain sockets (gh#grpc/grpc#24500).
  - Increment Index when parsing not plumbed SAN fields
    (gh#grpc/grpc#24601).
  - Revert 'Revert 'Deprecate
    GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS''
    (gh#grpc/grpc#24518).
  - xds: Set status code to INVALID_ARGUMENT when NACKing
    (gh#grpc/grpc#24516).
  - Include stddef.h in address_sorting.h (gh#grpc/grpc#24514).
  - xds: Add support for case_sensitive option in RouteMatch
    (gh#grpc/grpc#24381).
* C++:
  - Fix --define=grpc_no_xds=true builds (gh#grpc/grpc#24503).
  - Experimental support and tests for
    CreateCustomInsecureChannelWithInterceptorsFromFd
    (gh#grpc/grpc#24362).

Update to release 1.33.2

* Deprecate GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS.
* Expose Cronet error message to the application layer.
* Remove grpc_channel_ping from surface API.
* Do not send BDP pings if there is no receive side activity.

Update to version 1.33.1

* Core

  - Deprecate
    GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS
    (gh#grpc/grpc#24063).
  - Expose Cronet error message to the application layer
    (gh#grpc/grpc#24083).
  - Remove grpc_channel_ping from surface API
    (gh#grpc/grpc#23894).
  - Do not send BDP pings if there is no receive side activity
    (gh#grpc/grpc#22997).

* C++

  - Makefile: only support building deps from submodule
    (gh#grpc/grpc#23957).

- Add new subpackages - libupb and upb-devel. Currently, grpc
  sources include also upb sources. Before this change, libupb and
  upb-devel used to be included in a separate package - upb.

Update to version 1.32.0:

* Core
  - Remove stream from stalled lists on remove_stream
    (gh#grpc/grpc#23984).
  - Do not cancel RPC if send metadata size if larger than
    peer's limit (gh#grpc/grpc#23806).
  - Don't consider receiving non-OK status as an error for HTTP2
    (gh#grpc/grpc#19545).
  - Keepalive throttling (gh#grpc/grpc#23313).
  - Include the target_uri in 'target uri is not valid' error
    messages (gh#grpc/grpc#23782).
  - Fix 'cannot send compressed message large than 1024B' in
    cronet_transport (gh#grpc/grpc#23219).
  - Receive SETTINGS frame on clients before declaring
    subchannel READY (gh#grpc/grpc#23636).
  - Enabled GPR_ABSEIL_SYNC (gh#grpc/grpc#23372).
  - Experimental xDS v3 support (gh#grpc/grpc#23281).

* C++

  - Upgrade bazel used for all tests to 2.2.0
    (gh#grpc/grpc#23902).
  - Remove test targets and test helper libraries from Makefile
    (gh#grpc/grpc#23813).
  - Fix repeated builds broken by re2's cmake
    (gh#grpc/grpc#23587).
  - Log the peer address of grpc_cli CallMethod RPCs to stderr
    (gh#grpc/grpc#23557).

opencensus-proto was updated to 0.3.0+git.20200721:

- Update to version 0.3.0+git.20200721:

  * Bump version to 0.3.0
  * Generate Go types using  protocolbuffers/protobuf-go (#218)
  * Load proto_library() rule. (#216)

- Update to version 0.2.1+git.20190826:

  * Remove grpc_java dependency and java_proto rules. (#214)
  * Add C++ targets, especially for gRPC services. (#212)
  * Upgrade bazel and dependencies to latest. (#211)
  * Bring back bazel cache to make CI faster. (#210)
  * Travis: don't require sudo for bazel installation. (#209)

- Update to version 0.2.1:

  * Add grpc-gateway for metrics service. (#205)
  * Pin bazel version in travis builds (#207)
  * Update gen-go files (#199)
  * Add Web JS as a LibraryInfo.Language option (#198)
  * Set up Python packaging for PyPI release. (#197)
  * Add tracestate to links. (#191)
  * Python proto file generator and generated proto files (#196)
  * Ruby proto file generator and generated proto files (#192)
  * Add py_proto_library() rules for envoy/api. (#194)
  * Gradle: Upgrade dependency versions. (#193)
  * Update release versions for readme. (#189)
  * Start 0.3.0 development cycle
  * Update gen-go files. (#187)
  * Revert 'Start 0.3.0 development cycle (#167)' (#183)
  * Revert optimization for metric descriptor and bucket options for now. (#184)
  * Constant sampler: add option to always follow the parent's decision. (#182)
  * Document that all maximum values must be specified. (#181)
  * Fix typo in bucket bounds. (#178)
  * Restrict people who can approve reviews. This is to ensure code quality. (#177)
  * Use bazel cache to make CI faster. (#176)
  * Add grpc generated files to the idea plugin. (#175)
  * Add Resource to Span (#174)
  * time is required (#170)
  * Upgrade protobuf dependency to v3.6.1.3. (#173)
  * assume Ok Status when not set (#171)
  * Minor comments fixes (#160)
  * Start 0.3.0 development cycle (#167)
  * Update gen-go files. (#162)
  * Update releasing instruction. (#163)
  * Fix Travis build. (#165)
  * Add OpenApi doc for trace agent grpc-gateway (#157)
  * Add command to generate OpenApi/Swagger doc for grpc-gateway (#156)
  * Update gen-go files (#155)
  * Add trace export grpc-gateway config (#77)
  * Fix bazel build after bazel upgrade (#154)
  * README: Add gitter, javadoc and godoc badge. (#151)
  * Update release versions for README. (#150)
  * Start 0.2.0 development cycle
  * Add resource and metrics_service proto to mkgogen. Re-generate gen-go files. (#147)
  * Add resource to protocol (#137)
  * Fix generating the javadoc. (#144)
  * Metrics/TimeSeries: start time should not be included while end time should. (#142)
  * README: Add instructions on using opencensus_proto with Bazel. (#140)
  * agent/README: update package info. (#138)
  * Agent: Add metrics service. (#136)
  * Tracing: Add default limits to TraceConfig. (#133)
  * Remove a stale TODO. (#134)
  * README: Add a note about go_proto_library rules. (#135)
  * add golang bazel build support (#132)
  * Remove exporter protos from mkgogen. (#128)
  * Update README and RELEASING. (#130)
  * Change histogram buckets definition to be OpenMetrics compatible. (#121)
  * Remove exporter/v1 protos. (#124)
  * Clean up the README for Agent proto. (#126)
  * Change Quantiles to ValuesAtPercentile. (#122)
  * Extend the TraceService service to support export/config for multiple Applications. (#119)
  * Add specifications on Agent implementation details. (#112)
  * Update gitignore (#118)
  * Remove maven support. Not used. (#116)
  * Add gauge distribution. (#117)
  * Add support for Summary type and value. (#110)
  * Add Maven status and instructions on adding dependencies. (#115)
  * Bump version to 0.0.3-SNAPSHOT
  * Bump version to 0.0.2
  * Update gen-go files. (#114)
  * Gradle: Add missing source and javadoc rules. (#113)
  * Add support for float attributes. (#98)
  * Change from mean to sum in distribution. (#109)
  * Bump version to v0.0.2-SNAPSHOT
  * Bump version to v0.0.1
  * Add releasing instructions in RELEASING.md. (#106)
  * Add Gradle build rules for generating gRPC service and releasing to Maven. (#102)
  * Re-organize proto directory structure. (#103)
  * Update gen-go files. (#101)
  * Add a note about interceptors of other libraries. (#94)
  * agent/common/v1: use exporter_version, core_library_version in LibraryInfo (#100)
  * opencensus/proto: add default Agent port to README (#97)
  * Update the message names for Config RPC. (#93)
  * Add details about agent protocol in the README. (#88)
  * Update gen-go files. (#92)
  * agent/trace/v1: fix signature for Config and comments too (#91)
  * Update gen-go files. (#86)
  * Make tracestate a list instead of a map to preserve ordering. (#84)
  * Allow MetricDescriptor to be sent only the first time. (#78)
  * Update mkgogen.sh. (#85)
  * Add agent trace service proto definitions. (#79)
  * Update proto and gen-go package names. (#83)
  * Add agent/common proto and BUILD. (#81)
  *  Add trace_config.proto. (#80)
  * Build exporters with maven. (#76)
  * Make clear that cumulative int/float can go only up. (#75)
  * Add tracestate field to the Span proto. (#74)
  * gradle wrapper --gradle-version 4.9 (#72)
  * Change from multiple types of timeseries to have one. (#71)
  * Move exemplars in the Bucket. (#70)
  * Update gen-go files. (#69)
  * Move metrics in the top level directory. (#68)
  * Remove Range from Distribution. No backend supports this. (#67)
  * Remove unused MetricSet message. (#66)
  * Metrics: Add Exemplar to DistributionValue. (#62)
  * Gauge vs Cumulative. (#65)
  * Clarifying comment about bucket boundaries. (#64)
  * Make MetricDescriptor.Type capture the type of the value as well. (#63)
  * Regenerate the Go artifacts (#61)
  * Add export service proto (#60)

- Initial version 20180523

protobuf was updated to 25.1:

update to 25.1:

  * Raise warnings for deprecated python syntax usages
  * Add support for extensions in CRuby, JRuby, and FFI Ruby
  * Add support for options in CRuby, JRuby and FFI (#14594)

update to 25.0:

  * Implement proto2/proto3 with editions
  * Defines Protobuf compiler version strings as macros and
    separates out suffix string definition.
  * Add utf8_validation feature back to the global feature set.
  * Setting up version updater to prepare for poison pills and
    embedding version info into C++, Python and Java gencode.
  * Merge the protobuf and upb Bazel repos
  * Editions: Introduce functionality to protoc for generating
    edition feature set defaults.
  * Editions: Migrate edition strings to enum in C++ code.
  * Create a reflection helper for ExtensionIdentifier.
  * Editions: Provide an API for C++ generators to specify their
    features.
  * Editions: Refactor feature resolution to use an intermediate
    message.
  * Publish extension declarations with declaration
    verifications.
  * Editions: Stop propagating partially resolved feature sets to
    plugins.
  * Editions: Migrate string_field_validation to a C++ feature
  * Editions: Include defaults for any features in the generated
    pool.
  * Protoc: parser rejects explicit use of map_entry option
  * Protoc: validate that reserved range start is before end
  * Protoc: support identifiers as reserved names in addition to
    string literals (only in editions)
  * Drop support for Bazel 5.
  * Allow code generators to specify whether or not they support
    editions.
C++:
  * Set `PROTOBUF_EXPORT` on
    `InternalOutOfLineDeleteMessageLite()`
  * Update stale checked-in files
  * Apply PROTOBUF_NOINLINE to declarations of some functions
    that want it.
  * Implement proto2/proto3 with editions
  * Make JSON UTF-8 boundary check inclusive of the largest
    possible UTF-8 character.
  * Reduce `Map::size_type` to 32-bits. Protobuf containers can't
    have more than that
  * Defines Protobuf compiler version strings as macros and
    separates out suffix string definition.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    oneof accessors.
  * Fix bug in reflection based Swap of map fields.
  * Add utf8_validation feature back to the global feature set.
  * Setting up version updater to prepare for poison pills and
    embedding version info into C++, Python and Java gencode.
  * Add prefetching to arena allocations.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    repeated and map field accessors.
  * Editions: Migrate edition strings to enum in C++ code.
  * Create a reflection helper for ExtensionIdentifier.
  * Editions: Provide an API for C++ generators to specify their
    features.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    string field accessors.
  * Editions: Refactor feature resolution to use an intermediate
    message.
  * Fixes for 32-bit MSVC.
  * Publish extension declarations with declaration
    verifications.
  * Export the constants in protobuf's any.h to support DLL
    builds.
  * Implement AbslStringify for the Descriptor family of types.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    message field accessors.
  * Editions: Stop propagating partially resolved feature sets to
    plugins.
  * Editions: Migrate string_field_validation to a C++ feature
  * Editions: Include defaults for any features in the generated
    pool.
  * Introduce C++ feature for UTF8 validation.
  * Protoc: validate that reserved range start is before end
  * Remove option to disable the table-driven parser in protoc.
  * Lock down ctype=CORD in proto file.
  * Support split repeated fields.
  * In OSS mode omit some extern template specializations.
  * Allow code generators to specify whether or not they support
    editions.
Java:
  * Implement proto2/proto3 with editions
  * Remove synthetic oneofs from Java gencode field accessor
    tables.
  * Timestamps.parse: Add error handling for invalid
    hours/minutes in the timezone offset.
  * Defines Protobuf compiler version strings as macros and
    separates out suffix string definition.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    oneof accessors.
  * Add missing debugging version info to Protobuf Java gencode
    when multiple files are generated.
  * Fix a bad cast in putBuilderIfAbsent when already present due
    to using the result of put() directly (which is null if it
    currently has no value)
  * Setting up version updater to prepare for poison pills and
    embedding version info into C++, Python and Java gencode.
  * Fix a NPE in putBuilderIfAbsent due to using the result of
    put() directly (which is null if it currently has no value)
  * Update Kotlin compiler to escape package names
  * Add MapFieldBuilder and change codegen to generate it and the
    put{field}BuilderIfAbsent method.
  * Introduce recursion limit in Java text format parsing
  * Consider the protobuf.Any invalid if typeUrl.split('/')
    returns an empty array.
  * Mark `FieldDescriptor.hasOptionalKeyword()` as deprecated.
  * Fixed Python memory leak in map lookup.
  * Loosen upb for json name conflict check in proto2 between
    json name and field
  * Defines Protobuf compiler version strings as macros and
    separates out suffix string definition.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    oneof accessors.
  * Ensure Timestamp.ToDatetime(tz) has correct offset
  * Do not check required field for upb python MergeFrom
  * Setting up version updater to prepare for poison pills and
    embedding version info into C++, Python and Java gencode.
  * Merge the protobuf and upb Bazel repos
  * Comparing a proto message with an object of unknown returns
    NotImplemented
  * Emit __slots__ in pyi output as a tuple rather than a list
    for --pyi_out.
  * Fix a bug that strips options from descriptor.proto in
    Python.
  * Raise warings for message.UnknownFields() usages and navigate
    to the new add
  * Add protobuf python keyword support in path for stub
    generator.
  * Add tuple support to set Struct
  * ### Python C-Extension (Default)
  * Comparing a proto message with an object of unknown returns
    NotImplemented
  * Check that ffi-compiler loads before using it to define
    tasks.
UPB (Python/PHP/Ruby C-Extension):
  * Include .inc files directly instead of through a filegroup
  * Loosen upb for json name conflict check in proto2 between
    json name and field
  * Add utf8_validation feature back to the global feature set.
  * Do not check required field for upb python MergeFrom
  * Merge the protobuf and upb Bazel repos
  * Added malloc_trim() calls to Python allocator so RSS will
    decrease when memory is freed
  * Upb: fix a Python memory leak in ByteSize()
  * Support ASAN detection on clang
  * Upb: bugfix for importing a proto3 enum from within a proto2
    file
  * Expose methods needed by Ruby FFI using UPB_API
  * Fix `PyUpb_Message_MergeInternal` segfault

- Build with source and target levels 8
  * fixes build with JDK21
- Install the pom file with the new %%mvn_install_pom macro
- Do not install the pom-only artifacts, since the %%mvn_install_pom
  macro resolves the variables at the install time

update to 23.4:

  * Add dllexport_decl for generated default instance.
  * Deps: Update Guava to 32.0.1

update to 23.3:

  C++:

  * Regenerate stale files
  * Use the same ABI for static and shared libraries on non-
    Windows platforms
  * Add a workaround for GCC constexpr bug
  Objective-C:
  * Regenerate stale files
  UPB (Python/PHP/Ruby C-Extension)
  * Fixed a bug in `upb_Map_Delete()` that caused crashes in
    map.delete(k) for Ruby when string-keyed maps were in use.

  Compiler:
  * Add missing header to Objective-c generator
  * Add a workaround for GCC constexpr bug

  Java:
  * Rollback of: Simplify protobuf Java message builder by
    removing methods that calls the super class only.

  Csharp:
  * [C#] Replace regex that validates descriptor names

update to 22.5:

  C++:
  * Add missing cstdint header
  * Fix: missing -DPROTOBUF_USE_DLLS in pkg-config (#12700)
  * Avoid using string(JOIN..., which requires cmake 3.12
  * Explicitly include GTest package in examples
  * Bump Abseil submodule to 20230125.3 (#12660)

update to 22.4:

  C++:
  * Fix libprotoc: export useful symbols from .so

  Python:
  * Fix bug in _internal_copy_files where the rule would fail in
    downstream repositories.

  Other:
  * Bump utf8_range to version with working pkg-config (#12584)
  * Fix declared dependencies for pkg-config
  * Update abseil dependency and reorder dependencies to ensure
    we use the version specified in protobuf_deps.
  * Turn off clang::musttail on i386

update to v22.3

  UPB (Python/PHP/Ruby C-Extension):
  * Remove src prefix from proto import
  * Fix .gitmodules to use the correct absl branch
  * Remove erroneous dependency on googletest

update to 22.2:

  Java:
  * Add version to intra proto dependencies and add kotlin stdlib
    dependency
  * Add $ back for osgi header
  * Remove $ in pom files

update to 22.1:
  * Add visibility of plugin.proto to python directory
  * Strip 'src' from file name of plugin.proto
  * Add OSGi headers to pom files.
  * Remove errorprone dependency from kotlin protos.
  * Version protoc according to the compiler version number.

- update to 22.0:

  * This version includes breaking changes to: Cpp.
    Please refer to the migration guide for information:
    https://protobuf.dev/support/migration/#compiler-22
  * [Cpp] Migrate to Abseil's logging library.
  * [Cpp] `proto2::Map::value_type` changes to `std::pair`.
  * [Cpp] Mark final ZeroCopyInputStream, ZeroCopyOutputStream,
    and DefaultFieldComparator classes.
  * [Cpp] Add a dependency on Abseil (#10416)
  * [Cpp] Remove all autotools usage (#10132)
  * [Cpp] Add C++20 reserved keywords
  * [Cpp] Dropped C++11 Support
  * [Cpp] Delete Arena::Init
  * [Cpp] Replace JSON parser with new implementation
  * [Cpp] Make RepeatedField::GetArena non-const in order to
    support split RepeatedFields.
  * long list of bindings specific fixes see
    https://github.com/protocolbuffers/protobuf/releases/tag/v22.0

update to v21.12:

* Python:
  * Fix broken enum ranges (#11171)
  * Stop requiring extension fields to have a sythetic oneof (#11091)
  * Python runtime 4.21.10 not works generated code can not load valid
    proto.

update to 21.11:

* Python:
  * Add license file to pypi wheels (#10936)
  * Fix round-trip bug (#10158)

update to 21.10::

* Java:
  * Use bit-field int values in buildPartial to skip work on unset groups of
    fields. (#10960)
  * Mark nested builder as clean after clear is called (#10984)

update to 21.9:
  * Ruby:
      * Replace libc strdup usage with internal impl to restore musl compat (#10818)
      * Auto capitalize enums name in Ruby (#10454) (#10763)
  * Other:
      * Fix for grpc.tools #17995 &amp; protobuf #7474 (handle UTF-8 paths in argumentfile) (#10721)
  * C++:
      * 21.x No longer define no_threadlocal on OpenBSD (#10743)
  * Java:
      * Mark default instance as immutable first to avoid race during static initialization of default instances (#10771)
      * Refactoring java full runtime to reuse sub-message builders and prepare to
        migrate parsing logic from parse constructor to builder.
      * Move proto wireformat parsing functionality from the private 'parsing
        constructor' to the Builder class.
      * Change the Lite runtime to prefer merging from the wireformat into mutable
        messages rather than building up a new immutable object before merging. This
        way results in fewer allocations and copy operations.
      * Make message-type extensions merge from wire-format instead of building up
        instances and merging afterwards. This has much better performance.
      * Fix TextFormat parser to build up recurring (but supposedly not repeated)
        sub-messages directly from text rather than building a new sub-message and
        merging the fully formed message into the existing field.

update to 21.6:
  C++:
  * Reduce memory consumption of MessageSet parsing

update to 21.5:

  PHP:
  * Added getContainingOneof and getRealContainingOneof to descriptor.
  * fix PHP readonly legacy files for nested messages

  Python:

  * Fixed comparison of maps in Python.

- update to 21.4:

  * Reduce the required alignment of ArenaString from 8 to 4

- update to 21.3:

  * C++:
    * Add header search paths to Protobuf-C++.podspec (#10024)
    * Fixed Visual Studio constinit errors (#10232)
    * Fix #9947: make the ABI compatible between debug and non-debug builds (#10271)
  * UPB:
    * Allow empty package names (fixes behavior regression in 4.21.0)
    * Fix a SEGV bug when comparing a non-materialized sub-message (#10208)
    * Fix several bugs in descriptor mapping containers (eg. descriptor.services_by_name)
      * for x in mapping now yields keys rather than values, to match Python
        conventions and the behavior of the old library.
      * Lookup operations now correctly reject unhashable types as map keys.
      * We implement repr() to use the same format as dict.
    * Fix maps to use the ScalarMapContainer class when appropriate
    * Fix bug when parsing an unknown value in a proto2 enum extension (protocolbuffers/upb#717)
  * PHP:
    * Add 'readonly' as a keyword for PHP and add previous classnames to descriptor pool (#10041)
  * Python:
    * Make //:protobuf_python and //:well_known_types_py_pb2 public (#10118)
  * Bazel:
     * Add back a filegroup for :well_known_protos (#10061)

Update to 21.2:
- C++:
  - cmake: Call get_filename_component() with DIRECTORY mode instead of PATH mode (#9614)
  - Escape GetObject macro inside protoc-generated code (#9739)
  - Update CMake configuration to add a dependency on Abseil (#9793)
  - Fix cmake install targets (#9822)
  - Use __constinit only in GCC 12.2 and up (#9936)
- Java:
  - Update protobuf_version.bzl to separate protoc and per-language java … (#9900)
- Python:
  - Increment python major version to 4 in version.json for python upb (#9926)
  - The C extension module for Python has been rewritten to use the upb library.
  - This is expected to deliver significant performance benefits, especially when
    parsing large payloads. There are some minor breaking changes, but these
    should not impact most users. For more information see:
    https://developers.google.com/protocol-buffers/docs/news/2022-05-06#python-updates
- PHP:
  - [PHP] fix PHP build system (#9571)
  - Fix building packaged PHP extension (#9727)
  - fix: reserve 'ReadOnly' keyword for PHP 8.1 and add compatibility (#9633)
  - fix: phpdoc syntax for repeatedfield parameters (#9784)
  - fix: phpdoc for repeatedfield (#9783)
  - Change enum string name for reserved words (#9780)
  - chore: [PHP] fix phpdoc for MapField keys (#9536)
  - Fixed PHP SEGV by not writing to shared memory for zend_class_entry. (#9996)
- Ruby:
  - Allow pre-compiled binaries for ruby 3.1.0 (#9566)
  - Implement respond_to? in RubyMessage (#9677)
  - [Ruby] Fix RepeatedField#last, #first inconsistencies (#9722)
  - Do not use range based UTF-8 validation in truffleruby (#9769)
  - Improve range handling logic of RepeatedField (#9799)
- Other:
  - Fix invalid dependency manifest when using descriptor_set_out (#9647)
  - Remove duplicate java generated code (#9909)

- Update to 3.20.1:

  - PHP:
    - Fix building packaged PHP extension (#9727)
    - Fixed composer.json to only advertise compatibility with
      PHP 7.0+. (#9819)
  - Ruby:
    - Disable the aarch64 build on macOS until it can be fixed. (#9816)
  - Other:
    - Fix versioning issues in 3.20.0

- Update to 3.20.1:
  - Ruby:
    - Dropped Ruby 2.3 and 2.4 support for CI and releases.
      (#9311)
    - Added Ruby 3.1 support for CI and releases (#9566).
    - Message.decode/encode: Add recursion_limit option
      (#9218/#9486)
    - Allocate with xrealloc()/xfree() so message allocation is
      visible to the
    - Ruby GC. In certain tests this leads to much lower memory
      usage due to more
    - frequent GC runs (#9586).
    - Fix conversion of singleton classes in Ruby (#9342)
    - Suppress warning for intentional circular require (#9556)
    - JSON will now output shorter strings for double and float
      fields when possible
    - without losing precision.
    - Encoding and decoding of binary format will now work
      properly on big-endian
    - systems.
    - UTF-8 verification was fixed to properly reject surrogate
      code points.
    - Unknown enums for proto2 protos now properly implement
      proto2's behavior of
    - putting such values in unknown fields.
  - Java:
    - Revert 'Standardize on Array copyOf' (#9400)
    - Resolve more java field accessor name conflicts (#8198)
    - Fix parseFrom to only throw InvalidProtocolBufferException
    - InvalidProtocolBufferException now allows arbitrary wrapped
      Exception types.
    - Fix bug in FieldSet.Builder.mergeFrom
    - Flush CodedOutputStream also flushes underlying
      OutputStream
    - When oneof case is the same and the field type is Message,
      merge the
    - subfield. (previously it was replaced.)’
    - Add @CheckReturnValue to some protobuf types
    - Report original exceptions when parsing JSON
    - Add more info to @deprecated javadoc for set/get/has
      methods
    - Fix initialization bug in doc comment line numbers
    - Fix comments for message set wire format.
  - Kotlin:
    - Add test scope to kotlin-test for protobuf-kotlin-lite
      (#9518)
    - Add orNull extensions for optional message fields.
    - Add orNull extensions to all proto3 message fields.
  - Python:
    - Dropped support for Python &lt; 3.7 (#9480)
    - Protoc is now able to generate python stubs (.pyi) with
      --pyi_out
    - Pin multibuild scripts to get manylinux1 wheels back
      (#9216)
    - Fix type annotations of some Duration and Timestamp
      methods.
    - Repeated field containers are now generic in field types
      and could be used in type annotations.
    - Protobuf python generated codes are simplified. Descriptors
      and message classes' definitions are now dynamic created in
      internal/builder.py.
    - Insertion Points for messages classes are discarded.
    - has_presence is added for FieldDescriptor in python
    - Loosen indexing type requirements to allow valid index()
      implementations rather than only PyLongObjects.
    - Fix the deepcopy bug caused by not copying
      message_listener.
    - Added python JSON parse recursion limit (default 100)
    - Path info is added for python JSON parse errors
    - Pure python repeated scalar fields will not able to pickle.
      Convert to list first.
    - Timestamp.ToDatetime() now accepts an optional tzinfo
      parameter. If specified, the function returns
      a timezone-aware datetime in the given time zone. If
      omitted or None, the function returns a timezone-naive UTC
      datetime (as previously).
    - Adds client_streaming and server_streaming fields to
      MethodDescriptor.
    - Add 'ensure_ascii' parameter to json_format.MessageToJson.
      This allows smaller JSON serializations with UTF-8 or other
      non-ASCII encodings.
    - Added experimental support for directly assigning numpy
      scalars and array.
    - Improve the calculation of public_dependencies in
      DescriptorPool.
    - [Breaking Change] Disallow setting fields to numpy
      singleton arrays or repeated fields to numpy
      multi-dimensional arrays. Numpy arrays should be indexed or
      flattened explicitly before assignment.
  - Compiler:
    - Migrate IsDefault(const std::string*) and
      UnsafeSetDefault(const std::string*)
    - Implement strong qualified tags for TaggedPtr
    - Rework allocations to power-of-two byte sizes.
    - Migrate IsDefault(const std::string*) and
      UnsafeSetDefault(const std::string*)
    - Implement strong qualified tags for TaggedPtr
    - Make TaggedPtr Set...() calls explicitly spell out the
      content type.
    - Check for parsing error before verifying UTF8.
    - Enforce a maximum message nesting limit of 32 in the
      descriptor builder to
    - guard against stack overflows
    - Fixed bugs in operators for RepeatedPtrIterator
    - Assert a maximum map alignment for allocated values
    - Fix proto1 group extension protodb parsing error
    - Do not log/report the same descriptor symbol multiple
      times if it contains
    - more than one invalid character.
    - Add UnknownFieldSet::SerializeToString and
      SerializeToCodedStream.
    - Remove explicit default pointers and deprecated API from
      protocol compiler
  - Arenas:
    - Change Repeated*Field to reuse memory when using arenas.
    - Implements pbarenaz for profiling proto arenas
    - Introduce CreateString() and CreateArenaString() for
      cleaner semantics
    - Fix unreferenced parameter for MSVC builds
    - Add UnsafeSetAllocated to be used for one-of string
      fields.
    - Make Arena::AllocateAligned() a public function.
    - Determine if ArenaDtor related code generation is
      necessary in one place.
    - Implement on demand register ArenaDtor for
      InlinedStringField
  - C++:
    - Enable testing via CTest (#8737)
    - Add option to use external GTest in CMake (#8736)
    - CMake: Set correct sonames for libprotobuf-lite.so and
      libprotoc.so (#8635) (#9529)
    - Add cmake option protobuf_INSTALL to not install files
      (#7123)
    - CMake: Allow custom plugin options e.g. to generate mocks
      (#9105)
    - CMake: Use linker version scripts (#9545)
    - Manually *struct Cord fields to work better with arenas.
    - Manually destruct map fields.
    - Generate narrower code
    - Fix #9378 by removing
    - shadowed cached_size field
    - Remove GetPointer() and explicit nullptr defaults.
    - Add proto_h flag for speeding up large builds
    - Add missing overload for reference wrapped fields.
    - Add MergedDescriptorDatabase::FindAllFileNames()
    - RepeatedField now defines an iterator type instead of
      using a pointer.
    - Remove obsolete macros GOOGLE_PROTOBUF_HAS_ONEOF and
      GOOGLE_PROTOBUF_HAS_ARENAS.
  - PHP:
    - Fix: add missing reserved classnames (#9458)
    - PHP 8.1 compatibility (#9370)
  - C#:
    - Fix trim warnings (#9182)
    - Fixes NullReferenceException when accessing
      FieldDescriptor.IsPacked (#9430)
    - Add ToProto() method to all descriptor classes (#9426)
    - Add an option to preserve proto names in JsonFormatter
      (#6307)
  - Objective-C:
    - Add prefix_to_proto_package_mappings_path option. (#9498)
    - Rename proto_package_to_prefix_mappings_path to
      package_to_prefix_mappings_path. (#9552)
    - Add a generation option to control use of forward
      declarations in headers. (#9568)

- update to 3.19.4:
  Python:
    * Make libprotobuf symbols local on OSX to fix issue #9395 (#9435)
  Ruby:
    * Fixed a data loss bug that could occur when the number of optional fields
      in a message is an exact multiple of 32
  PHP:
    * Fixed a data loss bug that could occur when the number of optional fields
      in a message is an exact multiple of 32.

- Update to 3.19.3:
  C++:
    * Make proto2::Message::DiscardUnknownFields() non-virtual
    * Separate RepeatedPtrField into its own header file
    * For default floating point values of 0, consider all bits significant
    * Fix shadowing warnings
    * Fix for issue #8484, constant initialization doesn't compile in msvc clang-cl environment
  Java:
    * Improve performance characteristics of UnknownFieldSet parsing
    * For default floating point values of 0, consider all bits significant
    * Annotate //java/com/google/protobuf/util/... with nullness annotations
    * Use ArrayList copy constructor
  Bazel:
    * Ensure that release archives contain everything needed for Bazel
    * Align dependency handling with Bazel best practices
  Javascript:
    * Fix ReferenceError: window is not defined when getting the global object
  Ruby:
    * Fix memory leak in MessageClass.encode
    * Override Map.clone to use Map's dup method
    * Ruby: build extensions for arm64-darwin
    * Add class method Timestamp.from_time to ruby well known types
    * Adopt pure ruby DSL implementation for JRuby
    * Add size to Map class
    * Fix for descriptor_pb.rb: google/protobuf should be required first
  Python:
    * Proto2 DecodeError now includes message name in error message
    * Make MessageToDict convert map keys to strings
    * Add python-requires in setup.py
    * Add python 3.10

- Update to 3.17.3:
  C++
  * Introduce FieldAccessListener.
  * Stop emitting boilerplate {Copy/Merge}From in each ProtoBuf class
  * Provide stable versions of SortAndUnique().
  * Make sure to cache proto3 optional message fields when they are cleared.
  * Expose UnsafeArena methods to Reflection.
  * Use std::string::empty() rather than std::string::size() &gt; 0.
  * [Protoc] C++ Resolved an issue where NO_DESTROY and CONSTINIT are in incorrect order (#8296)
  * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)
  * Delete StringPiecePod (#8353)
  * Create a CMake option to control whether or not RTTI is enabled (#8347)
  * Make util::Status more similar to absl::Status (#8405)
  * The ::pb namespace is no longer exposed due to conflicts.
  * Allow MessageDifferencer::TreatAsSet() (and friends) to override previous
  calls instead of crashing.
  * Reduce the size of generated proto headers for protos with string or
  bytes fields.
  * Move arena() operation on uncommon path to out-of-line routine
  * For iterator-pair function parameter types, take both iterators by value.
  * Code-space savings and perhaps some modest performance improvements in
  * RepeatedPtrField.
  * Eliminate nullptr check from every tag parse.
  * Remove unused _$name$cached_byte_size fields.
  * Serialize extension ranges together when not broken by a proto field in the
  middle.
  * Do out-of-line allocation and deallocation of string object in ArenaString.
  * Streamline ParseContext::ParseMessage to avoid code bloat and improve
  performance.
  * New member functions RepeatedField::Assign, RepeatedPtrField::{Add, Assign}.
  on an error path.
  * util::DefaultFieldComparator will be final in a future version of protobuf.
  * Subclasses should inherit from SimpleFieldComparator instead.
  Kotlin
  * Introduce support for Kotlin protos (#8272)
  * Restrict extension setter and getter operators to non-nullable T.
  Java
  * Fixed parser to check that we are at a proper limit when a sub-message has
  finished parsing.
  * updating GSON and Guava to more recent versions (#8524)
  * Reduce the time spent evaluating isExtensionNumber by storing the extension
  ranges in a TreeMap for faster queries. This is particularly relevant for
  protos which define a large number of extension ranges, for example when
  each tag is defined as an extension.
  * Fix java bytecode estimation logic for optional fields.
  * Optimize Descriptor.isExtensionNumber.
  * deps: update JUnit and Truth (#8319)
  * Detect invalid overflow of byteLimit and return InvalidProtocolBufferException as documented.
  * Exceptions thrown while reading from an InputStream in parseFrom are now
  included as causes.
  * Support potentially more efficient proto parsing from RopeByteStrings.
  * Clarify runtime of ByteString.Output.toStringBuffer().
  * Added UnsafeByteOperations to protobuf-lite (#8426)
  Python:
  * Add MethodDescriptor.CopyToProto() (#8327)
  * Remove unused python_protobuf.{cc,h} (#8513)
  * Start publishing python aarch64 manylinux wheels normally (#8530)
  * Fix constness issue detected by MSVC standard conforming mode (#8568)
  * Make JSON parsing match C++ and Java when multiple fields from the same
  oneof are present and all but one is null.
  * Fix some constness / char literal issues being found by MSVC standard conforming mode (#8344)
  * Switch on 'new' buffer API (#8339)
  * Enable crosscompiling aarch64 python wheels under dockcross manylinux docker image (#8280)
  * Fixed a bug in text format where a trailing colon was printed for repeated field.
  * When TextFormat encounters a duplicate message map key, replace the current
  one instead of merging.
  Ruby:
  * Add support for proto3 json_name in compiler and field definitions (#8356)
  * Fixed memory leak of Ruby arena objects. (#8461)
  * Fix source gem compilation (#8471)
  * Fix various exceptions in Ruby on 64-bit Windows (#8563)
  * Fix crash when calculating Message hash values on 64-bit Windows (#8565)
  General:
  * Support M1 (#8557)

Update to 3.15.8:
  - Fixed memory leak of Ruby arena objects (#8461)

Update to 3.15.7:

  C++:
  * Remove the ::pb namespace (alias) (#8423)
  Ruby:
  * Fix unbounded memory growth for Ruby &lt;2.7 (#8429)
  * Fixed message equality in cases where the message type is different (#8434)

update to 3.15.6:

  Ruby:
  * Fixed bug in string comparison logic (#8386)
  * Fixed quadratic memory use in array append (#8379)
  * Fixed SEGV when users pass nil messages (#8363)
  * Fixed quadratic memory usage when appending to arrays (#8364)
  * Ruby &lt;2.7 now uses WeakMap too, which prevents memory leaks. (#8341)
  * Fix for FieldDescriptor.get(msg) (#8330)
  * Bugfix for Message.[] for repeated or map fields (#8313)
  PHP:
  * read_property() handler is not supposed to return NULL (#8362)
  Protocol Compiler
  * Optional fields for proto3 are enabled by default, and no longer require
    the --experimental_allow_proto3_optional flag.
  C++:
  * Do not disable RTTI by default in the CMake build (#8377)
  * Create a CMake option to control whether or not RTTI is enabled (#8361)
  * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)
  * MessageDifferencer: fixed bug when using custom ignore with multiple
    unknown fields
  * Use init_seg in MSVC to push initialization to an earlier phase.
  * Runtime no longer triggers -Wsign-compare warnings.
  * Fixed -Wtautological-constant-out-of-range-compare warning.
  * DynamicCastToGenerated works for nullptr input for even if RTTI is disabled
  * Arena is refactored and optimized.
  * Clarified/specified that the exact value of Arena::SpaceAllocated() is an
    implementation detail users must not rely on. It should not be used in
    unit tests.
  * Change the signature of Any::PackFrom() to return false on error.
  * Add fast reflection getter API for strings.
  * Constant initialize the global message instances
  * Avoid potential for missed wakeup in UnknownFieldSet
  * Now Proto3 Oneof fields have 'has' methods for checking their presence in
    C++.
  * Bugfix for NVCC
  * Return early in _InternalSerialize for empty maps.
  * Adding functionality for outputting map key values in proto path logging
    output (does not affect comparison logic) and stop printing 'value' in the
    path. The modified print functionality is in the
    MessageDifferencer::StreamReporter.
  * Fixed https://github.com/protocolbuffers/protobuf/issues/8129
  * Ensure that null char symbol, package and file names do not result in a
    crash.
  * Constant initialize the global message instances
  * Pretty print 'max' instead of numeric values in reserved ranges.
  * Removed remaining instances of std::is_pod, which is deprecated in C++20.
  * Changes to reduce code size for unknown field handling by making uncommon
    cases out of line.
  * Fix std::is_pod deprecated in C++20 (#7180)
  * Fix some -Wunused-parameter warnings (#8053)
  * Fix detecting file as directory on zOS issue #8051 (#8052)
  * Don't include sys/param.h for _BYTE_ORDER (#8106)
  * remove CMAKE_THREAD_LIBS_INIT from pkgconfig CFLAGS (#8154)
  * Fix TextFormatMapTest.DynamicMessage issue#5136 (#8159)
  * Fix for compiler warning issue#8145 (#8160)
  * fix: support deprecated enums for GCC &lt; 6 (#8164)
  * Fix some warning when compiling with Visual Studio 2019 on x64 target (#8125)
  Python:
  * Provided an override for the reverse() method that will reverse the internal
    collection directly instead of using the other methods of the BaseContainer.
  * MessageFactory.CreateProtoype can be overridden to customize class creation.
  * Fix PyUnknownFields memory leak (#7928)
  * Add macOS big sur compatibility (#8126)
  JavaScript
  * Generate `getDescriptor` methods with `*` as their `this` type.
  * Enforce `let/const` for generated messages.
  * js/binary/utils.js: Fix jspb.utils.joinUnsignedDecimalString to work with
    negative bitsLow and low but non-zero bitsHigh parameter. (#8170)
  PHP:
  * Added support for PHP 8. (#8105)
  * unregister INI entries and fix invalid read on shutdown (#8042)
  * Fix PhpDoc comments for message accessors to include '|null'. (#8136)
  * fix: convert native PHP floats to single precision (#8187)
  * Fixed PHP to support field numbers &gt;=2**28. (#8235)
  * feat: add support for deprecated fields to PHP compiler (#8223)
  * Protect against stack overflow if the user derives from Message. (#8248)
  * Fixed clone for Message, RepeatedField, and MapField. (#8245)
  * Updated upb to allow nonzero offset minutes in JSON timestamps. (#8258)
  Ruby:
  * Added support for Ruby 3. (#8184)
  * Rewrote the data storage layer to be based on upb_msg objects from the
    upb library. This should lead to much better parsing performance,
    particularly for large messages. (#8184).
  * Fill out JRuby support (#7923)
  * [Ruby] Fix: (SIGSEGV) gRPC-Ruby issue on Windows. memory alloc infinite
    recursion/run out of memory (#8195)
  * Fix jruby support to handle messages nested more than 1 level deep (#8194)
  Java:
  * Avoid possible UnsupportedOperationException when using CodedInputSteam
    with a direct ByteBuffer.
  * Make Durations.comparator() and Timestamps.comparator() Serializable.
  * Add more detailed error information for dynamic message field type
    validation failure
  * Removed declarations of functions declared in java_names.h from
    java_helpers.h.
  * Now Proto3 Oneof fields have 'has' methods for checking their presence in
    Java.
  * Annotates Java proto generated *_FIELD_NUMBER constants.
  * Add -assumevalues to remove JvmMemoryAccessor on Android.
  C#:
  * Fix parsing negative Int32Value that crosses segment boundary (#8035)
  * Change ByteString to use memory and support unsafe create without copy (#7645)
  * Optimize MapField serialization by removing MessageAdapter (#8143)
  * Allow FileDescriptors to be parsed with extension registries (#8220)
  * Optimize writing small strings (#8149)

- Updated URL to https://github.com/protocolbuffers/protobuf

Update to v3.14.0

  Protocol Compiler:
  * The proto compiler no longer requires a .proto filename when it is not
    generating code.
  * Added flag `--deterministic_output` to `protoc --encode=...`.
  * Fixed deadlock when using google.protobuf.Any embedded in aggregate options.
  C++:
  * Arenas are now unconditionally enabled. cc_enable_arenas no longer has
    any effect.
  * Removed inlined string support, which is incompatible with arenas.
  * Fix a memory corruption bug in reflection when mixing optional and
    non-optional fields.
  * Make SpaceUsed() calculation more thorough for map fields.
  * Add stack overflow protection for text format with unknown field values.
  * FieldPath::FollowAll() now returns a bool to signal if an out-of-bounds
    error was encountered.
  * Performance improvements for Map.
  * Minor formatting fix when dumping a descriptor to .proto format with
    DebugString.
  * UBSAN fix in RepeatedField
  * When running under ASAN, skip a test that makes huge allocations.
  * Fixed a crash that could happen when creating more than 256 extensions in
    a single message.
  * Fix a crash in BuildFile when passing in invalid descriptor proto.
  * Parser security fix when operating with CodedInputStream.
  * Warn against the use of AllowUnknownExtension.
  * Migrated to C++11 for-range loops instead of index-based loops where
    possible. This fixes a lot of warnings when compiling with -Wsign-compare.
  * Fix segment fault for proto3 optional
  * Adds a CMake option to build `libprotoc` separately
  Java
  * Bugfix in mergeFrom() when a oneof has multiple message fields.
  * Fix RopeByteString.RopeInputStream.read() returning -1 when told to read
    0 bytes when not at EOF.
  * Redefine remove(Object) on primitive repeated field Lists to avoid
    autoboxing.
  * Support '\u' escapes in textformat string literals.
  * Trailing empty spaces are no longer ignored for FieldMask.
  * Fix FieldMaskUtil.subtract to recursively remove mask.
  * Mark enums with `@java.lang.Deprecated` if the proto enum has option
    `deprecated = true;`.
  * Adding forgotten duration.proto to the lite library
  Python:
  * Print google.protobuf.NullValue as null instead of 'NULL_VALUE' when it is
    used outside WKT Value/Struct.
  * Fix bug occurring when attempting to deep copy an enum type in python 3.
  * Add a setuptools extension for generating Python protobufs
  * Remove uses of pkg_resources in non-namespace packages
  * [bazel/py] Omit google/__init__.py from the Protobuf runtime
  * Removed the unnecessary setuptools package dependency for Python package
  * Fix PyUnknownFields memory leak
  PHP:
  * Added support for '==' to the PHP C extension
  * Added `==` operators for Map and Array
  * Native C well-known types
  * Optimized away hex2bin() call in generated code
  * New version of upb, and a new hash function wyhash in third_party
  * add missing hasOneof method to check presence of oneof fields
  Go:
  * Update go_package options to reference google.golang.org/protobuf module.
  C#:
  * annotate ByteString.CopyFrom(ReadOnlySpan&lt;byte&gt;) as SecuritySafeCritical
  * Fix C# optional field reflection when there are regular fields too
  * Fix parsing negative Int32Value that crosses segment boundary
  Javascript:
  * JS: parse (un)packed fields conditionally

Update to version 3.13.0
  PHP:
  * The C extension is completely rewritten. The new C extension has significantly
    better parsing performance and fixes a handful of conformance issues. It will
    also make it easier to add support for more features like proto2 and proto3 presence.
  * The new C extension does not support PHP 5.x. PHP 5.x users can still use pure-PHP.
  C++:
  * Removed deprecated unsafe arena string accessors
  * Enabled heterogeneous lookup for std::string keys in maps.
  * Removed implicit conversion from StringPiece to std::string
  * Fix use-after-destroy bug when the Map is allocated in the arena.
  * Improved the randomness of map ordering
  * Added stack overflow protection for text format with unknown fields
  * Use std::hash for proto maps to help with portability.
  * Added more Windows macros to proto whitelist.
  * Arena constructors for map entry messages are now marked 'explicit'
    (for regular messages they were already explicit).
  * Fix subtle aliasing bug in RepeatedField::Add
  * Fix mismatch between MapEntry ByteSize and Serialize with respect to unset
    fields.
  Python:
  * JSON format conformance fixes:
    * Reject lowercase t for Timestamp json format.
    * Print full_name directly for extensions (no camelCase).
    * Reject boolean values for integer fields.
    * Reject NaN, Infinity, -Infinity that is not quoted.
    * Base64 fixes for bytes fields: accept URL-safe base64 and missing padding.
  * Bugfix for fields/files named 'async' or 'await'.
  * Improved the error message when AttributeError is returned from __getattr__
    in EnumTypeWrapper.
  Java:
  * Fixed a bug where setting optional proto3 enums with setFooValue() would
    not mark the value as present.
  * Add Subtract function to FieldMaskUtil.
  C#:
  * Dropped support for netstandard1.0 (replaced by support for netstandard1.1).
    This was required to modernize the parsing stack to use the `Span&lt;byte&gt;`
    type internally
  * Add `ParseFrom(ReadOnlySequence&lt;byte&gt;)` method to enable GC friendly
    parsing with reduced allocations and buffer copies
  * Add support for serialization directly to a `IBufferWriter&lt;byte&gt;` or
    to a `Span&lt;byte&gt;` to enable GC friendly serialization.
    The new API is available as extension methods on the `IMessage` type
  * Add `GOOGLE_PROTOBUF_REFSTRUCT_COMPATIBILITY_MODE` define to make
    generated code compatible with old C# compilers (pre-roslyn compilers
    from .NET framework and old versions of mono) that do not support
    ref structs. Users that are still on a legacy stack that does
    not support C# 7.2 compiler might need to use the new define
    in their projects to be able to build the newly generated code
  * Due to the major overhaul of parsing and serialization internals,
    it is recommended to regenerate your generated code to achieve the best
    performance (the legacy generated code will still work, but might incur
    a slight performance penalty).

Update to version 3.12.3; notable changes since 3.11.4:

  Protocol Compiler:
  * [experimental] Singular, non-message typed fields in proto3 now support
    presence tracking. This is enabled by adding the 'optional' field label and
    passing the --experimental_allow_proto3_optional flag to protoc.
    * For usage info, see docs/field_presence.md.
    * During this experimental phase, code generators should update to support
      proto3 presence, see docs/implementing_proto3_presence.md for instructions.
  * Allow duplicate symbol names when multiple descriptor sets are passed on
    the command-line, to match the behavior when multiple .proto files are passed.
  * Deterministic `protoc --descriptor_set_out` (#7175)
  Objective-C:
  * Tweak the union used for Extensions to support old generated code. #7573
  * Fix for the :protobuf_objc target in the Bazel BUILD file. (#7538)
  * [experimental] ObjC Proto3 optional support (#7421)
  * Block subclassing of generated classes (#7124)
  * Use references to Obj C classes instead of names in descriptors. (#7026)
  * Revisit how the WKTs are bundled with ObjC. (#7173)
  C++:
  * Simplified the template export macros to fix the build for mingw32. (#7539)
  * [experimental] Added proto3 presence support.
  * New descriptor APIs to support proto3 presence.
  * Enable Arenas by default on all .proto files.
  * Documented that users are not allowed to subclass Message or MessageLite.
  * Mark generated classes as final; inheriting from protos is strongly discouraged.
  * Add stack overflow protection for text format with unknown fields.
  * Add accessors for map key and value FieldDescriptors.
  * Add FieldMaskUtil::FromFieldNumbers().
  * MessageDifferencer: use ParsePartial() on Any fields so the diff does not
    fail when there are missing required fields.
  * ReflectionOps::Merge(): lookup messages in the right factory, if it can.
  * Added Descriptor::WellKnownTypes enum and Descriptor::well_known_type()
    accessor as an easier way of determining if a message is a Well-Known Type.
  * Optimized RepeatedField::Add() when it is used in a loop.
  * Made proto move/swap more efficient.
  * De-virtualize the GetArena() method in MessageLite.
  * Improves performance of json_stream_parser.cc by factor 1000 (#7230)
  * bug: #7076 undefine Windows OUT and OPTIONAL macros (#7087)
  * Fixed a bug in FieldDescriptor::DebugString() that would erroneously print
    an 'optional' label for a field in a oneof.
  * Fix bug in parsing bool extensions that assumed they are always 1 byte.
  * Fix off-by-one error in FieldOptions::ByteSize() when extensions are present.
  * Clarified the comments to show an example of the difference between
    Descriptor::extension and DescriptorPool::FindAllExtensions.
  * Add a compiler option 'code_size' to force optimize_for=code_size on all
    protos where this is possible.
  Ruby:
  * Re-add binary gems for Ruby 2.3 and 2.4. These are EOL upstream, however
    many people still use them and dropping support will require more
    coordination.
  * [experimental] Implemented proto3 presence for Ruby. (#7406)
  * Stop building binary gems for ruby &lt;2.5 (#7453)
  * Fix for wrappers with a zero value (#7195)
  * Fix for JSON serialization of 0/empty-valued wrapper types (#7198)
  * Call 'Class#new' over rb_class_new_instance in decoding (#7352)
  * Build extensions for Ruby 2.7 (#7027)
  * assigning 'nil' to submessage should clear the field. (#7397)
  Java:
  * [experimental] Added proto3 presence support.
  * Mark java enum _VALUE constants as @Deprecated if the enum field is deprecated
  * reduce &lt;clinit&gt; size for enums with allow_alias set to true.
  * Sort map fields alphabetically by the field's key when printing textproto.
  * Fixed a bug in map sorting that appeared in -rc1 and -rc2 (#7508).
  * TextFormat.merge() handles Any as top level type.
  * Throw a descriptive IllegalArgumentException when calling
    getValueDescriptor() on enum special value UNRECOGNIZED instead of
    ArrayIndexOutOfBoundsException.
  * Fixed an issue with JsonFormat.printer() where setting printingEnumsAsInts()
    would override the configuration passed into includingDefaultValueFields().
  * Implement overrides of indexOf() and contains() on primitive lists returned
    for repeated fields to avoid autoboxing the list contents.
  * Add overload to FieldMaskUtil.fromStringList that accepts a descriptor.
  * [bazel] Move Java runtime/toolchains into //java (#7190)
  Python:
  * [experimental] Added proto3 presence support.
  * [experimental] fast import protobuf module, only works with cpp generated code linked in.
  * Truncate 'float' fields to 4 bytes of precision in setters for pure-Python
    implementation (C++ extension was already doing this).
  * Fixed a memory leak in C++ bindings.
  * Added a deprecation warning when code tries to create Descriptor objects
    directly.
  * Fix unintended comparison between bytes and string in descriptor.py.
  * Avoid printing excess digits for float fields in TextFormat.
  * Remove Python 2.5 syntax compatibility from the proto compiler generated _pb2.py module code.
  * Drop 3.3, 3.4 and use single version docker images for all python tests (#7396)
  JavaScript:
  * Fix js message pivot selection (#6813)
  PHP:
  * Persistent Descriptor Pool (#6899)
  * Implement lazy loading of php class for proto messages (#6911)
  * Correct @return in Any.unpack docblock (#7089)
  * Ignore unknown enum value when ignore_unknown specified (#7455)
  C#:
  * [experimental] Add support for proto3 presence fields in C# (#7382)
  * Mark GetOption API as obsolete and expose the 'GetOptions()' method on descriptors instead (#7491)
  * Remove Has/Clear members for C# message fields in proto2 (#7429)
  * Enforce recursion depth checking for unknown fields (#7132)
  * Fix conformance test failures for Google.Protobuf (#6910)
  * Cleanup various bits of Google.Protobuf (#6674)
  * Fix latest ArgumentException for C# extensions (#6938)
  * Remove unnecessary branch from ReadTag (#7289)
  Other:
  * Add a proto_lang_toolchain for javalite (#6882)
  * [bazel] Update gtest and deprecate //external:{gtest,gtest_main} (#7237)
  * Add application note for explicit presence tracking. (#7390)
  * Howto doc for implementing proto3 presence in a code generator. (#7407)

Update to version 3.11.4; notable changes since 3.9.2:

  * C++: Make serialization method naming consistent
  * C++: Moved ShutdownProtobufLibrary() to message_lite.h. For
         backward compatibility a declaration is still available
         in stubs/common.h, but users should prefer message_lite.h
  * C++: Removed non-namespace macro EXPECT_OK()
  * C++: Removed mathlimits.h from stubs in favor of using
         std::numeric_limits from C++11
  * C++: Support direct pickling of nested messages
  * C++: Disable extension code gen for C#
  * C++: Switch the proto parser to the faster MOMI parser
  * C++: Unused imports of files defining descriptor extensions
         will now be reported
  * C++: Add proto2::util::RemoveSubranges to remove multiple
         subranges in linear time
  * C++: Support 32 bit values for ProtoStreamObjectWriter to Struct
  * C++: Removed the internal-only header coded_stream_inl.h and
         the internal-only methods defined there
  * C++: Enforced no SWIG wrapping of descriptor_database.h
         (other headers already had this restriction)
  * C++: Implementation of the equivalent of the MOMI parser for
         serialization. This removes one of the two serialization
         routines, by making the fast array serialization routine
         completely general. SerializeToCodedStream can now be
         implemented in terms of the much much faster array
         serialization. The array serialization regresses slightly,
         but when array serialization is not possible this wins big
  * C++: Add move constructor for Reflection's SetString
  * Java: Remove the usage of MethodHandle, so that Android users
          prior to API version 26 can use protobuf-java
  * Java: Publish ProGuard config for javalite
  * Java: Include unknown fields when merging proto3 messages in
          Java lite builders
  * Java: Have oneof enums implement a separate interface (other
          than EnumLite) for clarity
  * Java: Opensource Android Memory Accessors
  * Java: Change ProtobufArrayList to use Object[] instead of
          ArrayList for 5-10% faster parsing
  * Java: Make a copy of JsonFormat.TypeRegistry at the protobuf
          top level package. This will eventually replace
          JsonFormat.TypeRegistry
  * Java: Add Automatic-Module-Name entries to the Manifest
  * Python: Add float_precision option in json format printer
  * Python: Optionally print bytes fields as messages in unknown
            fields, if possible
  * Python: Experimental code gen (fast import protobuf module)
            which only work with cpp generated code linked in
  * Python: Add descriptor methods in descriptor_pool are deprecated
  * Python: Added delitem for Python extension dict
  * JavaScript: Remove guard for Symbol iterator for jspb.Map
  * JavaScript: Remove deprecated boolean option to getResultBase64String()
  * JavaScript: Change the parameter types of binaryReaderFn in
                ExtensionFieldBinaryInfo to (number, ?, ?)
  * JavaScript: Create dates.ts and time_of_days.ts to mirror Java
                versions. This is a near-identical conversion of
                c.g.type.util.{Dates,TimeOfDays} respectively
  * JavaScript: Migrate moneys to TypeScript
  * PHP: Increase php7.4 compatibility
  * PHP: Implement lazy loading of php class for proto messages
  * Ruby: Support hashes for struct initializers
  * C#: Experimental proto2 support is now officially available
  * C#: Change _Extensions property to normal body rather than expression
  * Objective C: Remove OSReadLittle* due to alignment requirements
  * Other: Override CocoaPods module to lowercase
  * further bugfixes and optimisations
- Install LICENSE
- Drop protobuf-libs as it is just workaround for rpmlint issue
  * python bindings now require recent python-google-apputils
  * Released memory allocated by InitializeDefaultRepeatedFields()
    and GetEmptyString(). Some memory sanitizers reported them
  * Updated DynamicMessage.setField() to handle repeated enum
  * Fixed a bug that caused NullPointerException to be thrown when
    converting manually constructed FileDescriptorProto to
  * Added oneofs(unions) feature. Fields in the same oneof will
  * Files, services, enums, messages, methods and enum values
  * Added Support for list values, including lists of mesaages,
  * Added SwapFields() in reflection API to swap a subset of
  * Repeated primitive extensions are now packable. The
    it is possible to switch a repeated extension field to
  * writeTo() method in ByteString can now write a substring to
  * java_generate_equals_and_hash can now be used with the
  * A new C++-backed extension module (aka 'cpp api v2') that
    replaces the old ('cpp api v1') one. Much faster than the
    pure Python code. This one resolves many bugs and is
  mosh reqires it

python-abseil was udpated:

version update to 1.4.0
  New:
    (testing) Added @flagsaver.as_parsed: this allows saving/restoring flags
    using string values as if parsed from the command line and will also reflect
    other flag states after command line parsing, e.g. .present is set.
  Changed:
    (logging) If no log dir is specified logging.find_log_dir() now falls back
    to tempfile.gettempdir() instead of /tmp/.
  Fixed:
    (flags) Additional kwargs (e.g. short_name=) to DEFINE_multi_enum_class
    are now correctly passed to the underlying Flag object.

version update to 1.2.0
  *   Fixed a crash in Python 3.11 when `TempFileCleanup.SUCCESS` is used.
  *   `Flag` instances now raise an error if used in a bool context. This prevents
      the occasional mistake of testing an instance for truthiness rather than
      testing `flag.value`.
  *   `absl-py` no longer depends on `six`.

Update to version 1.0.0 
  * absl-py no longer supports Python 2.7, 3.4, 3.5. All versions
    have reached end-of-life for more than a year now.
  * New releases will be tagged as vX.Y.Z instead of pypi-vX.Y.Z in
    the git repo going forward.

- Release notes for 0.15.0

  * (testing) #128: When running bazel with its --test_filter=
    flag, it now treats the filters as unittest's -k flag in Python
    3.7+.

- Release notes for 0.14.1

  * Top-level LICENSE file is now exported in bazel.

- Release notes for 0.14.0

  * #171: Creating argparse_flags.ArgumentParser with
    argument_default= no longer raises an exception when other
    absl.flags flags are defined.
  * #173: absltest now correctly sets up test filtering and fail
    fast flags when an explicit argv= parameter is passed to
    absltest.main.

- Release notes for 0.13.0
  * (app) Type annotations for public app interfaces.
  * (testing) Added new decorator @absltest.skipThisClass to
    indicate a class contains shared functionality to be used as a
    base class for other TestCases, and therefore should be
    skipped.
  * (app) Annotated the flag_parser paramteter of run as
    keyword-only. This keyword-only constraint will be enforced at
    runtime in a future release.
  * (app, flags) Flag validations now include all errors from
    disjoint flag sets, instead of fail fast upon first error from
    all validators. Multiple validators on the same flag still
    fails fast.
- Release notes for 0.12.0
  * (flags) Made EnumClassSerializer and EnumClassListSerializer
    public.
  * (flags) Added a required: Optional[bool] = False parameter to
    DEFINE_* functions.
  * (testing) flagsaver overrides can now be specified in terms of
    FlagHolder.
  * (testing) parameterized.product: Allows testing a method over
    cartesian product of parameters values, specified as a
    sequences of values for each parameter or as kwargs-like dicts
    of parameter values.
  * (testing) Added public flag holders for --test_srcdir and
    --test_tmpdir. Users should use absltest.TEST_SRCDIR.value and
    absltest.TEST_TMPDIR.value instead of FLAGS.test_srcdir and
    FLAGS.test_tmpdir.
  * (flags) Made CsvListSerializer respect its delimiter argument.

- Add Provides python-absl-py

python-grpcuio was updated:

- Update to version 1.60.0:
  * No python specfic changes.

- Update to version 1.59.2:
  * No python specific changes.

- Update to version 1.59.0:
  * [Python 3.12] Support Python 3.12 (gh#grpc/grpc#34398).
  * [Python 3.12] Deprecate distutil (gh#grpc/grpc#34186).

- Update to version 1.58.0:
  * [Bazel] Enable grpcio-reflection to be used via Bazel
    (gh#grpc/grpc#31013).
  * [packaging] Publish xds-protos as part of the standard package
    pipeline (gh#grpc/grpc#33797).

- Update to version 1.57.0: (CVE-2023-4785, bsc#1215334, CVE-2023-33953, bsc#1214148)
  * [posix] Enable systemd sockets for libsystemd&gt;=233
    (gh#grpc/grpc#32671).
  * [python O11Y] Initial Implementation (gh#grpc/grpc#32974).
- Build with LTO (don't set _lto_cflags to %nil).
- No need to pass '-std=c++17' to build CFLAGS.

- Update to version 1.56.2:

  * [WRR] backport (gh#grpc/grpc#33694) to 1.56
    (gh#grpc/grpc#33698)
  * [backport][iomgr][EventEngine] Improve server handling of
    file descriptor exhaustion (gh#grpc/grpc#33667)
- Switch build to pip/wheel.
- Use system abseil with '-std=c++17' to prevent undefined symbol
  eg. with python-grpcio-tools (_ZN3re23RE213GlobalReplaceEPNSt7__
  cxx1112basic_stringIcSt11char_traitsIcESaIcEEERKS0_N4absl12lts_
  2023012511string_viewE)

- Upstream only supports python &gt;= 3.7, so adjust BuildRequires
  accordingly.

- Add %{?sle15_python_module_pythons}

- Update to version 1.56.0: (CVE-2023-32731, bsc#1212180)
  * [aio types] Fix some grpc.aio python types
    (gh#grpc/grpc#32475).

- Update to version 1.55.0:
  * [EventEngine] Disable EventEngine polling in gRPC Python
    (gh#grpc/grpc#33279) (gh#grpc/grpc#33320).
  * [Bazel Python3.11] Update Bazel dependencies for Python 3.11
    (gh#grpc/grpc#33318) (gh#grpc/grpc#33319).
- Drop Requires: python-six; not required any more.
- Switch Suggests to Recommends.

- Update to version 1.54.0: (CVE-2023-32732, bsc#1212182)
  * Fix DeprecationWarning when calling asyncio.get_event_loop()
    (gh#grpc/grpc#32533).
  * Remove references to deprecated syntax field
    (gh#grpc/grpc#32497).

- Update to version 1.51.1:
  * No Linux specific changes.
- Changes from version 1.51.0:
  * Fix lack of cooldown between poll attempts
    (gh#grpc/grpc#31550).
  * Remove enum and future (gh#grpc/grpc#31381).
  * [Remove Six] Remove dependency on six (gh#grpc/grpc#31340).
  * Update xds-protos package to pull in protobuf 4.X
    (gh#grpc/grpc#31113).

- Update to version 1.50.0:
  * Support Python 3.11. [gh#grpc/grpc#30818].

- Update to version 1.49.1
  * Support Python 3.11. (#30818)
  * Add type stub generation support to grpcio-tools. (#30498)

- Update to version 1.48.0:
  * [Aio] Ensure Core channel closes when deallocated
    [gh#grpc/grpc#29797].
  * [Aio] Fix the wait_for_termination return value
    [gh#grpc/grpc#29795].

- update to 1.46.3:
  * backport: xds: use federation env var to guard new-style resource name parsing
  * This release contains refinements, improvements, and bug fixes. 

- Update to version 1.46.0:
  * Add Python GCF Distribtest [gh#grpc/grpc#29303].
  * Add Python Reflection Client [gh#grpc/grpc#29085].
  * Revert 'Fix prefork handler register's default behavior'
    [gh#grpc/grpc#29229].
  * Fix prefork handler register's default behavior
    [gh#grpc/grpc#29103].
  * Fix fetching CXX variable in setup.py [gh#grpc/grpc#28873].

- Update to version 1.45.0:
  * Reimplement Gevent Integration [gh#grpc/grpc#28276].
  * Support musllinux binary wheels on x64 and x86
    [gh#grpc/grpc#28092].
  * Increase the Python protobuf requirement to &gt;=3.12.0
    [gh#grpc/grpc#28604].
- Build with system re2; add BuildRequires: pkgconfig(re2).

- Update to version 1.44.0:

  * Add python async example for hellostreamingworld using
    generator (gh#grpc/grpc#27343).
  * Disable __wrap_memcpy hack for Python builds
    (gh#grpc/grpc#28410).
  * Bump Bazel Python Cython dependency to 0.29.26
    (gh#grpc/grpc#28398).
  * Fix libatomic linking on Raspberry Pi OS Bullseye
    (gh#grpc/grpc#28041).
  * Allow generated proto sources in remote repositories for
    py_proto_library (gh#grpc/grpc#28103).

- Update to version 1.43.0:
  * [Aio] Validate the input type for set_trailing_metadata and
    abort (gh#grpc/grpc#27958).

- update to 1.41.1:
  * This is release 1.41.0 (goat) of gRPC Core. 

- Update to version 1.41.0:
  * Add Python 3.10 support and drop 3.5 (gh#grpc/grpc#26074).
  * [Aio] Remove custom IO manager support (gh#grpc/grpc#27090).

- Update to version 1.39.0:
  * Python AIO: Match continuation typing on Interceptors
    (gh#grpc/grpc#26500).
  * Workaround #26279 by publishing manylinux_2_24 wheels instead
    of manylinux2014 on aarch64 (gh#grpc/grpc#26430).
  * Fix zlib unistd.h import problem (gh#grpc/grpc#26374).
  * Handle gevent exception in gevent poller (gh#grpc/grpc#26058).

- Update to version 1.38.1:
  * Backport gh#grpc/grpc#26430 and gh#grpc/grpc#26435 to v1.38.x
    (gh#grpc/grpc#26436).

- Update to version 1.38.0:
  * Add grpcio-admin Python package (gh#grpc/grpc#26166).
  * Add CSDS API to Python (gh#grpc/grpc#26114).
  * Expose code and details from context on the server side
    (gh#grpc/grpc#25457).
  * Explicitly import importlib.abc; required on Python 3.10.
    Fixes #26062 (gh#grpc/grpc#26083).
  * Fix potential deadlock on the GIL in AuthMetdataPlugin
    (gh#grpc/grpc#26009).
  * Introduce new Python package 'xds_protos'
    (gh#grpc/grpc#25975).
  * Remove async mark for set_trailing_metadata interface
    (gh#grpc/grpc#25814).

- Update to version 1.37.1:
  * No user visible changes.
- Changes from version 1.37.0:
  * Clarify Guarantees about grpc.Future Interface
    (gh#grpc/grpc#25383).
  * [Aio] Add time_remaining method to ServicerContext
    (gh#grpc/grpc#25719).
  * Standardize all environment variable boolean configuration in
    python's setup.py (gh#grpc/grpc#25444).
  * Fix Signal Safety Issue (gh#grpc/grpc#25394).

- Update to version 1.36.1:
  * Core: back-port: add env var protection for google-c2p
    resolver (gh#grpc/grpc#25569).

- Update to version 1.35.0:
  * Implement Python Client and Server xDS Creds.
    (gh#grpc/grpc#25365)
  * Add %define _lto_cflags %{nil} (bsc#1182659) (rh#1893533)
  * Link roots.pem to ca-bundle.pem from ca-certificates package

- Update to version 1.34.1:
  * Backport 'Lazily import grpc_tools when using runtime
    stub/message generation' to 1.34.x (gh#grpc/grpc#25011).

- Update to version 1.34.0:
  * Incur setuptools as an dependency for grpcio_tools
    (gh#grpc/grpc#24752).
  * Stop the spamming log generated by ctrl-c for AsyncIO server
    (gh#grpc/grpc#24718).
  * [gRPC Easy] Make Well-Known Types Available to Runtime Protos
    (gh#grpc/grpc#24478).
  * Bump MACOSX_DEPLOYMENT_TARGET to 10.10 for Python
    (gh#grpc/grpc#24480).
  * Make Python 2 an optional dependency for Bazel build
    (gh#grpc/grpc#24407).
  * [Linux] [macOS] Support pre-compiled Python 3.9 wheels
    (gh#grpc/grpc#24356).

- Update to version 1.33.2:

  * [Backport] Implement grpc.Future interface in
    SingleThreadedRendezvous (gh#grpc/grpc#24574).

- Update to version 1.33.1:

  * [Backport] Make Python 2 an optional dependency for Bazel
    build (gh#grpc/grpc#24452).
  * Allow asyncio API to be imported as grpc.aio.
    (gh#grpc/grpc#24289).
  * [gRPC Easy] Fix import errors on Windows (gh#grpc/grpc#24124).
  * Make version check for importlib.abc in grpcio-tools more
    stringent (gh#grpc/grpc#24098).

Added re2 package in version 2024-02-01.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133277">SUSE bug 1133277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182659">SUSE bug 1182659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203378">SUSE bug 1203378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208794">SUSE bug 1208794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212180">SUSE bug 1212180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212182">SUSE bug 1212182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214148">SUSE bug 1214148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215334">SUSE bug 1215334</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32731/">CVE-2023-32731 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-32732/">CVE-2023-32732 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32732">CVE-2023-32732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33953/">CVE-2023-33953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33953">CVE-2023-33953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4785/">CVE-2023-4785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4785">CVE-2023-4785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848502" comment="libabsl2308_0_0-20230802.1-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848503" comment="libprotobuf-lite25_1_0-25.1-150400.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206255" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210638" ref_url="https://bugzilla.suse.com/1210638" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017987.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848499" comment="libpython3_6m1_0-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848500" comment="python3-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848501" comment="python3-base-3.6.15-150300.10.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206256" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219267" ref_url="https://bugzilla.suse.com/1219267" source="BUGZILLA"/>
		<reference ref_id="1219268" ref_url="https://bugzilla.suse.com/1219268" source="BUGZILLA"/>
		<reference ref_id="1219438" ref_url="https://bugzilla.suse.com/1219438" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651/" source="CVE"/>
		<reference ref_id="CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652/" source="CVE"/>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017990.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

Vendor latest buildkit v0.11 including bugfixes for the following:

* CVE-2024-23653: BuildKit API doesn't validate entitlement on container creation (bsc#1219438).
* CVE-2024-23652: Fixed arbitrary deletion of files (bsc#1219268).
* CVE-2024-23651: Fixed race condition in mount (bsc#1219267).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219267">SUSE bug 1219267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219268">SUSE bug 1219268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219438">SUSE bug 1219438</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848741" comment="docker-24.0.7_ce-150000.193.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206257" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219213" ref_url="https://bugzilla.suse.com/1219213" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52356" ref_url="https://www.suse.com/security/cve/CVE-2023-52356/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017992.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-52356: Fixed segfault in TIFFReadRGBATileExt() (bsc#1219213).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219213">SUSE bug 1219213</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52356/">CVE-2023-52356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52356">CVE-2023-52356 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848747" comment="libtiff5-4.0.9-150000.45.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206258" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218215" ref_url="https://bugzilla.suse.com/1218215" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51385" ref_url="https://www.suse.com/security/cve/CVE-2023-51385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017998.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2023-51385: Limit the use of shell metacharacters in host- and
  user names to avoid command injection. (bsc#1218215)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218215">SUSE bug 1218215</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51385/">CVE-2023-51385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848742" comment="openssh-8.4p1-150300.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848743" comment="openssh-clients-8.4p1-150300.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848744" comment="openssh-common-8.4p1-150300.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848745" comment="openssh-fips-8.4p1-150300.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848746" comment="openssh-server-8.4p1-150300.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206259" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1216198" ref_url="https://bugzilla.suse.com/1216198" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017997.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to NSS 3.90.2:

- CVE-2023-5388: Fixed timing attack against RSA decryption in TLS (bsc#1216198)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216198">SUSE bug 1216198</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848748" comment="libfreebl3-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848749" comment="libsoftokn3-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848750" comment="mozilla-nss-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848751" comment="mozilla-nss-certs-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848752" comment="mozilla-nss-tools-3.90.2-150400.3.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206260" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218127" ref_url="https://bugzilla.suse.com/1218127" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017579.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (Terrapin Attack) (bsc#1218127).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-02"/>
	<updated date="2024-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218127">SUSE bug 1218127</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817820" comment="libssh2-1-1.11.0-150000.4.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206261" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219576" ref_url="https://bugzilla.suse.com/1219576" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25062" ref_url="https://www.suse.com/security/cve/CVE-2024-25062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0613-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035534.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2024-25062: Fixed use-after-free in XMLReader (bsc#1219576).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-07"/>
	<updated date="2024-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219576">SUSE bug 1219576</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25062/">CVE-2024-25062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848936" comment="libxml2-2-2.9.14-150400.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848937" comment="libxml2-tools-2.9.14-150400.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848938" comment="python3-libxml2-2.9.14-150400.5.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206262" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218862" ref_url="https://bugzilla.suse.com/1218862" source="BUGZILLA"/>
		<reference ref_id="1218865" ref_url="https://bugzilla.suse.com/1218865" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0553" ref_url="https://www.suse.com/security/cve/CVE-2024-0553/" source="CVE"/>
		<reference ref_id="CVE-2024-0567" ref_url="https://www.suse.com/security/cve/CVE-2024-0567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018038.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2024-0567: Fixed an incorrect rejection of certificate chains
  with distributed trust (bsc#1218862).
- CVE-2024-0553: Fixed a timing attack against the RSA-PSK key
  exchange, which could lead to the leakage of sensitive data
  (bsc#1218865).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218862">SUSE bug 1218862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218865">SUSE bug 1218865</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0553/">CVE-2024-0553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0567/">CVE-2024-0567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849010" comment="gnutls-3.7.3-150400.4.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849011" comment="libgnutls30-3.7.3-150400.4.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849012" comment="libgnutls30-hmac-3.7.3-150400.4.41.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206263" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1217969" ref_url="https://bugzilla.suse.com/1217969" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39804" ref_url="https://www.suse.com/security/cve/CVE-2023-39804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/033622.html" source="SUSE-SU"/>
		<description>
This update for tar fixes the following issues:

- CVE-2023-39804: Fixed  extension attributes in PAX archives incorrect hanling (bsc#1217969).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-09"/>
	<updated date="2024-01-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1217969">SUSE bug 1217969</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39804/">CVE-2023-39804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39804">CVE-2023-39804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816615" comment="tar-1.34-150000.3.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206264" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1220552" ref_url="https://bugzilla.suse.com/1220552" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42265" ref_url="https://www.suse.com/security/cve/CVE-2022-42265/" source="CVE"/>
		<reference ref_id="CVE-2024-0074" ref_url="https://www.suse.com/security/cve/CVE-2024-0074/" source="CVE"/>
		<reference ref_id="CVE-2024-0075" ref_url="https://www.suse.com/security/cve/CVE-2024-0075/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018097.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues:

Update to 550.54.14

* Added vGPU Host and vGPU Guest support. For vGPU Host, please
  refer to the README.vgpu packaged in the vGPU Host Package for
  more details.

Security issues fixed:

* CVE-2024-0074: A user could trigger a NULL ptr dereference.
* CVE-2024-0075: A user could overwrite the end of a buffer, leading to crashes or code execution.
* CVE-2022-42265: A unprivileged user could trigger an integer overflow which could lead to crashes or code execution.


- create /run/udev/static_node-tags/uaccess/nvidia${devid} symlinks
  also during modprobing the nvidia module; this changes the issue
  of not having access to /dev/nvidia${devid}, when gfxcard has
  been replaced by a different gfx card after installing the driver

- provide nvidia-open-driver-G06-kmp (jsc#PED-7117)
  * this makes it easy to replace the package from nVidia's
    CUDA repository with this presigned package

		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-05"/>
	<updated date="2024-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220552">SUSE bug 1220552</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42265/">CVE-2022-42265 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42265">CVE-2022-42265 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0074/">CVE-2024-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0074">CVE-2024-0074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0075/">CVE-2024-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0075">CVE-2024-0075 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849778" comment="kernel-firmware-nvidia-gspx-G06-550.54.14-150400.9.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849782" comment="nvidia-open-driver-G06-signed-kmp-default-550.54.14_k5.14.21_150400.24.108-150400.9.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206265" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219975" ref_url="https://bugzilla.suse.com/1219975" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52160" ref_url="https://www.suse.com/security/cve/CVE-2023-52160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018124.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2023-52160: Bypassing WiFi Authentication (bsc#1219975).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-08"/>
	<updated date="2024-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219975">SUSE bug 1219975</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52160/">CVE-2023-52160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52160">CVE-2023-52160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850745" comment="wpa_supplicant-2.9-150000.4.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206266" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219243" ref_url="https://bugzilla.suse.com/1219243" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018139.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-11"/>
	<updated date="2024-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219243">SUSE bug 1219243</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850762" comment="libopenssl-1_1-devel-1.1.1l-150400.7.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850763" comment="libopenssl1_1-1.1.1l-150400.7.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850764" comment="libopenssl1_1-hmac-1.1.1l-150400.7.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850765" comment="openssl-1_1-1.1.1l-150400.7.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206267" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1217445" ref_url="https://bugzilla.suse.com/1217445" source="BUGZILLA"/>
		<reference ref_id="1217589" ref_url="https://bugzilla.suse.com/1217589" source="BUGZILLA"/>
		<reference ref_id="1218866" ref_url="https://bugzilla.suse.com/1218866" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018164.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- qsort: harden handling of degenerated / non transient compare function (bsc#1218866)

Other issues fixed:

- getaddrinfo: translate ENOMEM to EAI_MEMORY (bsc#1217589, BZ #31163)
- aarch64: correct CFI in rawmemchr (bsc#1217445, BZ #31113)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-03-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217445">SUSE bug 1217445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217589">SUSE bug 1217589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218866">SUSE bug 1218866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851279" comment="glibc-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851280" comment="glibc-devel-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851281" comment="glibc-locale-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851282" comment="glibc-locale-base-2.31-150300.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206268" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1215005" ref_url="https://bugzilla.suse.com/1215005" source="BUGZILLA"/>
		<reference ref_id="1217316" ref_url="https://bugzilla.suse.com/1217316" source="BUGZILLA"/>
		<reference ref_id="1217320" ref_url="https://bugzilla.suse.com/1217320" source="BUGZILLA"/>
		<reference ref_id="1217321" ref_url="https://bugzilla.suse.com/1217321" source="BUGZILLA"/>
		<reference ref_id="1217324" ref_url="https://bugzilla.suse.com/1217324" source="BUGZILLA"/>
		<reference ref_id="1217326" ref_url="https://bugzilla.suse.com/1217326" source="BUGZILLA"/>
		<reference ref_id="1217329" ref_url="https://bugzilla.suse.com/1217329" source="BUGZILLA"/>
		<reference ref_id="1217330" ref_url="https://bugzilla.suse.com/1217330" source="BUGZILLA"/>
		<reference ref_id="1217432" ref_url="https://bugzilla.suse.com/1217432" source="BUGZILLA"/>
		<reference ref_id="1219581" ref_url="https://bugzilla.suse.com/1219581" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4750" ref_url="https://www.suse.com/security/cve/CVE-2023-4750/" source="CVE"/>
		<reference ref_id="CVE-2023-48231" ref_url="https://www.suse.com/security/cve/CVE-2023-48231/" source="CVE"/>
		<reference ref_id="CVE-2023-48232" ref_url="https://www.suse.com/security/cve/CVE-2023-48232/" source="CVE"/>
		<reference ref_id="CVE-2023-48233" ref_url="https://www.suse.com/security/cve/CVE-2023-48233/" source="CVE"/>
		<reference ref_id="CVE-2023-48234" ref_url="https://www.suse.com/security/cve/CVE-2023-48234/" source="CVE"/>
		<reference ref_id="CVE-2023-48235" ref_url="https://www.suse.com/security/cve/CVE-2023-48235/" source="CVE"/>
		<reference ref_id="CVE-2023-48236" ref_url="https://www.suse.com/security/cve/CVE-2023-48236/" source="CVE"/>
		<reference ref_id="CVE-2023-48237" ref_url="https://www.suse.com/security/cve/CVE-2023-48237/" source="CVE"/>
		<reference ref_id="CVE-2023-48706" ref_url="https://www.suse.com/security/cve/CVE-2023-48706/" source="CVE"/>
		<reference ref_id="CVE-2024-22667" ref_url="https://www.suse.com/security/cve/CVE-2024-22667/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2023-48231: Fixed  Use-After-Free in win_close() (bsc#1217316).
- CVE-2023-48232: Fixed Floating point Exception in adjust_plines_for_skipcol() (bsc#1217320).
- CVE-2023-48233: Fixed overflow with count for :s command (bsc#1217321).
- CVE-2023-48234: Fixed overflow in nv_z_get_count (bsc#1217324).
- CVE-2023-48235: Fixed overflow in ex address parsing (bsc#1217326).
- CVE-2023-48236: Fixed overflow in get_number (bsc#1217329).
- CVE-2023-48237: Fixed overflow in shift_line (bsc#1217330).
- CVE-2023-48706: Fixed heap-use-after-free in ex_substitute (bsc#1217432).
- CVE-2024-22667: Fixed stack-based buffer overflow in did_set_langmap function in map.c (bsc#1219581).
- CVE-2023-4750: Fixed heap use-after-free in function bt_quickfix (bsc#1215005).

Updated to version 9.1 with patch level 0111:
https://github.com/vim/vim/compare/v9.0.2103...v9.1.0111
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215005">SUSE bug 1215005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217316">SUSE bug 1217316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217320">SUSE bug 1217320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217321">SUSE bug 1217321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217324">SUSE bug 1217324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217326">SUSE bug 1217326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217329">SUSE bug 1217329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217330">SUSE bug 1217330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217432">SUSE bug 1217432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219581">SUSE bug 1219581</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4750/">CVE-2023-4750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4750">CVE-2023-4750 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48231/">CVE-2023-48231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48231">CVE-2023-48231 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48232/">CVE-2023-48232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48232">CVE-2023-48232 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48233/">CVE-2023-48233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48233">CVE-2023-48233 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48234/">CVE-2023-48234 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48234">CVE-2023-48234 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48235/">CVE-2023-48235 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48235">CVE-2023-48235 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-48236/">CVE-2023-48236 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48236">CVE-2023-48236 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48237/">CVE-2023-48237 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48237">CVE-2023-48237 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48706/">CVE-2023-48706 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48706">CVE-2023-48706 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22667/">CVE-2024-22667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22667">CVE-2024-22667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850732" comment="vim-data-common-9.1.0111-150000.5.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851283" comment="vim-small-9.1.0111-150000.5.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206269" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1221134" ref_url="https://bugzilla.suse.com/1221134" source="BUGZILLA"/>
		<reference ref_id="1221151" ref_url="https://bugzilla.suse.com/1221151" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42465" ref_url="https://www.suse.com/security/cve/CVE-2023-42465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018159.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2023-42465: Fixed issues introduced by first patches (bsc#1221151, bsc#1221134).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221134">SUSE bug 1221134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221151">SUSE bug 1221151</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42465/">CVE-2023-42465 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851287" comment="sudo-1.9.9-150400.4.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206270" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211515" ref_url="https://bugzilla.suse.com/1211515" source="BUGZILLA"/>
		<reference ref_id="1213456" ref_url="https://bugzilla.suse.com/1213456" source="BUGZILLA"/>
		<reference ref_id="1214064" ref_url="https://bugzilla.suse.com/1214064" source="BUGZILLA"/>
		<reference ref_id="1218195" ref_url="https://bugzilla.suse.com/1218195" source="BUGZILLA"/>
		<reference ref_id="1218216" ref_url="https://bugzilla.suse.com/1218216" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1218915" ref_url="https://bugzilla.suse.com/1218915" source="BUGZILLA"/>
		<reference ref_id="1219073" ref_url="https://bugzilla.suse.com/1219073" source="BUGZILLA"/>
		<reference ref_id="1219126" ref_url="https://bugzilla.suse.com/1219126" source="BUGZILLA"/>
		<reference ref_id="1219127" ref_url="https://bugzilla.suse.com/1219127" source="BUGZILLA"/>
		<reference ref_id="1219146" ref_url="https://bugzilla.suse.com/1219146" source="BUGZILLA"/>
		<reference ref_id="1219295" ref_url="https://bugzilla.suse.com/1219295" source="BUGZILLA"/>
		<reference ref_id="1219633" ref_url="https://bugzilla.suse.com/1219633" source="BUGZILLA"/>
		<reference ref_id="1219653" ref_url="https://bugzilla.suse.com/1219653" source="BUGZILLA"/>
		<reference ref_id="1219827" ref_url="https://bugzilla.suse.com/1219827" source="BUGZILLA"/>
		<reference ref_id="1219835" ref_url="https://bugzilla.suse.com/1219835" source="BUGZILLA"/>
		<reference ref_id="1220009" ref_url="https://bugzilla.suse.com/1220009" source="BUGZILLA"/>
		<reference ref_id="1220140" ref_url="https://bugzilla.suse.com/1220140" source="BUGZILLA"/>
		<reference ref_id="1220187" ref_url="https://bugzilla.suse.com/1220187" source="BUGZILLA"/>
		<reference ref_id="1220238" ref_url="https://bugzilla.suse.com/1220238" source="BUGZILLA"/>
		<reference ref_id="1220240" ref_url="https://bugzilla.suse.com/1220240" source="BUGZILLA"/>
		<reference ref_id="1220241" ref_url="https://bugzilla.suse.com/1220241" source="BUGZILLA"/>
		<reference ref_id="1220243" ref_url="https://bugzilla.suse.com/1220243" source="BUGZILLA"/>
		<reference ref_id="1220250" ref_url="https://bugzilla.suse.com/1220250" source="BUGZILLA"/>
		<reference ref_id="1220251" ref_url="https://bugzilla.suse.com/1220251" source="BUGZILLA"/>
		<reference ref_id="1220253" ref_url="https://bugzilla.suse.com/1220253" source="BUGZILLA"/>
		<reference ref_id="1220254" ref_url="https://bugzilla.suse.com/1220254" source="BUGZILLA"/>
		<reference ref_id="1220255" ref_url="https://bugzilla.suse.com/1220255" source="BUGZILLA"/>
		<reference ref_id="1220257" ref_url="https://bugzilla.suse.com/1220257" source="BUGZILLA"/>
		<reference ref_id="1220326" ref_url="https://bugzilla.suse.com/1220326" source="BUGZILLA"/>
		<reference ref_id="1220328" ref_url="https://bugzilla.suse.com/1220328" source="BUGZILLA"/>
		<reference ref_id="1220330" ref_url="https://bugzilla.suse.com/1220330" source="BUGZILLA"/>
		<reference ref_id="1220335" ref_url="https://bugzilla.suse.com/1220335" source="BUGZILLA"/>
		<reference ref_id="1220344" ref_url="https://bugzilla.suse.com/1220344" source="BUGZILLA"/>
		<reference ref_id="1220350" ref_url="https://bugzilla.suse.com/1220350" source="BUGZILLA"/>
		<reference ref_id="1220364" ref_url="https://bugzilla.suse.com/1220364" source="BUGZILLA"/>
		<reference ref_id="1220398" ref_url="https://bugzilla.suse.com/1220398" source="BUGZILLA"/>
		<reference ref_id="1220409" ref_url="https://bugzilla.suse.com/1220409" source="BUGZILLA"/>
		<reference ref_id="1220433" ref_url="https://bugzilla.suse.com/1220433" source="BUGZILLA"/>
		<reference ref_id="1220444" ref_url="https://bugzilla.suse.com/1220444" source="BUGZILLA"/>
		<reference ref_id="1220457" ref_url="https://bugzilla.suse.com/1220457" source="BUGZILLA"/>
		<reference ref_id="1220459" ref_url="https://bugzilla.suse.com/1220459" source="BUGZILLA"/>
		<reference ref_id="1220469" ref_url="https://bugzilla.suse.com/1220469" source="BUGZILLA"/>
		<reference ref_id="1220649" ref_url="https://bugzilla.suse.com/1220649" source="BUGZILLA"/>
		<reference ref_id="1220735" ref_url="https://bugzilla.suse.com/1220735" source="BUGZILLA"/>
		<reference ref_id="1220736" ref_url="https://bugzilla.suse.com/1220736" source="BUGZILLA"/>
		<reference ref_id="1220796" ref_url="https://bugzilla.suse.com/1220796" source="BUGZILLA"/>
		<reference ref_id="1220797" ref_url="https://bugzilla.suse.com/1220797" source="BUGZILLA"/>
		<reference ref_id="1220825" ref_url="https://bugzilla.suse.com/1220825" source="BUGZILLA"/>
		<reference ref_id="1220845" ref_url="https://bugzilla.suse.com/1220845" source="BUGZILLA"/>
		<reference ref_id="1220917" ref_url="https://bugzilla.suse.com/1220917" source="BUGZILLA"/>
		<reference ref_id="1220930" ref_url="https://bugzilla.suse.com/1220930" source="BUGZILLA"/>
		<reference ref_id="1220931" ref_url="https://bugzilla.suse.com/1220931" source="BUGZILLA"/>
		<reference ref_id="1220933" ref_url="https://bugzilla.suse.com/1220933" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25162" ref_url="https://www.suse.com/security/cve/CVE-2019-25162/" source="CVE"/>
		<reference ref_id="CVE-2021-46923" ref_url="https://www.suse.com/security/cve/CVE-2021-46923/" source="CVE"/>
		<reference ref_id="CVE-2021-46924" ref_url="https://www.suse.com/security/cve/CVE-2021-46924/" source="CVE"/>
		<reference ref_id="CVE-2021-46932" ref_url="https://www.suse.com/security/cve/CVE-2021-46932/" source="CVE"/>
		<reference ref_id="CVE-2021-46934" ref_url="https://www.suse.com/security/cve/CVE-2021-46934/" source="CVE"/>
		<reference ref_id="CVE-2021-47083" ref_url="https://www.suse.com/security/cve/CVE-2021-47083/" source="CVE"/>
		<reference ref_id="CVE-2022-48627" ref_url="https://www.suse.com/security/cve/CVE-2022-48627/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-5197" ref_url="https://www.suse.com/security/cve/CVE-2023-5197/" source="CVE"/>
		<reference ref_id="CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340/" source="CVE"/>
		<reference ref_id="CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429/" source="CVE"/>
		<reference ref_id="CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439/" source="CVE"/>
		<reference ref_id="CVE-2023-52443" ref_url="https://www.suse.com/security/cve/CVE-2023-52443/" source="CVE"/>
		<reference ref_id="CVE-2023-52445" ref_url="https://www.suse.com/security/cve/CVE-2023-52445/" source="CVE"/>
		<reference ref_id="CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447/" source="CVE"/>
		<reference ref_id="CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448/" source="CVE"/>
		<reference ref_id="CVE-2023-52449" ref_url="https://www.suse.com/security/cve/CVE-2023-52449/" source="CVE"/>
		<reference ref_id="CVE-2023-52451" ref_url="https://www.suse.com/security/cve/CVE-2023-52451/" source="CVE"/>
		<reference ref_id="CVE-2023-52452" ref_url="https://www.suse.com/security/cve/CVE-2023-52452/" source="CVE"/>
		<reference ref_id="CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456/" source="CVE"/>
		<reference ref_id="CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457/" source="CVE"/>
		<reference ref_id="CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463/" source="CVE"/>
		<reference ref_id="CVE-2023-52464" ref_url="https://www.suse.com/security/cve/CVE-2023-52464/" source="CVE"/>
		<reference ref_id="CVE-2023-52467" ref_url="https://www.suse.com/security/cve/CVE-2023-52467/" source="CVE"/>
		<reference ref_id="CVE-2023-52475" ref_url="https://www.suse.com/security/cve/CVE-2023-52475/" source="CVE"/>
		<reference ref_id="CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478/" source="CVE"/>
		<reference ref_id="CVE-2023-52482" ref_url="https://www.suse.com/security/cve/CVE-2023-52482/" source="CVE"/>
		<reference ref_id="CVE-2023-52484" ref_url="https://www.suse.com/security/cve/CVE-2023-52484/" source="CVE"/>
		<reference ref_id="CVE-2023-52530" ref_url="https://www.suse.com/security/cve/CVE-2023-52530/" source="CVE"/>
		<reference ref_id="CVE-2023-52531" ref_url="https://www.suse.com/security/cve/CVE-2023-52531/" source="CVE"/>
		<reference ref_id="CVE-2023-52559" ref_url="https://www.suse.com/security/cve/CVE-2023-52559/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817/" source="CVE"/>
		<reference ref_id="CVE-2024-0607" ref_url="https://www.suse.com/security/cve/CVE-2024-0607/" source="CVE"/>
		<reference ref_id="CVE-2024-1151" ref_url="https://www.suse.com/security/cve/CVE-2024-1151/" source="CVE"/>
		<reference ref_id="CVE-2024-23849" ref_url="https://www.suse.com/security/cve/CVE-2024-23849/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586/" source="CVE"/>
		<reference ref_id="CVE-2024-26589" ref_url="https://www.suse.com/security/cve/CVE-2024-26589/" source="CVE"/>
		<reference ref_id="CVE-2024-26591" ref_url="https://www.suse.com/security/cve/CVE-2024-26591/" source="CVE"/>
		<reference ref_id="CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593/" source="CVE"/>
		<reference ref_id="CVE-2024-26595" ref_url="https://www.suse.com/security/cve/CVE-2024-26595/" source="CVE"/>
		<reference ref_id="CVE-2024-26598" ref_url="https://www.suse.com/security/cve/CVE-2024-26598/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26603" ref_url="https://www.suse.com/security/cve/CVE-2024-26603/" source="CVE"/>
		<reference ref_id="CVE-2024-26607" ref_url="https://www.suse.com/security/cve/CVE-2024-26607/" source="CVE"/>
		<reference ref_id="CVE-2024-26622" ref_url="https://www.suse.com/security/cve/CVE-2024-26622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).
- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).
- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach  (bsc#1220254).
- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).
- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close  (bsc#1220187).
- CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).
- CVE-2024-0607: Fixed 64-bit load issue in  nft_byteorder_eval() (bsc#1218915).
- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).
- CVE-2023-52457: Fixed skipped resource freeing if  pm_runtime_resume_and_get() failed (bsc#1220350).
- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).
- CVE-2023-52451: Fixed access beyond end of drmem array  (bsc#1220250).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier  (bsc#1220238).
- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround  (bsc#1220251).
- CVE-2024-26598: Fixed potential UAF in LPI translation  cache (bsc#1220326).
- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).
- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).
- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
- CVE-2023-52443: Fixed crash when parsed profile name is empty  (bsc#1220240).
- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
- CVE-2024-26586: Fixed stack corruption (bsc#1220243).
- CVE-2024-26595: Fixed NULL pointer dereference in  error path (bsc#1220344).
- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)
- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump  (bsc#1220253).
- CVE-2024-1151: Fixed unlimited number of recursions from action  sets (bsc#1219835).
- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).
- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv  (bsc#1219127).
- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).
- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).

The following non-security bugs were fixed:

- bpf: Fix verification of indirect var-off stack access (git-fixes).
- bpf: Guard stack limits against 32bit overflow (git-fixes).
- KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).
- KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes).
- NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633).
- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).
- nvme: remove nvme_alloc_request and nvme_alloc_request_qid (bsc#1214064).
- nvme: start keep-alive after admin queue setup (bsc#1211515).
- x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).
- x86/bugs: Add asm helpers for executing VERW (git-fixes). 
- x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes).
- x86/entry_32: Add VERW just before userspace transition (git-fixes).
- x86/entry_64: Add VERW just before userspace transition (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-14"/>
	<updated date="2024-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211515">SUSE bug 1211515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214064">SUSE bug 1214064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218195">SUSE bug 1218195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218216">SUSE bug 1218216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218915">SUSE bug 1218915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219073">SUSE bug 1219073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219127">SUSE bug 1219127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219146">SUSE bug 1219146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219295">SUSE bug 1219295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219633">SUSE bug 1219633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219653">SUSE bug 1219653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219827">SUSE bug 1219827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219835">SUSE bug 1219835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220009">SUSE bug 1220009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220140">SUSE bug 1220140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220238">SUSE bug 1220238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220240">SUSE bug 1220240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220241">SUSE bug 1220241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220243">SUSE bug 1220243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220250">SUSE bug 1220250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220253">SUSE bug 1220253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220254">SUSE bug 1220254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220255">SUSE bug 1220255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220257">SUSE bug 1220257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220326">SUSE bug 1220326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220328">SUSE bug 1220328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220330">SUSE bug 1220330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220335">SUSE bug 1220335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220344">SUSE bug 1220344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220350">SUSE bug 1220350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220364">SUSE bug 1220364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220409">SUSE bug 1220409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220433">SUSE bug 1220433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220444">SUSE bug 1220444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220457">SUSE bug 1220457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220459">SUSE bug 1220459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220469">SUSE bug 1220469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220649">SUSE bug 1220649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220735">SUSE bug 1220735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220736">SUSE bug 1220736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220796">SUSE bug 1220796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220797">SUSE bug 1220797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220825">SUSE bug 1220825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220845">SUSE bug 1220845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220917">SUSE bug 1220917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220930">SUSE bug 1220930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220931">SUSE bug 1220931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220933">SUSE bug 1220933</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25162/">CVE-2019-25162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25162">CVE-2019-25162 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46923/">CVE-2021-46923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46923">CVE-2021-46923 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46924/">CVE-2021-46924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46924">CVE-2021-46924 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46932/">CVE-2021-46932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46932">CVE-2021-46932 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46934/">CVE-2021-46934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46934">CVE-2021-46934 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47083/">CVE-2021-47083 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47083">CVE-2021-47083 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48627/">CVE-2022-48627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48627">CVE-2022-48627 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5197/">CVE-2023-5197 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52443/">CVE-2023-52443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52443">CVE-2023-52443 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52445/">CVE-2023-52445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52449/">CVE-2023-52449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52449">CVE-2023-52449 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52451/">CVE-2023-52451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52451">CVE-2023-52451 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52452/">CVE-2023-52452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52452">CVE-2023-52452 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52464/">CVE-2023-52464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52464">CVE-2023-52464 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52467/">CVE-2023-52467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52467">CVE-2023-52467 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52475/">CVE-2023-52475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52482/">CVE-2023-52482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52482">CVE-2023-52482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52484/">CVE-2023-52484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52484">CVE-2023-52484 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52530/">CVE-2023-52530 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52531/">CVE-2023-52531 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52531">CVE-2023-52531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52559/">CVE-2023-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52559">CVE-2023-52559 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-0607/">CVE-2024-0607 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1151/">CVE-2024-1151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23849/">CVE-2024-23849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26589/">CVE-2024-26589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26589">CVE-2024-26589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26591/">CVE-2024-26591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26591">CVE-2024-26591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26595/">CVE-2024-26595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26595">CVE-2024-26595 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26598/">CVE-2024-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26598">CVE-2024-26598 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26603/">CVE-2024-26603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26607/">CVE-2024-26607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26607">CVE-2024-26607 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26622/">CVE-2024-26622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851288" comment="kernel-default-5.14.21-150400.24.111.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851097" comment="kernel-default-base-5.14.21-150400.24.111.2.150400.24.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206271" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214691" ref_url="https://bugzilla.suse.com/1214691" source="BUGZILLA"/>
		<reference ref_id="1219666" ref_url="https://bugzilla.suse.com/1219666" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48566" ref_url="https://www.suse.com/security/cve/CVE-2022-48566/" source="CVE"/>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018166.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-6597: Fixed symlink bug in cleanup of tempfile.TemporaryDirectory (bsc#1219666).
- CVE-2022-48566: Make compare_digest more constant-time (bsc#1214691).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-14"/>
	<updated date="2024-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214691">SUSE bug 1214691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48566/">CVE-2022-48566 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48566">CVE-2022-48566 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851284" comment="libpython3_6m1_0-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851285" comment="python3-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851286" comment="python3-base-3.6.15-150300.10.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206272" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1219885" ref_url="https://bugzilla.suse.com/1219885" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46841" ref_url="https://www.suse.com/security/cve/CVE-2023-46841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018203.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-46841: Fixed shadow stack vs exceptions from emulation stubs (XSA-451) (bsc#1219885).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-03-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219885">SUSE bug 1219885</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46841/">CVE-2023-46841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46841">CVE-2023-46841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851780" comment="xen-libs-4.16.5_14-150400.4.49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206273" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1144060" ref_url="https://bugzilla.suse.com/1144060" source="BUGZILLA"/>
		<reference ref_id="1176006" ref_url="https://bugzilla.suse.com/1176006" source="BUGZILLA"/>
		<reference ref_id="1188307" ref_url="https://bugzilla.suse.com/1188307" source="BUGZILLA"/>
		<reference ref_id="1203823" ref_url="https://bugzilla.suse.com/1203823" source="BUGZILLA"/>
		<reference ref_id="1205502" ref_url="https://bugzilla.suse.com/1205502" source="BUGZILLA"/>
		<reference ref_id="1206627" ref_url="https://bugzilla.suse.com/1206627" source="BUGZILLA"/>
		<reference ref_id="1210507" ref_url="https://bugzilla.suse.com/1210507" source="BUGZILLA"/>
		<reference ref_id="1213189" ref_url="https://bugzilla.suse.com/1213189" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29383" ref_url="https://www.suse.com/security/cve/CVE-2023-29383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018199.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2023-29383: Fixed apparent /etc/shadow manipulation via chfn (bsc#1210507).

The following non-security bugs were fixed:

- bsc#1176006: Fix chage date miscalculation
- bsc#1188307: Fix passwd segfault
- bsc#1203823: Remove pam_keyinit from PAM config files
- bsc#1213189: Change lock mechanism to file locking to prevent
  lock files after power interruptions
- bsc#1206627: Add --prefix support to passwd, chpasswd and chage
- bsc#1205502: useradd audit event user id field cannot be interpretedd 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-20"/>
	<updated date="2024-03-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144060">SUSE bug 1144060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176006">SUSE bug 1176006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188307">SUSE bug 1188307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203823">SUSE bug 1203823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205502">SUSE bug 1205502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206627">SUSE bug 1206627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210507">SUSE bug 1210507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213189">SUSE bug 1213189</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29383/">CVE-2023-29383 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">CVE-2023-29383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851790" comment="login_defs-4.8.1-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851791" comment="shadow-4.8.1-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206274" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1213590" ref_url="https://bugzilla.suse.com/1213590" source="BUGZILLA"/>
		<reference ref_id="1214686" ref_url="https://bugzilla.suse.com/1214686" source="BUGZILLA"/>
		<reference ref_id="1214687" ref_url="https://bugzilla.suse.com/1214687" source="BUGZILLA"/>
		<reference ref_id="1221187" ref_url="https://bugzilla.suse.com/1221187" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38288" ref_url="https://www.suse.com/security/cve/CVE-2023-38288/" source="CVE"/>
		<reference ref_id="CVE-2023-40745" ref_url="https://www.suse.com/security/cve/CVE-2023-40745/" source="CVE"/>
		<reference ref_id="CVE-2023-41175" ref_url="https://www.suse.com/security/cve/CVE-2023-41175/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018188.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-41175: Fixed potential integer overflow in raw2tiff.c (bsc#1214686).
- CVE-2023-38288: Fixed potential integer overflow in raw2tiff.c (bsc#1213590).
- CVE-2023-40745: Fixed integer overflow in tiffcp.c (bsc#1214687).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2024-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213590">SUSE bug 1213590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214686">SUSE bug 1214686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214687">SUSE bug 1214687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221187">SUSE bug 1221187</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38288/">CVE-2023-38288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38288">CVE-2023-38288 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40745/">CVE-2023-40745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40745">CVE-2023-40745 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41175/">CVE-2023-41175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41175">CVE-2023-41175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851902" comment="libtiff5-4.0.9-150000.45.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206275" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1211515" ref_url="https://bugzilla.suse.com/1211515" source="BUGZILLA"/>
		<reference ref_id="1213456" ref_url="https://bugzilla.suse.com/1213456" source="BUGZILLA"/>
		<reference ref_id="1214064" ref_url="https://bugzilla.suse.com/1214064" source="BUGZILLA"/>
		<reference ref_id="1218195" ref_url="https://bugzilla.suse.com/1218195" source="BUGZILLA"/>
		<reference ref_id="1218216" ref_url="https://bugzilla.suse.com/1218216" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1218915" ref_url="https://bugzilla.suse.com/1218915" source="BUGZILLA"/>
		<reference ref_id="1219073" ref_url="https://bugzilla.suse.com/1219073" source="BUGZILLA"/>
		<reference ref_id="1219126" ref_url="https://bugzilla.suse.com/1219126" source="BUGZILLA"/>
		<reference ref_id="1219127" ref_url="https://bugzilla.suse.com/1219127" source="BUGZILLA"/>
		<reference ref_id="1219146" ref_url="https://bugzilla.suse.com/1219146" source="BUGZILLA"/>
		<reference ref_id="1219295" ref_url="https://bugzilla.suse.com/1219295" source="BUGZILLA"/>
		<reference ref_id="1219633" ref_url="https://bugzilla.suse.com/1219633" source="BUGZILLA"/>
		<reference ref_id="1219653" ref_url="https://bugzilla.suse.com/1219653" source="BUGZILLA"/>
		<reference ref_id="1219827" ref_url="https://bugzilla.suse.com/1219827" source="BUGZILLA"/>
		<reference ref_id="1219835" ref_url="https://bugzilla.suse.com/1219835" source="BUGZILLA"/>
		<reference ref_id="1220009" ref_url="https://bugzilla.suse.com/1220009" source="BUGZILLA"/>
		<reference ref_id="1220140" ref_url="https://bugzilla.suse.com/1220140" source="BUGZILLA"/>
		<reference ref_id="1220187" ref_url="https://bugzilla.suse.com/1220187" source="BUGZILLA"/>
		<reference ref_id="1220238" ref_url="https://bugzilla.suse.com/1220238" source="BUGZILLA"/>
		<reference ref_id="1220240" ref_url="https://bugzilla.suse.com/1220240" source="BUGZILLA"/>
		<reference ref_id="1220241" ref_url="https://bugzilla.suse.com/1220241" source="BUGZILLA"/>
		<reference ref_id="1220243" ref_url="https://bugzilla.suse.com/1220243" source="BUGZILLA"/>
		<reference ref_id="1220250" ref_url="https://bugzilla.suse.com/1220250" source="BUGZILLA"/>
		<reference ref_id="1220251" ref_url="https://bugzilla.suse.com/1220251" source="BUGZILLA"/>
		<reference ref_id="1220253" ref_url="https://bugzilla.suse.com/1220253" source="BUGZILLA"/>
		<reference ref_id="1220254" ref_url="https://bugzilla.suse.com/1220254" source="BUGZILLA"/>
		<reference ref_id="1220255" ref_url="https://bugzilla.suse.com/1220255" source="BUGZILLA"/>
		<reference ref_id="1220257" ref_url="https://bugzilla.suse.com/1220257" source="BUGZILLA"/>
		<reference ref_id="1220326" ref_url="https://bugzilla.suse.com/1220326" source="BUGZILLA"/>
		<reference ref_id="1220328" ref_url="https://bugzilla.suse.com/1220328" source="BUGZILLA"/>
		<reference ref_id="1220330" ref_url="https://bugzilla.suse.com/1220330" source="BUGZILLA"/>
		<reference ref_id="1220335" ref_url="https://bugzilla.suse.com/1220335" source="BUGZILLA"/>
		<reference ref_id="1220344" ref_url="https://bugzilla.suse.com/1220344" source="BUGZILLA"/>
		<reference ref_id="1220350" ref_url="https://bugzilla.suse.com/1220350" source="BUGZILLA"/>
		<reference ref_id="1220364" ref_url="https://bugzilla.suse.com/1220364" source="BUGZILLA"/>
		<reference ref_id="1220398" ref_url="https://bugzilla.suse.com/1220398" source="BUGZILLA"/>
		<reference ref_id="1220409" ref_url="https://bugzilla.suse.com/1220409" source="BUGZILLA"/>
		<reference ref_id="1220433" ref_url="https://bugzilla.suse.com/1220433" source="BUGZILLA"/>
		<reference ref_id="1220444" ref_url="https://bugzilla.suse.com/1220444" source="BUGZILLA"/>
		<reference ref_id="1220457" ref_url="https://bugzilla.suse.com/1220457" source="BUGZILLA"/>
		<reference ref_id="1220459" ref_url="https://bugzilla.suse.com/1220459" source="BUGZILLA"/>
		<reference ref_id="1220469" ref_url="https://bugzilla.suse.com/1220469" source="BUGZILLA"/>
		<reference ref_id="1220649" ref_url="https://bugzilla.suse.com/1220649" source="BUGZILLA"/>
		<reference ref_id="1220735" ref_url="https://bugzilla.suse.com/1220735" source="BUGZILLA"/>
		<reference ref_id="1220736" ref_url="https://bugzilla.suse.com/1220736" source="BUGZILLA"/>
		<reference ref_id="1220796" ref_url="https://bugzilla.suse.com/1220796" source="BUGZILLA"/>
		<reference ref_id="1220797" ref_url="https://bugzilla.suse.com/1220797" source="BUGZILLA"/>
		<reference ref_id="1220825" ref_url="https://bugzilla.suse.com/1220825" source="BUGZILLA"/>
		<reference ref_id="1220845" ref_url="https://bugzilla.suse.com/1220845" source="BUGZILLA"/>
		<reference ref_id="1220917" ref_url="https://bugzilla.suse.com/1220917" source="BUGZILLA"/>
		<reference ref_id="1220930" ref_url="https://bugzilla.suse.com/1220930" source="BUGZILLA"/>
		<reference ref_id="1220931" ref_url="https://bugzilla.suse.com/1220931" source="BUGZILLA"/>
		<reference ref_id="1220933" ref_url="https://bugzilla.suse.com/1220933" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25162" ref_url="https://www.suse.com/security/cve/CVE-2019-25162/" source="CVE"/>
		<reference ref_id="CVE-2021-46923" ref_url="https://www.suse.com/security/cve/CVE-2021-46923/" source="CVE"/>
		<reference ref_id="CVE-2021-46924" ref_url="https://www.suse.com/security/cve/CVE-2021-46924/" source="CVE"/>
		<reference ref_id="CVE-2021-46932" ref_url="https://www.suse.com/security/cve/CVE-2021-46932/" source="CVE"/>
		<reference ref_id="CVE-2021-46934" ref_url="https://www.suse.com/security/cve/CVE-2021-46934/" source="CVE"/>
		<reference ref_id="CVE-2021-47083" ref_url="https://www.suse.com/security/cve/CVE-2021-47083/" source="CVE"/>
		<reference ref_id="CVE-2022-48627" ref_url="https://www.suse.com/security/cve/CVE-2022-48627/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-5197" ref_url="https://www.suse.com/security/cve/CVE-2023-5197/" source="CVE"/>
		<reference ref_id="CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340/" source="CVE"/>
		<reference ref_id="CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429/" source="CVE"/>
		<reference ref_id="CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439/" source="CVE"/>
		<reference ref_id="CVE-2023-52443" ref_url="https://www.suse.com/security/cve/CVE-2023-52443/" source="CVE"/>
		<reference ref_id="CVE-2023-52445" ref_url="https://www.suse.com/security/cve/CVE-2023-52445/" source="CVE"/>
		<reference ref_id="CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447/" source="CVE"/>
		<reference ref_id="CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448/" source="CVE"/>
		<reference ref_id="CVE-2023-52449" ref_url="https://www.suse.com/security/cve/CVE-2023-52449/" source="CVE"/>
		<reference ref_id="CVE-2023-52451" ref_url="https://www.suse.com/security/cve/CVE-2023-52451/" source="CVE"/>
		<reference ref_id="CVE-2023-52452" ref_url="https://www.suse.com/security/cve/CVE-2023-52452/" source="CVE"/>
		<reference ref_id="CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456/" source="CVE"/>
		<reference ref_id="CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457/" source="CVE"/>
		<reference ref_id="CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463/" source="CVE"/>
		<reference ref_id="CVE-2023-52464" ref_url="https://www.suse.com/security/cve/CVE-2023-52464/" source="CVE"/>
		<reference ref_id="CVE-2023-52467" ref_url="https://www.suse.com/security/cve/CVE-2023-52467/" source="CVE"/>
		<reference ref_id="CVE-2023-52475" ref_url="https://www.suse.com/security/cve/CVE-2023-52475/" source="CVE"/>
		<reference ref_id="CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478/" source="CVE"/>
		<reference ref_id="CVE-2023-52482" ref_url="https://www.suse.com/security/cve/CVE-2023-52482/" source="CVE"/>
		<reference ref_id="CVE-2023-52484" ref_url="https://www.suse.com/security/cve/CVE-2023-52484/" source="CVE"/>
		<reference ref_id="CVE-2023-52530" ref_url="https://www.suse.com/security/cve/CVE-2023-52530/" source="CVE"/>
		<reference ref_id="CVE-2023-52531" ref_url="https://www.suse.com/security/cve/CVE-2023-52531/" source="CVE"/>
		<reference ref_id="CVE-2023-52559" ref_url="https://www.suse.com/security/cve/CVE-2023-52559/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817/" source="CVE"/>
		<reference ref_id="CVE-2024-0607" ref_url="https://www.suse.com/security/cve/CVE-2024-0607/" source="CVE"/>
		<reference ref_id="CVE-2024-1151" ref_url="https://www.suse.com/security/cve/CVE-2024-1151/" source="CVE"/>
		<reference ref_id="CVE-2024-23849" ref_url="https://www.suse.com/security/cve/CVE-2024-23849/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586/" source="CVE"/>
		<reference ref_id="CVE-2024-26589" ref_url="https://www.suse.com/security/cve/CVE-2024-26589/" source="CVE"/>
		<reference ref_id="CVE-2024-26591" ref_url="https://www.suse.com/security/cve/CVE-2024-26591/" source="CVE"/>
		<reference ref_id="CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593/" source="CVE"/>
		<reference ref_id="CVE-2024-26595" ref_url="https://www.suse.com/security/cve/CVE-2024-26595/" source="CVE"/>
		<reference ref_id="CVE-2024-26598" ref_url="https://www.suse.com/security/cve/CVE-2024-26598/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26603" ref_url="https://www.suse.com/security/cve/CVE-2024-26603/" source="CVE"/>
		<reference ref_id="CVE-2024-26607" ref_url="https://www.suse.com/security/cve/CVE-2024-26607/" source="CVE"/>
		<reference ref_id="CVE-2024-26622" ref_url="https://www.suse.com/security/cve/CVE-2024-26622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2019-25162: Fixed a potential use after free (bsc#1220409).
- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).
- CVE-2021-46924: Fixed fix memory leak in device probe and remove (bsc#1220459)
- CVE-2021-46932: Fixed missing work initialization before device registration (bsc#1220444)
- CVE-2021-46934: Fixed a bug by validating user data in compat ioctl (bsc#1220469).
- CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek: (bsc#1220917).
- CVE-2022-48627: Fixed a memory overlapping when deleting chars in the buffer (bsc#1220845).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).
- CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).
- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).
- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
- CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).
- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround  (bsc#1220251).
- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump  (bsc#1220253).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier  (bsc#1220238).
- CVE-2023-52451: Fixed access beyond end of drmem array  (bsc#1220250).
- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).
- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).
- CVE-2023-52457: Fixed skipped resource freeing if  pm_runtime_resume_and_get() failed (bsc#1220350).
- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)
- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).
- CVE-2023-52475: Fixed use-after-free in powermate_config_complete (bsc#1220649)
- CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796)
- CVE-2023-52482: Fixed a bug by adding SRSO mitigation for Hygon processors (bsc#1220735).
- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).
- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).
- CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931).
- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
- CVE-2024-0607: Fixed 64-bit load issue in  nft_byteorder_eval() (bsc#1218915).
- CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835).
- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2024-26586: Fixed stack corruption (bsc#1220243).
- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).
- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach  (bsc#1220254).
- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
- CVE-2024-26595: Fixed NULL pointer dereference in  error path (bsc#1220344).
- CVE-2024-26598: Fixed potential UAF in LPI translation  cache (bsc#1220326).
- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).
- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).

The following non-security bugs were fixed:

- bpf: fix verification of indirect var-off stack access (git-fixes).
- bpf: guard stack limits against 32bit overflow (git-fixes).
- drop 2 git-fixes patches which are suspicious to introduce regression reported in bsc#1219073
- fix unresolved hunks in readme.branch
- kvm: vmx: move verw closer to vmentry for mds mitigation (git-fixes).
- kvm: vmx: use bt+jnc, i.e. eflags.cf to select vmresume vs. vmlaunch (git-fixes).
- nfs: avoid infinite loop in pnfs_update_layout (bsc#1219633).
- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).
- nvme: remove nvme_alloc_request and nvme_alloc_request_qid (bsc#1214064).
- nvme: start keep-alive after admin queue setup (bsc#1211515).
- readme.branch: use correct mail for roy
- rpm/kernel-binary.spec.in: install scripts/gdb when enabled in config (bsc#1219653) they are put into -devel subpackage. and a proper link to /usr/share/gdb/auto-load/ is created.
- x86/asm: add _asm_rip() macro for x86-64 (%rip) suffix (git-fixes).
- x86/bugs: add asm helpers for executing verw (git-fixes).
- x86/bugs: use alternative() instead of mds_user_clear static key (git-fixes). also add the removed mds_user_clear symbol to kabi severities as it is exposed just for kvm module and is generally a core kernel component so removing it is low risk.
- x86/entry_32: add verw just before userspace transition (git-fixes).
- x86/entry_64: Add VERW just before userspace transition (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2024-03-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211515">SUSE bug 1211515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214064">SUSE bug 1214064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218195">SUSE bug 1218195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218216">SUSE bug 1218216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218915">SUSE bug 1218915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219073">SUSE bug 1219073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219127">SUSE bug 1219127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219146">SUSE bug 1219146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219295">SUSE bug 1219295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219633">SUSE bug 1219633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219653">SUSE bug 1219653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219827">SUSE bug 1219827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219835">SUSE bug 1219835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220009">SUSE bug 1220009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220140">SUSE bug 1220140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220238">SUSE bug 1220238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220240">SUSE bug 1220240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220241">SUSE bug 1220241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220243">SUSE bug 1220243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220250">SUSE bug 1220250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220253">SUSE bug 1220253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220254">SUSE bug 1220254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220255">SUSE bug 1220255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220257">SUSE bug 1220257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220326">SUSE bug 1220326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220328">SUSE bug 1220328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220330">SUSE bug 1220330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220335">SUSE bug 1220335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220344">SUSE bug 1220344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220350">SUSE bug 1220350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220364">SUSE bug 1220364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220409">SUSE bug 1220409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220433">SUSE bug 1220433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220444">SUSE bug 1220444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220457">SUSE bug 1220457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220459">SUSE bug 1220459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220469">SUSE bug 1220469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220649">SUSE bug 1220649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220735">SUSE bug 1220735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220736">SUSE bug 1220736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220796">SUSE bug 1220796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220797">SUSE bug 1220797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220825">SUSE bug 1220825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220845">SUSE bug 1220845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220917">SUSE bug 1220917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220930">SUSE bug 1220930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220931">SUSE bug 1220931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220933">SUSE bug 1220933</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25162/">CVE-2019-25162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25162">CVE-2019-25162 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46923/">CVE-2021-46923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46923">CVE-2021-46923 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46924/">CVE-2021-46924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46924">CVE-2021-46924 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46932/">CVE-2021-46932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46932">CVE-2021-46932 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46934/">CVE-2021-46934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46934">CVE-2021-46934 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47083/">CVE-2021-47083 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47083">CVE-2021-47083 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48627/">CVE-2022-48627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48627">CVE-2022-48627 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5197/">CVE-2023-5197 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52443/">CVE-2023-52443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52443">CVE-2023-52443 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52445/">CVE-2023-52445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52449/">CVE-2023-52449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52449">CVE-2023-52449 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52451/">CVE-2023-52451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52451">CVE-2023-52451 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52452/">CVE-2023-52452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52452">CVE-2023-52452 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52464/">CVE-2023-52464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52464">CVE-2023-52464 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52467/">CVE-2023-52467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52467">CVE-2023-52467 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52475/">CVE-2023-52475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52482/">CVE-2023-52482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52482">CVE-2023-52482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52484/">CVE-2023-52484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52484">CVE-2023-52484 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52530/">CVE-2023-52530 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52531/">CVE-2023-52531 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52531">CVE-2023-52531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52559/">CVE-2023-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52559">CVE-2023-52559 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-0607/">CVE-2024-0607 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1151/">CVE-2024-1151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23849/">CVE-2024-23849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26589/">CVE-2024-26589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26589">CVE-2024-26589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26591/">CVE-2024-26591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26591">CVE-2024-26591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26595/">CVE-2024-26595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26595">CVE-2024-26595 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26598/">CVE-2024-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26598">CVE-2024-26598 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26603/">CVE-2024-26603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26607/">CVE-2024-26607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26607">CVE-2024-26607 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26622/">CVE-2024-26622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851903" comment="kernel-rt-5.14.21-150400.15.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851904" comment="kernel-source-rt-5.14.21-150400.15.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206276" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1238879" ref_url="https://bugzilla.suse.com/1238879" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-27516" ref_url="https://www.suse.com/security/cve/CVE-2025-27516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020594.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2025-27516: Fixed sandbox breakout through attr filter selecting format method (bsc#1238879)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2025-03-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1238879">SUSE bug 1238879</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-27516/">CVE-2025-27516 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27516">CVE-2025-27516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969574" comment="python3-Jinja2-2.10.1-150000.3.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206277" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1180814" ref_url="https://bugzilla.suse.com/1180814" source="BUGZILLA"/>
		<reference ref_id="1183682" ref_url="https://bugzilla.suse.com/1183682" source="BUGZILLA"/>
		<reference ref_id="1190336" ref_url="https://bugzilla.suse.com/1190336" source="BUGZILLA"/>
		<reference ref_id="1190768" ref_url="https://bugzilla.suse.com/1190768" source="BUGZILLA"/>
		<reference ref_id="1190786" ref_url="https://bugzilla.suse.com/1190786" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1194904" ref_url="https://bugzilla.suse.com/1194904" source="BUGZILLA"/>
		<reference ref_id="1195823" ref_url="https://bugzilla.suse.com/1195823" source="BUGZILLA"/>
		<reference ref_id="1196444" ref_url="https://bugzilla.suse.com/1196444" source="BUGZILLA"/>
		<reference ref_id="1197158" ref_url="https://bugzilla.suse.com/1197158" source="BUGZILLA"/>
		<reference ref_id="1197174" ref_url="https://bugzilla.suse.com/1197174" source="BUGZILLA"/>
		<reference ref_id="1197246" ref_url="https://bugzilla.suse.com/1197246" source="BUGZILLA"/>
		<reference ref_id="1197302" ref_url="https://bugzilla.suse.com/1197302" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197472" ref_url="https://bugzilla.suse.com/1197472" source="BUGZILLA"/>
		<reference ref_id="1197661" ref_url="https://bugzilla.suse.com/1197661" source="BUGZILLA"/>
		<reference ref_id="1197926" ref_url="https://bugzilla.suse.com/1197926" source="BUGZILLA"/>
		<reference ref_id="1198019" ref_url="https://bugzilla.suse.com/1198019" source="BUGZILLA"/>
		<reference ref_id="1198021" ref_url="https://bugzilla.suse.com/1198021" source="BUGZILLA"/>
		<reference ref_id="1198240" ref_url="https://bugzilla.suse.com/1198240" source="BUGZILLA"/>
		<reference ref_id="1198577" ref_url="https://bugzilla.suse.com/1198577" source="BUGZILLA"/>
		<reference ref_id="1198660" ref_url="https://bugzilla.suse.com/1198660" source="BUGZILLA"/>
		<reference ref_id="1199657" ref_url="https://bugzilla.suse.com/1199657" source="BUGZILLA"/>
		<reference ref_id="1200045" ref_url="https://bugzilla.suse.com/1200045" source="BUGZILLA"/>
		<reference ref_id="1200571" ref_url="https://bugzilla.suse.com/1200571" source="BUGZILLA"/>
		<reference ref_id="1200807" ref_url="https://bugzilla.suse.com/1200807" source="BUGZILLA"/>
		<reference ref_id="1200809" ref_url="https://bugzilla.suse.com/1200809" source="BUGZILLA"/>
		<reference ref_id="1200810" ref_url="https://bugzilla.suse.com/1200810" source="BUGZILLA"/>
		<reference ref_id="1200824" ref_url="https://bugzilla.suse.com/1200824" source="BUGZILLA"/>
		<reference ref_id="1200825" ref_url="https://bugzilla.suse.com/1200825" source="BUGZILLA"/>
		<reference ref_id="1200871" ref_url="https://bugzilla.suse.com/1200871" source="BUGZILLA"/>
		<reference ref_id="1200872" ref_url="https://bugzilla.suse.com/1200872" source="BUGZILLA"/>
		<reference ref_id="1201193" ref_url="https://bugzilla.suse.com/1201193" source="BUGZILLA"/>
		<reference ref_id="1201218" ref_url="https://bugzilla.suse.com/1201218" source="BUGZILLA"/>
		<reference ref_id="1201323" ref_url="https://bugzilla.suse.com/1201323" source="BUGZILLA"/>
		<reference ref_id="1201381" ref_url="https://bugzilla.suse.com/1201381" source="BUGZILLA"/>
		<reference ref_id="1201610" ref_url="https://bugzilla.suse.com/1201610" source="BUGZILLA"/>
		<reference ref_id="1202672" ref_url="https://bugzilla.suse.com/1202672" source="BUGZILLA"/>
		<reference ref_id="1202711" ref_url="https://bugzilla.suse.com/1202711" source="BUGZILLA"/>
		<reference ref_id="1202712" ref_url="https://bugzilla.suse.com/1202712" source="BUGZILLA"/>
		<reference ref_id="1202771" ref_url="https://bugzilla.suse.com/1202771" source="BUGZILLA"/>
		<reference ref_id="1202774" ref_url="https://bugzilla.suse.com/1202774" source="BUGZILLA"/>
		<reference ref_id="1202778" ref_url="https://bugzilla.suse.com/1202778" source="BUGZILLA"/>
		<reference ref_id="1202781" ref_url="https://bugzilla.suse.com/1202781" source="BUGZILLA"/>
		<reference ref_id="1203699" ref_url="https://bugzilla.suse.com/1203699" source="BUGZILLA"/>
		<reference ref_id="1203769" ref_url="https://bugzilla.suse.com/1203769" source="BUGZILLA"/>
		<reference ref_id="1204171" ref_url="https://bugzilla.suse.com/1204171" source="BUGZILLA"/>
		<reference ref_id="1206048" ref_url="https://bugzilla.suse.com/1206048" source="BUGZILLA"/>
		<reference ref_id="1206049" ref_url="https://bugzilla.suse.com/1206049" source="BUGZILLA"/>
		<reference ref_id="1207593" ref_url="https://bugzilla.suse.com/1207593" source="BUGZILLA"/>
		<reference ref_id="1207640" ref_url="https://bugzilla.suse.com/1207640" source="BUGZILLA"/>
		<reference ref_id="1210050" ref_url="https://bugzilla.suse.com/1210050" source="BUGZILLA"/>
		<reference ref_id="1211263" ref_url="https://bugzilla.suse.com/1211263" source="BUGZILLA"/>
		<reference ref_id="1217339" ref_url="https://bugzilla.suse.com/1217339" source="BUGZILLA"/>
		<reference ref_id="1228483" ref_url="https://bugzilla.suse.com/1228483" source="BUGZILLA"/>
		<reference ref_id="1228708" ref_url="https://bugzilla.suse.com/1228708" source="BUGZILLA"/>
		<reference ref_id="1228779" ref_url="https://bugzilla.suse.com/1228779" source="BUGZILLA"/>
		<reference ref_id="1228966" ref_url="https://bugzilla.suse.com/1228966" source="BUGZILLA"/>
		<reference ref_id="1237521" ref_url="https://bugzilla.suse.com/1237521" source="BUGZILLA"/>
		<reference ref_id="1237718" ref_url="https://bugzilla.suse.com/1237718" source="BUGZILLA"/>
		<reference ref_id="1237721" ref_url="https://bugzilla.suse.com/1237721" source="BUGZILLA"/>
		<reference ref_id="1237722" ref_url="https://bugzilla.suse.com/1237722" source="BUGZILLA"/>
		<reference ref_id="1237723" ref_url="https://bugzilla.suse.com/1237723" source="BUGZILLA"/>
		<reference ref_id="1237724" ref_url="https://bugzilla.suse.com/1237724" source="BUGZILLA"/>
		<reference ref_id="1237725" ref_url="https://bugzilla.suse.com/1237725" source="BUGZILLA"/>
		<reference ref_id="1237726" ref_url="https://bugzilla.suse.com/1237726" source="BUGZILLA"/>
		<reference ref_id="1237727" ref_url="https://bugzilla.suse.com/1237727" source="BUGZILLA"/>
		<reference ref_id="1237728" ref_url="https://bugzilla.suse.com/1237728" source="BUGZILLA"/>
		<reference ref_id="1237729" ref_url="https://bugzilla.suse.com/1237729" source="BUGZILLA"/>
		<reference ref_id="1237734" ref_url="https://bugzilla.suse.com/1237734" source="BUGZILLA"/>
		<reference ref_id="1237735" ref_url="https://bugzilla.suse.com/1237735" source="BUGZILLA"/>
		<reference ref_id="1237736" ref_url="https://bugzilla.suse.com/1237736" source="BUGZILLA"/>
		<reference ref_id="1237737" ref_url="https://bugzilla.suse.com/1237737" source="BUGZILLA"/>
		<reference ref_id="1237738" ref_url="https://bugzilla.suse.com/1237738" source="BUGZILLA"/>
		<reference ref_id="1237739" ref_url="https://bugzilla.suse.com/1237739" source="BUGZILLA"/>
		<reference ref_id="1237740" ref_url="https://bugzilla.suse.com/1237740" source="BUGZILLA"/>
		<reference ref_id="1237742" ref_url="https://bugzilla.suse.com/1237742" source="BUGZILLA"/>
		<reference ref_id="1237743" ref_url="https://bugzilla.suse.com/1237743" source="BUGZILLA"/>
		<reference ref_id="1237745" ref_url="https://bugzilla.suse.com/1237745" source="BUGZILLA"/>
		<reference ref_id="1237746" ref_url="https://bugzilla.suse.com/1237746" source="BUGZILLA"/>
		<reference ref_id="1237748" ref_url="https://bugzilla.suse.com/1237748" source="BUGZILLA"/>
		<reference ref_id="1237751" ref_url="https://bugzilla.suse.com/1237751" source="BUGZILLA"/>
		<reference ref_id="1237752" ref_url="https://bugzilla.suse.com/1237752" source="BUGZILLA"/>
		<reference ref_id="1237753" ref_url="https://bugzilla.suse.com/1237753" source="BUGZILLA"/>
		<reference ref_id="1237755" ref_url="https://bugzilla.suse.com/1237755" source="BUGZILLA"/>
		<reference ref_id="1237759" ref_url="https://bugzilla.suse.com/1237759" source="BUGZILLA"/>
		<reference ref_id="1237761" ref_url="https://bugzilla.suse.com/1237761" source="BUGZILLA"/>
		<reference ref_id="1237763" ref_url="https://bugzilla.suse.com/1237763" source="BUGZILLA"/>
		<reference ref_id="1237766" ref_url="https://bugzilla.suse.com/1237766" source="BUGZILLA"/>
		<reference ref_id="1237767" ref_url="https://bugzilla.suse.com/1237767" source="BUGZILLA"/>
		<reference ref_id="1237768" ref_url="https://bugzilla.suse.com/1237768" source="BUGZILLA"/>
		<reference ref_id="1237774" ref_url="https://bugzilla.suse.com/1237774" source="BUGZILLA"/>
		<reference ref_id="1237775" ref_url="https://bugzilla.suse.com/1237775" source="BUGZILLA"/>
		<reference ref_id="1237778" ref_url="https://bugzilla.suse.com/1237778" source="BUGZILLA"/>
		<reference ref_id="1237779" ref_url="https://bugzilla.suse.com/1237779" source="BUGZILLA"/>
		<reference ref_id="1237780" ref_url="https://bugzilla.suse.com/1237780" source="BUGZILLA"/>
		<reference ref_id="1237782" ref_url="https://bugzilla.suse.com/1237782" source="BUGZILLA"/>
		<reference ref_id="1237783" ref_url="https://bugzilla.suse.com/1237783" source="BUGZILLA"/>
		<reference ref_id="1237784" ref_url="https://bugzilla.suse.com/1237784" source="BUGZILLA"/>
		<reference ref_id="1237785" ref_url="https://bugzilla.suse.com/1237785" source="BUGZILLA"/>
		<reference ref_id="1237786" ref_url="https://bugzilla.suse.com/1237786" source="BUGZILLA"/>
		<reference ref_id="1237787" ref_url="https://bugzilla.suse.com/1237787" source="BUGZILLA"/>
		<reference ref_id="1237788" ref_url="https://bugzilla.suse.com/1237788" source="BUGZILLA"/>
		<reference ref_id="1237789" ref_url="https://bugzilla.suse.com/1237789" source="BUGZILLA"/>
		<reference ref_id="1237795" ref_url="https://bugzilla.suse.com/1237795" source="BUGZILLA"/>
		<reference ref_id="1237797" ref_url="https://bugzilla.suse.com/1237797" source="BUGZILLA"/>
		<reference ref_id="1237798" ref_url="https://bugzilla.suse.com/1237798" source="BUGZILLA"/>
		<reference ref_id="1237807" ref_url="https://bugzilla.suse.com/1237807" source="BUGZILLA"/>
		<reference ref_id="1237808" ref_url="https://bugzilla.suse.com/1237808" source="BUGZILLA"/>
		<reference ref_id="1237810" ref_url="https://bugzilla.suse.com/1237810" source="BUGZILLA"/>
		<reference ref_id="1237812" ref_url="https://bugzilla.suse.com/1237812" source="BUGZILLA"/>
		<reference ref_id="1237813" ref_url="https://bugzilla.suse.com/1237813" source="BUGZILLA"/>
		<reference ref_id="1237814" ref_url="https://bugzilla.suse.com/1237814" source="BUGZILLA"/>
		<reference ref_id="1237815" ref_url="https://bugzilla.suse.com/1237815" source="BUGZILLA"/>
		<reference ref_id="1237817" ref_url="https://bugzilla.suse.com/1237817" source="BUGZILLA"/>
		<reference ref_id="1237818" ref_url="https://bugzilla.suse.com/1237818" source="BUGZILLA"/>
		<reference ref_id="1237821" ref_url="https://bugzilla.suse.com/1237821" source="BUGZILLA"/>
		<reference ref_id="1237823" ref_url="https://bugzilla.suse.com/1237823" source="BUGZILLA"/>
		<reference ref_id="1237824" ref_url="https://bugzilla.suse.com/1237824" source="BUGZILLA"/>
		<reference ref_id="1237826" ref_url="https://bugzilla.suse.com/1237826" source="BUGZILLA"/>
		<reference ref_id="1237827" ref_url="https://bugzilla.suse.com/1237827" source="BUGZILLA"/>
		<reference ref_id="1237829" ref_url="https://bugzilla.suse.com/1237829" source="BUGZILLA"/>
		<reference ref_id="1237831" ref_url="https://bugzilla.suse.com/1237831" source="BUGZILLA"/>
		<reference ref_id="1237835" ref_url="https://bugzilla.suse.com/1237835" source="BUGZILLA"/>
		<reference ref_id="1237836" ref_url="https://bugzilla.suse.com/1237836" source="BUGZILLA"/>
		<reference ref_id="1237837" ref_url="https://bugzilla.suse.com/1237837" source="BUGZILLA"/>
		<reference ref_id="1237839" ref_url="https://bugzilla.suse.com/1237839" source="BUGZILLA"/>
		<reference ref_id="1237840" ref_url="https://bugzilla.suse.com/1237840" source="BUGZILLA"/>
		<reference ref_id="1237845" ref_url="https://bugzilla.suse.com/1237845" source="BUGZILLA"/>
		<reference ref_id="1237846" ref_url="https://bugzilla.suse.com/1237846" source="BUGZILLA"/>
		<reference ref_id="1237868" ref_url="https://bugzilla.suse.com/1237868" source="BUGZILLA"/>
		<reference ref_id="1237872" ref_url="https://bugzilla.suse.com/1237872" source="BUGZILLA"/>
		<reference ref_id="1237892" ref_url="https://bugzilla.suse.com/1237892" source="BUGZILLA"/>
		<reference ref_id="1237903" ref_url="https://bugzilla.suse.com/1237903" source="BUGZILLA"/>
		<reference ref_id="1237904" ref_url="https://bugzilla.suse.com/1237904" source="BUGZILLA"/>
		<reference ref_id="1237916" ref_url="https://bugzilla.suse.com/1237916" source="BUGZILLA"/>
		<reference ref_id="1237922" ref_url="https://bugzilla.suse.com/1237922" source="BUGZILLA"/>
		<reference ref_id="1237925" ref_url="https://bugzilla.suse.com/1237925" source="BUGZILLA"/>
		<reference ref_id="1237926" ref_url="https://bugzilla.suse.com/1237926" source="BUGZILLA"/>
		<reference ref_id="1237929" ref_url="https://bugzilla.suse.com/1237929" source="BUGZILLA"/>
		<reference ref_id="1237931" ref_url="https://bugzilla.suse.com/1237931" source="BUGZILLA"/>
		<reference ref_id="1237932" ref_url="https://bugzilla.suse.com/1237932" source="BUGZILLA"/>
		<reference ref_id="1237933" ref_url="https://bugzilla.suse.com/1237933" source="BUGZILLA"/>
		<reference ref_id="1237937" ref_url="https://bugzilla.suse.com/1237937" source="BUGZILLA"/>
		<reference ref_id="1237939" ref_url="https://bugzilla.suse.com/1237939" source="BUGZILLA"/>
		<reference ref_id="1237940" ref_url="https://bugzilla.suse.com/1237940" source="BUGZILLA"/>
		<reference ref_id="1237941" ref_url="https://bugzilla.suse.com/1237941" source="BUGZILLA"/>
		<reference ref_id="1237942" ref_url="https://bugzilla.suse.com/1237942" source="BUGZILLA"/>
		<reference ref_id="1237946" ref_url="https://bugzilla.suse.com/1237946" source="BUGZILLA"/>
		<reference ref_id="1237951" ref_url="https://bugzilla.suse.com/1237951" source="BUGZILLA"/>
		<reference ref_id="1237952" ref_url="https://bugzilla.suse.com/1237952" source="BUGZILLA"/>
		<reference ref_id="1237954" ref_url="https://bugzilla.suse.com/1237954" source="BUGZILLA"/>
		<reference ref_id="1237955" ref_url="https://bugzilla.suse.com/1237955" source="BUGZILLA"/>
		<reference ref_id="1237957" ref_url="https://bugzilla.suse.com/1237957" source="BUGZILLA"/>
		<reference ref_id="1237958" ref_url="https://bugzilla.suse.com/1237958" source="BUGZILLA"/>
		<reference ref_id="1237959" ref_url="https://bugzilla.suse.com/1237959" source="BUGZILLA"/>
		<reference ref_id="1237960" ref_url="https://bugzilla.suse.com/1237960" source="BUGZILLA"/>
		<reference ref_id="1237961" ref_url="https://bugzilla.suse.com/1237961" source="BUGZILLA"/>
		<reference ref_id="1237963" ref_url="https://bugzilla.suse.com/1237963" source="BUGZILLA"/>
		<reference ref_id="1237965" ref_url="https://bugzilla.suse.com/1237965" source="BUGZILLA"/>
		<reference ref_id="1237966" ref_url="https://bugzilla.suse.com/1237966" source="BUGZILLA"/>
		<reference ref_id="1237967" ref_url="https://bugzilla.suse.com/1237967" source="BUGZILLA"/>
		<reference ref_id="1237968" ref_url="https://bugzilla.suse.com/1237968" source="BUGZILLA"/>
		<reference ref_id="1237969" ref_url="https://bugzilla.suse.com/1237969" source="BUGZILLA"/>
		<reference ref_id="1237970" ref_url="https://bugzilla.suse.com/1237970" source="BUGZILLA"/>
		<reference ref_id="1237971" ref_url="https://bugzilla.suse.com/1237971" source="BUGZILLA"/>
		<reference ref_id="1237973" ref_url="https://bugzilla.suse.com/1237973" source="BUGZILLA"/>
		<reference ref_id="1237975" ref_url="https://bugzilla.suse.com/1237975" source="BUGZILLA"/>
		<reference ref_id="1237976" ref_url="https://bugzilla.suse.com/1237976" source="BUGZILLA"/>
		<reference ref_id="1237978" ref_url="https://bugzilla.suse.com/1237978" source="BUGZILLA"/>
		<reference ref_id="1237979" ref_url="https://bugzilla.suse.com/1237979" source="BUGZILLA"/>
		<reference ref_id="1237983" ref_url="https://bugzilla.suse.com/1237983" source="BUGZILLA"/>
		<reference ref_id="1237984" ref_url="https://bugzilla.suse.com/1237984" source="BUGZILLA"/>
		<reference ref_id="1237986" ref_url="https://bugzilla.suse.com/1237986" source="BUGZILLA"/>
		<reference ref_id="1237987" ref_url="https://bugzilla.suse.com/1237987" source="BUGZILLA"/>
		<reference ref_id="1237990" ref_url="https://bugzilla.suse.com/1237990" source="BUGZILLA"/>
		<reference ref_id="1237996" ref_url="https://bugzilla.suse.com/1237996" source="BUGZILLA"/>
		<reference ref_id="1237997" ref_url="https://bugzilla.suse.com/1237997" source="BUGZILLA"/>
		<reference ref_id="1237998" ref_url="https://bugzilla.suse.com/1237998" source="BUGZILLA"/>
		<reference ref_id="1237999" ref_url="https://bugzilla.suse.com/1237999" source="BUGZILLA"/>
		<reference ref_id="1238000" ref_url="https://bugzilla.suse.com/1238000" source="BUGZILLA"/>
		<reference ref_id="1238003" ref_url="https://bugzilla.suse.com/1238003" source="BUGZILLA"/>
		<reference ref_id="1238006" ref_url="https://bugzilla.suse.com/1238006" source="BUGZILLA"/>
		<reference ref_id="1238007" ref_url="https://bugzilla.suse.com/1238007" source="BUGZILLA"/>
		<reference ref_id="1238010" ref_url="https://bugzilla.suse.com/1238010" source="BUGZILLA"/>
		<reference ref_id="1238011" ref_url="https://bugzilla.suse.com/1238011" source="BUGZILLA"/>
		<reference ref_id="1238012" ref_url="https://bugzilla.suse.com/1238012" source="BUGZILLA"/>
		<reference ref_id="1238013" ref_url="https://bugzilla.suse.com/1238013" source="BUGZILLA"/>
		<reference ref_id="1238014" ref_url="https://bugzilla.suse.com/1238014" source="BUGZILLA"/>
		<reference ref_id="1238016" ref_url="https://bugzilla.suse.com/1238016" source="BUGZILLA"/>
		<reference ref_id="1238017" ref_url="https://bugzilla.suse.com/1238017" source="BUGZILLA"/>
		<reference ref_id="1238018" ref_url="https://bugzilla.suse.com/1238018" source="BUGZILLA"/>
		<reference ref_id="1238019" ref_url="https://bugzilla.suse.com/1238019" source="BUGZILLA"/>
		<reference ref_id="1238021" ref_url="https://bugzilla.suse.com/1238021" source="BUGZILLA"/>
		<reference ref_id="1238022" ref_url="https://bugzilla.suse.com/1238022" source="BUGZILLA"/>
		<reference ref_id="1238024" ref_url="https://bugzilla.suse.com/1238024" source="BUGZILLA"/>
		<reference ref_id="1238030" ref_url="https://bugzilla.suse.com/1238030" source="BUGZILLA"/>
		<reference ref_id="1238036" ref_url="https://bugzilla.suse.com/1238036" source="BUGZILLA"/>
		<reference ref_id="1238037" ref_url="https://bugzilla.suse.com/1238037" source="BUGZILLA"/>
		<reference ref_id="1238041" ref_url="https://bugzilla.suse.com/1238041" source="BUGZILLA"/>
		<reference ref_id="1238046" ref_url="https://bugzilla.suse.com/1238046" source="BUGZILLA"/>
		<reference ref_id="1238047" ref_url="https://bugzilla.suse.com/1238047" source="BUGZILLA"/>
		<reference ref_id="1238071" ref_url="https://bugzilla.suse.com/1238071" source="BUGZILLA"/>
		<reference ref_id="1238077" ref_url="https://bugzilla.suse.com/1238077" source="BUGZILLA"/>
		<reference ref_id="1238079" ref_url="https://bugzilla.suse.com/1238079" source="BUGZILLA"/>
		<reference ref_id="1238080" ref_url="https://bugzilla.suse.com/1238080" source="BUGZILLA"/>
		<reference ref_id="1238089" ref_url="https://bugzilla.suse.com/1238089" source="BUGZILLA"/>
		<reference ref_id="1238090" ref_url="https://bugzilla.suse.com/1238090" source="BUGZILLA"/>
		<reference ref_id="1238091" ref_url="https://bugzilla.suse.com/1238091" source="BUGZILLA"/>
		<reference ref_id="1238092" ref_url="https://bugzilla.suse.com/1238092" source="BUGZILLA"/>
		<reference ref_id="1238096" ref_url="https://bugzilla.suse.com/1238096" source="BUGZILLA"/>
		<reference ref_id="1238097" ref_url="https://bugzilla.suse.com/1238097" source="BUGZILLA"/>
		<reference ref_id="1238099" ref_url="https://bugzilla.suse.com/1238099" source="BUGZILLA"/>
		<reference ref_id="1238103" ref_url="https://bugzilla.suse.com/1238103" source="BUGZILLA"/>
		<reference ref_id="1238105" ref_url="https://bugzilla.suse.com/1238105" source="BUGZILLA"/>
		<reference ref_id="1238106" ref_url="https://bugzilla.suse.com/1238106" source="BUGZILLA"/>
		<reference ref_id="1238108" ref_url="https://bugzilla.suse.com/1238108" source="BUGZILLA"/>
		<reference ref_id="1238110" ref_url="https://bugzilla.suse.com/1238110" source="BUGZILLA"/>
		<reference ref_id="1238111" ref_url="https://bugzilla.suse.com/1238111" source="BUGZILLA"/>
		<reference ref_id="1238112" ref_url="https://bugzilla.suse.com/1238112" source="BUGZILLA"/>
		<reference ref_id="1238113" ref_url="https://bugzilla.suse.com/1238113" source="BUGZILLA"/>
		<reference ref_id="1238115" ref_url="https://bugzilla.suse.com/1238115" source="BUGZILLA"/>
		<reference ref_id="1238116" ref_url="https://bugzilla.suse.com/1238116" source="BUGZILLA"/>
		<reference ref_id="1238120" ref_url="https://bugzilla.suse.com/1238120" source="BUGZILLA"/>
		<reference ref_id="1238123" ref_url="https://bugzilla.suse.com/1238123" source="BUGZILLA"/>
		<reference ref_id="1238125" ref_url="https://bugzilla.suse.com/1238125" source="BUGZILLA"/>
		<reference ref_id="1238126" ref_url="https://bugzilla.suse.com/1238126" source="BUGZILLA"/>
		<reference ref_id="1238127" ref_url="https://bugzilla.suse.com/1238127" source="BUGZILLA"/>
		<reference ref_id="1238131" ref_url="https://bugzilla.suse.com/1238131" source="BUGZILLA"/>
		<reference ref_id="1238134" ref_url="https://bugzilla.suse.com/1238134" source="BUGZILLA"/>
		<reference ref_id="1238135" ref_url="https://bugzilla.suse.com/1238135" source="BUGZILLA"/>
		<reference ref_id="1238138" ref_url="https://bugzilla.suse.com/1238138" source="BUGZILLA"/>
		<reference ref_id="1238139" ref_url="https://bugzilla.suse.com/1238139" source="BUGZILLA"/>
		<reference ref_id="1238140" ref_url="https://bugzilla.suse.com/1238140" source="BUGZILLA"/>
		<reference ref_id="1238142" ref_url="https://bugzilla.suse.com/1238142" source="BUGZILLA"/>
		<reference ref_id="1238144" ref_url="https://bugzilla.suse.com/1238144" source="BUGZILLA"/>
		<reference ref_id="1238146" ref_url="https://bugzilla.suse.com/1238146" source="BUGZILLA"/>
		<reference ref_id="1238147" ref_url="https://bugzilla.suse.com/1238147" source="BUGZILLA"/>
		<reference ref_id="1238149" ref_url="https://bugzilla.suse.com/1238149" source="BUGZILLA"/>
		<reference ref_id="1238150" ref_url="https://bugzilla.suse.com/1238150" source="BUGZILLA"/>
		<reference ref_id="1238155" ref_url="https://bugzilla.suse.com/1238155" source="BUGZILLA"/>
		<reference ref_id="1238156" ref_url="https://bugzilla.suse.com/1238156" source="BUGZILLA"/>
		<reference ref_id="1238157" ref_url="https://bugzilla.suse.com/1238157" source="BUGZILLA"/>
		<reference ref_id="1238158" ref_url="https://bugzilla.suse.com/1238158" source="BUGZILLA"/>
		<reference ref_id="1238162" ref_url="https://bugzilla.suse.com/1238162" source="BUGZILLA"/>
		<reference ref_id="1238166" ref_url="https://bugzilla.suse.com/1238166" source="BUGZILLA"/>
		<reference ref_id="1238167" ref_url="https://bugzilla.suse.com/1238167" source="BUGZILLA"/>
		<reference ref_id="1238168" ref_url="https://bugzilla.suse.com/1238168" source="BUGZILLA"/>
		<reference ref_id="1238169" ref_url="https://bugzilla.suse.com/1238169" source="BUGZILLA"/>
		<reference ref_id="1238170" ref_url="https://bugzilla.suse.com/1238170" source="BUGZILLA"/>
		<reference ref_id="1238171" ref_url="https://bugzilla.suse.com/1238171" source="BUGZILLA"/>
		<reference ref_id="1238172" ref_url="https://bugzilla.suse.com/1238172" source="BUGZILLA"/>
		<reference ref_id="1238175" ref_url="https://bugzilla.suse.com/1238175" source="BUGZILLA"/>
		<reference ref_id="1238176" ref_url="https://bugzilla.suse.com/1238176" source="BUGZILLA"/>
		<reference ref_id="1238177" ref_url="https://bugzilla.suse.com/1238177" source="BUGZILLA"/>
		<reference ref_id="1238180" ref_url="https://bugzilla.suse.com/1238180" source="BUGZILLA"/>
		<reference ref_id="1238181" ref_url="https://bugzilla.suse.com/1238181" source="BUGZILLA"/>
		<reference ref_id="1238183" ref_url="https://bugzilla.suse.com/1238183" source="BUGZILLA"/>
		<reference ref_id="1238184" ref_url="https://bugzilla.suse.com/1238184" source="BUGZILLA"/>
		<reference ref_id="1238228" ref_url="https://bugzilla.suse.com/1238228" source="BUGZILLA"/>
		<reference ref_id="1238229" ref_url="https://bugzilla.suse.com/1238229" source="BUGZILLA"/>
		<reference ref_id="1238231" ref_url="https://bugzilla.suse.com/1238231" source="BUGZILLA"/>
		<reference ref_id="1238234" ref_url="https://bugzilla.suse.com/1238234" source="BUGZILLA"/>
		<reference ref_id="1238235" ref_url="https://bugzilla.suse.com/1238235" source="BUGZILLA"/>
		<reference ref_id="1238236" ref_url="https://bugzilla.suse.com/1238236" source="BUGZILLA"/>
		<reference ref_id="1238238" ref_url="https://bugzilla.suse.com/1238238" source="BUGZILLA"/>
		<reference ref_id="1238239" ref_url="https://bugzilla.suse.com/1238239" source="BUGZILLA"/>
		<reference ref_id="1238241" ref_url="https://bugzilla.suse.com/1238241" source="BUGZILLA"/>
		<reference ref_id="1238242" ref_url="https://bugzilla.suse.com/1238242" source="BUGZILLA"/>
		<reference ref_id="1238243" ref_url="https://bugzilla.suse.com/1238243" source="BUGZILLA"/>
		<reference ref_id="1238244" ref_url="https://bugzilla.suse.com/1238244" source="BUGZILLA"/>
		<reference ref_id="1238246" ref_url="https://bugzilla.suse.com/1238246" source="BUGZILLA"/>
		<reference ref_id="1238247" ref_url="https://bugzilla.suse.com/1238247" source="BUGZILLA"/>
		<reference ref_id="1238248" ref_url="https://bugzilla.suse.com/1238248" source="BUGZILLA"/>
		<reference ref_id="1238249" ref_url="https://bugzilla.suse.com/1238249" source="BUGZILLA"/>
		<reference ref_id="1238253" ref_url="https://bugzilla.suse.com/1238253" source="BUGZILLA"/>
		<reference ref_id="1238255" ref_url="https://bugzilla.suse.com/1238255" source="BUGZILLA"/>
		<reference ref_id="1238256" ref_url="https://bugzilla.suse.com/1238256" source="BUGZILLA"/>
		<reference ref_id="1238257" ref_url="https://bugzilla.suse.com/1238257" source="BUGZILLA"/>
		<reference ref_id="1238260" ref_url="https://bugzilla.suse.com/1238260" source="BUGZILLA"/>
		<reference ref_id="1238262" ref_url="https://bugzilla.suse.com/1238262" source="BUGZILLA"/>
		<reference ref_id="1238263" ref_url="https://bugzilla.suse.com/1238263" source="BUGZILLA"/>
		<reference ref_id="1238264" ref_url="https://bugzilla.suse.com/1238264" source="BUGZILLA"/>
		<reference ref_id="1238266" ref_url="https://bugzilla.suse.com/1238266" source="BUGZILLA"/>
		<reference ref_id="1238267" ref_url="https://bugzilla.suse.com/1238267" source="BUGZILLA"/>
		<reference ref_id="1238268" ref_url="https://bugzilla.suse.com/1238268" source="BUGZILLA"/>
		<reference ref_id="1238269" ref_url="https://bugzilla.suse.com/1238269" source="BUGZILLA"/>
		<reference ref_id="1238270" ref_url="https://bugzilla.suse.com/1238270" source="BUGZILLA"/>
		<reference ref_id="1238271" ref_url="https://bugzilla.suse.com/1238271" source="BUGZILLA"/>
		<reference ref_id="1238272" ref_url="https://bugzilla.suse.com/1238272" source="BUGZILLA"/>
		<reference ref_id="1238274" ref_url="https://bugzilla.suse.com/1238274" source="BUGZILLA"/>
		<reference ref_id="1238275" ref_url="https://bugzilla.suse.com/1238275" source="BUGZILLA"/>
		<reference ref_id="1238276" ref_url="https://bugzilla.suse.com/1238276" source="BUGZILLA"/>
		<reference ref_id="1238277" ref_url="https://bugzilla.suse.com/1238277" source="BUGZILLA"/>
		<reference ref_id="1238278" ref_url="https://bugzilla.suse.com/1238278" source="BUGZILLA"/>
		<reference ref_id="1238279" ref_url="https://bugzilla.suse.com/1238279" source="BUGZILLA"/>
		<reference ref_id="1238281" ref_url="https://bugzilla.suse.com/1238281" source="BUGZILLA"/>
		<reference ref_id="1238282" ref_url="https://bugzilla.suse.com/1238282" source="BUGZILLA"/>
		<reference ref_id="1238283" ref_url="https://bugzilla.suse.com/1238283" source="BUGZILLA"/>
		<reference ref_id="1238284" ref_url="https://bugzilla.suse.com/1238284" source="BUGZILLA"/>
		<reference ref_id="1238286" ref_url="https://bugzilla.suse.com/1238286" source="BUGZILLA"/>
		<reference ref_id="1238287" ref_url="https://bugzilla.suse.com/1238287" source="BUGZILLA"/>
		<reference ref_id="1238288" ref_url="https://bugzilla.suse.com/1238288" source="BUGZILLA"/>
		<reference ref_id="1238289" ref_url="https://bugzilla.suse.com/1238289" source="BUGZILLA"/>
		<reference ref_id="1238292" ref_url="https://bugzilla.suse.com/1238292" source="BUGZILLA"/>
		<reference ref_id="1238293" ref_url="https://bugzilla.suse.com/1238293" source="BUGZILLA"/>
		<reference ref_id="1238295" ref_url="https://bugzilla.suse.com/1238295" source="BUGZILLA"/>
		<reference ref_id="1238298" ref_url="https://bugzilla.suse.com/1238298" source="BUGZILLA"/>
		<reference ref_id="1238301" ref_url="https://bugzilla.suse.com/1238301" source="BUGZILLA"/>
		<reference ref_id="1238302" ref_url="https://bugzilla.suse.com/1238302" source="BUGZILLA"/>
		<reference ref_id="1238306" ref_url="https://bugzilla.suse.com/1238306" source="BUGZILLA"/>
		<reference ref_id="1238307" ref_url="https://bugzilla.suse.com/1238307" source="BUGZILLA"/>
		<reference ref_id="1238308" ref_url="https://bugzilla.suse.com/1238308" source="BUGZILLA"/>
		<reference ref_id="1238309" ref_url="https://bugzilla.suse.com/1238309" source="BUGZILLA"/>
		<reference ref_id="1238311" ref_url="https://bugzilla.suse.com/1238311" source="BUGZILLA"/>
		<reference ref_id="1238313" ref_url="https://bugzilla.suse.com/1238313" source="BUGZILLA"/>
		<reference ref_id="1238326" ref_url="https://bugzilla.suse.com/1238326" source="BUGZILLA"/>
		<reference ref_id="1238327" ref_url="https://bugzilla.suse.com/1238327" source="BUGZILLA"/>
		<reference ref_id="1238328" ref_url="https://bugzilla.suse.com/1238328" source="BUGZILLA"/>
		<reference ref_id="1238331" ref_url="https://bugzilla.suse.com/1238331" source="BUGZILLA"/>
		<reference ref_id="1238333" ref_url="https://bugzilla.suse.com/1238333" source="BUGZILLA"/>
		<reference ref_id="1238334" ref_url="https://bugzilla.suse.com/1238334" source="BUGZILLA"/>
		<reference ref_id="1238336" ref_url="https://bugzilla.suse.com/1238336" source="BUGZILLA"/>
		<reference ref_id="1238337" ref_url="https://bugzilla.suse.com/1238337" source="BUGZILLA"/>
		<reference ref_id="1238338" ref_url="https://bugzilla.suse.com/1238338" source="BUGZILLA"/>
		<reference ref_id="1238339" ref_url="https://bugzilla.suse.com/1238339" source="BUGZILLA"/>
		<reference ref_id="1238343" ref_url="https://bugzilla.suse.com/1238343" source="BUGZILLA"/>
		<reference ref_id="1238345" ref_url="https://bugzilla.suse.com/1238345" source="BUGZILLA"/>
		<reference ref_id="1238372" ref_url="https://bugzilla.suse.com/1238372" source="BUGZILLA"/>
		<reference ref_id="1238373" ref_url="https://bugzilla.suse.com/1238373" source="BUGZILLA"/>
		<reference ref_id="1238374" ref_url="https://bugzilla.suse.com/1238374" source="BUGZILLA"/>
		<reference ref_id="1238376" ref_url="https://bugzilla.suse.com/1238376" source="BUGZILLA"/>
		<reference ref_id="1238377" ref_url="https://bugzilla.suse.com/1238377" source="BUGZILLA"/>
		<reference ref_id="1238381" ref_url="https://bugzilla.suse.com/1238381" source="BUGZILLA"/>
		<reference ref_id="1238382" ref_url="https://bugzilla.suse.com/1238382" source="BUGZILLA"/>
		<reference ref_id="1238383" ref_url="https://bugzilla.suse.com/1238383" source="BUGZILLA"/>
		<reference ref_id="1238386" ref_url="https://bugzilla.suse.com/1238386" source="BUGZILLA"/>
		<reference ref_id="1238387" ref_url="https://bugzilla.suse.com/1238387" source="BUGZILLA"/>
		<reference ref_id="1238388" ref_url="https://bugzilla.suse.com/1238388" source="BUGZILLA"/>
		<reference ref_id="1238389" ref_url="https://bugzilla.suse.com/1238389" source="BUGZILLA"/>
		<reference ref_id="1238390" ref_url="https://bugzilla.suse.com/1238390" source="BUGZILLA"/>
		<reference ref_id="1238391" ref_url="https://bugzilla.suse.com/1238391" source="BUGZILLA"/>
		<reference ref_id="1238392" ref_url="https://bugzilla.suse.com/1238392" source="BUGZILLA"/>
		<reference ref_id="1238393" ref_url="https://bugzilla.suse.com/1238393" source="BUGZILLA"/>
		<reference ref_id="1238394" ref_url="https://bugzilla.suse.com/1238394" source="BUGZILLA"/>
		<reference ref_id="1238395" ref_url="https://bugzilla.suse.com/1238395" source="BUGZILLA"/>
		<reference ref_id="1238396" ref_url="https://bugzilla.suse.com/1238396" source="BUGZILLA"/>
		<reference ref_id="1238397" ref_url="https://bugzilla.suse.com/1238397" source="BUGZILLA"/>
		<reference ref_id="1238400" ref_url="https://bugzilla.suse.com/1238400" source="BUGZILLA"/>
		<reference ref_id="1238410" ref_url="https://bugzilla.suse.com/1238410" source="BUGZILLA"/>
		<reference ref_id="1238411" ref_url="https://bugzilla.suse.com/1238411" source="BUGZILLA"/>
		<reference ref_id="1238413" ref_url="https://bugzilla.suse.com/1238413" source="BUGZILLA"/>
		<reference ref_id="1238415" ref_url="https://bugzilla.suse.com/1238415" source="BUGZILLA"/>
		<reference ref_id="1238416" ref_url="https://bugzilla.suse.com/1238416" source="BUGZILLA"/>
		<reference ref_id="1238417" ref_url="https://bugzilla.suse.com/1238417" source="BUGZILLA"/>
		<reference ref_id="1238418" ref_url="https://bugzilla.suse.com/1238418" source="BUGZILLA"/>
		<reference ref_id="1238419" ref_url="https://bugzilla.suse.com/1238419" source="BUGZILLA"/>
		<reference ref_id="1238420" ref_url="https://bugzilla.suse.com/1238420" source="BUGZILLA"/>
		<reference ref_id="1238423" ref_url="https://bugzilla.suse.com/1238423" source="BUGZILLA"/>
		<reference ref_id="1238428" ref_url="https://bugzilla.suse.com/1238428" source="BUGZILLA"/>
		<reference ref_id="1238429" ref_url="https://bugzilla.suse.com/1238429" source="BUGZILLA"/>
		<reference ref_id="1238430" ref_url="https://bugzilla.suse.com/1238430" source="BUGZILLA"/>
		<reference ref_id="1238431" ref_url="https://bugzilla.suse.com/1238431" source="BUGZILLA"/>
		<reference ref_id="1238432" ref_url="https://bugzilla.suse.com/1238432" source="BUGZILLA"/>
		<reference ref_id="1238433" ref_url="https://bugzilla.suse.com/1238433" source="BUGZILLA"/>
		<reference ref_id="1238434" ref_url="https://bugzilla.suse.com/1238434" source="BUGZILLA"/>
		<reference ref_id="1238435" ref_url="https://bugzilla.suse.com/1238435" source="BUGZILLA"/>
		<reference ref_id="1238436" ref_url="https://bugzilla.suse.com/1238436" source="BUGZILLA"/>
		<reference ref_id="1238437" ref_url="https://bugzilla.suse.com/1238437" source="BUGZILLA"/>
		<reference ref_id="1238440" ref_url="https://bugzilla.suse.com/1238440" source="BUGZILLA"/>
		<reference ref_id="1238441" ref_url="https://bugzilla.suse.com/1238441" source="BUGZILLA"/>
		<reference ref_id="1238442" ref_url="https://bugzilla.suse.com/1238442" source="BUGZILLA"/>
		<reference ref_id="1238443" ref_url="https://bugzilla.suse.com/1238443" source="BUGZILLA"/>
		<reference ref_id="1238444" ref_url="https://bugzilla.suse.com/1238444" source="BUGZILLA"/>
		<reference ref_id="1238445" ref_url="https://bugzilla.suse.com/1238445" source="BUGZILLA"/>
		<reference ref_id="1238446" ref_url="https://bugzilla.suse.com/1238446" source="BUGZILLA"/>
		<reference ref_id="1238447" ref_url="https://bugzilla.suse.com/1238447" source="BUGZILLA"/>
		<reference ref_id="1238453" ref_url="https://bugzilla.suse.com/1238453" source="BUGZILLA"/>
		<reference ref_id="1238454" ref_url="https://bugzilla.suse.com/1238454" source="BUGZILLA"/>
		<reference ref_id="1238458" ref_url="https://bugzilla.suse.com/1238458" source="BUGZILLA"/>
		<reference ref_id="1238459" ref_url="https://bugzilla.suse.com/1238459" source="BUGZILLA"/>
		<reference ref_id="1238462" ref_url="https://bugzilla.suse.com/1238462" source="BUGZILLA"/>
		<reference ref_id="1238463" ref_url="https://bugzilla.suse.com/1238463" source="BUGZILLA"/>
		<reference ref_id="1238465" ref_url="https://bugzilla.suse.com/1238465" source="BUGZILLA"/>
		<reference ref_id="1238467" ref_url="https://bugzilla.suse.com/1238467" source="BUGZILLA"/>
		<reference ref_id="1238469" ref_url="https://bugzilla.suse.com/1238469" source="BUGZILLA"/>
		<reference ref_id="1238533" ref_url="https://bugzilla.suse.com/1238533" source="BUGZILLA"/>
		<reference ref_id="1238536" ref_url="https://bugzilla.suse.com/1238536" source="BUGZILLA"/>
		<reference ref_id="1238538" ref_url="https://bugzilla.suse.com/1238538" source="BUGZILLA"/>
		<reference ref_id="1238539" ref_url="https://bugzilla.suse.com/1238539" source="BUGZILLA"/>
		<reference ref_id="1238540" ref_url="https://bugzilla.suse.com/1238540" source="BUGZILLA"/>
		<reference ref_id="1238543" ref_url="https://bugzilla.suse.com/1238543" source="BUGZILLA"/>
		<reference ref_id="1238545" ref_url="https://bugzilla.suse.com/1238545" source="BUGZILLA"/>
		<reference ref_id="1238546" ref_url="https://bugzilla.suse.com/1238546" source="BUGZILLA"/>
		<reference ref_id="1238556" ref_url="https://bugzilla.suse.com/1238556" source="BUGZILLA"/>
		<reference ref_id="1238557" ref_url="https://bugzilla.suse.com/1238557" source="BUGZILLA"/>
		<reference ref_id="1238599" ref_url="https://bugzilla.suse.com/1238599" source="BUGZILLA"/>
		<reference ref_id="1238600" ref_url="https://bugzilla.suse.com/1238600" source="BUGZILLA"/>
		<reference ref_id="1238601" ref_url="https://bugzilla.suse.com/1238601" source="BUGZILLA"/>
		<reference ref_id="1238602" ref_url="https://bugzilla.suse.com/1238602" source="BUGZILLA"/>
		<reference ref_id="1238605" ref_url="https://bugzilla.suse.com/1238605" source="BUGZILLA"/>
		<reference ref_id="1238612" ref_url="https://bugzilla.suse.com/1238612" source="BUGZILLA"/>
		<reference ref_id="1238615" ref_url="https://bugzilla.suse.com/1238615" source="BUGZILLA"/>
		<reference ref_id="1238617" ref_url="https://bugzilla.suse.com/1238617" source="BUGZILLA"/>
		<reference ref_id="1238618" ref_url="https://bugzilla.suse.com/1238618" source="BUGZILLA"/>
		<reference ref_id="1238619" ref_url="https://bugzilla.suse.com/1238619" source="BUGZILLA"/>
		<reference ref_id="1238621" ref_url="https://bugzilla.suse.com/1238621" source="BUGZILLA"/>
		<reference ref_id="1238623" ref_url="https://bugzilla.suse.com/1238623" source="BUGZILLA"/>
		<reference ref_id="1238625" ref_url="https://bugzilla.suse.com/1238625" source="BUGZILLA"/>
		<reference ref_id="1238626" ref_url="https://bugzilla.suse.com/1238626" source="BUGZILLA"/>
		<reference ref_id="1238630" ref_url="https://bugzilla.suse.com/1238630" source="BUGZILLA"/>
		<reference ref_id="1238631" ref_url="https://bugzilla.suse.com/1238631" source="BUGZILLA"/>
		<reference ref_id="1238632" ref_url="https://bugzilla.suse.com/1238632" source="BUGZILLA"/>
		<reference ref_id="1238633" ref_url="https://bugzilla.suse.com/1238633" source="BUGZILLA"/>
		<reference ref_id="1238635" ref_url="https://bugzilla.suse.com/1238635" source="BUGZILLA"/>
		<reference ref_id="1238636" ref_url="https://bugzilla.suse.com/1238636" source="BUGZILLA"/>
		<reference ref_id="1238638" ref_url="https://bugzilla.suse.com/1238638" source="BUGZILLA"/>
		<reference ref_id="1238639" ref_url="https://bugzilla.suse.com/1238639" source="BUGZILLA"/>
		<reference ref_id="1238640" ref_url="https://bugzilla.suse.com/1238640" source="BUGZILLA"/>
		<reference ref_id="1238641" ref_url="https://bugzilla.suse.com/1238641" source="BUGZILLA"/>
		<reference ref_id="1238642" ref_url="https://bugzilla.suse.com/1238642" source="BUGZILLA"/>
		<reference ref_id="1238643" ref_url="https://bugzilla.suse.com/1238643" source="BUGZILLA"/>
		<reference ref_id="1238645" ref_url="https://bugzilla.suse.com/1238645" source="BUGZILLA"/>
		<reference ref_id="1238646" ref_url="https://bugzilla.suse.com/1238646" source="BUGZILLA"/>
		<reference ref_id="1238647" ref_url="https://bugzilla.suse.com/1238647" source="BUGZILLA"/>
		<reference ref_id="1238650" ref_url="https://bugzilla.suse.com/1238650" source="BUGZILLA"/>
		<reference ref_id="1238653" ref_url="https://bugzilla.suse.com/1238653" source="BUGZILLA"/>
		<reference ref_id="1238654" ref_url="https://bugzilla.suse.com/1238654" source="BUGZILLA"/>
		<reference ref_id="1238655" ref_url="https://bugzilla.suse.com/1238655" source="BUGZILLA"/>
		<reference ref_id="1238662" ref_url="https://bugzilla.suse.com/1238662" source="BUGZILLA"/>
		<reference ref_id="1238663" ref_url="https://bugzilla.suse.com/1238663" source="BUGZILLA"/>
		<reference ref_id="1238664" ref_url="https://bugzilla.suse.com/1238664" source="BUGZILLA"/>
		<reference ref_id="1238666" ref_url="https://bugzilla.suse.com/1238666" source="BUGZILLA"/>
		<reference ref_id="1238668" ref_url="https://bugzilla.suse.com/1238668" source="BUGZILLA"/>
		<reference ref_id="1238705" ref_url="https://bugzilla.suse.com/1238705" source="BUGZILLA"/>
		<reference ref_id="1238707" ref_url="https://bugzilla.suse.com/1238707" source="BUGZILLA"/>
		<reference ref_id="1238710" ref_url="https://bugzilla.suse.com/1238710" source="BUGZILLA"/>
		<reference ref_id="1238712" ref_url="https://bugzilla.suse.com/1238712" source="BUGZILLA"/>
		<reference ref_id="1238718" ref_url="https://bugzilla.suse.com/1238718" source="BUGZILLA"/>
		<reference ref_id="1238719" ref_url="https://bugzilla.suse.com/1238719" source="BUGZILLA"/>
		<reference ref_id="1238721" ref_url="https://bugzilla.suse.com/1238721" source="BUGZILLA"/>
		<reference ref_id="1238722" ref_url="https://bugzilla.suse.com/1238722" source="BUGZILLA"/>
		<reference ref_id="1238727" ref_url="https://bugzilla.suse.com/1238727" source="BUGZILLA"/>
		<reference ref_id="1238729" ref_url="https://bugzilla.suse.com/1238729" source="BUGZILLA"/>
		<reference ref_id="1238750" ref_url="https://bugzilla.suse.com/1238750" source="BUGZILLA"/>
		<reference ref_id="1238787" ref_url="https://bugzilla.suse.com/1238787" source="BUGZILLA"/>
		<reference ref_id="1238789" ref_url="https://bugzilla.suse.com/1238789" source="BUGZILLA"/>
		<reference ref_id="1238792" ref_url="https://bugzilla.suse.com/1238792" source="BUGZILLA"/>
		<reference ref_id="1238799" ref_url="https://bugzilla.suse.com/1238799" source="BUGZILLA"/>
		<reference ref_id="1238804" ref_url="https://bugzilla.suse.com/1238804" source="BUGZILLA"/>
		<reference ref_id="1238805" ref_url="https://bugzilla.suse.com/1238805" source="BUGZILLA"/>
		<reference ref_id="1238808" ref_url="https://bugzilla.suse.com/1238808" source="BUGZILLA"/>
		<reference ref_id="1238809" ref_url="https://bugzilla.suse.com/1238809" source="BUGZILLA"/>
		<reference ref_id="1238811" ref_url="https://bugzilla.suse.com/1238811" source="BUGZILLA"/>
		<reference ref_id="1238814" ref_url="https://bugzilla.suse.com/1238814" source="BUGZILLA"/>
		<reference ref_id="1238815" ref_url="https://bugzilla.suse.com/1238815" source="BUGZILLA"/>
		<reference ref_id="1238816" ref_url="https://bugzilla.suse.com/1238816" source="BUGZILLA"/>
		<reference ref_id="1238817" ref_url="https://bugzilla.suse.com/1238817" source="BUGZILLA"/>
		<reference ref_id="1238818" ref_url="https://bugzilla.suse.com/1238818" source="BUGZILLA"/>
		<reference ref_id="1238819" ref_url="https://bugzilla.suse.com/1238819" source="BUGZILLA"/>
		<reference ref_id="1238821" ref_url="https://bugzilla.suse.com/1238821" source="BUGZILLA"/>
		<reference ref_id="1238823" ref_url="https://bugzilla.suse.com/1238823" source="BUGZILLA"/>
		<reference ref_id="1238825" ref_url="https://bugzilla.suse.com/1238825" source="BUGZILLA"/>
		<reference ref_id="1238830" ref_url="https://bugzilla.suse.com/1238830" source="BUGZILLA"/>
		<reference ref_id="1238834" ref_url="https://bugzilla.suse.com/1238834" source="BUGZILLA"/>
		<reference ref_id="1238835" ref_url="https://bugzilla.suse.com/1238835" source="BUGZILLA"/>
		<reference ref_id="1238836" ref_url="https://bugzilla.suse.com/1238836" source="BUGZILLA"/>
		<reference ref_id="1238838" ref_url="https://bugzilla.suse.com/1238838" source="BUGZILLA"/>
		<reference ref_id="1238867" ref_url="https://bugzilla.suse.com/1238867" source="BUGZILLA"/>
		<reference ref_id="1238868" ref_url="https://bugzilla.suse.com/1238868" source="BUGZILLA"/>
		<reference ref_id="1238869" ref_url="https://bugzilla.suse.com/1238869" source="BUGZILLA"/>
		<reference ref_id="1238870" ref_url="https://bugzilla.suse.com/1238870" source="BUGZILLA"/>
		<reference ref_id="1238871" ref_url="https://bugzilla.suse.com/1238871" source="BUGZILLA"/>
		<reference ref_id="1238878" ref_url="https://bugzilla.suse.com/1238878" source="BUGZILLA"/>
		<reference ref_id="1238889" ref_url="https://bugzilla.suse.com/1238889" source="BUGZILLA"/>
		<reference ref_id="1238892" ref_url="https://bugzilla.suse.com/1238892" source="BUGZILLA"/>
		<reference ref_id="1238893" ref_url="https://bugzilla.suse.com/1238893" source="BUGZILLA"/>
		<reference ref_id="1238897" ref_url="https://bugzilla.suse.com/1238897" source="BUGZILLA"/>
		<reference ref_id="1238898" ref_url="https://bugzilla.suse.com/1238898" source="BUGZILLA"/>
		<reference ref_id="1238899" ref_url="https://bugzilla.suse.com/1238899" source="BUGZILLA"/>
		<reference ref_id="1238902" ref_url="https://bugzilla.suse.com/1238902" source="BUGZILLA"/>
		<reference ref_id="1238916" ref_url="https://bugzilla.suse.com/1238916" source="BUGZILLA"/>
		<reference ref_id="1238925" ref_url="https://bugzilla.suse.com/1238925" source="BUGZILLA"/>
		<reference ref_id="1238930" ref_url="https://bugzilla.suse.com/1238930" source="BUGZILLA"/>
		<reference ref_id="1238933" ref_url="https://bugzilla.suse.com/1238933" source="BUGZILLA"/>
		<reference ref_id="1238936" ref_url="https://bugzilla.suse.com/1238936" source="BUGZILLA"/>
		<reference ref_id="1238937" ref_url="https://bugzilla.suse.com/1238937" source="BUGZILLA"/>
		<reference ref_id="1238938" ref_url="https://bugzilla.suse.com/1238938" source="BUGZILLA"/>
		<reference ref_id="1238939" ref_url="https://bugzilla.suse.com/1238939" source="BUGZILLA"/>
		<reference ref_id="1238943" ref_url="https://bugzilla.suse.com/1238943" source="BUGZILLA"/>
		<reference ref_id="1238945" ref_url="https://bugzilla.suse.com/1238945" source="BUGZILLA"/>
		<reference ref_id="1238948" ref_url="https://bugzilla.suse.com/1238948" source="BUGZILLA"/>
		<reference ref_id="1238949" ref_url="https://bugzilla.suse.com/1238949" source="BUGZILLA"/>
		<reference ref_id="1238950" ref_url="https://bugzilla.suse.com/1238950" source="BUGZILLA"/>
		<reference ref_id="1238951" ref_url="https://bugzilla.suse.com/1238951" source="BUGZILLA"/>
		<reference ref_id="1238952" ref_url="https://bugzilla.suse.com/1238952" source="BUGZILLA"/>
		<reference ref_id="1238954" ref_url="https://bugzilla.suse.com/1238954" source="BUGZILLA"/>
		<reference ref_id="1238956" ref_url="https://bugzilla.suse.com/1238956" source="BUGZILLA"/>
		<reference ref_id="1238957" ref_url="https://bugzilla.suse.com/1238957" source="BUGZILLA"/>
		<reference ref_id="1239001" ref_url="https://bugzilla.suse.com/1239001" source="BUGZILLA"/>
		<reference ref_id="1239004" ref_url="https://bugzilla.suse.com/1239004" source="BUGZILLA"/>
		<reference ref_id="1239035" ref_url="https://bugzilla.suse.com/1239035" source="BUGZILLA"/>
		<reference ref_id="1239040" ref_url="https://bugzilla.suse.com/1239040" source="BUGZILLA"/>
		<reference ref_id="1239041" ref_url="https://bugzilla.suse.com/1239041" source="BUGZILLA"/>
		<reference ref_id="1239051" ref_url="https://bugzilla.suse.com/1239051" source="BUGZILLA"/>
		<reference ref_id="1239060" ref_url="https://bugzilla.suse.com/1239060" source="BUGZILLA"/>
		<reference ref_id="1239070" ref_url="https://bugzilla.suse.com/1239070" source="BUGZILLA"/>
		<reference ref_id="1239071" ref_url="https://bugzilla.suse.com/1239071" source="BUGZILLA"/>
		<reference ref_id="1239073" ref_url="https://bugzilla.suse.com/1239073" source="BUGZILLA"/>
		<reference ref_id="1239076" ref_url="https://bugzilla.suse.com/1239076" source="BUGZILLA"/>
		<reference ref_id="1239109" ref_url="https://bugzilla.suse.com/1239109" source="BUGZILLA"/>
		<reference ref_id="1239115" ref_url="https://bugzilla.suse.com/1239115" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4453" ref_url="https://www.suse.com/security/cve/CVE-2021-4453/" source="CVE"/>
		<reference ref_id="CVE-2021-47631" ref_url="https://www.suse.com/security/cve/CVE-2021-47631/" source="CVE"/>
		<reference ref_id="CVE-2021-47632" ref_url="https://www.suse.com/security/cve/CVE-2021-47632/" source="CVE"/>
		<reference ref_id="CVE-2021-47633" ref_url="https://www.suse.com/security/cve/CVE-2021-47633/" source="CVE"/>
		<reference ref_id="CVE-2021-47635" ref_url="https://www.suse.com/security/cve/CVE-2021-47635/" source="CVE"/>
		<reference ref_id="CVE-2021-47636" ref_url="https://www.suse.com/security/cve/CVE-2021-47636/" source="CVE"/>
		<reference ref_id="CVE-2021-47637" ref_url="https://www.suse.com/security/cve/CVE-2021-47637/" source="CVE"/>
		<reference ref_id="CVE-2021-47638" ref_url="https://www.suse.com/security/cve/CVE-2021-47638/" source="CVE"/>
		<reference ref_id="CVE-2021-47639" ref_url="https://www.suse.com/security/cve/CVE-2021-47639/" source="CVE"/>
		<reference ref_id="CVE-2021-47641" ref_url="https://www.suse.com/security/cve/CVE-2021-47641/" source="CVE"/>
		<reference ref_id="CVE-2021-47642" ref_url="https://www.suse.com/security/cve/CVE-2021-47642/" source="CVE"/>
		<reference ref_id="CVE-2021-47643" ref_url="https://www.suse.com/security/cve/CVE-2021-47643/" source="CVE"/>
		<reference ref_id="CVE-2021-47644" ref_url="https://www.suse.com/security/cve/CVE-2021-47644/" source="CVE"/>
		<reference ref_id="CVE-2021-47645" ref_url="https://www.suse.com/security/cve/CVE-2021-47645/" source="CVE"/>
		<reference ref_id="CVE-2021-47646" ref_url="https://www.suse.com/security/cve/CVE-2021-47646/" source="CVE"/>
		<reference ref_id="CVE-2021-47647" ref_url="https://www.suse.com/security/cve/CVE-2021-47647/" source="CVE"/>
		<reference ref_id="CVE-2021-47648" ref_url="https://www.suse.com/security/cve/CVE-2021-47648/" source="CVE"/>
		<reference ref_id="CVE-2021-47649" ref_url="https://www.suse.com/security/cve/CVE-2021-47649/" source="CVE"/>
		<reference ref_id="CVE-2021-47650" ref_url="https://www.suse.com/security/cve/CVE-2021-47650/" source="CVE"/>
		<reference ref_id="CVE-2021-47651" ref_url="https://www.suse.com/security/cve/CVE-2021-47651/" source="CVE"/>
		<reference ref_id="CVE-2021-47652" ref_url="https://www.suse.com/security/cve/CVE-2021-47652/" source="CVE"/>
		<reference ref_id="CVE-2021-47653" ref_url="https://www.suse.com/security/cve/CVE-2021-47653/" source="CVE"/>
		<reference ref_id="CVE-2021-47654" ref_url="https://www.suse.com/security/cve/CVE-2021-47654/" source="CVE"/>
		<reference ref_id="CVE-2021-47656" ref_url="https://www.suse.com/security/cve/CVE-2021-47656/" source="CVE"/>
		<reference ref_id="CVE-2021-47657" ref_url="https://www.suse.com/security/cve/CVE-2021-47657/" source="CVE"/>
		<reference ref_id="CVE-2021-47659" ref_url="https://www.suse.com/security/cve/CVE-2021-47659/" source="CVE"/>
		<reference ref_id="CVE-2022-0168" ref_url="https://www.suse.com/security/cve/CVE-2022-0168/" source="CVE"/>
		<reference ref_id="CVE-2022-0995" ref_url="https://www.suse.com/security/cve/CVE-2022-0995/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-2977" ref_url="https://www.suse.com/security/cve/CVE-2022-2977/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303/" source="CVE"/>
		<reference ref_id="CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435/" source="CVE"/>
		<reference ref_id="CVE-2022-49044" ref_url="https://www.suse.com/security/cve/CVE-2022-49044/" source="CVE"/>
		<reference ref_id="CVE-2022-49050" ref_url="https://www.suse.com/security/cve/CVE-2022-49050/" source="CVE"/>
		<reference ref_id="CVE-2022-49051" ref_url="https://www.suse.com/security/cve/CVE-2022-49051/" source="CVE"/>
		<reference ref_id="CVE-2022-49054" ref_url="https://www.suse.com/security/cve/CVE-2022-49054/" source="CVE"/>
		<reference ref_id="CVE-2022-49055" ref_url="https://www.suse.com/security/cve/CVE-2022-49055/" source="CVE"/>
		<reference ref_id="CVE-2022-49058" ref_url="https://www.suse.com/security/cve/CVE-2022-49058/" source="CVE"/>
		<reference ref_id="CVE-2022-49059" ref_url="https://www.suse.com/security/cve/CVE-2022-49059/" source="CVE"/>
		<reference ref_id="CVE-2022-49060" ref_url="https://www.suse.com/security/cve/CVE-2022-49060/" source="CVE"/>
		<reference ref_id="CVE-2022-49061" ref_url="https://www.suse.com/security/cve/CVE-2022-49061/" source="CVE"/>
		<reference ref_id="CVE-2022-49063" ref_url="https://www.suse.com/security/cve/CVE-2022-49063/" source="CVE"/>
		<reference ref_id="CVE-2022-49065" ref_url="https://www.suse.com/security/cve/CVE-2022-49065/" source="CVE"/>
		<reference ref_id="CVE-2022-49066" ref_url="https://www.suse.com/security/cve/CVE-2022-49066/" source="CVE"/>
		<reference ref_id="CVE-2022-49073" ref_url="https://www.suse.com/security/cve/CVE-2022-49073/" source="CVE"/>
		<reference ref_id="CVE-2022-49074" ref_url="https://www.suse.com/security/cve/CVE-2022-49074/" source="CVE"/>
		<reference ref_id="CVE-2022-49076" ref_url="https://www.suse.com/security/cve/CVE-2022-49076/" source="CVE"/>
		<reference ref_id="CVE-2022-49078" ref_url="https://www.suse.com/security/cve/CVE-2022-49078/" source="CVE"/>
		<reference ref_id="CVE-2022-49082" ref_url="https://www.suse.com/security/cve/CVE-2022-49082/" source="CVE"/>
		<reference ref_id="CVE-2022-49083" ref_url="https://www.suse.com/security/cve/CVE-2022-49083/" source="CVE"/>
		<reference ref_id="CVE-2022-49084" ref_url="https://www.suse.com/security/cve/CVE-2022-49084/" source="CVE"/>
		<reference ref_id="CVE-2022-49085" ref_url="https://www.suse.com/security/cve/CVE-2022-49085/" source="CVE"/>
		<reference ref_id="CVE-2022-49086" ref_url="https://www.suse.com/security/cve/CVE-2022-49086/" source="CVE"/>
		<reference ref_id="CVE-2022-49088" ref_url="https://www.suse.com/security/cve/CVE-2022-49088/" source="CVE"/>
		<reference ref_id="CVE-2022-49089" ref_url="https://www.suse.com/security/cve/CVE-2022-49089/" source="CVE"/>
		<reference ref_id="CVE-2022-49090" ref_url="https://www.suse.com/security/cve/CVE-2022-49090/" source="CVE"/>
		<reference ref_id="CVE-2022-49091" ref_url="https://www.suse.com/security/cve/CVE-2022-49091/" source="CVE"/>
		<reference ref_id="CVE-2022-49092" ref_url="https://www.suse.com/security/cve/CVE-2022-49092/" source="CVE"/>
		<reference ref_id="CVE-2022-49093" ref_url="https://www.suse.com/security/cve/CVE-2022-49093/" source="CVE"/>
		<reference ref_id="CVE-2022-49095" ref_url="https://www.suse.com/security/cve/CVE-2022-49095/" source="CVE"/>
		<reference ref_id="CVE-2022-49096" ref_url="https://www.suse.com/security/cve/CVE-2022-49096/" source="CVE"/>
		<reference ref_id="CVE-2022-49097" ref_url="https://www.suse.com/security/cve/CVE-2022-49097/" source="CVE"/>
		<reference ref_id="CVE-2022-49098" ref_url="https://www.suse.com/security/cve/CVE-2022-49098/" source="CVE"/>
		<reference ref_id="CVE-2022-49099" ref_url="https://www.suse.com/security/cve/CVE-2022-49099/" source="CVE"/>
		<reference ref_id="CVE-2022-49100" ref_url="https://www.suse.com/security/cve/CVE-2022-49100/" source="CVE"/>
		<reference ref_id="CVE-2022-49102" ref_url="https://www.suse.com/security/cve/CVE-2022-49102/" source="CVE"/>
		<reference ref_id="CVE-2022-49103" ref_url="https://www.suse.com/security/cve/CVE-2022-49103/" source="CVE"/>
		<reference ref_id="CVE-2022-49104" ref_url="https://www.suse.com/security/cve/CVE-2022-49104/" source="CVE"/>
		<reference ref_id="CVE-2022-49105" ref_url="https://www.suse.com/security/cve/CVE-2022-49105/" source="CVE"/>
		<reference ref_id="CVE-2022-49106" ref_url="https://www.suse.com/security/cve/CVE-2022-49106/" source="CVE"/>
		<reference ref_id="CVE-2022-49107" ref_url="https://www.suse.com/security/cve/CVE-2022-49107/" source="CVE"/>
		<reference ref_id="CVE-2022-49109" ref_url="https://www.suse.com/security/cve/CVE-2022-49109/" source="CVE"/>
		<reference ref_id="CVE-2022-49111" ref_url="https://www.suse.com/security/cve/CVE-2022-49111/" source="CVE"/>
		<reference ref_id="CVE-2022-49112" ref_url="https://www.suse.com/security/cve/CVE-2022-49112/" source="CVE"/>
		<reference ref_id="CVE-2022-49113" ref_url="https://www.suse.com/security/cve/CVE-2022-49113/" source="CVE"/>
		<reference ref_id="CVE-2022-49114" ref_url="https://www.suse.com/security/cve/CVE-2022-49114/" source="CVE"/>
		<reference ref_id="CVE-2022-49115" ref_url="https://www.suse.com/security/cve/CVE-2022-49115/" source="CVE"/>
		<reference ref_id="CVE-2022-49116" ref_url="https://www.suse.com/security/cve/CVE-2022-49116/" source="CVE"/>
		<reference ref_id="CVE-2022-49118" ref_url="https://www.suse.com/security/cve/CVE-2022-49118/" source="CVE"/>
		<reference ref_id="CVE-2022-49119" ref_url="https://www.suse.com/security/cve/CVE-2022-49119/" source="CVE"/>
		<reference ref_id="CVE-2022-49120" ref_url="https://www.suse.com/security/cve/CVE-2022-49120/" source="CVE"/>
		<reference ref_id="CVE-2022-49121" ref_url="https://www.suse.com/security/cve/CVE-2022-49121/" source="CVE"/>
		<reference ref_id="CVE-2022-49122" ref_url="https://www.suse.com/security/cve/CVE-2022-49122/" source="CVE"/>
		<reference ref_id="CVE-2022-49126" ref_url="https://www.suse.com/security/cve/CVE-2022-49126/" source="CVE"/>
		<reference ref_id="CVE-2022-49128" ref_url="https://www.suse.com/security/cve/CVE-2022-49128/" source="CVE"/>
		<reference ref_id="CVE-2022-49129" ref_url="https://www.suse.com/security/cve/CVE-2022-49129/" source="CVE"/>
		<reference ref_id="CVE-2022-49130" ref_url="https://www.suse.com/security/cve/CVE-2022-49130/" source="CVE"/>
		<reference ref_id="CVE-2022-49131" ref_url="https://www.suse.com/security/cve/CVE-2022-49131/" source="CVE"/>
		<reference ref_id="CVE-2022-49132" ref_url="https://www.suse.com/security/cve/CVE-2022-49132/" source="CVE"/>
		<reference ref_id="CVE-2022-49135" ref_url="https://www.suse.com/security/cve/CVE-2022-49135/" source="CVE"/>
		<reference ref_id="CVE-2022-49137" ref_url="https://www.suse.com/security/cve/CVE-2022-49137/" source="CVE"/>
		<reference ref_id="CVE-2022-49145" ref_url="https://www.suse.com/security/cve/CVE-2022-49145/" source="CVE"/>
		<reference ref_id="CVE-2022-49147" ref_url="https://www.suse.com/security/cve/CVE-2022-49147/" source="CVE"/>
		<reference ref_id="CVE-2022-49148" ref_url="https://www.suse.com/security/cve/CVE-2022-49148/" source="CVE"/>
		<reference ref_id="CVE-2022-49151" ref_url="https://www.suse.com/security/cve/CVE-2022-49151/" source="CVE"/>
		<reference ref_id="CVE-2022-49153" ref_url="https://www.suse.com/security/cve/CVE-2022-49153/" source="CVE"/>
		<reference ref_id="CVE-2022-49154" ref_url="https://www.suse.com/security/cve/CVE-2022-49154/" source="CVE"/>
		<reference ref_id="CVE-2022-49155" ref_url="https://www.suse.com/security/cve/CVE-2022-49155/" source="CVE"/>
		<reference ref_id="CVE-2022-49156" ref_url="https://www.suse.com/security/cve/CVE-2022-49156/" source="CVE"/>
		<reference ref_id="CVE-2022-49157" ref_url="https://www.suse.com/security/cve/CVE-2022-49157/" source="CVE"/>
		<reference ref_id="CVE-2022-49158" ref_url="https://www.suse.com/security/cve/CVE-2022-49158/" source="CVE"/>
		<reference ref_id="CVE-2022-49159" ref_url="https://www.suse.com/security/cve/CVE-2022-49159/" source="CVE"/>
		<reference ref_id="CVE-2022-49160" ref_url="https://www.suse.com/security/cve/CVE-2022-49160/" source="CVE"/>
		<reference ref_id="CVE-2022-49162" ref_url="https://www.suse.com/security/cve/CVE-2022-49162/" source="CVE"/>
		<reference ref_id="CVE-2022-49163" ref_url="https://www.suse.com/security/cve/CVE-2022-49163/" source="CVE"/>
		<reference ref_id="CVE-2022-49164" ref_url="https://www.suse.com/security/cve/CVE-2022-49164/" source="CVE"/>
		<reference ref_id="CVE-2022-49165" ref_url="https://www.suse.com/security/cve/CVE-2022-49165/" source="CVE"/>
		<reference ref_id="CVE-2022-49174" ref_url="https://www.suse.com/security/cve/CVE-2022-49174/" source="CVE"/>
		<reference ref_id="CVE-2022-49175" ref_url="https://www.suse.com/security/cve/CVE-2022-49175/" source="CVE"/>
		<reference ref_id="CVE-2022-49176" ref_url="https://www.suse.com/security/cve/CVE-2022-49176/" source="CVE"/>
		<reference ref_id="CVE-2022-49177" ref_url="https://www.suse.com/security/cve/CVE-2022-49177/" source="CVE"/>
		<reference ref_id="CVE-2022-49179" ref_url="https://www.suse.com/security/cve/CVE-2022-49179/" source="CVE"/>
		<reference ref_id="CVE-2022-49180" ref_url="https://www.suse.com/security/cve/CVE-2022-49180/" source="CVE"/>
		<reference ref_id="CVE-2022-49182" ref_url="https://www.suse.com/security/cve/CVE-2022-49182/" source="CVE"/>
		<reference ref_id="CVE-2022-49185" ref_url="https://www.suse.com/security/cve/CVE-2022-49185/" source="CVE"/>
		<reference ref_id="CVE-2022-49187" ref_url="https://www.suse.com/security/cve/CVE-2022-49187/" source="CVE"/>
		<reference ref_id="CVE-2022-49188" ref_url="https://www.suse.com/security/cve/CVE-2022-49188/" source="CVE"/>
		<reference ref_id="CVE-2022-49189" ref_url="https://www.suse.com/security/cve/CVE-2022-49189/" source="CVE"/>
		<reference ref_id="CVE-2022-49193" ref_url="https://www.suse.com/security/cve/CVE-2022-49193/" source="CVE"/>
		<reference ref_id="CVE-2022-49194" ref_url="https://www.suse.com/security/cve/CVE-2022-49194/" source="CVE"/>
		<reference ref_id="CVE-2022-49196" ref_url="https://www.suse.com/security/cve/CVE-2022-49196/" source="CVE"/>
		<reference ref_id="CVE-2022-49199" ref_url="https://www.suse.com/security/cve/CVE-2022-49199/" source="CVE"/>
		<reference ref_id="CVE-2022-49200" ref_url="https://www.suse.com/security/cve/CVE-2022-49200/" source="CVE"/>
		<reference ref_id="CVE-2022-49201" ref_url="https://www.suse.com/security/cve/CVE-2022-49201/" source="CVE"/>
		<reference ref_id="CVE-2022-49206" ref_url="https://www.suse.com/security/cve/CVE-2022-49206/" source="CVE"/>
		<reference ref_id="CVE-2022-49208" ref_url="https://www.suse.com/security/cve/CVE-2022-49208/" source="CVE"/>
		<reference ref_id="CVE-2022-49212" ref_url="https://www.suse.com/security/cve/CVE-2022-49212/" source="CVE"/>
		<reference ref_id="CVE-2022-49213" ref_url="https://www.suse.com/security/cve/CVE-2022-49213/" source="CVE"/>
		<reference ref_id="CVE-2022-49214" ref_url="https://www.suse.com/security/cve/CVE-2022-49214/" source="CVE"/>
		<reference ref_id="CVE-2022-49216" ref_url="https://www.suse.com/security/cve/CVE-2022-49216/" source="CVE"/>
		<reference ref_id="CVE-2022-49217" ref_url="https://www.suse.com/security/cve/CVE-2022-49217/" source="CVE"/>
		<reference ref_id="CVE-2022-49218" ref_url="https://www.suse.com/security/cve/CVE-2022-49218/" source="CVE"/>
		<reference ref_id="CVE-2022-49221" ref_url="https://www.suse.com/security/cve/CVE-2022-49221/" source="CVE"/>
		<reference ref_id="CVE-2022-49222" ref_url="https://www.suse.com/security/cve/CVE-2022-49222/" source="CVE"/>
		<reference ref_id="CVE-2022-49224" ref_url="https://www.suse.com/security/cve/CVE-2022-49224/" source="CVE"/>
		<reference ref_id="CVE-2022-49226" ref_url="https://www.suse.com/security/cve/CVE-2022-49226/" source="CVE"/>
		<reference ref_id="CVE-2022-49227" ref_url="https://www.suse.com/security/cve/CVE-2022-49227/" source="CVE"/>
		<reference ref_id="CVE-2022-49232" ref_url="https://www.suse.com/security/cve/CVE-2022-49232/" source="CVE"/>
		<reference ref_id="CVE-2022-49235" ref_url="https://www.suse.com/security/cve/CVE-2022-49235/" source="CVE"/>
		<reference ref_id="CVE-2022-49236" ref_url="https://www.suse.com/security/cve/CVE-2022-49236/" source="CVE"/>
		<reference ref_id="CVE-2022-49239" ref_url="https://www.suse.com/security/cve/CVE-2022-49239/" source="CVE"/>
		<reference ref_id="CVE-2022-49241" ref_url="https://www.suse.com/security/cve/CVE-2022-49241/" source="CVE"/>
		<reference ref_id="CVE-2022-49242" ref_url="https://www.suse.com/security/cve/CVE-2022-49242/" source="CVE"/>
		<reference ref_id="CVE-2022-49243" ref_url="https://www.suse.com/security/cve/CVE-2022-49243/" source="CVE"/>
		<reference ref_id="CVE-2022-49244" ref_url="https://www.suse.com/security/cve/CVE-2022-49244/" source="CVE"/>
		<reference ref_id="CVE-2022-49246" ref_url="https://www.suse.com/security/cve/CVE-2022-49246/" source="CVE"/>
		<reference ref_id="CVE-2022-49247" ref_url="https://www.suse.com/security/cve/CVE-2022-49247/" source="CVE"/>
		<reference ref_id="CVE-2022-49248" ref_url="https://www.suse.com/security/cve/CVE-2022-49248/" source="CVE"/>
		<reference ref_id="CVE-2022-49249" ref_url="https://www.suse.com/security/cve/CVE-2022-49249/" source="CVE"/>
		<reference ref_id="CVE-2022-49250" ref_url="https://www.suse.com/security/cve/CVE-2022-49250/" source="CVE"/>
		<reference ref_id="CVE-2022-49251" ref_url="https://www.suse.com/security/cve/CVE-2022-49251/" source="CVE"/>
		<reference ref_id="CVE-2022-49252" ref_url="https://www.suse.com/security/cve/CVE-2022-49252/" source="CVE"/>
		<reference ref_id="CVE-2022-49253" ref_url="https://www.suse.com/security/cve/CVE-2022-49253/" source="CVE"/>
		<reference ref_id="CVE-2022-49254" ref_url="https://www.suse.com/security/cve/CVE-2022-49254/" source="CVE"/>
		<reference ref_id="CVE-2022-49256" ref_url="https://www.suse.com/security/cve/CVE-2022-49256/" source="CVE"/>
		<reference ref_id="CVE-2022-49257" ref_url="https://www.suse.com/security/cve/CVE-2022-49257/" source="CVE"/>
		<reference ref_id="CVE-2022-49258" ref_url="https://www.suse.com/security/cve/CVE-2022-49258/" source="CVE"/>
		<reference ref_id="CVE-2022-49259" ref_url="https://www.suse.com/security/cve/CVE-2022-49259/" source="CVE"/>
		<reference ref_id="CVE-2022-49260" ref_url="https://www.suse.com/security/cve/CVE-2022-49260/" source="CVE"/>
		<reference ref_id="CVE-2022-49261" ref_url="https://www.suse.com/security/cve/CVE-2022-49261/" source="CVE"/>
		<reference ref_id="CVE-2022-49262" ref_url="https://www.suse.com/security/cve/CVE-2022-49262/" source="CVE"/>
		<reference ref_id="CVE-2022-49263" ref_url="https://www.suse.com/security/cve/CVE-2022-49263/" source="CVE"/>
		<reference ref_id="CVE-2022-49264" ref_url="https://www.suse.com/security/cve/CVE-2022-49264/" source="CVE"/>
		<reference ref_id="CVE-2022-49265" ref_url="https://www.suse.com/security/cve/CVE-2022-49265/" source="CVE"/>
		<reference ref_id="CVE-2022-49266" ref_url="https://www.suse.com/security/cve/CVE-2022-49266/" source="CVE"/>
		<reference ref_id="CVE-2022-49268" ref_url="https://www.suse.com/security/cve/CVE-2022-49268/" source="CVE"/>
		<reference ref_id="CVE-2022-49269" ref_url="https://www.suse.com/security/cve/CVE-2022-49269/" source="CVE"/>
		<reference ref_id="CVE-2022-49270" ref_url="https://www.suse.com/security/cve/CVE-2022-49270/" source="CVE"/>
		<reference ref_id="CVE-2022-49271" ref_url="https://www.suse.com/security/cve/CVE-2022-49271/" source="CVE"/>
		<reference ref_id="CVE-2022-49272" ref_url="https://www.suse.com/security/cve/CVE-2022-49272/" source="CVE"/>
		<reference ref_id="CVE-2022-49273" ref_url="https://www.suse.com/security/cve/CVE-2022-49273/" source="CVE"/>
		<reference ref_id="CVE-2022-49274" ref_url="https://www.suse.com/security/cve/CVE-2022-49274/" source="CVE"/>
		<reference ref_id="CVE-2022-49275" ref_url="https://www.suse.com/security/cve/CVE-2022-49275/" source="CVE"/>
		<reference ref_id="CVE-2022-49276" ref_url="https://www.suse.com/security/cve/CVE-2022-49276/" source="CVE"/>
		<reference ref_id="CVE-2022-49277" ref_url="https://www.suse.com/security/cve/CVE-2022-49277/" source="CVE"/>
		<reference ref_id="CVE-2022-49278" ref_url="https://www.suse.com/security/cve/CVE-2022-49278/" source="CVE"/>
		<reference ref_id="CVE-2022-49279" ref_url="https://www.suse.com/security/cve/CVE-2022-49279/" source="CVE"/>
		<reference ref_id="CVE-2022-49280" ref_url="https://www.suse.com/security/cve/CVE-2022-49280/" source="CVE"/>
		<reference ref_id="CVE-2022-49281" ref_url="https://www.suse.com/security/cve/CVE-2022-49281/" source="CVE"/>
		<reference ref_id="CVE-2022-49283" ref_url="https://www.suse.com/security/cve/CVE-2022-49283/" source="CVE"/>
		<reference ref_id="CVE-2022-49285" ref_url="https://www.suse.com/security/cve/CVE-2022-49285/" source="CVE"/>
		<reference ref_id="CVE-2022-49286" ref_url="https://www.suse.com/security/cve/CVE-2022-49286/" source="CVE"/>
		<reference ref_id="CVE-2022-49287" ref_url="https://www.suse.com/security/cve/CVE-2022-49287/" source="CVE"/>
		<reference ref_id="CVE-2022-49288" ref_url="https://www.suse.com/security/cve/CVE-2022-49288/" source="CVE"/>
		<reference ref_id="CVE-2022-49290" ref_url="https://www.suse.com/security/cve/CVE-2022-49290/" source="CVE"/>
		<reference ref_id="CVE-2022-49291" ref_url="https://www.suse.com/security/cve/CVE-2022-49291/" source="CVE"/>
		<reference ref_id="CVE-2022-49292" ref_url="https://www.suse.com/security/cve/CVE-2022-49292/" source="CVE"/>
		<reference ref_id="CVE-2022-49294" ref_url="https://www.suse.com/security/cve/CVE-2022-49294/" source="CVE"/>
		<reference ref_id="CVE-2022-49295" ref_url="https://www.suse.com/security/cve/CVE-2022-49295/" source="CVE"/>
		<reference ref_id="CVE-2022-49297" ref_url="https://www.suse.com/security/cve/CVE-2022-49297/" source="CVE"/>
		<reference ref_id="CVE-2022-49298" ref_url="https://www.suse.com/security/cve/CVE-2022-49298/" source="CVE"/>
		<reference ref_id="CVE-2022-49299" ref_url="https://www.suse.com/security/cve/CVE-2022-49299/" source="CVE"/>
		<reference ref_id="CVE-2022-49300" ref_url="https://www.suse.com/security/cve/CVE-2022-49300/" source="CVE"/>
		<reference ref_id="CVE-2022-49301" ref_url="https://www.suse.com/security/cve/CVE-2022-49301/" source="CVE"/>
		<reference ref_id="CVE-2022-49302" ref_url="https://www.suse.com/security/cve/CVE-2022-49302/" source="CVE"/>
		<reference ref_id="CVE-2022-49304" ref_url="https://www.suse.com/security/cve/CVE-2022-49304/" source="CVE"/>
		<reference ref_id="CVE-2022-49305" ref_url="https://www.suse.com/security/cve/CVE-2022-49305/" source="CVE"/>
		<reference ref_id="CVE-2022-49307" ref_url="https://www.suse.com/security/cve/CVE-2022-49307/" source="CVE"/>
		<reference ref_id="CVE-2022-49308" ref_url="https://www.suse.com/security/cve/CVE-2022-49308/" source="CVE"/>
		<reference ref_id="CVE-2022-49309" ref_url="https://www.suse.com/security/cve/CVE-2022-49309/" source="CVE"/>
		<reference ref_id="CVE-2022-49310" ref_url="https://www.suse.com/security/cve/CVE-2022-49310/" source="CVE"/>
		<reference ref_id="CVE-2022-49311" ref_url="https://www.suse.com/security/cve/CVE-2022-49311/" source="CVE"/>
		<reference ref_id="CVE-2022-49312" ref_url="https://www.suse.com/security/cve/CVE-2022-49312/" source="CVE"/>
		<reference ref_id="CVE-2022-49313" ref_url="https://www.suse.com/security/cve/CVE-2022-49313/" source="CVE"/>
		<reference ref_id="CVE-2022-49314" ref_url="https://www.suse.com/security/cve/CVE-2022-49314/" source="CVE"/>
		<reference ref_id="CVE-2022-49315" ref_url="https://www.suse.com/security/cve/CVE-2022-49315/" source="CVE"/>
		<reference ref_id="CVE-2022-49316" ref_url="https://www.suse.com/security/cve/CVE-2022-49316/" source="CVE"/>
		<reference ref_id="CVE-2022-49319" ref_url="https://www.suse.com/security/cve/CVE-2022-49319/" source="CVE"/>
		<reference ref_id="CVE-2022-49320" ref_url="https://www.suse.com/security/cve/CVE-2022-49320/" source="CVE"/>
		<reference ref_id="CVE-2022-49321" ref_url="https://www.suse.com/security/cve/CVE-2022-49321/" source="CVE"/>
		<reference ref_id="CVE-2022-49322" ref_url="https://www.suse.com/security/cve/CVE-2022-49322/" source="CVE"/>
		<reference ref_id="CVE-2022-49323" ref_url="https://www.suse.com/security/cve/CVE-2022-49323/" source="CVE"/>
		<reference ref_id="CVE-2022-49326" ref_url="https://www.suse.com/security/cve/CVE-2022-49326/" source="CVE"/>
		<reference ref_id="CVE-2022-49327" ref_url="https://www.suse.com/security/cve/CVE-2022-49327/" source="CVE"/>
		<reference ref_id="CVE-2022-49328" ref_url="https://www.suse.com/security/cve/CVE-2022-49328/" source="CVE"/>
		<reference ref_id="CVE-2022-49331" ref_url="https://www.suse.com/security/cve/CVE-2022-49331/" source="CVE"/>
		<reference ref_id="CVE-2022-49332" ref_url="https://www.suse.com/security/cve/CVE-2022-49332/" source="CVE"/>
		<reference ref_id="CVE-2022-49335" ref_url="https://www.suse.com/security/cve/CVE-2022-49335/" source="CVE"/>
		<reference ref_id="CVE-2022-49336" ref_url="https://www.suse.com/security/cve/CVE-2022-49336/" source="CVE"/>
		<reference ref_id="CVE-2022-49337" ref_url="https://www.suse.com/security/cve/CVE-2022-49337/" source="CVE"/>
		<reference ref_id="CVE-2022-49339" ref_url="https://www.suse.com/security/cve/CVE-2022-49339/" source="CVE"/>
		<reference ref_id="CVE-2022-49341" ref_url="https://www.suse.com/security/cve/CVE-2022-49341/" source="CVE"/>
		<reference ref_id="CVE-2022-49342" ref_url="https://www.suse.com/security/cve/CVE-2022-49342/" source="CVE"/>
		<reference ref_id="CVE-2022-49343" ref_url="https://www.suse.com/security/cve/CVE-2022-49343/" source="CVE"/>
		<reference ref_id="CVE-2022-49345" ref_url="https://www.suse.com/security/cve/CVE-2022-49345/" source="CVE"/>
		<reference ref_id="CVE-2022-49346" ref_url="https://www.suse.com/security/cve/CVE-2022-49346/" source="CVE"/>
		<reference ref_id="CVE-2022-49347" ref_url="https://www.suse.com/security/cve/CVE-2022-49347/" source="CVE"/>
		<reference ref_id="CVE-2022-49348" ref_url="https://www.suse.com/security/cve/CVE-2022-49348/" source="CVE"/>
		<reference ref_id="CVE-2022-49349" ref_url="https://www.suse.com/security/cve/CVE-2022-49349/" source="CVE"/>
		<reference ref_id="CVE-2022-49350" ref_url="https://www.suse.com/security/cve/CVE-2022-49350/" source="CVE"/>
		<reference ref_id="CVE-2022-49351" ref_url="https://www.suse.com/security/cve/CVE-2022-49351/" source="CVE"/>
		<reference ref_id="CVE-2022-49352" ref_url="https://www.suse.com/security/cve/CVE-2022-49352/" source="CVE"/>
		<reference ref_id="CVE-2022-49354" ref_url="https://www.suse.com/security/cve/CVE-2022-49354/" source="CVE"/>
		<reference ref_id="CVE-2022-49356" ref_url="https://www.suse.com/security/cve/CVE-2022-49356/" source="CVE"/>
		<reference ref_id="CVE-2022-49357" ref_url="https://www.suse.com/security/cve/CVE-2022-49357/" source="CVE"/>
		<reference ref_id="CVE-2022-49367" ref_url="https://www.suse.com/security/cve/CVE-2022-49367/" source="CVE"/>
		<reference ref_id="CVE-2022-49368" ref_url="https://www.suse.com/security/cve/CVE-2022-49368/" source="CVE"/>
		<reference ref_id="CVE-2022-49370" ref_url="https://www.suse.com/security/cve/CVE-2022-49370/" source="CVE"/>
		<reference ref_id="CVE-2022-49371" ref_url="https://www.suse.com/security/cve/CVE-2022-49371/" source="CVE"/>
		<reference ref_id="CVE-2022-49373" ref_url="https://www.suse.com/security/cve/CVE-2022-49373/" source="CVE"/>
		<reference ref_id="CVE-2022-49375" ref_url="https://www.suse.com/security/cve/CVE-2022-49375/" source="CVE"/>
		<reference ref_id="CVE-2022-49376" ref_url="https://www.suse.com/security/cve/CVE-2022-49376/" source="CVE"/>
		<reference ref_id="CVE-2022-49377" ref_url="https://www.suse.com/security/cve/CVE-2022-49377/" source="CVE"/>
		<reference ref_id="CVE-2022-49378" ref_url="https://www.suse.com/security/cve/CVE-2022-49378/" source="CVE"/>
		<reference ref_id="CVE-2022-49379" ref_url="https://www.suse.com/security/cve/CVE-2022-49379/" source="CVE"/>
		<reference ref_id="CVE-2022-49381" ref_url="https://www.suse.com/security/cve/CVE-2022-49381/" source="CVE"/>
		<reference ref_id="CVE-2022-49382" ref_url="https://www.suse.com/security/cve/CVE-2022-49382/" source="CVE"/>
		<reference ref_id="CVE-2022-49384" ref_url="https://www.suse.com/security/cve/CVE-2022-49384/" source="CVE"/>
		<reference ref_id="CVE-2022-49385" ref_url="https://www.suse.com/security/cve/CVE-2022-49385/" source="CVE"/>
		<reference ref_id="CVE-2022-49386" ref_url="https://www.suse.com/security/cve/CVE-2022-49386/" source="CVE"/>
		<reference ref_id="CVE-2022-49389" ref_url="https://www.suse.com/security/cve/CVE-2022-49389/" source="CVE"/>
		<reference ref_id="CVE-2022-49392" ref_url="https://www.suse.com/security/cve/CVE-2022-49392/" source="CVE"/>
		<reference ref_id="CVE-2022-49394" ref_url="https://www.suse.com/security/cve/CVE-2022-49394/" source="CVE"/>
		<reference ref_id="CVE-2022-49396" ref_url="https://www.suse.com/security/cve/CVE-2022-49396/" source="CVE"/>
		<reference ref_id="CVE-2022-49397" ref_url="https://www.suse.com/security/cve/CVE-2022-49397/" source="CVE"/>
		<reference ref_id="CVE-2022-49398" ref_url="https://www.suse.com/security/cve/CVE-2022-49398/" source="CVE"/>
		<reference ref_id="CVE-2022-49399" ref_url="https://www.suse.com/security/cve/CVE-2022-49399/" source="CVE"/>
		<reference ref_id="CVE-2022-49400" ref_url="https://www.suse.com/security/cve/CVE-2022-49400/" source="CVE"/>
		<reference ref_id="CVE-2022-49402" ref_url="https://www.suse.com/security/cve/CVE-2022-49402/" source="CVE"/>
		<reference ref_id="CVE-2022-49404" ref_url="https://www.suse.com/security/cve/CVE-2022-49404/" source="CVE"/>
		<reference ref_id="CVE-2022-49407" ref_url="https://www.suse.com/security/cve/CVE-2022-49407/" source="CVE"/>
		<reference ref_id="CVE-2022-49409" ref_url="https://www.suse.com/security/cve/CVE-2022-49409/" source="CVE"/>
		<reference ref_id="CVE-2022-49410" ref_url="https://www.suse.com/security/cve/CVE-2022-49410/" source="CVE"/>
		<reference ref_id="CVE-2022-49411" ref_url="https://www.suse.com/security/cve/CVE-2022-49411/" source="CVE"/>
		<reference ref_id="CVE-2022-49412" ref_url="https://www.suse.com/security/cve/CVE-2022-49412/" source="CVE"/>
		<reference ref_id="CVE-2022-49413" ref_url="https://www.suse.com/security/cve/CVE-2022-49413/" source="CVE"/>
		<reference ref_id="CVE-2022-49414" ref_url="https://www.suse.com/security/cve/CVE-2022-49414/" source="CVE"/>
		<reference ref_id="CVE-2022-49416" ref_url="https://www.suse.com/security/cve/CVE-2022-49416/" source="CVE"/>
		<reference ref_id="CVE-2022-49418" ref_url="https://www.suse.com/security/cve/CVE-2022-49418/" source="CVE"/>
		<reference ref_id="CVE-2022-49421" ref_url="https://www.suse.com/security/cve/CVE-2022-49421/" source="CVE"/>
		<reference ref_id="CVE-2022-49422" ref_url="https://www.suse.com/security/cve/CVE-2022-49422/" source="CVE"/>
		<reference ref_id="CVE-2022-49424" ref_url="https://www.suse.com/security/cve/CVE-2022-49424/" source="CVE"/>
		<reference ref_id="CVE-2022-49426" ref_url="https://www.suse.com/security/cve/CVE-2022-49426/" source="CVE"/>
		<reference ref_id="CVE-2022-49427" ref_url="https://www.suse.com/security/cve/CVE-2022-49427/" source="CVE"/>
		<reference ref_id="CVE-2022-49429" ref_url="https://www.suse.com/security/cve/CVE-2022-49429/" source="CVE"/>
		<reference ref_id="CVE-2022-49430" ref_url="https://www.suse.com/security/cve/CVE-2022-49430/" source="CVE"/>
		<reference ref_id="CVE-2022-49431" ref_url="https://www.suse.com/security/cve/CVE-2022-49431/" source="CVE"/>
		<reference ref_id="CVE-2022-49432" ref_url="https://www.suse.com/security/cve/CVE-2022-49432/" source="CVE"/>
		<reference ref_id="CVE-2022-49433" ref_url="https://www.suse.com/security/cve/CVE-2022-49433/" source="CVE"/>
		<reference ref_id="CVE-2022-49434" ref_url="https://www.suse.com/security/cve/CVE-2022-49434/" source="CVE"/>
		<reference ref_id="CVE-2022-49435" ref_url="https://www.suse.com/security/cve/CVE-2022-49435/" source="CVE"/>
		<reference ref_id="CVE-2022-49437" ref_url="https://www.suse.com/security/cve/CVE-2022-49437/" source="CVE"/>
		<reference ref_id="CVE-2022-49438" ref_url="https://www.suse.com/security/cve/CVE-2022-49438/" source="CVE"/>
		<reference ref_id="CVE-2022-49440" ref_url="https://www.suse.com/security/cve/CVE-2022-49440/" source="CVE"/>
		<reference ref_id="CVE-2022-49441" ref_url="https://www.suse.com/security/cve/CVE-2022-49441/" source="CVE"/>
		<reference ref_id="CVE-2022-49442" ref_url="https://www.suse.com/security/cve/CVE-2022-49442/" source="CVE"/>
		<reference ref_id="CVE-2022-49443" ref_url="https://www.suse.com/security/cve/CVE-2022-49443/" source="CVE"/>
		<reference ref_id="CVE-2022-49444" ref_url="https://www.suse.com/security/cve/CVE-2022-49444/" source="CVE"/>
		<reference ref_id="CVE-2022-49445" ref_url="https://www.suse.com/security/cve/CVE-2022-49445/" source="CVE"/>
		<reference ref_id="CVE-2022-49447" ref_url="https://www.suse.com/security/cve/CVE-2022-49447/" source="CVE"/>
		<reference ref_id="CVE-2022-49448" ref_url="https://www.suse.com/security/cve/CVE-2022-49448/" source="CVE"/>
		<reference ref_id="CVE-2022-49449" ref_url="https://www.suse.com/security/cve/CVE-2022-49449/" source="CVE"/>
		<reference ref_id="CVE-2022-49451" ref_url="https://www.suse.com/security/cve/CVE-2022-49451/" source="CVE"/>
		<reference ref_id="CVE-2022-49453" ref_url="https://www.suse.com/security/cve/CVE-2022-49453/" source="CVE"/>
		<reference ref_id="CVE-2022-49455" ref_url="https://www.suse.com/security/cve/CVE-2022-49455/" source="CVE"/>
		<reference ref_id="CVE-2022-49459" ref_url="https://www.suse.com/security/cve/CVE-2022-49459/" source="CVE"/>
		<reference ref_id="CVE-2022-49460" ref_url="https://www.suse.com/security/cve/CVE-2022-49460/" source="CVE"/>
		<reference ref_id="CVE-2022-49462" ref_url="https://www.suse.com/security/cve/CVE-2022-49462/" source="CVE"/>
		<reference ref_id="CVE-2022-49463" ref_url="https://www.suse.com/security/cve/CVE-2022-49463/" source="CVE"/>
		<reference ref_id="CVE-2022-49466" ref_url="https://www.suse.com/security/cve/CVE-2022-49466/" source="CVE"/>
		<reference ref_id="CVE-2022-49467" ref_url="https://www.suse.com/security/cve/CVE-2022-49467/" source="CVE"/>
		<reference ref_id="CVE-2022-49468" ref_url="https://www.suse.com/security/cve/CVE-2022-49468/" source="CVE"/>
		<reference ref_id="CVE-2022-49472" ref_url="https://www.suse.com/security/cve/CVE-2022-49472/" source="CVE"/>
		<reference ref_id="CVE-2022-49473" ref_url="https://www.suse.com/security/cve/CVE-2022-49473/" source="CVE"/>
		<reference ref_id="CVE-2022-49474" ref_url="https://www.suse.com/security/cve/CVE-2022-49474/" source="CVE"/>
		<reference ref_id="CVE-2022-49475" ref_url="https://www.suse.com/security/cve/CVE-2022-49475/" source="CVE"/>
		<reference ref_id="CVE-2022-49477" ref_url="https://www.suse.com/security/cve/CVE-2022-49477/" source="CVE"/>
		<reference ref_id="CVE-2022-49478" ref_url="https://www.suse.com/security/cve/CVE-2022-49478/" source="CVE"/>
		<reference ref_id="CVE-2022-49480" ref_url="https://www.suse.com/security/cve/CVE-2022-49480/" source="CVE"/>
		<reference ref_id="CVE-2022-49481" ref_url="https://www.suse.com/security/cve/CVE-2022-49481/" source="CVE"/>
		<reference ref_id="CVE-2022-49482" ref_url="https://www.suse.com/security/cve/CVE-2022-49482/" source="CVE"/>
		<reference ref_id="CVE-2022-49486" ref_url="https://www.suse.com/security/cve/CVE-2022-49486/" source="CVE"/>
		<reference ref_id="CVE-2022-49487" ref_url="https://www.suse.com/security/cve/CVE-2022-49487/" source="CVE"/>
		<reference ref_id="CVE-2022-49488" ref_url="https://www.suse.com/security/cve/CVE-2022-49488/" source="CVE"/>
		<reference ref_id="CVE-2022-49489" ref_url="https://www.suse.com/security/cve/CVE-2022-49489/" source="CVE"/>
		<reference ref_id="CVE-2022-49490" ref_url="https://www.suse.com/security/cve/CVE-2022-49490/" source="CVE"/>
		<reference ref_id="CVE-2022-49491" ref_url="https://www.suse.com/security/cve/CVE-2022-49491/" source="CVE"/>
		<reference ref_id="CVE-2022-49492" ref_url="https://www.suse.com/security/cve/CVE-2022-49492/" source="CVE"/>
		<reference ref_id="CVE-2022-49493" ref_url="https://www.suse.com/security/cve/CVE-2022-49493/" source="CVE"/>
		<reference ref_id="CVE-2022-49494" ref_url="https://www.suse.com/security/cve/CVE-2022-49494/" source="CVE"/>
		<reference ref_id="CVE-2022-49495" ref_url="https://www.suse.com/security/cve/CVE-2022-49495/" source="CVE"/>
		<reference ref_id="CVE-2022-49498" ref_url="https://www.suse.com/security/cve/CVE-2022-49498/" source="CVE"/>
		<reference ref_id="CVE-2022-49501" ref_url="https://www.suse.com/security/cve/CVE-2022-49501/" source="CVE"/>
		<reference ref_id="CVE-2022-49502" ref_url="https://www.suse.com/security/cve/CVE-2022-49502/" source="CVE"/>
		<reference ref_id="CVE-2022-49503" ref_url="https://www.suse.com/security/cve/CVE-2022-49503/" source="CVE"/>
		<reference ref_id="CVE-2022-49504" ref_url="https://www.suse.com/security/cve/CVE-2022-49504/" source="CVE"/>
		<reference ref_id="CVE-2022-49505" ref_url="https://www.suse.com/security/cve/CVE-2022-49505/" source="CVE"/>
		<reference ref_id="CVE-2022-49506" ref_url="https://www.suse.com/security/cve/CVE-2022-49506/" source="CVE"/>
		<reference ref_id="CVE-2022-49507" ref_url="https://www.suse.com/security/cve/CVE-2022-49507/" source="CVE"/>
		<reference ref_id="CVE-2022-49508" ref_url="https://www.suse.com/security/cve/CVE-2022-49508/" source="CVE"/>
		<reference ref_id="CVE-2022-49509" ref_url="https://www.suse.com/security/cve/CVE-2022-49509/" source="CVE"/>
		<reference ref_id="CVE-2022-49512" ref_url="https://www.suse.com/security/cve/CVE-2022-49512/" source="CVE"/>
		<reference ref_id="CVE-2022-49514" ref_url="https://www.suse.com/security/cve/CVE-2022-49514/" source="CVE"/>
		<reference ref_id="CVE-2022-49515" ref_url="https://www.suse.com/security/cve/CVE-2022-49515/" source="CVE"/>
		<reference ref_id="CVE-2022-49517" ref_url="https://www.suse.com/security/cve/CVE-2022-49517/" source="CVE"/>
		<reference ref_id="CVE-2022-49519" ref_url="https://www.suse.com/security/cve/CVE-2022-49519/" source="CVE"/>
		<reference ref_id="CVE-2022-49520" ref_url="https://www.suse.com/security/cve/CVE-2022-49520/" source="CVE"/>
		<reference ref_id="CVE-2022-49521" ref_url="https://www.suse.com/security/cve/CVE-2022-49521/" source="CVE"/>
		<reference ref_id="CVE-2022-49522" ref_url="https://www.suse.com/security/cve/CVE-2022-49522/" source="CVE"/>
		<reference ref_id="CVE-2022-49523" ref_url="https://www.suse.com/security/cve/CVE-2022-49523/" source="CVE"/>
		<reference ref_id="CVE-2022-49524" ref_url="https://www.suse.com/security/cve/CVE-2022-49524/" source="CVE"/>
		<reference ref_id="CVE-2022-49525" ref_url="https://www.suse.com/security/cve/CVE-2022-49525/" source="CVE"/>
		<reference ref_id="CVE-2022-49526" ref_url="https://www.suse.com/security/cve/CVE-2022-49526/" source="CVE"/>
		<reference ref_id="CVE-2022-49527" ref_url="https://www.suse.com/security/cve/CVE-2022-49527/" source="CVE"/>
		<reference ref_id="CVE-2022-49532" ref_url="https://www.suse.com/security/cve/CVE-2022-49532/" source="CVE"/>
		<reference ref_id="CVE-2022-49534" ref_url="https://www.suse.com/security/cve/CVE-2022-49534/" source="CVE"/>
		<reference ref_id="CVE-2022-49535" ref_url="https://www.suse.com/security/cve/CVE-2022-49535/" source="CVE"/>
		<reference ref_id="CVE-2022-49536" ref_url="https://www.suse.com/security/cve/CVE-2022-49536/" source="CVE"/>
		<reference ref_id="CVE-2022-49537" ref_url="https://www.suse.com/security/cve/CVE-2022-49537/" source="CVE"/>
		<reference ref_id="CVE-2022-49541" ref_url="https://www.suse.com/security/cve/CVE-2022-49541/" source="CVE"/>
		<reference ref_id="CVE-2022-49542" ref_url="https://www.suse.com/security/cve/CVE-2022-49542/" source="CVE"/>
		<reference ref_id="CVE-2022-49544" ref_url="https://www.suse.com/security/cve/CVE-2022-49544/" source="CVE"/>
		<reference ref_id="CVE-2022-49545" ref_url="https://www.suse.com/security/cve/CVE-2022-49545/" source="CVE"/>
		<reference ref_id="CVE-2022-49546" ref_url="https://www.suse.com/security/cve/CVE-2022-49546/" source="CVE"/>
		<reference ref_id="CVE-2022-49549" ref_url="https://www.suse.com/security/cve/CVE-2022-49549/" source="CVE"/>
		<reference ref_id="CVE-2022-49551" ref_url="https://www.suse.com/security/cve/CVE-2022-49551/" source="CVE"/>
		<reference ref_id="CVE-2022-49555" ref_url="https://www.suse.com/security/cve/CVE-2022-49555/" source="CVE"/>
		<reference ref_id="CVE-2022-49556" ref_url="https://www.suse.com/security/cve/CVE-2022-49556/" source="CVE"/>
		<reference ref_id="CVE-2022-49559" ref_url="https://www.suse.com/security/cve/CVE-2022-49559/" source="CVE"/>
		<reference ref_id="CVE-2022-49562" ref_url="https://www.suse.com/security/cve/CVE-2022-49562/" source="CVE"/>
		<reference ref_id="CVE-2022-49563" ref_url="https://www.suse.com/security/cve/CVE-2022-49563/" source="CVE"/>
		<reference ref_id="CVE-2022-49564" ref_url="https://www.suse.com/security/cve/CVE-2022-49564/" source="CVE"/>
		<reference ref_id="CVE-2022-49566" ref_url="https://www.suse.com/security/cve/CVE-2022-49566/" source="CVE"/>
		<reference ref_id="CVE-2022-49568" ref_url="https://www.suse.com/security/cve/CVE-2022-49568/" source="CVE"/>
		<reference ref_id="CVE-2022-49569" ref_url="https://www.suse.com/security/cve/CVE-2022-49569/" source="CVE"/>
		<reference ref_id="CVE-2022-49570" ref_url="https://www.suse.com/security/cve/CVE-2022-49570/" source="CVE"/>
		<reference ref_id="CVE-2022-49579" ref_url="https://www.suse.com/security/cve/CVE-2022-49579/" source="CVE"/>
		<reference ref_id="CVE-2022-49581" ref_url="https://www.suse.com/security/cve/CVE-2022-49581/" source="CVE"/>
		<reference ref_id="CVE-2022-49583" ref_url="https://www.suse.com/security/cve/CVE-2022-49583/" source="CVE"/>
		<reference ref_id="CVE-2022-49584" ref_url="https://www.suse.com/security/cve/CVE-2022-49584/" source="CVE"/>
		<reference ref_id="CVE-2022-49591" ref_url="https://www.suse.com/security/cve/CVE-2022-49591/" source="CVE"/>
		<reference ref_id="CVE-2022-49592" ref_url="https://www.suse.com/security/cve/CVE-2022-49592/" source="CVE"/>
		<reference ref_id="CVE-2022-49603" ref_url="https://www.suse.com/security/cve/CVE-2022-49603/" source="CVE"/>
		<reference ref_id="CVE-2022-49605" ref_url="https://www.suse.com/security/cve/CVE-2022-49605/" source="CVE"/>
		<reference ref_id="CVE-2022-49606" ref_url="https://www.suse.com/security/cve/CVE-2022-49606/" source="CVE"/>
		<reference ref_id="CVE-2022-49607" ref_url="https://www.suse.com/security/cve/CVE-2022-49607/" source="CVE"/>
		<reference ref_id="CVE-2022-49609" ref_url="https://www.suse.com/security/cve/CVE-2022-49609/" source="CVE"/>
		<reference ref_id="CVE-2022-49610" ref_url="https://www.suse.com/security/cve/CVE-2022-49610/" source="CVE"/>
		<reference ref_id="CVE-2022-49611" ref_url="https://www.suse.com/security/cve/CVE-2022-49611/" source="CVE"/>
		<reference ref_id="CVE-2022-49613" ref_url="https://www.suse.com/security/cve/CVE-2022-49613/" source="CVE"/>
		<reference ref_id="CVE-2022-49615" ref_url="https://www.suse.com/security/cve/CVE-2022-49615/" source="CVE"/>
		<reference ref_id="CVE-2022-49616" ref_url="https://www.suse.com/security/cve/CVE-2022-49616/" source="CVE"/>
		<reference ref_id="CVE-2022-49617" ref_url="https://www.suse.com/security/cve/CVE-2022-49617/" source="CVE"/>
		<reference ref_id="CVE-2022-49618" ref_url="https://www.suse.com/security/cve/CVE-2022-49618/" source="CVE"/>
		<reference ref_id="CVE-2022-49621" ref_url="https://www.suse.com/security/cve/CVE-2022-49621/" source="CVE"/>
		<reference ref_id="CVE-2022-49623" ref_url="https://www.suse.com/security/cve/CVE-2022-49623/" source="CVE"/>
		<reference ref_id="CVE-2022-49625" ref_url="https://www.suse.com/security/cve/CVE-2022-49625/" source="CVE"/>
		<reference ref_id="CVE-2022-49626" ref_url="https://www.suse.com/security/cve/CVE-2022-49626/" source="CVE"/>
		<reference ref_id="CVE-2022-49627" ref_url="https://www.suse.com/security/cve/CVE-2022-49627/" source="CVE"/>
		<reference ref_id="CVE-2022-49628" ref_url="https://www.suse.com/security/cve/CVE-2022-49628/" source="CVE"/>
		<reference ref_id="CVE-2022-49631" ref_url="https://www.suse.com/security/cve/CVE-2022-49631/" source="CVE"/>
		<reference ref_id="CVE-2022-49634" ref_url="https://www.suse.com/security/cve/CVE-2022-49634/" source="CVE"/>
		<reference ref_id="CVE-2022-49640" ref_url="https://www.suse.com/security/cve/CVE-2022-49640/" source="CVE"/>
		<reference ref_id="CVE-2022-49641" ref_url="https://www.suse.com/security/cve/CVE-2022-49641/" source="CVE"/>
		<reference ref_id="CVE-2022-49642" ref_url="https://www.suse.com/security/cve/CVE-2022-49642/" source="CVE"/>
		<reference ref_id="CVE-2022-49643" ref_url="https://www.suse.com/security/cve/CVE-2022-49643/" source="CVE"/>
		<reference ref_id="CVE-2022-49644" ref_url="https://www.suse.com/security/cve/CVE-2022-49644/" source="CVE"/>
		<reference ref_id="CVE-2022-49645" ref_url="https://www.suse.com/security/cve/CVE-2022-49645/" source="CVE"/>
		<reference ref_id="CVE-2022-49646" ref_url="https://www.suse.com/security/cve/CVE-2022-49646/" source="CVE"/>
		<reference ref_id="CVE-2022-49647" ref_url="https://www.suse.com/security/cve/CVE-2022-49647/" source="CVE"/>
		<reference ref_id="CVE-2022-49648" ref_url="https://www.suse.com/security/cve/CVE-2022-49648/" source="CVE"/>
		<reference ref_id="CVE-2022-49649" ref_url="https://www.suse.com/security/cve/CVE-2022-49649/" source="CVE"/>
		<reference ref_id="CVE-2022-49652" ref_url="https://www.suse.com/security/cve/CVE-2022-49652/" source="CVE"/>
		<reference ref_id="CVE-2022-49653" ref_url="https://www.suse.com/security/cve/CVE-2022-49653/" source="CVE"/>
		<reference ref_id="CVE-2022-49656" ref_url="https://www.suse.com/security/cve/CVE-2022-49656/" source="CVE"/>
		<reference ref_id="CVE-2022-49657" ref_url="https://www.suse.com/security/cve/CVE-2022-49657/" source="CVE"/>
		<reference ref_id="CVE-2022-49661" ref_url="https://www.suse.com/security/cve/CVE-2022-49661/" source="CVE"/>
		<reference ref_id="CVE-2022-49663" ref_url="https://www.suse.com/security/cve/CVE-2022-49663/" source="CVE"/>
		<reference ref_id="CVE-2022-49665" ref_url="https://www.suse.com/security/cve/CVE-2022-49665/" source="CVE"/>
		<reference ref_id="CVE-2022-49667" ref_url="https://www.suse.com/security/cve/CVE-2022-49667/" source="CVE"/>
		<reference ref_id="CVE-2022-49668" ref_url="https://www.suse.com/security/cve/CVE-2022-49668/" source="CVE"/>
		<reference ref_id="CVE-2022-49670" ref_url="https://www.suse.com/security/cve/CVE-2022-49670/" source="CVE"/>
		<reference ref_id="CVE-2022-49671" ref_url="https://www.suse.com/security/cve/CVE-2022-49671/" source="CVE"/>
		<reference ref_id="CVE-2022-49672" ref_url="https://www.suse.com/security/cve/CVE-2022-49672/" source="CVE"/>
		<reference ref_id="CVE-2022-49673" ref_url="https://www.suse.com/security/cve/CVE-2022-49673/" source="CVE"/>
		<reference ref_id="CVE-2022-49674" ref_url="https://www.suse.com/security/cve/CVE-2022-49674/" source="CVE"/>
		<reference ref_id="CVE-2022-49675" ref_url="https://www.suse.com/security/cve/CVE-2022-49675/" source="CVE"/>
		<reference ref_id="CVE-2022-49676" ref_url="https://www.suse.com/security/cve/CVE-2022-49676/" source="CVE"/>
		<reference ref_id="CVE-2022-49677" ref_url="https://www.suse.com/security/cve/CVE-2022-49677/" source="CVE"/>
		<reference ref_id="CVE-2022-49678" ref_url="https://www.suse.com/security/cve/CVE-2022-49678/" source="CVE"/>
		<reference ref_id="CVE-2022-49679" ref_url="https://www.suse.com/security/cve/CVE-2022-49679/" source="CVE"/>
		<reference ref_id="CVE-2022-49680" ref_url="https://www.suse.com/security/cve/CVE-2022-49680/" source="CVE"/>
		<reference ref_id="CVE-2022-49683" ref_url="https://www.suse.com/security/cve/CVE-2022-49683/" source="CVE"/>
		<reference ref_id="CVE-2022-49685" ref_url="https://www.suse.com/security/cve/CVE-2022-49685/" source="CVE"/>
		<reference ref_id="CVE-2022-49687" ref_url="https://www.suse.com/security/cve/CVE-2022-49687/" source="CVE"/>
		<reference ref_id="CVE-2022-49688" ref_url="https://www.suse.com/security/cve/CVE-2022-49688/" source="CVE"/>
		<reference ref_id="CVE-2022-49693" ref_url="https://www.suse.com/security/cve/CVE-2022-49693/" source="CVE"/>
		<reference ref_id="CVE-2022-49695" ref_url="https://www.suse.com/security/cve/CVE-2022-49695/" source="CVE"/>
		<reference ref_id="CVE-2022-49699" ref_url="https://www.suse.com/security/cve/CVE-2022-49699/" source="CVE"/>
		<reference ref_id="CVE-2022-49700" ref_url="https://www.suse.com/security/cve/CVE-2022-49700/" source="CVE"/>
		<reference ref_id="CVE-2022-49701" ref_url="https://www.suse.com/security/cve/CVE-2022-49701/" source="CVE"/>
		<reference ref_id="CVE-2022-49703" ref_url="https://www.suse.com/security/cve/CVE-2022-49703/" source="CVE"/>
		<reference ref_id="CVE-2022-49704" ref_url="https://www.suse.com/security/cve/CVE-2022-49704/" source="CVE"/>
		<reference ref_id="CVE-2022-49705" ref_url="https://www.suse.com/security/cve/CVE-2022-49705/" source="CVE"/>
		<reference ref_id="CVE-2022-49707" ref_url="https://www.suse.com/security/cve/CVE-2022-49707/" source="CVE"/>
		<reference ref_id="CVE-2022-49708" ref_url="https://www.suse.com/security/cve/CVE-2022-49708/" source="CVE"/>
		<reference ref_id="CVE-2022-49710" ref_url="https://www.suse.com/security/cve/CVE-2022-49710/" source="CVE"/>
		<reference ref_id="CVE-2022-49711" ref_url="https://www.suse.com/security/cve/CVE-2022-49711/" source="CVE"/>
		<reference ref_id="CVE-2022-49712" ref_url="https://www.suse.com/security/cve/CVE-2022-49712/" source="CVE"/>
		<reference ref_id="CVE-2022-49713" ref_url="https://www.suse.com/security/cve/CVE-2022-49713/" source="CVE"/>
		<reference ref_id="CVE-2022-49714" ref_url="https://www.suse.com/security/cve/CVE-2022-49714/" source="CVE"/>
		<reference ref_id="CVE-2022-49715" ref_url="https://www.suse.com/security/cve/CVE-2022-49715/" source="CVE"/>
		<reference ref_id="CVE-2022-49716" ref_url="https://www.suse.com/security/cve/CVE-2022-49716/" source="CVE"/>
		<reference ref_id="CVE-2022-49719" ref_url="https://www.suse.com/security/cve/CVE-2022-49719/" source="CVE"/>
		<reference ref_id="CVE-2022-49720" ref_url="https://www.suse.com/security/cve/CVE-2022-49720/" source="CVE"/>
		<reference ref_id="CVE-2022-49721" ref_url="https://www.suse.com/security/cve/CVE-2022-49721/" source="CVE"/>
		<reference ref_id="CVE-2022-49722" ref_url="https://www.suse.com/security/cve/CVE-2022-49722/" source="CVE"/>
		<reference ref_id="CVE-2022-49723" ref_url="https://www.suse.com/security/cve/CVE-2022-49723/" source="CVE"/>
		<reference ref_id="CVE-2022-49724" ref_url="https://www.suse.com/security/cve/CVE-2022-49724/" source="CVE"/>
		<reference ref_id="CVE-2022-49725" ref_url="https://www.suse.com/security/cve/CVE-2022-49725/" source="CVE"/>
		<reference ref_id="CVE-2022-49726" ref_url="https://www.suse.com/security/cve/CVE-2022-49726/" source="CVE"/>
		<reference ref_id="CVE-2022-49729" ref_url="https://www.suse.com/security/cve/CVE-2022-49729/" source="CVE"/>
		<reference ref_id="CVE-2022-49730" ref_url="https://www.suse.com/security/cve/CVE-2022-49730/" source="CVE"/>
		<reference ref_id="CVE-2022-49731" ref_url="https://www.suse.com/security/cve/CVE-2022-49731/" source="CVE"/>
		<reference ref_id="CVE-2022-49733" ref_url="https://www.suse.com/security/cve/CVE-2022-49733/" source="CVE"/>
		<reference ref_id="CVE-2023-28410" ref_url="https://www.suse.com/security/cve/CVE-2023-28410/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-41092" ref_url="https://www.suse.com/security/cve/CVE-2024-41092/" source="CVE"/>
		<reference ref_id="CVE-2024-42098" ref_url="https://www.suse.com/security/cve/CVE-2024-42098/" source="CVE"/>
		<reference ref_id="CVE-2024-42229" ref_url="https://www.suse.com/security/cve/CVE-2024-42229/" source="CVE"/>
		<reference ref_id="CVE-2024-42240" ref_url="https://www.suse.com/security/cve/CVE-2024-42240/" source="CVE"/>
		<reference ref_id="CVE-2024-57996" ref_url="https://www.suse.com/security/cve/CVE-2024-57996/" source="CVE"/>
		<reference ref_id="CVE-2024-58014" ref_url="https://www.suse.com/security/cve/CVE-2024-58014/" source="CVE"/>
		<reference ref_id="CVE-2025-21718" ref_url="https://www.suse.com/security/cve/CVE-2025-21718/" source="CVE"/>
		<reference ref_id="CVE-2025-21780" ref_url="https://www.suse.com/security/cve/CVE-2025-21780/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-41092: drm/i915/gt: Fix potential UAF by revoke of fence registers (bsc#1228483).
- CVE-2024-42098: crypto: ecdh - explicitly zeroize private_key (bsc#1228779).
- CVE-2024-42229: crypto: aead,cipher - zeroize key buffer after use (bsc#1228708).
- CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076).
- CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109).
- CVE-2025-21718: net: rose: fix timer races against user threads (bsc#1239073).
- CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (bsc#1239115).

The following non-security bugs were fixed:

- initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521).
- x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-26"/>
	<updated date="2025-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180814">SUSE bug 1180814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183682">SUSE bug 1183682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190336">SUSE bug 1190336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190768">SUSE bug 1190768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190786">SUSE bug 1190786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194904">SUSE bug 1194904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195823">SUSE bug 1195823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196444">SUSE bug 1196444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197158">SUSE bug 1197158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197174">SUSE bug 1197174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197246">SUSE bug 1197246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197302">SUSE bug 1197302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197472">SUSE bug 1197472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197661">SUSE bug 1197661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197926">SUSE bug 1197926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198019">SUSE bug 1198019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198021">SUSE bug 1198021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198240">SUSE bug 1198240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198660">SUSE bug 1198660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200045">SUSE bug 1200045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200571">SUSE bug 1200571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200807">SUSE bug 1200807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200809">SUSE bug 1200809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200810">SUSE bug 1200810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200824">SUSE bug 1200824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200825">SUSE bug 1200825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200871">SUSE bug 1200871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200872">SUSE bug 1200872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201193">SUSE bug 1201193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201218">SUSE bug 1201218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201323">SUSE bug 1201323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201381">SUSE bug 1201381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201610">SUSE bug 1201610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202672">SUSE bug 1202672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202711">SUSE bug 1202711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202712">SUSE bug 1202712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202771">SUSE bug 1202771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202774">SUSE bug 1202774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202778">SUSE bug 1202778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202781">SUSE bug 1202781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203699">SUSE bug 1203699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203769">SUSE bug 1203769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204171">SUSE bug 1204171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206048">SUSE bug 1206048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206049">SUSE bug 1206049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207593">SUSE bug 1207593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207640">SUSE bug 1207640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210050">SUSE bug 1210050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211263">SUSE bug 1211263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228483">SUSE bug 1228483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228708">SUSE bug 1228708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228779">SUSE bug 1228779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228966">SUSE bug 1228966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237521">SUSE bug 1237521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237718">SUSE bug 1237718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237721">SUSE bug 1237721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237722">SUSE bug 1237722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237723">SUSE bug 1237723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237724">SUSE bug 1237724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237725">SUSE bug 1237725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237726">SUSE bug 1237726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237727">SUSE bug 1237727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237728">SUSE bug 1237728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237729">SUSE bug 1237729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237734">SUSE bug 1237734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237735">SUSE bug 1237735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237736">SUSE bug 1237736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237737">SUSE bug 1237737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237738">SUSE bug 1237738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237739">SUSE bug 1237739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237740">SUSE bug 1237740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237742">SUSE bug 1237742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237743">SUSE bug 1237743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237745">SUSE bug 1237745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237746">SUSE bug 1237746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237748">SUSE bug 1237748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237751">SUSE bug 1237751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237752">SUSE bug 1237752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237753">SUSE bug 1237753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237755">SUSE bug 1237755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237759">SUSE bug 1237759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237761">SUSE bug 1237761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237763">SUSE bug 1237763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237766">SUSE bug 1237766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237767">SUSE bug 1237767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237768">SUSE bug 1237768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237774">SUSE bug 1237774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237775">SUSE bug 1237775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237778">SUSE bug 1237778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237779">SUSE bug 1237779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237780">SUSE bug 1237780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237782">SUSE bug 1237782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237783">SUSE bug 1237783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237784">SUSE bug 1237784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237785">SUSE bug 1237785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237786">SUSE bug 1237786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237787">SUSE bug 1237787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237788">SUSE bug 1237788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237789">SUSE bug 1237789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237795">SUSE bug 1237795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237797">SUSE bug 1237797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237798">SUSE bug 1237798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237807">SUSE bug 1237807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237808">SUSE bug 1237808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237810">SUSE bug 1237810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237812">SUSE bug 1237812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237813">SUSE bug 1237813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237814">SUSE bug 1237814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237815">SUSE bug 1237815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237817">SUSE bug 1237817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237818">SUSE bug 1237818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237821">SUSE bug 1237821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237823">SUSE bug 1237823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237824">SUSE bug 1237824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237826">SUSE bug 1237826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237827">SUSE bug 1237827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237829">SUSE bug 1237829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237831">SUSE bug 1237831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237835">SUSE bug 1237835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237836">SUSE bug 1237836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237837">SUSE bug 1237837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237839">SUSE bug 1237839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237840">SUSE bug 1237840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237845">SUSE bug 1237845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237846">SUSE bug 1237846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237868">SUSE bug 1237868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237872">SUSE bug 1237872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237892">SUSE bug 1237892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237903">SUSE bug 1237903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237904">SUSE bug 1237904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237916">SUSE bug 1237916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237922">SUSE bug 1237922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237925">SUSE bug 1237925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237926">SUSE bug 1237926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237929">SUSE bug 1237929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237931">SUSE bug 1237931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237932">SUSE bug 1237932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237933">SUSE bug 1237933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237937">SUSE bug 1237937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237939">SUSE bug 1237939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237940">SUSE bug 1237940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237941">SUSE bug 1237941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237942">SUSE bug 1237942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237946">SUSE bug 1237946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237951">SUSE bug 1237951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237952">SUSE bug 1237952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237954">SUSE bug 1237954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237955">SUSE bug 1237955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237957">SUSE bug 1237957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237958">SUSE bug 1237958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237959">SUSE bug 1237959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237960">SUSE bug 1237960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237961">SUSE bug 1237961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237963">SUSE bug 1237963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237965">SUSE bug 1237965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237966">SUSE bug 1237966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237967">SUSE bug 1237967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237968">SUSE bug 1237968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237969">SUSE bug 1237969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237970">SUSE bug 1237970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237971">SUSE bug 1237971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237973">SUSE bug 1237973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237975">SUSE bug 1237975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237976">SUSE bug 1237976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237978">SUSE bug 1237978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237979">SUSE bug 1237979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237983">SUSE bug 1237983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237984">SUSE bug 1237984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237986">SUSE bug 1237986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237987">SUSE bug 1237987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237990">SUSE bug 1237990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237996">SUSE bug 1237996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237997">SUSE bug 1237997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237998">SUSE bug 1237998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237999">SUSE bug 1237999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238000">SUSE bug 1238000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238003">SUSE bug 1238003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238006">SUSE bug 1238006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238007">SUSE bug 1238007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238010">SUSE bug 1238010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238011">SUSE bug 1238011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238012">SUSE bug 1238012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238013">SUSE bug 1238013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238014">SUSE bug 1238014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238016">SUSE bug 1238016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238017">SUSE bug 1238017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238018">SUSE bug 1238018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238019">SUSE bug 1238019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238021">SUSE bug 1238021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238022">SUSE bug 1238022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238024">SUSE bug 1238024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238030">SUSE bug 1238030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238036">SUSE bug 1238036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238037">SUSE bug 1238037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238041">SUSE bug 1238041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238046">SUSE bug 1238046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238047">SUSE bug 1238047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238071">SUSE bug 1238071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238077">SUSE bug 1238077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238079">SUSE bug 1238079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238080">SUSE bug 1238080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238089">SUSE bug 1238089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238090">SUSE bug 1238090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238091">SUSE bug 1238091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238092">SUSE bug 1238092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238096">SUSE bug 1238096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238097">SUSE bug 1238097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238099">SUSE bug 1238099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238103">SUSE bug 1238103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238105">SUSE bug 1238105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238106">SUSE bug 1238106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238108">SUSE bug 1238108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238110">SUSE bug 1238110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238111">SUSE bug 1238111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238112">SUSE bug 1238112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238113">SUSE bug 1238113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238115">SUSE bug 1238115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238116">SUSE bug 1238116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238120">SUSE bug 1238120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238123">SUSE bug 1238123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238125">SUSE bug 1238125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238126">SUSE bug 1238126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238127">SUSE bug 1238127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238131">SUSE bug 1238131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238134">SUSE bug 1238134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238135">SUSE bug 1238135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238138">SUSE bug 1238138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238139">SUSE bug 1238139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238140">SUSE bug 1238140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238142">SUSE bug 1238142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238144">SUSE bug 1238144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238146">SUSE bug 1238146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238147">SUSE bug 1238147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238149">SUSE bug 1238149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238150">SUSE bug 1238150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238155">SUSE bug 1238155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238156">SUSE bug 1238156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238157">SUSE bug 1238157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238158">SUSE bug 1238158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238162">SUSE bug 1238162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238166">SUSE bug 1238166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238167">SUSE bug 1238167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238168">SUSE bug 1238168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238169">SUSE bug 1238169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238170">SUSE bug 1238170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238171">SUSE bug 1238171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238172">SUSE bug 1238172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238175">SUSE bug 1238175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238176">SUSE bug 1238176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238177">SUSE bug 1238177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238180">SUSE bug 1238180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238181">SUSE bug 1238181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238183">SUSE bug 1238183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238184">SUSE bug 1238184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238228">SUSE bug 1238228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238229">SUSE bug 1238229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238231">SUSE bug 1238231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238234">SUSE bug 1238234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238235">SUSE bug 1238235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238236">SUSE bug 1238236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238238">SUSE bug 1238238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238239">SUSE bug 1238239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238241">SUSE bug 1238241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238242">SUSE bug 1238242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238243">SUSE bug 1238243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238244">SUSE bug 1238244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238246">SUSE bug 1238246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238247">SUSE bug 1238247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238248">SUSE bug 1238248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238249">SUSE bug 1238249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238253">SUSE bug 1238253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238255">SUSE bug 1238255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238256">SUSE bug 1238256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238257">SUSE bug 1238257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238260">SUSE bug 1238260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238262">SUSE bug 1238262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238263">SUSE bug 1238263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238264">SUSE bug 1238264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238266">SUSE bug 1238266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238267">SUSE bug 1238267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238268">SUSE bug 1238268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238269">SUSE bug 1238269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238270">SUSE bug 1238270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238271">SUSE bug 1238271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238272">SUSE bug 1238272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238274">SUSE bug 1238274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238275">SUSE bug 1238275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238276">SUSE bug 1238276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238277">SUSE bug 1238277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238278">SUSE bug 1238278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238279">SUSE bug 1238279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238281">SUSE bug 1238281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238282">SUSE bug 1238282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238283">SUSE bug 1238283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238284">SUSE bug 1238284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238286">SUSE bug 1238286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238287">SUSE bug 1238287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238288">SUSE bug 1238288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238289">SUSE bug 1238289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238292">SUSE bug 1238292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238293">SUSE bug 1238293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238295">SUSE bug 1238295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238298">SUSE bug 1238298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238301">SUSE bug 1238301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238302">SUSE bug 1238302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238306">SUSE bug 1238306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238307">SUSE bug 1238307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238308">SUSE bug 1238308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238309">SUSE bug 1238309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238311">SUSE bug 1238311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238313">SUSE bug 1238313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238326">SUSE bug 1238326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238327">SUSE bug 1238327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238328">SUSE bug 1238328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238331">SUSE bug 1238331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238333">SUSE bug 1238333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238334">SUSE bug 1238334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238336">SUSE bug 1238336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238337">SUSE bug 1238337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238338">SUSE bug 1238338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238339">SUSE bug 1238339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238343">SUSE bug 1238343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238345">SUSE bug 1238345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238372">SUSE bug 1238372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238373">SUSE bug 1238373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238374">SUSE bug 1238374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238376">SUSE bug 1238376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238377">SUSE bug 1238377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238381">SUSE bug 1238381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238382">SUSE bug 1238382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238383">SUSE bug 1238383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238386">SUSE bug 1238386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238387">SUSE bug 1238387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238388">SUSE bug 1238388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238389">SUSE bug 1238389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238390">SUSE bug 1238390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238391">SUSE bug 1238391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238392">SUSE bug 1238392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238393">SUSE bug 1238393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238394">SUSE bug 1238394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238395">SUSE bug 1238395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238396">SUSE bug 1238396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238397">SUSE bug 1238397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238400">SUSE bug 1238400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238410">SUSE bug 1238410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238411">SUSE bug 1238411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238413">SUSE bug 1238413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238415">SUSE bug 1238415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238416">SUSE bug 1238416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238417">SUSE bug 1238417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238418">SUSE bug 1238418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238419">SUSE bug 1238419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238420">SUSE bug 1238420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238423">SUSE bug 1238423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238428">SUSE bug 1238428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238429">SUSE bug 1238429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238430">SUSE bug 1238430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238431">SUSE bug 1238431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238432">SUSE bug 1238432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238433">SUSE bug 1238433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238434">SUSE bug 1238434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238435">SUSE bug 1238435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238436">SUSE bug 1238436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238437">SUSE bug 1238437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238440">SUSE bug 1238440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238441">SUSE bug 1238441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238442">SUSE bug 1238442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238443">SUSE bug 1238443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238444">SUSE bug 1238444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238445">SUSE bug 1238445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238446">SUSE bug 1238446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238447">SUSE bug 1238447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238453">SUSE bug 1238453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238454">SUSE bug 1238454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238458">SUSE bug 1238458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238459">SUSE bug 1238459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238462">SUSE bug 1238462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238463">SUSE bug 1238463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238465">SUSE bug 1238465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238467">SUSE bug 1238467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238469">SUSE bug 1238469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238533">SUSE bug 1238533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238536">SUSE bug 1238536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238538">SUSE bug 1238538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238539">SUSE bug 1238539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238540">SUSE bug 1238540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238543">SUSE bug 1238543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238545">SUSE bug 1238545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238546">SUSE bug 1238546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238556">SUSE bug 1238556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238557">SUSE bug 1238557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238599">SUSE bug 1238599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238600">SUSE bug 1238600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238601">SUSE bug 1238601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238602">SUSE bug 1238602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238605">SUSE bug 1238605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238612">SUSE bug 1238612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238615">SUSE bug 1238615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238617">SUSE bug 1238617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238618">SUSE bug 1238618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238619">SUSE bug 1238619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238621">SUSE bug 1238621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238623">SUSE bug 1238623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238625">SUSE bug 1238625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238626">SUSE bug 1238626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238630">SUSE bug 1238630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238631">SUSE bug 1238631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238632">SUSE bug 1238632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238633">SUSE bug 1238633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238635">SUSE bug 1238635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238636">SUSE bug 1238636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238638">SUSE bug 1238638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238639">SUSE bug 1238639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238640">SUSE bug 1238640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238641">SUSE bug 1238641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238642">SUSE bug 1238642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238643">SUSE bug 1238643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238645">SUSE bug 1238645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238646">SUSE bug 1238646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238647">SUSE bug 1238647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238650">SUSE bug 1238650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238653">SUSE bug 1238653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238654">SUSE bug 1238654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238655">SUSE bug 1238655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238662">SUSE bug 1238662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238663">SUSE bug 1238663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238664">SUSE bug 1238664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238666">SUSE bug 1238666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238668">SUSE bug 1238668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238705">SUSE bug 1238705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238707">SUSE bug 1238707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238710">SUSE bug 1238710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238712">SUSE bug 1238712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238718">SUSE bug 1238718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238719">SUSE bug 1238719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238721">SUSE bug 1238721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238722">SUSE bug 1238722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238727">SUSE bug 1238727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238729">SUSE bug 1238729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238750">SUSE bug 1238750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238787">SUSE bug 1238787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238789">SUSE bug 1238789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238792">SUSE bug 1238792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238799">SUSE bug 1238799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238804">SUSE bug 1238804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238805">SUSE bug 1238805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238808">SUSE bug 1238808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238809">SUSE bug 1238809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238811">SUSE bug 1238811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238814">SUSE bug 1238814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238815">SUSE bug 1238815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238816">SUSE bug 1238816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238817">SUSE bug 1238817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238818">SUSE bug 1238818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238819">SUSE bug 1238819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238821">SUSE bug 1238821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238823">SUSE bug 1238823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238825">SUSE bug 1238825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238830">SUSE bug 1238830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238834">SUSE bug 1238834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238835">SUSE bug 1238835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238836">SUSE bug 1238836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238838">SUSE bug 1238838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238867">SUSE bug 1238867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238868">SUSE bug 1238868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238869">SUSE bug 1238869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238870">SUSE bug 1238870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238871">SUSE bug 1238871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238878">SUSE bug 1238878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238889">SUSE bug 1238889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238892">SUSE bug 1238892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238893">SUSE bug 1238893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238897">SUSE bug 1238897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238898">SUSE bug 1238898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238899">SUSE bug 1238899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238902">SUSE bug 1238902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238916">SUSE bug 1238916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238925">SUSE bug 1238925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238930">SUSE bug 1238930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238933">SUSE bug 1238933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238936">SUSE bug 1238936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238937">SUSE bug 1238937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238938">SUSE bug 1238938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238939">SUSE bug 1238939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238943">SUSE bug 1238943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238945">SUSE bug 1238945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238948">SUSE bug 1238948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238949">SUSE bug 1238949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238950">SUSE bug 1238950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238951">SUSE bug 1238951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238952">SUSE bug 1238952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238954">SUSE bug 1238954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238956">SUSE bug 1238956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238957">SUSE bug 1238957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239001">SUSE bug 1239001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239004">SUSE bug 1239004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239035">SUSE bug 1239035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239040">SUSE bug 1239040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239041">SUSE bug 1239041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239051">SUSE bug 1239051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239060">SUSE bug 1239060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239070">SUSE bug 1239070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239071">SUSE bug 1239071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239073">SUSE bug 1239073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239076">SUSE bug 1239076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239109">SUSE bug 1239109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239115">SUSE bug 1239115</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-4453/">CVE-2021-4453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4453">CVE-2021-4453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47631/">CVE-2021-47631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47631">CVE-2021-47631 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47632/">CVE-2021-47632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47632">CVE-2021-47632 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47633/">CVE-2021-47633 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47633">CVE-2021-47633 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47635/">CVE-2021-47635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47635">CVE-2021-47635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47636/">CVE-2021-47636 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47636">CVE-2021-47636 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47637/">CVE-2021-47637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47637">CVE-2021-47637 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47638/">CVE-2021-47638 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47638">CVE-2021-47638 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47639/">CVE-2021-47639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47639">CVE-2021-47639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47641/">CVE-2021-47641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47641">CVE-2021-47641 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47642/">CVE-2021-47642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47642">CVE-2021-47642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47643/">CVE-2021-47643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47643">CVE-2021-47643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47644/">CVE-2021-47644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47644">CVE-2021-47644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47645/">CVE-2021-47645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47645">CVE-2021-47645 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47646/">CVE-2021-47646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47646">CVE-2021-47646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47647/">CVE-2021-47647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47647">CVE-2021-47647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47648/">CVE-2021-47648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47648">CVE-2021-47648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47649/">CVE-2021-47649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47649">CVE-2021-47649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47650/">CVE-2021-47650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47650">CVE-2021-47650 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47651/">CVE-2021-47651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47651">CVE-2021-47651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47652/">CVE-2021-47652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47652">CVE-2021-47652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47653/">CVE-2021-47653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47653">CVE-2021-47653 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47654/">CVE-2021-47654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47654">CVE-2021-47654 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47656/">CVE-2021-47656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47656">CVE-2021-47656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47657/">CVE-2021-47657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47657">CVE-2021-47657 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47659/">CVE-2021-47659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47659">CVE-2021-47659 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0168/">CVE-2022-0168 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0995/">CVE-2022-0995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0995">CVE-2022-0995 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2977/">CVE-2022-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2977">CVE-2022-2977 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49044/">CVE-2022-49044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49044">CVE-2022-49044 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49050/">CVE-2022-49050 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49050">CVE-2022-49050 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="4.3/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49051/">CVE-2022-49051 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49051">CVE-2022-49051 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49054/">CVE-2022-49054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49054">CVE-2022-49054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49055/">CVE-2022-49055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49055">CVE-2022-49055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49058/">CVE-2022-49058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49058">CVE-2022-49058 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49059/">CVE-2022-49059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49059">CVE-2022-49059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49060/">CVE-2022-49060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49060">CVE-2022-49060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49061/">CVE-2022-49061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49061">CVE-2022-49061 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49063/">CVE-2022-49063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49063">CVE-2022-49063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49065/">CVE-2022-49065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49065">CVE-2022-49065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49066/">CVE-2022-49066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49066">CVE-2022-49066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49073/">CVE-2022-49073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49073">CVE-2022-49073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49074/">CVE-2022-49074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49074">CVE-2022-49074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49076/">CVE-2022-49076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49076">CVE-2022-49076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49078/">CVE-2022-49078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49078">CVE-2022-49078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49082/">CVE-2022-49082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49082">CVE-2022-49082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49083/">CVE-2022-49083 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49083">CVE-2022-49083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49084/">CVE-2022-49084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49084">CVE-2022-49084 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49085/">CVE-2022-49085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49085">CVE-2022-49085 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49086/">CVE-2022-49086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49086">CVE-2022-49086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49088/">CVE-2022-49088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49088">CVE-2022-49088 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49089/">CVE-2022-49089 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49089">CVE-2022-49089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49090/">CVE-2022-49090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49090">CVE-2022-49090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49091/">CVE-2022-49091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49091">CVE-2022-49091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49092/">CVE-2022-49092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49092">CVE-2022-49092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49093/">CVE-2022-49093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49093">CVE-2022-49093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49095/">CVE-2022-49095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49095">CVE-2022-49095 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49096/">CVE-2022-49096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49096">CVE-2022-49096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49097/">CVE-2022-49097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49097">CVE-2022-49097 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49098/">CVE-2022-49098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49098">CVE-2022-49098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49099/">CVE-2022-49099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49099">CVE-2022-49099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49100/">CVE-2022-49100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49100">CVE-2022-49100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49102/">CVE-2022-49102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49102">CVE-2022-49102 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49103/">CVE-2022-49103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49103">CVE-2022-49103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49104/">CVE-2022-49104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49104">CVE-2022-49104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49105/">CVE-2022-49105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49105">CVE-2022-49105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49106/">CVE-2022-49106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49106">CVE-2022-49106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49107/">CVE-2022-49107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49107">CVE-2022-49107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49109/">CVE-2022-49109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49109">CVE-2022-49109 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49111/">CVE-2022-49111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49111">CVE-2022-49111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49112/">CVE-2022-49112 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49112">CVE-2022-49112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49113/">CVE-2022-49113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49113">CVE-2022-49113 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49114/">CVE-2022-49114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49114">CVE-2022-49114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49115/">CVE-2022-49115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49115">CVE-2022-49115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49116/">CVE-2022-49116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49116">CVE-2022-49116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49118/">CVE-2022-49118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49118">CVE-2022-49118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49119/">CVE-2022-49119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49119">CVE-2022-49119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49120/">CVE-2022-49120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49120">CVE-2022-49120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49121/">CVE-2022-49121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49121">CVE-2022-49121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49122/">CVE-2022-49122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49122">CVE-2022-49122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49126/">CVE-2022-49126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49126">CVE-2022-49126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49128/">CVE-2022-49128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49128">CVE-2022-49128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49129/">CVE-2022-49129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49129">CVE-2022-49129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49130/">CVE-2022-49130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49130">CVE-2022-49130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49131/">CVE-2022-49131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49131">CVE-2022-49131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49132/">CVE-2022-49132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49132">CVE-2022-49132 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49135/">CVE-2022-49135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49135">CVE-2022-49135 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49137/">CVE-2022-49137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49137">CVE-2022-49137 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49145/">CVE-2022-49145 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49145">CVE-2022-49145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49147/">CVE-2022-49147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49147">CVE-2022-49147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49148/">CVE-2022-49148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49148">CVE-2022-49148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49151/">CVE-2022-49151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49151">CVE-2022-49151 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49153/">CVE-2022-49153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49153">CVE-2022-49153 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49154/">CVE-2022-49154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49154">CVE-2022-49154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49155/">CVE-2022-49155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49155">CVE-2022-49155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49156/">CVE-2022-49156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49156">CVE-2022-49156 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49157/">CVE-2022-49157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49157">CVE-2022-49157 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49158/">CVE-2022-49158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49158">CVE-2022-49158 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49159/">CVE-2022-49159 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49159">CVE-2022-49159 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49160/">CVE-2022-49160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49160">CVE-2022-49160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49162/">CVE-2022-49162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49162">CVE-2022-49162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49163/">CVE-2022-49163 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49163">CVE-2022-49163 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49164/">CVE-2022-49164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49164">CVE-2022-49164 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49165/">CVE-2022-49165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49165">CVE-2022-49165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49174/">CVE-2022-49174 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49174">CVE-2022-49174 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49175/">CVE-2022-49175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49175">CVE-2022-49175 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49176/">CVE-2022-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49176">CVE-2022-49176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49177/">CVE-2022-49177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49177">CVE-2022-49177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49179/">CVE-2022-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49179">CVE-2022-49179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49180/">CVE-2022-49180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49180">CVE-2022-49180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49182/">CVE-2022-49182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49182">CVE-2022-49182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49185/">CVE-2022-49185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49185">CVE-2022-49185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49187/">CVE-2022-49187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49187">CVE-2022-49187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49188/">CVE-2022-49188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49188">CVE-2022-49188 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49189/">CVE-2022-49189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49189">CVE-2022-49189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49193/">CVE-2022-49193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49193">CVE-2022-49193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49194/">CVE-2022-49194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49194">CVE-2022-49194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49196/">CVE-2022-49196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49196">CVE-2022-49196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49199/">CVE-2022-49199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49199">CVE-2022-49199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49200/">CVE-2022-49200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49200">CVE-2022-49200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49201/">CVE-2022-49201 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49201">CVE-2022-49201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49206/">CVE-2022-49206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49206">CVE-2022-49206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49208/">CVE-2022-49208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49208">CVE-2022-49208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49212/">CVE-2022-49212 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49212">CVE-2022-49212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49213/">CVE-2022-49213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49213">CVE-2022-49213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49214/">CVE-2022-49214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49214">CVE-2022-49214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49216/">CVE-2022-49216 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49216">CVE-2022-49216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49217/">CVE-2022-49217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49217">CVE-2022-49217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49218/">CVE-2022-49218 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49218">CVE-2022-49218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49221/">CVE-2022-49221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49221">CVE-2022-49221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49222/">CVE-2022-49222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49222">CVE-2022-49222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49224/">CVE-2022-49224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49224">CVE-2022-49224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49226/">CVE-2022-49226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49226">CVE-2022-49226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49227/">CVE-2022-49227 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49227">CVE-2022-49227 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49232/">CVE-2022-49232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49232">CVE-2022-49232 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49235/">CVE-2022-49235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49235">CVE-2022-49235 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49236/">CVE-2022-49236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49236">CVE-2022-49236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49239/">CVE-2022-49239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49239">CVE-2022-49239 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49241/">CVE-2022-49241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49241">CVE-2022-49241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49242/">CVE-2022-49242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49242">CVE-2022-49242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49243/">CVE-2022-49243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49243">CVE-2022-49243 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49244/">CVE-2022-49244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49244">CVE-2022-49244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49246/">CVE-2022-49246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49246">CVE-2022-49246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49247/">CVE-2022-49247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49247">CVE-2022-49247 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49248/">CVE-2022-49248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49248">CVE-2022-49248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49249/">CVE-2022-49249 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49249">CVE-2022-49249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49250/">CVE-2022-49250 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49250">CVE-2022-49250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49251/">CVE-2022-49251 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49251">CVE-2022-49251 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49252/">CVE-2022-49252 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49252">CVE-2022-49252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49253/">CVE-2022-49253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49253">CVE-2022-49253 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49254/">CVE-2022-49254 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49254">CVE-2022-49254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49256/">CVE-2022-49256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49256">CVE-2022-49256 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49257/">CVE-2022-49257 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49257">CVE-2022-49257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49258/">CVE-2022-49258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49258">CVE-2022-49258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49259/">CVE-2022-49259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49259">CVE-2022-49259 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49260/">CVE-2022-49260 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49260">CVE-2022-49260 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49261/">CVE-2022-49261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49261">CVE-2022-49261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49262/">CVE-2022-49262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49262">CVE-2022-49262 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49263/">CVE-2022-49263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49263">CVE-2022-49263 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49264/">CVE-2022-49264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49264">CVE-2022-49264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49265/">CVE-2022-49265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49265">CVE-2022-49265 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49266/">CVE-2022-49266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49266">CVE-2022-49266 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49268/">CVE-2022-49268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49268">CVE-2022-49268 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49269/">CVE-2022-49269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49269">CVE-2022-49269 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49270/">CVE-2022-49270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49270">CVE-2022-49270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49271/">CVE-2022-49271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49271">CVE-2022-49271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49272/">CVE-2022-49272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49272">CVE-2022-49272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49273/">CVE-2022-49273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49273">CVE-2022-49273 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49274/">CVE-2022-49274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49274">CVE-2022-49274 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49275/">CVE-2022-49275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49275">CVE-2022-49275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49276/">CVE-2022-49276 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49276">CVE-2022-49276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49277/">CVE-2022-49277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49277">CVE-2022-49277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49278/">CVE-2022-49278 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49278">CVE-2022-49278 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49279/">CVE-2022-49279 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49279">CVE-2022-49279 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49280/">CVE-2022-49280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49280">CVE-2022-49280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49281/">CVE-2022-49281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49281">CVE-2022-49281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49283/">CVE-2022-49283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49283">CVE-2022-49283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49285/">CVE-2022-49285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49285">CVE-2022-49285 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49286/">CVE-2022-49286 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49286">CVE-2022-49286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49287/">CVE-2022-49287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49287">CVE-2022-49287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49288/">CVE-2022-49288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49288">CVE-2022-49288 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49290/">CVE-2022-49290 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49290">CVE-2022-49290 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49291/">CVE-2022-49291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49291">CVE-2022-49291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49292/">CVE-2022-49292 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49292">CVE-2022-49292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49294/">CVE-2022-49294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49294">CVE-2022-49294 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49295/">CVE-2022-49295 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49295">CVE-2022-49295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49297/">CVE-2022-49297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49297">CVE-2022-49297 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49298/">CVE-2022-49298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49298">CVE-2022-49298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49299/">CVE-2022-49299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49299">CVE-2022-49299 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49300/">CVE-2022-49300 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49300">CVE-2022-49300 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49301/">CVE-2022-49301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49301">CVE-2022-49301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49302/">CVE-2022-49302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49302">CVE-2022-49302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49304/">CVE-2022-49304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49304">CVE-2022-49304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49305/">CVE-2022-49305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49305">CVE-2022-49305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49307/">CVE-2022-49307 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49307">CVE-2022-49307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49308/">CVE-2022-49308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49308">CVE-2022-49308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49309/">CVE-2022-49309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49309">CVE-2022-49309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49310/">CVE-2022-49310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49310">CVE-2022-49310 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49311/">CVE-2022-49311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49311">CVE-2022-49311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49312/">CVE-2022-49312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49312">CVE-2022-49312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49313/">CVE-2022-49313 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49313">CVE-2022-49313 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49314/">CVE-2022-49314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49314">CVE-2022-49314 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49315/">CVE-2022-49315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49315">CVE-2022-49315 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49316/">CVE-2022-49316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49316">CVE-2022-49316 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49319/">CVE-2022-49319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49319">CVE-2022-49319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49320/">CVE-2022-49320 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49320">CVE-2022-49320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49321/">CVE-2022-49321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49321">CVE-2022-49321 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49322/">CVE-2022-49322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49322">CVE-2022-49322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49323/">CVE-2022-49323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49323">CVE-2022-49323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49326/">CVE-2022-49326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49326">CVE-2022-49326 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49327/">CVE-2022-49327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49327">CVE-2022-49327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49328/">CVE-2022-49328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49328">CVE-2022-49328 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49331/">CVE-2022-49331 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49331">CVE-2022-49331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49332/">CVE-2022-49332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49332">CVE-2022-49332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49335/">CVE-2022-49335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49335">CVE-2022-49335 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49336/">CVE-2022-49336 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49336">CVE-2022-49336 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49337/">CVE-2022-49337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49337">CVE-2022-49337 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49339/">CVE-2022-49339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49339">CVE-2022-49339 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49341/">CVE-2022-49341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49341">CVE-2022-49341 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49342/">CVE-2022-49342 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49342">CVE-2022-49342 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49343/">CVE-2022-49343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49343">CVE-2022-49343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49345/">CVE-2022-49345 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49345">CVE-2022-49345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49346/">CVE-2022-49346 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49346">CVE-2022-49346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49347/">CVE-2022-49347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49347">CVE-2022-49347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49348/">CVE-2022-49348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49348">CVE-2022-49348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49349/">CVE-2022-49349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49349">CVE-2022-49349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49350/">CVE-2022-49350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49350">CVE-2022-49350 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49351/">CVE-2022-49351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49351">CVE-2022-49351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49352/">CVE-2022-49352 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49352">CVE-2022-49352 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49354/">CVE-2022-49354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49354">CVE-2022-49354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49356/">CVE-2022-49356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49356">CVE-2022-49356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49357/">CVE-2022-49357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49357">CVE-2022-49357 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49367/">CVE-2022-49367 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49367">CVE-2022-49367 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49368/">CVE-2022-49368 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49368">CVE-2022-49368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49370/">CVE-2022-49370 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49370">CVE-2022-49370 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49371/">CVE-2022-49371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49371">CVE-2022-49371 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49373/">CVE-2022-49373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49373">CVE-2022-49373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49375/">CVE-2022-49375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49375">CVE-2022-49375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49376/">CVE-2022-49376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49376">CVE-2022-49376 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49377/">CVE-2022-49377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49377">CVE-2022-49377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49378/">CVE-2022-49378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49378">CVE-2022-49378 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49379/">CVE-2022-49379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49379">CVE-2022-49379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49381/">CVE-2022-49381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49381">CVE-2022-49381 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49382/">CVE-2022-49382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49382">CVE-2022-49382 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49384/">CVE-2022-49384 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49384">CVE-2022-49384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49385/">CVE-2022-49385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49385">CVE-2022-49385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49386/">CVE-2022-49386 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49386">CVE-2022-49386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49389/">CVE-2022-49389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49389">CVE-2022-49389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49392/">CVE-2022-49392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49392">CVE-2022-49392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49394/">CVE-2022-49394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49394">CVE-2022-49394 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49396/">CVE-2022-49396 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49396">CVE-2022-49396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49397/">CVE-2022-49397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49397">CVE-2022-49397 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49398/">CVE-2022-49398 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49398">CVE-2022-49398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49399/">CVE-2022-49399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49399">CVE-2022-49399 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49400/">CVE-2022-49400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49400">CVE-2022-49400 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49402/">CVE-2022-49402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49402">CVE-2022-49402 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49404/">CVE-2022-49404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49404">CVE-2022-49404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49407/">CVE-2022-49407 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49407">CVE-2022-49407 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49409/">CVE-2022-49409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49409">CVE-2022-49409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49410/">CVE-2022-49410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49410">CVE-2022-49410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49411/">CVE-2022-49411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49411">CVE-2022-49411 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49412/">CVE-2022-49412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49412">CVE-2022-49412 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49413/">CVE-2022-49413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49413">CVE-2022-49413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49414/">CVE-2022-49414 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49414">CVE-2022-49414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49416/">CVE-2022-49416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49416">CVE-2022-49416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49418/">CVE-2022-49418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49418">CVE-2022-49418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49421/">CVE-2022-49421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49421">CVE-2022-49421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49422/">CVE-2022-49422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49422">CVE-2022-49422 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49424/">CVE-2022-49424 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49424">CVE-2022-49424 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49426/">CVE-2022-49426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49426">CVE-2022-49426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49427/">CVE-2022-49427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49427">CVE-2022-49427 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49429/">CVE-2022-49429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49429">CVE-2022-49429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49430/">CVE-2022-49430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49430">CVE-2022-49430 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49431/">CVE-2022-49431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49431">CVE-2022-49431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49432/">CVE-2022-49432 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49432">CVE-2022-49432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49433/">CVE-2022-49433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49433">CVE-2022-49433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49434/">CVE-2022-49434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49434">CVE-2022-49434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49435/">CVE-2022-49435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49435">CVE-2022-49435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49437/">CVE-2022-49437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49437">CVE-2022-49437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49438/">CVE-2022-49438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49438">CVE-2022-49438 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49440/">CVE-2022-49440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49440">CVE-2022-49440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49441/">CVE-2022-49441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49441">CVE-2022-49441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49442/">CVE-2022-49442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49442">CVE-2022-49442 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49443/">CVE-2022-49443 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49443">CVE-2022-49443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49444/">CVE-2022-49444 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49444">CVE-2022-49444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49445/">CVE-2022-49445 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49445">CVE-2022-49445 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49447/">CVE-2022-49447 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49447">CVE-2022-49447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49448/">CVE-2022-49448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49448">CVE-2022-49448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49449/">CVE-2022-49449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49449">CVE-2022-49449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49451/">CVE-2022-49451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49451">CVE-2022-49451 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49453/">CVE-2022-49453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49453">CVE-2022-49453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49455/">CVE-2022-49455 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49455">CVE-2022-49455 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49459/">CVE-2022-49459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49459">CVE-2022-49459 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49460/">CVE-2022-49460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49460">CVE-2022-49460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49462/">CVE-2022-49462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49462">CVE-2022-49462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49463/">CVE-2022-49463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49463">CVE-2022-49463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49466/">CVE-2022-49466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49466">CVE-2022-49466 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49467/">CVE-2022-49467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49467">CVE-2022-49467 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49468/">CVE-2022-49468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49468">CVE-2022-49468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49472/">CVE-2022-49472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49472">CVE-2022-49472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49473/">CVE-2022-49473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49473">CVE-2022-49473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49474/">CVE-2022-49474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49474">CVE-2022-49474 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49475/">CVE-2022-49475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49475">CVE-2022-49475 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49477/">CVE-2022-49477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49477">CVE-2022-49477 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49478/">CVE-2022-49478 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49478">CVE-2022-49478 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49480/">CVE-2022-49480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49480">CVE-2022-49480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49481/">CVE-2022-49481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49481">CVE-2022-49481 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49482/">CVE-2022-49482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49482">CVE-2022-49482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49486/">CVE-2022-49486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49486">CVE-2022-49486 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49487/">CVE-2022-49487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49487">CVE-2022-49487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49488/">CVE-2022-49488 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49488">CVE-2022-49488 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49489/">CVE-2022-49489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49489">CVE-2022-49489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49490/">CVE-2022-49490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49490">CVE-2022-49490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49491/">CVE-2022-49491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49491">CVE-2022-49491 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49492/">CVE-2022-49492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49492">CVE-2022-49492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49493/">CVE-2022-49493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49493">CVE-2022-49493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49494/">CVE-2022-49494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49494">CVE-2022-49494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49495/">CVE-2022-49495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49495">CVE-2022-49495 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49498/">CVE-2022-49498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49498">CVE-2022-49498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49501/">CVE-2022-49501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49501">CVE-2022-49501 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49502/">CVE-2022-49502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49502">CVE-2022-49502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49503/">CVE-2022-49503 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49503">CVE-2022-49503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49504/">CVE-2022-49504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49504">CVE-2022-49504 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49505/">CVE-2022-49505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49505">CVE-2022-49505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49506/">CVE-2022-49506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49506">CVE-2022-49506 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49507/">CVE-2022-49507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49507">CVE-2022-49507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49508/">CVE-2022-49508 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49508">CVE-2022-49508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49509/">CVE-2022-49509 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49509">CVE-2022-49509 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49512/">CVE-2022-49512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49512">CVE-2022-49512 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49514/">CVE-2022-49514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49514">CVE-2022-49514 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49515/">CVE-2022-49515 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49515">CVE-2022-49515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49517/">CVE-2022-49517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49517">CVE-2022-49517 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49519/">CVE-2022-49519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49519">CVE-2022-49519 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49520/">CVE-2022-49520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49520">CVE-2022-49520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49521/">CVE-2022-49521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49521">CVE-2022-49521 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49522/">CVE-2022-49522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49522">CVE-2022-49522 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49523/">CVE-2022-49523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49523">CVE-2022-49523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49524/">CVE-2022-49524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49524">CVE-2022-49524 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49525/">CVE-2022-49525 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49525">CVE-2022-49525 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49526/">CVE-2022-49526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49526">CVE-2022-49526 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49527/">CVE-2022-49527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49527">CVE-2022-49527 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49532/">CVE-2022-49532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49532">CVE-2022-49532 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49534/">CVE-2022-49534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49534">CVE-2022-49534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49535/">CVE-2022-49535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49535">CVE-2022-49535 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49536/">CVE-2022-49536 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49536">CVE-2022-49536 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49537/">CVE-2022-49537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49537">CVE-2022-49537 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49541/">CVE-2022-49541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49541">CVE-2022-49541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49542/">CVE-2022-49542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49542">CVE-2022-49542 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49544/">CVE-2022-49544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49544">CVE-2022-49544 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49545/">CVE-2022-49545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49545">CVE-2022-49545 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49546/">CVE-2022-49546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49546">CVE-2022-49546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49549/">CVE-2022-49549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49549">CVE-2022-49549 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49551/">CVE-2022-49551 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49551">CVE-2022-49551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49555/">CVE-2022-49555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49555">CVE-2022-49555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49556/">CVE-2022-49556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49556">CVE-2022-49556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49559/">CVE-2022-49559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49559">CVE-2022-49559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49562/">CVE-2022-49562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49562">CVE-2022-49562 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49563/">CVE-2022-49563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49563">CVE-2022-49563 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49564/">CVE-2022-49564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49564">CVE-2022-49564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49566/">CVE-2022-49566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49566">CVE-2022-49566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49568/">CVE-2022-49568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49568">CVE-2022-49568 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49569/">CVE-2022-49569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49569">CVE-2022-49569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49570/">CVE-2022-49570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49570">CVE-2022-49570 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49579/">CVE-2022-49579 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49579">CVE-2022-49579 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49581/">CVE-2022-49581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49581">CVE-2022-49581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49583/">CVE-2022-49583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49583">CVE-2022-49583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49584/">CVE-2022-49584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49584">CVE-2022-49584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49591/">CVE-2022-49591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49591">CVE-2022-49591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49592/">CVE-2022-49592 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49592">CVE-2022-49592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49603/">CVE-2022-49603 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49603">CVE-2022-49603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49605/">CVE-2022-49605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49605">CVE-2022-49605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49606/">CVE-2022-49606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49606">CVE-2022-49606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49607/">CVE-2022-49607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49607">CVE-2022-49607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49609/">CVE-2022-49609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49609">CVE-2022-49609 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2022-49610/">CVE-2022-49610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49610">CVE-2022-49610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49611/">CVE-2022-49611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49611">CVE-2022-49611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49613/">CVE-2022-49613 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49613">CVE-2022-49613 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49615/">CVE-2022-49615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49615">CVE-2022-49615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49616/">CVE-2022-49616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49616">CVE-2022-49616 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49617/">CVE-2022-49617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49617">CVE-2022-49617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49618/">CVE-2022-49618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49618">CVE-2022-49618 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49621/">CVE-2022-49621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49621">CVE-2022-49621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49623/">CVE-2022-49623 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49623">CVE-2022-49623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49625/">CVE-2022-49625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49625">CVE-2022-49625 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49626/">CVE-2022-49626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49626">CVE-2022-49626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49627/">CVE-2022-49627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49627">CVE-2022-49627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49628/">CVE-2022-49628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49628">CVE-2022-49628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49631/">CVE-2022-49631 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49631">CVE-2022-49631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49634/">CVE-2022-49634 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49634">CVE-2022-49634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49640/">CVE-2022-49640 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49640">CVE-2022-49640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49641/">CVE-2022-49641 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49641">CVE-2022-49641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49642/">CVE-2022-49642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49642">CVE-2022-49642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49643/">CVE-2022-49643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49643">CVE-2022-49643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49644/">CVE-2022-49644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49644">CVE-2022-49644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49645/">CVE-2022-49645 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49645">CVE-2022-49645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49646/">CVE-2022-49646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49646">CVE-2022-49646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49647/">CVE-2022-49647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49647">CVE-2022-49647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49648/">CVE-2022-49648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49648">CVE-2022-49648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49649/">CVE-2022-49649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49649">CVE-2022-49649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49652/">CVE-2022-49652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49652">CVE-2022-49652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49653/">CVE-2022-49653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49653">CVE-2022-49653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49656/">CVE-2022-49656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49656">CVE-2022-49656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49657/">CVE-2022-49657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49657">CVE-2022-49657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49661/">CVE-2022-49661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49661">CVE-2022-49661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49663/">CVE-2022-49663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49663">CVE-2022-49663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49665/">CVE-2022-49665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49665">CVE-2022-49665 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49667/">CVE-2022-49667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49667">CVE-2022-49667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49668/">CVE-2022-49668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49668">CVE-2022-49668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49670/">CVE-2022-49670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49670">CVE-2022-49670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49671/">CVE-2022-49671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49671">CVE-2022-49671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49672/">CVE-2022-49672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49672">CVE-2022-49672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49673/">CVE-2022-49673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49673">CVE-2022-49673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49674/">CVE-2022-49674 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49674">CVE-2022-49674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49675/">CVE-2022-49675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49675">CVE-2022-49675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49676/">CVE-2022-49676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49676">CVE-2022-49676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49677/">CVE-2022-49677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49677">CVE-2022-49677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49678/">CVE-2022-49678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49678">CVE-2022-49678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49679/">CVE-2022-49679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49679">CVE-2022-49679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49680/">CVE-2022-49680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49680">CVE-2022-49680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49683/">CVE-2022-49683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49683">CVE-2022-49683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49685/">CVE-2022-49685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49685">CVE-2022-49685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49687/">CVE-2022-49687 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49687">CVE-2022-49687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49688/">CVE-2022-49688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49688">CVE-2022-49688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49693/">CVE-2022-49693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49693">CVE-2022-49693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49695/">CVE-2022-49695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49695">CVE-2022-49695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49699/">CVE-2022-49699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49699">CVE-2022-49699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49700/">CVE-2022-49700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49700">CVE-2022-49700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49701/">CVE-2022-49701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49701">CVE-2022-49701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49703/">CVE-2022-49703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49703">CVE-2022-49703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49704/">CVE-2022-49704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49704">CVE-2022-49704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49705/">CVE-2022-49705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49705">CVE-2022-49705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49707/">CVE-2022-49707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49707">CVE-2022-49707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49708/">CVE-2022-49708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49708">CVE-2022-49708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49710/">CVE-2022-49710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49710">CVE-2022-49710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49711/">CVE-2022-49711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49711">CVE-2022-49711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49712/">CVE-2022-49712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49712">CVE-2022-49712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49713/">CVE-2022-49713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49713">CVE-2022-49713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49714/">CVE-2022-49714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49714">CVE-2022-49714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49715/">CVE-2022-49715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49715">CVE-2022-49715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49716/">CVE-2022-49716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49716">CVE-2022-49716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49719/">CVE-2022-49719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49719">CVE-2022-49719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49720/">CVE-2022-49720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49720">CVE-2022-49720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49721/">CVE-2022-49721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49721">CVE-2022-49721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49722/">CVE-2022-49722 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49722">CVE-2022-49722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49723/">CVE-2022-49723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49723">CVE-2022-49723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49724/">CVE-2022-49724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49724">CVE-2022-49724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49725/">CVE-2022-49725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49725">CVE-2022-49725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49726/">CVE-2022-49726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49726">CVE-2022-49726 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49729/">CVE-2022-49729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49729">CVE-2022-49729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49730/">CVE-2022-49730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49730">CVE-2022-49730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49731/">CVE-2022-49731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49731">CVE-2022-49731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49733/">CVE-2022-49733 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49733">CVE-2022-49733 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28410/">CVE-2023-28410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41092/">CVE-2024-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42098/">CVE-2024-42098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42229/">CVE-2024-42229 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42240/">CVE-2024-42240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42240">CVE-2024-42240 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57996/">CVE-2024-57996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57996">CVE-2024-57996 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58014/">CVE-2024-58014 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58014">CVE-2024-58014 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21718/">CVE-2025-21718 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21718">CVE-2025-21718 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21780/">CVE-2025-21780 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21780">CVE-2025-21780 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970276" comment="kernel-default-5.14.21-150400.24.158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970267" comment="kernel-default-base-5.14.21-150400.24.158.1.150400.24.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206278" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1239330" ref_url="https://bugzilla.suse.com/1239330" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020614.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239330).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-27"/>
	<updated date="2025-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1239330">SUSE bug 1239330</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970335" comment="podman-4.9.5-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970336" comment="podman-remote-4.9.5-150400.4.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206279" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1233307" ref_url="https://bugzilla.suse.com/1233307" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020622.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-28"/>
	<updated date="2025-03-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1233307">SUSE bug 1233307</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970568" comment="libpython3_6m1_0-3.6.15-150300.10.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970569" comment="python3-3.6.15-150300.10.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970570" comment="python3-base-3.6.15-150300.10.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206280" version="1" class="patch">
	<metadata>
		<title>Security update for docker, docker-stable (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1237367" ref_url="https://bugzilla.suse.com/1237367" source="BUGZILLA"/>
		<reference ref_id="1239185" ref_url="https://bugzilla.suse.com/1239185" source="BUGZILLA"/>
		<reference ref_id="1239322" ref_url="https://bugzilla.suse.com/1239322" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23650" ref_url="https://www.suse.com/security/cve/CVE-2024-23650/" source="CVE"/>
		<reference ref_id="CVE-2024-29018" ref_url="https://www.suse.com/security/cve/CVE-2024-29018/" source="CVE"/>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-March/038860.html" source="SUSE-SU"/>
		<description>
This update for docker, docker-stable fixes the following issues:


- CVE-2025-22868: Fixed unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239185).
- CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239322).

Other fixes:
- Make container-selinux requirement conditional on selinux-policy (bsc#1237367)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-31"/>
	<updated date="2025-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1237367">SUSE bug 1237367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239185">SUSE bug 1239185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239322">SUSE bug 1239322</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23650/">CVE-2024-23650 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23650">CVE-2024-23650 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-29018/">CVE-2024-29018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29018">CVE-2024-29018 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970715" comment="docker-27.5.1_ce-150000.218.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206281" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1238591" ref_url="https://bugzilla.suse.com/1238591" source="BUGZILLA"/>
		<reference ref_id="1239625" ref_url="https://bugzilla.suse.com/1239625" source="BUGZILLA"/>
		<reference ref_id="1239637" ref_url="https://bugzilla.suse.com/1239637" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40403" ref_url="https://www.suse.com/security/cve/CVE-2023-40403/" source="CVE"/>
		<reference ref_id="CVE-2024-55549" ref_url="https://www.suse.com/security/cve/CVE-2024-55549/" source="CVE"/>
		<reference ref_id="CVE-2025-24855" ref_url="https://www.suse.com/security/cve/CVE-2025-24855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038900.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issues:

- CVE-2023-40403: Fixed sensitive information disclosure during processing web content (bsc#1238591)
- CVE-2024-55549: Fixed use-after-free in xsltGetInheritedNsList (bsc#1239637)
- CVE-2025-24855: Fixed use-after-free in numbers.c (bsc#1239625)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-03"/>
	<updated date="2025-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1238591">SUSE bug 1238591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239625">SUSE bug 1239625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239637">SUSE bug 1239637</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-40403/">CVE-2023-40403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40403">CVE-2023-40403 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-55549/">CVE-2024-55549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24855/">CVE-2025-24855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974372" comment="libxslt1-1.1.34-150400.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206282" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1180814" ref_url="https://bugzilla.suse.com/1180814" source="BUGZILLA"/>
		<reference ref_id="1183682" ref_url="https://bugzilla.suse.com/1183682" source="BUGZILLA"/>
		<reference ref_id="1190336" ref_url="https://bugzilla.suse.com/1190336" source="BUGZILLA"/>
		<reference ref_id="1190768" ref_url="https://bugzilla.suse.com/1190768" source="BUGZILLA"/>
		<reference ref_id="1190786" ref_url="https://bugzilla.suse.com/1190786" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1194904" ref_url="https://bugzilla.suse.com/1194904" source="BUGZILLA"/>
		<reference ref_id="1195823" ref_url="https://bugzilla.suse.com/1195823" source="BUGZILLA"/>
		<reference ref_id="1196444" ref_url="https://bugzilla.suse.com/1196444" source="BUGZILLA"/>
		<reference ref_id="1197158" ref_url="https://bugzilla.suse.com/1197158" source="BUGZILLA"/>
		<reference ref_id="1197174" ref_url="https://bugzilla.suse.com/1197174" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197246" ref_url="https://bugzilla.suse.com/1197246" source="BUGZILLA"/>
		<reference ref_id="1197302" ref_url="https://bugzilla.suse.com/1197302" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197472" ref_url="https://bugzilla.suse.com/1197472" source="BUGZILLA"/>
		<reference ref_id="1197661" ref_url="https://bugzilla.suse.com/1197661" source="BUGZILLA"/>
		<reference ref_id="1197926" ref_url="https://bugzilla.suse.com/1197926" source="BUGZILLA"/>
		<reference ref_id="1198019" ref_url="https://bugzilla.suse.com/1198019" source="BUGZILLA"/>
		<reference ref_id="1198021" ref_url="https://bugzilla.suse.com/1198021" source="BUGZILLA"/>
		<reference ref_id="1198240" ref_url="https://bugzilla.suse.com/1198240" source="BUGZILLA"/>
		<reference ref_id="1198577" ref_url="https://bugzilla.suse.com/1198577" source="BUGZILLA"/>
		<reference ref_id="1198660" ref_url="https://bugzilla.suse.com/1198660" source="BUGZILLA"/>
		<reference ref_id="1199657" ref_url="https://bugzilla.suse.com/1199657" source="BUGZILLA"/>
		<reference ref_id="1200045" ref_url="https://bugzilla.suse.com/1200045" source="BUGZILLA"/>
		<reference ref_id="1200571" ref_url="https://bugzilla.suse.com/1200571" source="BUGZILLA"/>
		<reference ref_id="1200807" ref_url="https://bugzilla.suse.com/1200807" source="BUGZILLA"/>
		<reference ref_id="1200809" ref_url="https://bugzilla.suse.com/1200809" source="BUGZILLA"/>
		<reference ref_id="1200810" ref_url="https://bugzilla.suse.com/1200810" source="BUGZILLA"/>
		<reference ref_id="1200824" ref_url="https://bugzilla.suse.com/1200824" source="BUGZILLA"/>
		<reference ref_id="1200825" ref_url="https://bugzilla.suse.com/1200825" source="BUGZILLA"/>
		<reference ref_id="1200871" ref_url="https://bugzilla.suse.com/1200871" source="BUGZILLA"/>
		<reference ref_id="1200872" ref_url="https://bugzilla.suse.com/1200872" source="BUGZILLA"/>
		<reference ref_id="1201193" ref_url="https://bugzilla.suse.com/1201193" source="BUGZILLA"/>
		<reference ref_id="1201218" ref_url="https://bugzilla.suse.com/1201218" source="BUGZILLA"/>
		<reference ref_id="1201323" ref_url="https://bugzilla.suse.com/1201323" source="BUGZILLA"/>
		<reference ref_id="1201381" ref_url="https://bugzilla.suse.com/1201381" source="BUGZILLA"/>
		<reference ref_id="1201610" ref_url="https://bugzilla.suse.com/1201610" source="BUGZILLA"/>
		<reference ref_id="1202672" ref_url="https://bugzilla.suse.com/1202672" source="BUGZILLA"/>
		<reference ref_id="1202711" ref_url="https://bugzilla.suse.com/1202711" source="BUGZILLA"/>
		<reference ref_id="1202712" ref_url="https://bugzilla.suse.com/1202712" source="BUGZILLA"/>
		<reference ref_id="1202771" ref_url="https://bugzilla.suse.com/1202771" source="BUGZILLA"/>
		<reference ref_id="1202774" ref_url="https://bugzilla.suse.com/1202774" source="BUGZILLA"/>
		<reference ref_id="1202778" ref_url="https://bugzilla.suse.com/1202778" source="BUGZILLA"/>
		<reference ref_id="1202781" ref_url="https://bugzilla.suse.com/1202781" source="BUGZILLA"/>
		<reference ref_id="1203699" ref_url="https://bugzilla.suse.com/1203699" source="BUGZILLA"/>
		<reference ref_id="1203769" ref_url="https://bugzilla.suse.com/1203769" source="BUGZILLA"/>
		<reference ref_id="1204171" ref_url="https://bugzilla.suse.com/1204171" source="BUGZILLA"/>
		<reference ref_id="1206048" ref_url="https://bugzilla.suse.com/1206048" source="BUGZILLA"/>
		<reference ref_id="1206049" ref_url="https://bugzilla.suse.com/1206049" source="BUGZILLA"/>
		<reference ref_id="1207034" ref_url="https://bugzilla.suse.com/1207034" source="BUGZILLA"/>
		<reference ref_id="1207186" ref_url="https://bugzilla.suse.com/1207186" source="BUGZILLA"/>
		<reference ref_id="1207593" ref_url="https://bugzilla.suse.com/1207593" source="BUGZILLA"/>
		<reference ref_id="1207640" ref_url="https://bugzilla.suse.com/1207640" source="BUGZILLA"/>
		<reference ref_id="1207878" ref_url="https://bugzilla.suse.com/1207878" source="BUGZILLA"/>
		<reference ref_id="1209262" ref_url="https://bugzilla.suse.com/1209262" source="BUGZILLA"/>
		<reference ref_id="1209547" ref_url="https://bugzilla.suse.com/1209547" source="BUGZILLA"/>
		<reference ref_id="1209788" ref_url="https://bugzilla.suse.com/1209788" source="BUGZILLA"/>
		<reference ref_id="1210050" ref_url="https://bugzilla.suse.com/1210050" source="BUGZILLA"/>
		<reference ref_id="1210647" ref_url="https://bugzilla.suse.com/1210647" source="BUGZILLA"/>
		<reference ref_id="1211263" ref_url="https://bugzilla.suse.com/1211263" source="BUGZILLA"/>
		<reference ref_id="1213167" ref_url="https://bugzilla.suse.com/1213167" source="BUGZILLA"/>
		<reference ref_id="1217339" ref_url="https://bugzilla.suse.com/1217339" source="BUGZILLA"/>
		<reference ref_id="1225742" ref_url="https://bugzilla.suse.com/1225742" source="BUGZILLA"/>
		<reference ref_id="1228483" ref_url="https://bugzilla.suse.com/1228483" source="BUGZILLA"/>
		<reference ref_id="1228708" ref_url="https://bugzilla.suse.com/1228708" source="BUGZILLA"/>
		<reference ref_id="1228779" ref_url="https://bugzilla.suse.com/1228779" source="BUGZILLA"/>
		<reference ref_id="1228966" ref_url="https://bugzilla.suse.com/1228966" source="BUGZILLA"/>
		<reference ref_id="1231375" ref_url="https://bugzilla.suse.com/1231375" source="BUGZILLA"/>
		<reference ref_id="1233479" ref_url="https://bugzilla.suse.com/1233479" source="BUGZILLA"/>
		<reference ref_id="1233557" ref_url="https://bugzilla.suse.com/1233557" source="BUGZILLA"/>
		<reference ref_id="1233558" ref_url="https://bugzilla.suse.com/1233558" source="BUGZILLA"/>
		<reference ref_id="1234464" ref_url="https://bugzilla.suse.com/1234464" source="BUGZILLA"/>
		<reference ref_id="1235528" ref_url="https://bugzilla.suse.com/1235528" source="BUGZILLA"/>
		<reference ref_id="1237029" ref_url="https://bugzilla.suse.com/1237029" source="BUGZILLA"/>
		<reference ref_id="1237521" ref_url="https://bugzilla.suse.com/1237521" source="BUGZILLA"/>
		<reference ref_id="1237530" ref_url="https://bugzilla.suse.com/1237530" source="BUGZILLA"/>
		<reference ref_id="1237718" ref_url="https://bugzilla.suse.com/1237718" source="BUGZILLA"/>
		<reference ref_id="1237721" ref_url="https://bugzilla.suse.com/1237721" source="BUGZILLA"/>
		<reference ref_id="1237722" ref_url="https://bugzilla.suse.com/1237722" source="BUGZILLA"/>
		<reference ref_id="1237723" ref_url="https://bugzilla.suse.com/1237723" source="BUGZILLA"/>
		<reference ref_id="1237724" ref_url="https://bugzilla.suse.com/1237724" source="BUGZILLA"/>
		<reference ref_id="1237725" ref_url="https://bugzilla.suse.com/1237725" source="BUGZILLA"/>
		<reference ref_id="1237726" ref_url="https://bugzilla.suse.com/1237726" source="BUGZILLA"/>
		<reference ref_id="1237727" ref_url="https://bugzilla.suse.com/1237727" source="BUGZILLA"/>
		<reference ref_id="1237728" ref_url="https://bugzilla.suse.com/1237728" source="BUGZILLA"/>
		<reference ref_id="1237729" ref_url="https://bugzilla.suse.com/1237729" source="BUGZILLA"/>
		<reference ref_id="1237734" ref_url="https://bugzilla.suse.com/1237734" source="BUGZILLA"/>
		<reference ref_id="1237735" ref_url="https://bugzilla.suse.com/1237735" source="BUGZILLA"/>
		<reference ref_id="1237736" ref_url="https://bugzilla.suse.com/1237736" source="BUGZILLA"/>
		<reference ref_id="1237737" ref_url="https://bugzilla.suse.com/1237737" source="BUGZILLA"/>
		<reference ref_id="1237738" ref_url="https://bugzilla.suse.com/1237738" source="BUGZILLA"/>
		<reference ref_id="1237739" ref_url="https://bugzilla.suse.com/1237739" source="BUGZILLA"/>
		<reference ref_id="1237740" ref_url="https://bugzilla.suse.com/1237740" source="BUGZILLA"/>
		<reference ref_id="1237742" ref_url="https://bugzilla.suse.com/1237742" source="BUGZILLA"/>
		<reference ref_id="1237743" ref_url="https://bugzilla.suse.com/1237743" source="BUGZILLA"/>
		<reference ref_id="1237745" ref_url="https://bugzilla.suse.com/1237745" source="BUGZILLA"/>
		<reference ref_id="1237746" ref_url="https://bugzilla.suse.com/1237746" source="BUGZILLA"/>
		<reference ref_id="1237748" ref_url="https://bugzilla.suse.com/1237748" source="BUGZILLA"/>
		<reference ref_id="1237751" ref_url="https://bugzilla.suse.com/1237751" source="BUGZILLA"/>
		<reference ref_id="1237752" ref_url="https://bugzilla.suse.com/1237752" source="BUGZILLA"/>
		<reference ref_id="1237753" ref_url="https://bugzilla.suse.com/1237753" source="BUGZILLA"/>
		<reference ref_id="1237755" ref_url="https://bugzilla.suse.com/1237755" source="BUGZILLA"/>
		<reference ref_id="1237759" ref_url="https://bugzilla.suse.com/1237759" source="BUGZILLA"/>
		<reference ref_id="1237761" ref_url="https://bugzilla.suse.com/1237761" source="BUGZILLA"/>
		<reference ref_id="1237763" ref_url="https://bugzilla.suse.com/1237763" source="BUGZILLA"/>
		<reference ref_id="1237766" ref_url="https://bugzilla.suse.com/1237766" source="BUGZILLA"/>
		<reference ref_id="1237767" ref_url="https://bugzilla.suse.com/1237767" source="BUGZILLA"/>
		<reference ref_id="1237768" ref_url="https://bugzilla.suse.com/1237768" source="BUGZILLA"/>
		<reference ref_id="1237774" ref_url="https://bugzilla.suse.com/1237774" source="BUGZILLA"/>
		<reference ref_id="1237775" ref_url="https://bugzilla.suse.com/1237775" source="BUGZILLA"/>
		<reference ref_id="1237778" ref_url="https://bugzilla.suse.com/1237778" source="BUGZILLA"/>
		<reference ref_id="1237779" ref_url="https://bugzilla.suse.com/1237779" source="BUGZILLA"/>
		<reference ref_id="1237780" ref_url="https://bugzilla.suse.com/1237780" source="BUGZILLA"/>
		<reference ref_id="1237782" ref_url="https://bugzilla.suse.com/1237782" source="BUGZILLA"/>
		<reference ref_id="1237783" ref_url="https://bugzilla.suse.com/1237783" source="BUGZILLA"/>
		<reference ref_id="1237784" ref_url="https://bugzilla.suse.com/1237784" source="BUGZILLA"/>
		<reference ref_id="1237785" ref_url="https://bugzilla.suse.com/1237785" source="BUGZILLA"/>
		<reference ref_id="1237786" ref_url="https://bugzilla.suse.com/1237786" source="BUGZILLA"/>
		<reference ref_id="1237787" ref_url="https://bugzilla.suse.com/1237787" source="BUGZILLA"/>
		<reference ref_id="1237788" ref_url="https://bugzilla.suse.com/1237788" source="BUGZILLA"/>
		<reference ref_id="1237789" ref_url="https://bugzilla.suse.com/1237789" source="BUGZILLA"/>
		<reference ref_id="1237795" ref_url="https://bugzilla.suse.com/1237795" source="BUGZILLA"/>
		<reference ref_id="1237797" ref_url="https://bugzilla.suse.com/1237797" source="BUGZILLA"/>
		<reference ref_id="1237798" ref_url="https://bugzilla.suse.com/1237798" source="BUGZILLA"/>
		<reference ref_id="1237807" ref_url="https://bugzilla.suse.com/1237807" source="BUGZILLA"/>
		<reference ref_id="1237808" ref_url="https://bugzilla.suse.com/1237808" source="BUGZILLA"/>
		<reference ref_id="1237810" ref_url="https://bugzilla.suse.com/1237810" source="BUGZILLA"/>
		<reference ref_id="1237812" ref_url="https://bugzilla.suse.com/1237812" source="BUGZILLA"/>
		<reference ref_id="1237813" ref_url="https://bugzilla.suse.com/1237813" source="BUGZILLA"/>
		<reference ref_id="1237814" ref_url="https://bugzilla.suse.com/1237814" source="BUGZILLA"/>
		<reference ref_id="1237815" ref_url="https://bugzilla.suse.com/1237815" source="BUGZILLA"/>
		<reference ref_id="1237817" ref_url="https://bugzilla.suse.com/1237817" source="BUGZILLA"/>
		<reference ref_id="1237818" ref_url="https://bugzilla.suse.com/1237818" source="BUGZILLA"/>
		<reference ref_id="1237821" ref_url="https://bugzilla.suse.com/1237821" source="BUGZILLA"/>
		<reference ref_id="1237823" ref_url="https://bugzilla.suse.com/1237823" source="BUGZILLA"/>
		<reference ref_id="1237824" ref_url="https://bugzilla.suse.com/1237824" source="BUGZILLA"/>
		<reference ref_id="1237826" ref_url="https://bugzilla.suse.com/1237826" source="BUGZILLA"/>
		<reference ref_id="1237827" ref_url="https://bugzilla.suse.com/1237827" source="BUGZILLA"/>
		<reference ref_id="1237829" ref_url="https://bugzilla.suse.com/1237829" source="BUGZILLA"/>
		<reference ref_id="1237831" ref_url="https://bugzilla.suse.com/1237831" source="BUGZILLA"/>
		<reference ref_id="1237835" ref_url="https://bugzilla.suse.com/1237835" source="BUGZILLA"/>
		<reference ref_id="1237836" ref_url="https://bugzilla.suse.com/1237836" source="BUGZILLA"/>
		<reference ref_id="1237837" ref_url="https://bugzilla.suse.com/1237837" source="BUGZILLA"/>
		<reference ref_id="1237839" ref_url="https://bugzilla.suse.com/1237839" source="BUGZILLA"/>
		<reference ref_id="1237840" ref_url="https://bugzilla.suse.com/1237840" source="BUGZILLA"/>
		<reference ref_id="1237845" ref_url="https://bugzilla.suse.com/1237845" source="BUGZILLA"/>
		<reference ref_id="1237846" ref_url="https://bugzilla.suse.com/1237846" source="BUGZILLA"/>
		<reference ref_id="1237868" ref_url="https://bugzilla.suse.com/1237868" source="BUGZILLA"/>
		<reference ref_id="1237872" ref_url="https://bugzilla.suse.com/1237872" source="BUGZILLA"/>
		<reference ref_id="1237875" ref_url="https://bugzilla.suse.com/1237875" source="BUGZILLA"/>
		<reference ref_id="1237877" ref_url="https://bugzilla.suse.com/1237877" source="BUGZILLA"/>
		<reference ref_id="1237890" ref_url="https://bugzilla.suse.com/1237890" source="BUGZILLA"/>
		<reference ref_id="1237892" ref_url="https://bugzilla.suse.com/1237892" source="BUGZILLA"/>
		<reference ref_id="1237903" ref_url="https://bugzilla.suse.com/1237903" source="BUGZILLA"/>
		<reference ref_id="1237904" ref_url="https://bugzilla.suse.com/1237904" source="BUGZILLA"/>
		<reference ref_id="1237916" ref_url="https://bugzilla.suse.com/1237916" source="BUGZILLA"/>
		<reference ref_id="1237918" ref_url="https://bugzilla.suse.com/1237918" source="BUGZILLA"/>
		<reference ref_id="1237922" ref_url="https://bugzilla.suse.com/1237922" source="BUGZILLA"/>
		<reference ref_id="1237925" ref_url="https://bugzilla.suse.com/1237925" source="BUGZILLA"/>
		<reference ref_id="1237926" ref_url="https://bugzilla.suse.com/1237926" source="BUGZILLA"/>
		<reference ref_id="1237929" ref_url="https://bugzilla.suse.com/1237929" source="BUGZILLA"/>
		<reference ref_id="1237931" ref_url="https://bugzilla.suse.com/1237931" source="BUGZILLA"/>
		<reference ref_id="1237932" ref_url="https://bugzilla.suse.com/1237932" source="BUGZILLA"/>
		<reference ref_id="1237933" ref_url="https://bugzilla.suse.com/1237933" source="BUGZILLA"/>
		<reference ref_id="1237937" ref_url="https://bugzilla.suse.com/1237937" source="BUGZILLA"/>
		<reference ref_id="1237939" ref_url="https://bugzilla.suse.com/1237939" source="BUGZILLA"/>
		<reference ref_id="1237940" ref_url="https://bugzilla.suse.com/1237940" source="BUGZILLA"/>
		<reference ref_id="1237941" ref_url="https://bugzilla.suse.com/1237941" source="BUGZILLA"/>
		<reference ref_id="1237942" ref_url="https://bugzilla.suse.com/1237942" source="BUGZILLA"/>
		<reference ref_id="1237946" ref_url="https://bugzilla.suse.com/1237946" source="BUGZILLA"/>
		<reference ref_id="1237951" ref_url="https://bugzilla.suse.com/1237951" source="BUGZILLA"/>
		<reference ref_id="1237952" ref_url="https://bugzilla.suse.com/1237952" source="BUGZILLA"/>
		<reference ref_id="1237954" ref_url="https://bugzilla.suse.com/1237954" source="BUGZILLA"/>
		<reference ref_id="1237955" ref_url="https://bugzilla.suse.com/1237955" source="BUGZILLA"/>
		<reference ref_id="1237957" ref_url="https://bugzilla.suse.com/1237957" source="BUGZILLA"/>
		<reference ref_id="1237958" ref_url="https://bugzilla.suse.com/1237958" source="BUGZILLA"/>
		<reference ref_id="1237959" ref_url="https://bugzilla.suse.com/1237959" source="BUGZILLA"/>
		<reference ref_id="1237960" ref_url="https://bugzilla.suse.com/1237960" source="BUGZILLA"/>
		<reference ref_id="1237961" ref_url="https://bugzilla.suse.com/1237961" source="BUGZILLA"/>
		<reference ref_id="1237963" ref_url="https://bugzilla.suse.com/1237963" source="BUGZILLA"/>
		<reference ref_id="1237965" ref_url="https://bugzilla.suse.com/1237965" source="BUGZILLA"/>
		<reference ref_id="1237966" ref_url="https://bugzilla.suse.com/1237966" source="BUGZILLA"/>
		<reference ref_id="1237967" ref_url="https://bugzilla.suse.com/1237967" source="BUGZILLA"/>
		<reference ref_id="1237968" ref_url="https://bugzilla.suse.com/1237968" source="BUGZILLA"/>
		<reference ref_id="1237969" ref_url="https://bugzilla.suse.com/1237969" source="BUGZILLA"/>
		<reference ref_id="1237970" ref_url="https://bugzilla.suse.com/1237970" source="BUGZILLA"/>
		<reference ref_id="1237971" ref_url="https://bugzilla.suse.com/1237971" source="BUGZILLA"/>
		<reference ref_id="1237973" ref_url="https://bugzilla.suse.com/1237973" source="BUGZILLA"/>
		<reference ref_id="1237975" ref_url="https://bugzilla.suse.com/1237975" source="BUGZILLA"/>
		<reference ref_id="1237976" ref_url="https://bugzilla.suse.com/1237976" source="BUGZILLA"/>
		<reference ref_id="1237978" ref_url="https://bugzilla.suse.com/1237978" source="BUGZILLA"/>
		<reference ref_id="1237979" ref_url="https://bugzilla.suse.com/1237979" source="BUGZILLA"/>
		<reference ref_id="1237983" ref_url="https://bugzilla.suse.com/1237983" source="BUGZILLA"/>
		<reference ref_id="1237984" ref_url="https://bugzilla.suse.com/1237984" source="BUGZILLA"/>
		<reference ref_id="1237986" ref_url="https://bugzilla.suse.com/1237986" source="BUGZILLA"/>
		<reference ref_id="1237987" ref_url="https://bugzilla.suse.com/1237987" source="BUGZILLA"/>
		<reference ref_id="1237990" ref_url="https://bugzilla.suse.com/1237990" source="BUGZILLA"/>
		<reference ref_id="1237996" ref_url="https://bugzilla.suse.com/1237996" source="BUGZILLA"/>
		<reference ref_id="1237997" ref_url="https://bugzilla.suse.com/1237997" source="BUGZILLA"/>
		<reference ref_id="1237998" ref_url="https://bugzilla.suse.com/1237998" source="BUGZILLA"/>
		<reference ref_id="1237999" ref_url="https://bugzilla.suse.com/1237999" source="BUGZILLA"/>
		<reference ref_id="1238000" ref_url="https://bugzilla.suse.com/1238000" source="BUGZILLA"/>
		<reference ref_id="1238003" ref_url="https://bugzilla.suse.com/1238003" source="BUGZILLA"/>
		<reference ref_id="1238006" ref_url="https://bugzilla.suse.com/1238006" source="BUGZILLA"/>
		<reference ref_id="1238007" ref_url="https://bugzilla.suse.com/1238007" source="BUGZILLA"/>
		<reference ref_id="1238010" ref_url="https://bugzilla.suse.com/1238010" source="BUGZILLA"/>
		<reference ref_id="1238011" ref_url="https://bugzilla.suse.com/1238011" source="BUGZILLA"/>
		<reference ref_id="1238012" ref_url="https://bugzilla.suse.com/1238012" source="BUGZILLA"/>
		<reference ref_id="1238013" ref_url="https://bugzilla.suse.com/1238013" source="BUGZILLA"/>
		<reference ref_id="1238014" ref_url="https://bugzilla.suse.com/1238014" source="BUGZILLA"/>
		<reference ref_id="1238016" ref_url="https://bugzilla.suse.com/1238016" source="BUGZILLA"/>
		<reference ref_id="1238017" ref_url="https://bugzilla.suse.com/1238017" source="BUGZILLA"/>
		<reference ref_id="1238018" ref_url="https://bugzilla.suse.com/1238018" source="BUGZILLA"/>
		<reference ref_id="1238019" ref_url="https://bugzilla.suse.com/1238019" source="BUGZILLA"/>
		<reference ref_id="1238021" ref_url="https://bugzilla.suse.com/1238021" source="BUGZILLA"/>
		<reference ref_id="1238022" ref_url="https://bugzilla.suse.com/1238022" source="BUGZILLA"/>
		<reference ref_id="1238024" ref_url="https://bugzilla.suse.com/1238024" source="BUGZILLA"/>
		<reference ref_id="1238030" ref_url="https://bugzilla.suse.com/1238030" source="BUGZILLA"/>
		<reference ref_id="1238036" ref_url="https://bugzilla.suse.com/1238036" source="BUGZILLA"/>
		<reference ref_id="1238037" ref_url="https://bugzilla.suse.com/1238037" source="BUGZILLA"/>
		<reference ref_id="1238041" ref_url="https://bugzilla.suse.com/1238041" source="BUGZILLA"/>
		<reference ref_id="1238046" ref_url="https://bugzilla.suse.com/1238046" source="BUGZILLA"/>
		<reference ref_id="1238047" ref_url="https://bugzilla.suse.com/1238047" source="BUGZILLA"/>
		<reference ref_id="1238071" ref_url="https://bugzilla.suse.com/1238071" source="BUGZILLA"/>
		<reference ref_id="1238077" ref_url="https://bugzilla.suse.com/1238077" source="BUGZILLA"/>
		<reference ref_id="1238079" ref_url="https://bugzilla.suse.com/1238079" source="BUGZILLA"/>
		<reference ref_id="1238080" ref_url="https://bugzilla.suse.com/1238080" source="BUGZILLA"/>
		<reference ref_id="1238089" ref_url="https://bugzilla.suse.com/1238089" source="BUGZILLA"/>
		<reference ref_id="1238090" ref_url="https://bugzilla.suse.com/1238090" source="BUGZILLA"/>
		<reference ref_id="1238091" ref_url="https://bugzilla.suse.com/1238091" source="BUGZILLA"/>
		<reference ref_id="1238092" ref_url="https://bugzilla.suse.com/1238092" source="BUGZILLA"/>
		<reference ref_id="1238096" ref_url="https://bugzilla.suse.com/1238096" source="BUGZILLA"/>
		<reference ref_id="1238097" ref_url="https://bugzilla.suse.com/1238097" source="BUGZILLA"/>
		<reference ref_id="1238099" ref_url="https://bugzilla.suse.com/1238099" source="BUGZILLA"/>
		<reference ref_id="1238103" ref_url="https://bugzilla.suse.com/1238103" source="BUGZILLA"/>
		<reference ref_id="1238105" ref_url="https://bugzilla.suse.com/1238105" source="BUGZILLA"/>
		<reference ref_id="1238106" ref_url="https://bugzilla.suse.com/1238106" source="BUGZILLA"/>
		<reference ref_id="1238108" ref_url="https://bugzilla.suse.com/1238108" source="BUGZILLA"/>
		<reference ref_id="1238110" ref_url="https://bugzilla.suse.com/1238110" source="BUGZILLA"/>
		<reference ref_id="1238111" ref_url="https://bugzilla.suse.com/1238111" source="BUGZILLA"/>
		<reference ref_id="1238112" ref_url="https://bugzilla.suse.com/1238112" source="BUGZILLA"/>
		<reference ref_id="1238113" ref_url="https://bugzilla.suse.com/1238113" source="BUGZILLA"/>
		<reference ref_id="1238115" ref_url="https://bugzilla.suse.com/1238115" source="BUGZILLA"/>
		<reference ref_id="1238116" ref_url="https://bugzilla.suse.com/1238116" source="BUGZILLA"/>
		<reference ref_id="1238120" ref_url="https://bugzilla.suse.com/1238120" source="BUGZILLA"/>
		<reference ref_id="1238123" ref_url="https://bugzilla.suse.com/1238123" source="BUGZILLA"/>
		<reference ref_id="1238125" ref_url="https://bugzilla.suse.com/1238125" source="BUGZILLA"/>
		<reference ref_id="1238126" ref_url="https://bugzilla.suse.com/1238126" source="BUGZILLA"/>
		<reference ref_id="1238127" ref_url="https://bugzilla.suse.com/1238127" source="BUGZILLA"/>
		<reference ref_id="1238131" ref_url="https://bugzilla.suse.com/1238131" source="BUGZILLA"/>
		<reference ref_id="1238134" ref_url="https://bugzilla.suse.com/1238134" source="BUGZILLA"/>
		<reference ref_id="1238135" ref_url="https://bugzilla.suse.com/1238135" source="BUGZILLA"/>
		<reference ref_id="1238138" ref_url="https://bugzilla.suse.com/1238138" source="BUGZILLA"/>
		<reference ref_id="1238139" ref_url="https://bugzilla.suse.com/1238139" source="BUGZILLA"/>
		<reference ref_id="1238140" ref_url="https://bugzilla.suse.com/1238140" source="BUGZILLA"/>
		<reference ref_id="1238142" ref_url="https://bugzilla.suse.com/1238142" source="BUGZILLA"/>
		<reference ref_id="1238144" ref_url="https://bugzilla.suse.com/1238144" source="BUGZILLA"/>
		<reference ref_id="1238146" ref_url="https://bugzilla.suse.com/1238146" source="BUGZILLA"/>
		<reference ref_id="1238147" ref_url="https://bugzilla.suse.com/1238147" source="BUGZILLA"/>
		<reference ref_id="1238149" ref_url="https://bugzilla.suse.com/1238149" source="BUGZILLA"/>
		<reference ref_id="1238150" ref_url="https://bugzilla.suse.com/1238150" source="BUGZILLA"/>
		<reference ref_id="1238155" ref_url="https://bugzilla.suse.com/1238155" source="BUGZILLA"/>
		<reference ref_id="1238156" ref_url="https://bugzilla.suse.com/1238156" source="BUGZILLA"/>
		<reference ref_id="1238157" ref_url="https://bugzilla.suse.com/1238157" source="BUGZILLA"/>
		<reference ref_id="1238158" ref_url="https://bugzilla.suse.com/1238158" source="BUGZILLA"/>
		<reference ref_id="1238162" ref_url="https://bugzilla.suse.com/1238162" source="BUGZILLA"/>
		<reference ref_id="1238166" ref_url="https://bugzilla.suse.com/1238166" source="BUGZILLA"/>
		<reference ref_id="1238167" ref_url="https://bugzilla.suse.com/1238167" source="BUGZILLA"/>
		<reference ref_id="1238168" ref_url="https://bugzilla.suse.com/1238168" source="BUGZILLA"/>
		<reference ref_id="1238169" ref_url="https://bugzilla.suse.com/1238169" source="BUGZILLA"/>
		<reference ref_id="1238170" ref_url="https://bugzilla.suse.com/1238170" source="BUGZILLA"/>
		<reference ref_id="1238171" ref_url="https://bugzilla.suse.com/1238171" source="BUGZILLA"/>
		<reference ref_id="1238172" ref_url="https://bugzilla.suse.com/1238172" source="BUGZILLA"/>
		<reference ref_id="1238175" ref_url="https://bugzilla.suse.com/1238175" source="BUGZILLA"/>
		<reference ref_id="1238176" ref_url="https://bugzilla.suse.com/1238176" source="BUGZILLA"/>
		<reference ref_id="1238177" ref_url="https://bugzilla.suse.com/1238177" source="BUGZILLA"/>
		<reference ref_id="1238180" ref_url="https://bugzilla.suse.com/1238180" source="BUGZILLA"/>
		<reference ref_id="1238181" ref_url="https://bugzilla.suse.com/1238181" source="BUGZILLA"/>
		<reference ref_id="1238183" ref_url="https://bugzilla.suse.com/1238183" source="BUGZILLA"/>
		<reference ref_id="1238184" ref_url="https://bugzilla.suse.com/1238184" source="BUGZILLA"/>
		<reference ref_id="1238228" ref_url="https://bugzilla.suse.com/1238228" source="BUGZILLA"/>
		<reference ref_id="1238229" ref_url="https://bugzilla.suse.com/1238229" source="BUGZILLA"/>
		<reference ref_id="1238231" ref_url="https://bugzilla.suse.com/1238231" source="BUGZILLA"/>
		<reference ref_id="1238234" ref_url="https://bugzilla.suse.com/1238234" source="BUGZILLA"/>
		<reference ref_id="1238235" ref_url="https://bugzilla.suse.com/1238235" source="BUGZILLA"/>
		<reference ref_id="1238236" ref_url="https://bugzilla.suse.com/1238236" source="BUGZILLA"/>
		<reference ref_id="1238238" ref_url="https://bugzilla.suse.com/1238238" source="BUGZILLA"/>
		<reference ref_id="1238239" ref_url="https://bugzilla.suse.com/1238239" source="BUGZILLA"/>
		<reference ref_id="1238241" ref_url="https://bugzilla.suse.com/1238241" source="BUGZILLA"/>
		<reference ref_id="1238242" ref_url="https://bugzilla.suse.com/1238242" source="BUGZILLA"/>
		<reference ref_id="1238243" ref_url="https://bugzilla.suse.com/1238243" source="BUGZILLA"/>
		<reference ref_id="1238244" ref_url="https://bugzilla.suse.com/1238244" source="BUGZILLA"/>
		<reference ref_id="1238246" ref_url="https://bugzilla.suse.com/1238246" source="BUGZILLA"/>
		<reference ref_id="1238247" ref_url="https://bugzilla.suse.com/1238247" source="BUGZILLA"/>
		<reference ref_id="1238248" ref_url="https://bugzilla.suse.com/1238248" source="BUGZILLA"/>
		<reference ref_id="1238249" ref_url="https://bugzilla.suse.com/1238249" source="BUGZILLA"/>
		<reference ref_id="1238253" ref_url="https://bugzilla.suse.com/1238253" source="BUGZILLA"/>
		<reference ref_id="1238255" ref_url="https://bugzilla.suse.com/1238255" source="BUGZILLA"/>
		<reference ref_id="1238256" ref_url="https://bugzilla.suse.com/1238256" source="BUGZILLA"/>
		<reference ref_id="1238257" ref_url="https://bugzilla.suse.com/1238257" source="BUGZILLA"/>
		<reference ref_id="1238260" ref_url="https://bugzilla.suse.com/1238260" source="BUGZILLA"/>
		<reference ref_id="1238262" ref_url="https://bugzilla.suse.com/1238262" source="BUGZILLA"/>
		<reference ref_id="1238263" ref_url="https://bugzilla.suse.com/1238263" source="BUGZILLA"/>
		<reference ref_id="1238264" ref_url="https://bugzilla.suse.com/1238264" source="BUGZILLA"/>
		<reference ref_id="1238266" ref_url="https://bugzilla.suse.com/1238266" source="BUGZILLA"/>
		<reference ref_id="1238267" ref_url="https://bugzilla.suse.com/1238267" source="BUGZILLA"/>
		<reference ref_id="1238268" ref_url="https://bugzilla.suse.com/1238268" source="BUGZILLA"/>
		<reference ref_id="1238269" ref_url="https://bugzilla.suse.com/1238269" source="BUGZILLA"/>
		<reference ref_id="1238270" ref_url="https://bugzilla.suse.com/1238270" source="BUGZILLA"/>
		<reference ref_id="1238271" ref_url="https://bugzilla.suse.com/1238271" source="BUGZILLA"/>
		<reference ref_id="1238272" ref_url="https://bugzilla.suse.com/1238272" source="BUGZILLA"/>
		<reference ref_id="1238274" ref_url="https://bugzilla.suse.com/1238274" source="BUGZILLA"/>
		<reference ref_id="1238275" ref_url="https://bugzilla.suse.com/1238275" source="BUGZILLA"/>
		<reference ref_id="1238276" ref_url="https://bugzilla.suse.com/1238276" source="BUGZILLA"/>
		<reference ref_id="1238277" ref_url="https://bugzilla.suse.com/1238277" source="BUGZILLA"/>
		<reference ref_id="1238278" ref_url="https://bugzilla.suse.com/1238278" source="BUGZILLA"/>
		<reference ref_id="1238279" ref_url="https://bugzilla.suse.com/1238279" source="BUGZILLA"/>
		<reference ref_id="1238281" ref_url="https://bugzilla.suse.com/1238281" source="BUGZILLA"/>
		<reference ref_id="1238282" ref_url="https://bugzilla.suse.com/1238282" source="BUGZILLA"/>
		<reference ref_id="1238283" ref_url="https://bugzilla.suse.com/1238283" source="BUGZILLA"/>
		<reference ref_id="1238284" ref_url="https://bugzilla.suse.com/1238284" source="BUGZILLA"/>
		<reference ref_id="1238286" ref_url="https://bugzilla.suse.com/1238286" source="BUGZILLA"/>
		<reference ref_id="1238287" ref_url="https://bugzilla.suse.com/1238287" source="BUGZILLA"/>
		<reference ref_id="1238288" ref_url="https://bugzilla.suse.com/1238288" source="BUGZILLA"/>
		<reference ref_id="1238289" ref_url="https://bugzilla.suse.com/1238289" source="BUGZILLA"/>
		<reference ref_id="1238292" ref_url="https://bugzilla.suse.com/1238292" source="BUGZILLA"/>
		<reference ref_id="1238293" ref_url="https://bugzilla.suse.com/1238293" source="BUGZILLA"/>
		<reference ref_id="1238295" ref_url="https://bugzilla.suse.com/1238295" source="BUGZILLA"/>
		<reference ref_id="1238298" ref_url="https://bugzilla.suse.com/1238298" source="BUGZILLA"/>
		<reference ref_id="1238301" ref_url="https://bugzilla.suse.com/1238301" source="BUGZILLA"/>
		<reference ref_id="1238302" ref_url="https://bugzilla.suse.com/1238302" source="BUGZILLA"/>
		<reference ref_id="1238306" ref_url="https://bugzilla.suse.com/1238306" source="BUGZILLA"/>
		<reference ref_id="1238307" ref_url="https://bugzilla.suse.com/1238307" source="BUGZILLA"/>
		<reference ref_id="1238308" ref_url="https://bugzilla.suse.com/1238308" source="BUGZILLA"/>
		<reference ref_id="1238309" ref_url="https://bugzilla.suse.com/1238309" source="BUGZILLA"/>
		<reference ref_id="1238311" ref_url="https://bugzilla.suse.com/1238311" source="BUGZILLA"/>
		<reference ref_id="1238313" ref_url="https://bugzilla.suse.com/1238313" source="BUGZILLA"/>
		<reference ref_id="1238326" ref_url="https://bugzilla.suse.com/1238326" source="BUGZILLA"/>
		<reference ref_id="1238327" ref_url="https://bugzilla.suse.com/1238327" source="BUGZILLA"/>
		<reference ref_id="1238328" ref_url="https://bugzilla.suse.com/1238328" source="BUGZILLA"/>
		<reference ref_id="1238331" ref_url="https://bugzilla.suse.com/1238331" source="BUGZILLA"/>
		<reference ref_id="1238333" ref_url="https://bugzilla.suse.com/1238333" source="BUGZILLA"/>
		<reference ref_id="1238334" ref_url="https://bugzilla.suse.com/1238334" source="BUGZILLA"/>
		<reference ref_id="1238336" ref_url="https://bugzilla.suse.com/1238336" source="BUGZILLA"/>
		<reference ref_id="1238337" ref_url="https://bugzilla.suse.com/1238337" source="BUGZILLA"/>
		<reference ref_id="1238338" ref_url="https://bugzilla.suse.com/1238338" source="BUGZILLA"/>
		<reference ref_id="1238339" ref_url="https://bugzilla.suse.com/1238339" source="BUGZILLA"/>
		<reference ref_id="1238343" ref_url="https://bugzilla.suse.com/1238343" source="BUGZILLA"/>
		<reference ref_id="1238345" ref_url="https://bugzilla.suse.com/1238345" source="BUGZILLA"/>
		<reference ref_id="1238372" ref_url="https://bugzilla.suse.com/1238372" source="BUGZILLA"/>
		<reference ref_id="1238373" ref_url="https://bugzilla.suse.com/1238373" source="BUGZILLA"/>
		<reference ref_id="1238374" ref_url="https://bugzilla.suse.com/1238374" source="BUGZILLA"/>
		<reference ref_id="1238376" ref_url="https://bugzilla.suse.com/1238376" source="BUGZILLA"/>
		<reference ref_id="1238377" ref_url="https://bugzilla.suse.com/1238377" source="BUGZILLA"/>
		<reference ref_id="1238381" ref_url="https://bugzilla.suse.com/1238381" source="BUGZILLA"/>
		<reference ref_id="1238382" ref_url="https://bugzilla.suse.com/1238382" source="BUGZILLA"/>
		<reference ref_id="1238383" ref_url="https://bugzilla.suse.com/1238383" source="BUGZILLA"/>
		<reference ref_id="1238386" ref_url="https://bugzilla.suse.com/1238386" source="BUGZILLA"/>
		<reference ref_id="1238387" ref_url="https://bugzilla.suse.com/1238387" source="BUGZILLA"/>
		<reference ref_id="1238388" ref_url="https://bugzilla.suse.com/1238388" source="BUGZILLA"/>
		<reference ref_id="1238389" ref_url="https://bugzilla.suse.com/1238389" source="BUGZILLA"/>
		<reference ref_id="1238390" ref_url="https://bugzilla.suse.com/1238390" source="BUGZILLA"/>
		<reference ref_id="1238391" ref_url="https://bugzilla.suse.com/1238391" source="BUGZILLA"/>
		<reference ref_id="1238392" ref_url="https://bugzilla.suse.com/1238392" source="BUGZILLA"/>
		<reference ref_id="1238393" ref_url="https://bugzilla.suse.com/1238393" source="BUGZILLA"/>
		<reference ref_id="1238394" ref_url="https://bugzilla.suse.com/1238394" source="BUGZILLA"/>
		<reference ref_id="1238395" ref_url="https://bugzilla.suse.com/1238395" source="BUGZILLA"/>
		<reference ref_id="1238396" ref_url="https://bugzilla.suse.com/1238396" source="BUGZILLA"/>
		<reference ref_id="1238397" ref_url="https://bugzilla.suse.com/1238397" source="BUGZILLA"/>
		<reference ref_id="1238400" ref_url="https://bugzilla.suse.com/1238400" source="BUGZILLA"/>
		<reference ref_id="1238410" ref_url="https://bugzilla.suse.com/1238410" source="BUGZILLA"/>
		<reference ref_id="1238411" ref_url="https://bugzilla.suse.com/1238411" source="BUGZILLA"/>
		<reference ref_id="1238413" ref_url="https://bugzilla.suse.com/1238413" source="BUGZILLA"/>
		<reference ref_id="1238415" ref_url="https://bugzilla.suse.com/1238415" source="BUGZILLA"/>
		<reference ref_id="1238416" ref_url="https://bugzilla.suse.com/1238416" source="BUGZILLA"/>
		<reference ref_id="1238417" ref_url="https://bugzilla.suse.com/1238417" source="BUGZILLA"/>
		<reference ref_id="1238418" ref_url="https://bugzilla.suse.com/1238418" source="BUGZILLA"/>
		<reference ref_id="1238419" ref_url="https://bugzilla.suse.com/1238419" source="BUGZILLA"/>
		<reference ref_id="1238420" ref_url="https://bugzilla.suse.com/1238420" source="BUGZILLA"/>
		<reference ref_id="1238423" ref_url="https://bugzilla.suse.com/1238423" source="BUGZILLA"/>
		<reference ref_id="1238428" ref_url="https://bugzilla.suse.com/1238428" source="BUGZILLA"/>
		<reference ref_id="1238429" ref_url="https://bugzilla.suse.com/1238429" source="BUGZILLA"/>
		<reference ref_id="1238430" ref_url="https://bugzilla.suse.com/1238430" source="BUGZILLA"/>
		<reference ref_id="1238431" ref_url="https://bugzilla.suse.com/1238431" source="BUGZILLA"/>
		<reference ref_id="1238432" ref_url="https://bugzilla.suse.com/1238432" source="BUGZILLA"/>
		<reference ref_id="1238433" ref_url="https://bugzilla.suse.com/1238433" source="BUGZILLA"/>
		<reference ref_id="1238434" ref_url="https://bugzilla.suse.com/1238434" source="BUGZILLA"/>
		<reference ref_id="1238435" ref_url="https://bugzilla.suse.com/1238435" source="BUGZILLA"/>
		<reference ref_id="1238436" ref_url="https://bugzilla.suse.com/1238436" source="BUGZILLA"/>
		<reference ref_id="1238437" ref_url="https://bugzilla.suse.com/1238437" source="BUGZILLA"/>
		<reference ref_id="1238440" ref_url="https://bugzilla.suse.com/1238440" source="BUGZILLA"/>
		<reference ref_id="1238441" ref_url="https://bugzilla.suse.com/1238441" source="BUGZILLA"/>
		<reference ref_id="1238442" ref_url="https://bugzilla.suse.com/1238442" source="BUGZILLA"/>
		<reference ref_id="1238443" ref_url="https://bugzilla.suse.com/1238443" source="BUGZILLA"/>
		<reference ref_id="1238444" ref_url="https://bugzilla.suse.com/1238444" source="BUGZILLA"/>
		<reference ref_id="1238445" ref_url="https://bugzilla.suse.com/1238445" source="BUGZILLA"/>
		<reference ref_id="1238446" ref_url="https://bugzilla.suse.com/1238446" source="BUGZILLA"/>
		<reference ref_id="1238447" ref_url="https://bugzilla.suse.com/1238447" source="BUGZILLA"/>
		<reference ref_id="1238453" ref_url="https://bugzilla.suse.com/1238453" source="BUGZILLA"/>
		<reference ref_id="1238454" ref_url="https://bugzilla.suse.com/1238454" source="BUGZILLA"/>
		<reference ref_id="1238458" ref_url="https://bugzilla.suse.com/1238458" source="BUGZILLA"/>
		<reference ref_id="1238459" ref_url="https://bugzilla.suse.com/1238459" source="BUGZILLA"/>
		<reference ref_id="1238462" ref_url="https://bugzilla.suse.com/1238462" source="BUGZILLA"/>
		<reference ref_id="1238463" ref_url="https://bugzilla.suse.com/1238463" source="BUGZILLA"/>
		<reference ref_id="1238465" ref_url="https://bugzilla.suse.com/1238465" source="BUGZILLA"/>
		<reference ref_id="1238467" ref_url="https://bugzilla.suse.com/1238467" source="BUGZILLA"/>
		<reference ref_id="1238469" ref_url="https://bugzilla.suse.com/1238469" source="BUGZILLA"/>
		<reference ref_id="1238533" ref_url="https://bugzilla.suse.com/1238533" source="BUGZILLA"/>
		<reference ref_id="1238536" ref_url="https://bugzilla.suse.com/1238536" source="BUGZILLA"/>
		<reference ref_id="1238538" ref_url="https://bugzilla.suse.com/1238538" source="BUGZILLA"/>
		<reference ref_id="1238539" ref_url="https://bugzilla.suse.com/1238539" source="BUGZILLA"/>
		<reference ref_id="1238540" ref_url="https://bugzilla.suse.com/1238540" source="BUGZILLA"/>
		<reference ref_id="1238543" ref_url="https://bugzilla.suse.com/1238543" source="BUGZILLA"/>
		<reference ref_id="1238545" ref_url="https://bugzilla.suse.com/1238545" source="BUGZILLA"/>
		<reference ref_id="1238546" ref_url="https://bugzilla.suse.com/1238546" source="BUGZILLA"/>
		<reference ref_id="1238556" ref_url="https://bugzilla.suse.com/1238556" source="BUGZILLA"/>
		<reference ref_id="1238557" ref_url="https://bugzilla.suse.com/1238557" source="BUGZILLA"/>
		<reference ref_id="1238599" ref_url="https://bugzilla.suse.com/1238599" source="BUGZILLA"/>
		<reference ref_id="1238600" ref_url="https://bugzilla.suse.com/1238600" source="BUGZILLA"/>
		<reference ref_id="1238601" ref_url="https://bugzilla.suse.com/1238601" source="BUGZILLA"/>
		<reference ref_id="1238602" ref_url="https://bugzilla.suse.com/1238602" source="BUGZILLA"/>
		<reference ref_id="1238605" ref_url="https://bugzilla.suse.com/1238605" source="BUGZILLA"/>
		<reference ref_id="1238612" ref_url="https://bugzilla.suse.com/1238612" source="BUGZILLA"/>
		<reference ref_id="1238615" ref_url="https://bugzilla.suse.com/1238615" source="BUGZILLA"/>
		<reference ref_id="1238617" ref_url="https://bugzilla.suse.com/1238617" source="BUGZILLA"/>
		<reference ref_id="1238618" ref_url="https://bugzilla.suse.com/1238618" source="BUGZILLA"/>
		<reference ref_id="1238619" ref_url="https://bugzilla.suse.com/1238619" source="BUGZILLA"/>
		<reference ref_id="1238621" ref_url="https://bugzilla.suse.com/1238621" source="BUGZILLA"/>
		<reference ref_id="1238623" ref_url="https://bugzilla.suse.com/1238623" source="BUGZILLA"/>
		<reference ref_id="1238625" ref_url="https://bugzilla.suse.com/1238625" source="BUGZILLA"/>
		<reference ref_id="1238626" ref_url="https://bugzilla.suse.com/1238626" source="BUGZILLA"/>
		<reference ref_id="1238630" ref_url="https://bugzilla.suse.com/1238630" source="BUGZILLA"/>
		<reference ref_id="1238631" ref_url="https://bugzilla.suse.com/1238631" source="BUGZILLA"/>
		<reference ref_id="1238632" ref_url="https://bugzilla.suse.com/1238632" source="BUGZILLA"/>
		<reference ref_id="1238633" ref_url="https://bugzilla.suse.com/1238633" source="BUGZILLA"/>
		<reference ref_id="1238635" ref_url="https://bugzilla.suse.com/1238635" source="BUGZILLA"/>
		<reference ref_id="1238636" ref_url="https://bugzilla.suse.com/1238636" source="BUGZILLA"/>
		<reference ref_id="1238638" ref_url="https://bugzilla.suse.com/1238638" source="BUGZILLA"/>
		<reference ref_id="1238639" ref_url="https://bugzilla.suse.com/1238639" source="BUGZILLA"/>
		<reference ref_id="1238640" ref_url="https://bugzilla.suse.com/1238640" source="BUGZILLA"/>
		<reference ref_id="1238641" ref_url="https://bugzilla.suse.com/1238641" source="BUGZILLA"/>
		<reference ref_id="1238642" ref_url="https://bugzilla.suse.com/1238642" source="BUGZILLA"/>
		<reference ref_id="1238643" ref_url="https://bugzilla.suse.com/1238643" source="BUGZILLA"/>
		<reference ref_id="1238645" ref_url="https://bugzilla.suse.com/1238645" source="BUGZILLA"/>
		<reference ref_id="1238646" ref_url="https://bugzilla.suse.com/1238646" source="BUGZILLA"/>
		<reference ref_id="1238647" ref_url="https://bugzilla.suse.com/1238647" source="BUGZILLA"/>
		<reference ref_id="1238650" ref_url="https://bugzilla.suse.com/1238650" source="BUGZILLA"/>
		<reference ref_id="1238653" ref_url="https://bugzilla.suse.com/1238653" source="BUGZILLA"/>
		<reference ref_id="1238654" ref_url="https://bugzilla.suse.com/1238654" source="BUGZILLA"/>
		<reference ref_id="1238655" ref_url="https://bugzilla.suse.com/1238655" source="BUGZILLA"/>
		<reference ref_id="1238662" ref_url="https://bugzilla.suse.com/1238662" source="BUGZILLA"/>
		<reference ref_id="1238663" ref_url="https://bugzilla.suse.com/1238663" source="BUGZILLA"/>
		<reference ref_id="1238664" ref_url="https://bugzilla.suse.com/1238664" source="BUGZILLA"/>
		<reference ref_id="1238666" ref_url="https://bugzilla.suse.com/1238666" source="BUGZILLA"/>
		<reference ref_id="1238668" ref_url="https://bugzilla.suse.com/1238668" source="BUGZILLA"/>
		<reference ref_id="1238705" ref_url="https://bugzilla.suse.com/1238705" source="BUGZILLA"/>
		<reference ref_id="1238707" ref_url="https://bugzilla.suse.com/1238707" source="BUGZILLA"/>
		<reference ref_id="1238710" ref_url="https://bugzilla.suse.com/1238710" source="BUGZILLA"/>
		<reference ref_id="1238712" ref_url="https://bugzilla.suse.com/1238712" source="BUGZILLA"/>
		<reference ref_id="1238718" ref_url="https://bugzilla.suse.com/1238718" source="BUGZILLA"/>
		<reference ref_id="1238719" ref_url="https://bugzilla.suse.com/1238719" source="BUGZILLA"/>
		<reference ref_id="1238721" ref_url="https://bugzilla.suse.com/1238721" source="BUGZILLA"/>
		<reference ref_id="1238722" ref_url="https://bugzilla.suse.com/1238722" source="BUGZILLA"/>
		<reference ref_id="1238727" ref_url="https://bugzilla.suse.com/1238727" source="BUGZILLA"/>
		<reference ref_id="1238729" ref_url="https://bugzilla.suse.com/1238729" source="BUGZILLA"/>
		<reference ref_id="1238750" ref_url="https://bugzilla.suse.com/1238750" source="BUGZILLA"/>
		<reference ref_id="1238787" ref_url="https://bugzilla.suse.com/1238787" source="BUGZILLA"/>
		<reference ref_id="1238789" ref_url="https://bugzilla.suse.com/1238789" source="BUGZILLA"/>
		<reference ref_id="1238792" ref_url="https://bugzilla.suse.com/1238792" source="BUGZILLA"/>
		<reference ref_id="1238799" ref_url="https://bugzilla.suse.com/1238799" source="BUGZILLA"/>
		<reference ref_id="1238804" ref_url="https://bugzilla.suse.com/1238804" source="BUGZILLA"/>
		<reference ref_id="1238805" ref_url="https://bugzilla.suse.com/1238805" source="BUGZILLA"/>
		<reference ref_id="1238808" ref_url="https://bugzilla.suse.com/1238808" source="BUGZILLA"/>
		<reference ref_id="1238809" ref_url="https://bugzilla.suse.com/1238809" source="BUGZILLA"/>
		<reference ref_id="1238811" ref_url="https://bugzilla.suse.com/1238811" source="BUGZILLA"/>
		<reference ref_id="1238814" ref_url="https://bugzilla.suse.com/1238814" source="BUGZILLA"/>
		<reference ref_id="1238815" ref_url="https://bugzilla.suse.com/1238815" source="BUGZILLA"/>
		<reference ref_id="1238816" ref_url="https://bugzilla.suse.com/1238816" source="BUGZILLA"/>
		<reference ref_id="1238817" ref_url="https://bugzilla.suse.com/1238817" source="BUGZILLA"/>
		<reference ref_id="1238818" ref_url="https://bugzilla.suse.com/1238818" source="BUGZILLA"/>
		<reference ref_id="1238819" ref_url="https://bugzilla.suse.com/1238819" source="BUGZILLA"/>
		<reference ref_id="1238821" ref_url="https://bugzilla.suse.com/1238821" source="BUGZILLA"/>
		<reference ref_id="1238823" ref_url="https://bugzilla.suse.com/1238823" source="BUGZILLA"/>
		<reference ref_id="1238825" ref_url="https://bugzilla.suse.com/1238825" source="BUGZILLA"/>
		<reference ref_id="1238830" ref_url="https://bugzilla.suse.com/1238830" source="BUGZILLA"/>
		<reference ref_id="1238834" ref_url="https://bugzilla.suse.com/1238834" source="BUGZILLA"/>
		<reference ref_id="1238835" ref_url="https://bugzilla.suse.com/1238835" source="BUGZILLA"/>
		<reference ref_id="1238836" ref_url="https://bugzilla.suse.com/1238836" source="BUGZILLA"/>
		<reference ref_id="1238838" ref_url="https://bugzilla.suse.com/1238838" source="BUGZILLA"/>
		<reference ref_id="1238867" ref_url="https://bugzilla.suse.com/1238867" source="BUGZILLA"/>
		<reference ref_id="1238868" ref_url="https://bugzilla.suse.com/1238868" source="BUGZILLA"/>
		<reference ref_id="1238869" ref_url="https://bugzilla.suse.com/1238869" source="BUGZILLA"/>
		<reference ref_id="1238870" ref_url="https://bugzilla.suse.com/1238870" source="BUGZILLA"/>
		<reference ref_id="1238871" ref_url="https://bugzilla.suse.com/1238871" source="BUGZILLA"/>
		<reference ref_id="1238878" ref_url="https://bugzilla.suse.com/1238878" source="BUGZILLA"/>
		<reference ref_id="1238889" ref_url="https://bugzilla.suse.com/1238889" source="BUGZILLA"/>
		<reference ref_id="1238892" ref_url="https://bugzilla.suse.com/1238892" source="BUGZILLA"/>
		<reference ref_id="1238893" ref_url="https://bugzilla.suse.com/1238893" source="BUGZILLA"/>
		<reference ref_id="1238897" ref_url="https://bugzilla.suse.com/1238897" source="BUGZILLA"/>
		<reference ref_id="1238898" ref_url="https://bugzilla.suse.com/1238898" source="BUGZILLA"/>
		<reference ref_id="1238899" ref_url="https://bugzilla.suse.com/1238899" source="BUGZILLA"/>
		<reference ref_id="1238902" ref_url="https://bugzilla.suse.com/1238902" source="BUGZILLA"/>
		<reference ref_id="1238911" ref_url="https://bugzilla.suse.com/1238911" source="BUGZILLA"/>
		<reference ref_id="1238916" ref_url="https://bugzilla.suse.com/1238916" source="BUGZILLA"/>
		<reference ref_id="1238919" ref_url="https://bugzilla.suse.com/1238919" source="BUGZILLA"/>
		<reference ref_id="1238925" ref_url="https://bugzilla.suse.com/1238925" source="BUGZILLA"/>
		<reference ref_id="1238930" ref_url="https://bugzilla.suse.com/1238930" source="BUGZILLA"/>
		<reference ref_id="1238933" ref_url="https://bugzilla.suse.com/1238933" source="BUGZILLA"/>
		<reference ref_id="1238936" ref_url="https://bugzilla.suse.com/1238936" source="BUGZILLA"/>
		<reference ref_id="1238937" ref_url="https://bugzilla.suse.com/1238937" source="BUGZILLA"/>
		<reference ref_id="1238938" ref_url="https://bugzilla.suse.com/1238938" source="BUGZILLA"/>
		<reference ref_id="1238939" ref_url="https://bugzilla.suse.com/1238939" source="BUGZILLA"/>
		<reference ref_id="1238943" ref_url="https://bugzilla.suse.com/1238943" source="BUGZILLA"/>
		<reference ref_id="1238945" ref_url="https://bugzilla.suse.com/1238945" source="BUGZILLA"/>
		<reference ref_id="1238948" ref_url="https://bugzilla.suse.com/1238948" source="BUGZILLA"/>
		<reference ref_id="1238949" ref_url="https://bugzilla.suse.com/1238949" source="BUGZILLA"/>
		<reference ref_id="1238950" ref_url="https://bugzilla.suse.com/1238950" source="BUGZILLA"/>
		<reference ref_id="1238951" ref_url="https://bugzilla.suse.com/1238951" source="BUGZILLA"/>
		<reference ref_id="1238952" ref_url="https://bugzilla.suse.com/1238952" source="BUGZILLA"/>
		<reference ref_id="1238954" ref_url="https://bugzilla.suse.com/1238954" source="BUGZILLA"/>
		<reference ref_id="1238956" ref_url="https://bugzilla.suse.com/1238956" source="BUGZILLA"/>
		<reference ref_id="1238957" ref_url="https://bugzilla.suse.com/1238957" source="BUGZILLA"/>
		<reference ref_id="1239001" ref_url="https://bugzilla.suse.com/1239001" source="BUGZILLA"/>
		<reference ref_id="1239004" ref_url="https://bugzilla.suse.com/1239004" source="BUGZILLA"/>
		<reference ref_id="1239016" ref_url="https://bugzilla.suse.com/1239016" source="BUGZILLA"/>
		<reference ref_id="1239035" ref_url="https://bugzilla.suse.com/1239035" source="BUGZILLA"/>
		<reference ref_id="1239036" ref_url="https://bugzilla.suse.com/1239036" source="BUGZILLA"/>
		<reference ref_id="1239040" ref_url="https://bugzilla.suse.com/1239040" source="BUGZILLA"/>
		<reference ref_id="1239041" ref_url="https://bugzilla.suse.com/1239041" source="BUGZILLA"/>
		<reference ref_id="1239051" ref_url="https://bugzilla.suse.com/1239051" source="BUGZILLA"/>
		<reference ref_id="1239060" ref_url="https://bugzilla.suse.com/1239060" source="BUGZILLA"/>
		<reference ref_id="1239061" ref_url="https://bugzilla.suse.com/1239061" source="BUGZILLA"/>
		<reference ref_id="1239070" ref_url="https://bugzilla.suse.com/1239070" source="BUGZILLA"/>
		<reference ref_id="1239071" ref_url="https://bugzilla.suse.com/1239071" source="BUGZILLA"/>
		<reference ref_id="1239073" ref_url="https://bugzilla.suse.com/1239073" source="BUGZILLA"/>
		<reference ref_id="1239076" ref_url="https://bugzilla.suse.com/1239076" source="BUGZILLA"/>
		<reference ref_id="1239109" ref_url="https://bugzilla.suse.com/1239109" source="BUGZILLA"/>
		<reference ref_id="1239115" ref_url="https://bugzilla.suse.com/1239115" source="BUGZILLA"/>
		<reference ref_id="1239126" ref_url="https://bugzilla.suse.com/1239126" source="BUGZILLA"/>
		<reference ref_id="1239452" ref_url="https://bugzilla.suse.com/1239452" source="BUGZILLA"/>
		<reference ref_id="1239454" ref_url="https://bugzilla.suse.com/1239454" source="BUGZILLA"/>
		<reference ref_id="1239968" ref_url="https://bugzilla.suse.com/1239968" source="BUGZILLA"/>
		<reference ref_id="1239969" ref_url="https://bugzilla.suse.com/1239969" source="BUGZILLA"/>
		<reference ref_id="1240133" ref_url="https://bugzilla.suse.com/1240133" source="BUGZILLA"/>
		<reference ref_id="1240195" ref_url="https://bugzilla.suse.com/1240195" source="BUGZILLA"/>
		<reference ref_id="1240205" ref_url="https://bugzilla.suse.com/1240205" source="BUGZILLA"/>
		<reference ref_id="1240207" ref_url="https://bugzilla.suse.com/1240207" source="BUGZILLA"/>
		<reference ref_id="1240208" ref_url="https://bugzilla.suse.com/1240208" source="BUGZILLA"/>
		<reference ref_id="1240210" ref_url="https://bugzilla.suse.com/1240210" source="BUGZILLA"/>
		<reference ref_id="1240212" ref_url="https://bugzilla.suse.com/1240212" source="BUGZILLA"/>
		<reference ref_id="1240213" ref_url="https://bugzilla.suse.com/1240213" source="BUGZILLA"/>
		<reference ref_id="1240218" ref_url="https://bugzilla.suse.com/1240218" source="BUGZILLA"/>
		<reference ref_id="1240220" ref_url="https://bugzilla.suse.com/1240220" source="BUGZILLA"/>
		<reference ref_id="1240227" ref_url="https://bugzilla.suse.com/1240227" source="BUGZILLA"/>
		<reference ref_id="1240229" ref_url="https://bugzilla.suse.com/1240229" source="BUGZILLA"/>
		<reference ref_id="1240231" ref_url="https://bugzilla.suse.com/1240231" source="BUGZILLA"/>
		<reference ref_id="1240242" ref_url="https://bugzilla.suse.com/1240242" source="BUGZILLA"/>
		<reference ref_id="1240245" ref_url="https://bugzilla.suse.com/1240245" source="BUGZILLA"/>
		<reference ref_id="1240247" ref_url="https://bugzilla.suse.com/1240247" source="BUGZILLA"/>
		<reference ref_id="1240250" ref_url="https://bugzilla.suse.com/1240250" source="BUGZILLA"/>
		<reference ref_id="1240254" ref_url="https://bugzilla.suse.com/1240254" source="BUGZILLA"/>
		<reference ref_id="1240256" ref_url="https://bugzilla.suse.com/1240256" source="BUGZILLA"/>
		<reference ref_id="1240264" ref_url="https://bugzilla.suse.com/1240264" source="BUGZILLA"/>
		<reference ref_id="1240266" ref_url="https://bugzilla.suse.com/1240266" source="BUGZILLA"/>
		<reference ref_id="1240272" ref_url="https://bugzilla.suse.com/1240272" source="BUGZILLA"/>
		<reference ref_id="1240275" ref_url="https://bugzilla.suse.com/1240275" source="BUGZILLA"/>
		<reference ref_id="1240276" ref_url="https://bugzilla.suse.com/1240276" source="BUGZILLA"/>
		<reference ref_id="1240278" ref_url="https://bugzilla.suse.com/1240278" source="BUGZILLA"/>
		<reference ref_id="1240279" ref_url="https://bugzilla.suse.com/1240279" source="BUGZILLA"/>
		<reference ref_id="1240280" ref_url="https://bugzilla.suse.com/1240280" source="BUGZILLA"/>
		<reference ref_id="1240281" ref_url="https://bugzilla.suse.com/1240281" source="BUGZILLA"/>
		<reference ref_id="1240282" ref_url="https://bugzilla.suse.com/1240282" source="BUGZILLA"/>
		<reference ref_id="1240283" ref_url="https://bugzilla.suse.com/1240283" source="BUGZILLA"/>
		<reference ref_id="1240284" ref_url="https://bugzilla.suse.com/1240284" source="BUGZILLA"/>
		<reference ref_id="1240286" ref_url="https://bugzilla.suse.com/1240286" source="BUGZILLA"/>
		<reference ref_id="1240288" ref_url="https://bugzilla.suse.com/1240288" source="BUGZILLA"/>
		<reference ref_id="1240290" ref_url="https://bugzilla.suse.com/1240290" source="BUGZILLA"/>
		<reference ref_id="1240292" ref_url="https://bugzilla.suse.com/1240292" source="BUGZILLA"/>
		<reference ref_id="1240293" ref_url="https://bugzilla.suse.com/1240293" source="BUGZILLA"/>
		<reference ref_id="1240297" ref_url="https://bugzilla.suse.com/1240297" source="BUGZILLA"/>
		<reference ref_id="1240304" ref_url="https://bugzilla.suse.com/1240304" source="BUGZILLA"/>
		<reference ref_id="1240308" ref_url="https://bugzilla.suse.com/1240308" source="BUGZILLA"/>
		<reference ref_id="1240309" ref_url="https://bugzilla.suse.com/1240309" source="BUGZILLA"/>
		<reference ref_id="1240317" ref_url="https://bugzilla.suse.com/1240317" source="BUGZILLA"/>
		<reference ref_id="1240318" ref_url="https://bugzilla.suse.com/1240318" source="BUGZILLA"/>
		<reference ref_id="1240322" ref_url="https://bugzilla.suse.com/1240322" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2021-4453" ref_url="https://www.suse.com/security/cve/CVE-2021-4453/" source="CVE"/>
		<reference ref_id="CVE-2021-4454" ref_url="https://www.suse.com/security/cve/CVE-2021-4454/" source="CVE"/>
		<reference ref_id="CVE-2021-47631" ref_url="https://www.suse.com/security/cve/CVE-2021-47631/" source="CVE"/>
		<reference ref_id="CVE-2021-47632" ref_url="https://www.suse.com/security/cve/CVE-2021-47632/" source="CVE"/>
		<reference ref_id="CVE-2021-47633" ref_url="https://www.suse.com/security/cve/CVE-2021-47633/" source="CVE"/>
		<reference ref_id="CVE-2021-47635" ref_url="https://www.suse.com/security/cve/CVE-2021-47635/" source="CVE"/>
		<reference ref_id="CVE-2021-47636" ref_url="https://www.suse.com/security/cve/CVE-2021-47636/" source="CVE"/>
		<reference ref_id="CVE-2021-47637" ref_url="https://www.suse.com/security/cve/CVE-2021-47637/" source="CVE"/>
		<reference ref_id="CVE-2021-47638" ref_url="https://www.suse.com/security/cve/CVE-2021-47638/" source="CVE"/>
		<reference ref_id="CVE-2021-47639" ref_url="https://www.suse.com/security/cve/CVE-2021-47639/" source="CVE"/>
		<reference ref_id="CVE-2021-47641" ref_url="https://www.suse.com/security/cve/CVE-2021-47641/" source="CVE"/>
		<reference ref_id="CVE-2021-47642" ref_url="https://www.suse.com/security/cve/CVE-2021-47642/" source="CVE"/>
		<reference ref_id="CVE-2021-47643" ref_url="https://www.suse.com/security/cve/CVE-2021-47643/" source="CVE"/>
		<reference ref_id="CVE-2021-47644" ref_url="https://www.suse.com/security/cve/CVE-2021-47644/" source="CVE"/>
		<reference ref_id="CVE-2021-47645" ref_url="https://www.suse.com/security/cve/CVE-2021-47645/" source="CVE"/>
		<reference ref_id="CVE-2021-47646" ref_url="https://www.suse.com/security/cve/CVE-2021-47646/" source="CVE"/>
		<reference ref_id="CVE-2021-47647" ref_url="https://www.suse.com/security/cve/CVE-2021-47647/" source="CVE"/>
		<reference ref_id="CVE-2021-47648" ref_url="https://www.suse.com/security/cve/CVE-2021-47648/" source="CVE"/>
		<reference ref_id="CVE-2021-47649" ref_url="https://www.suse.com/security/cve/CVE-2021-47649/" source="CVE"/>
		<reference ref_id="CVE-2021-47650" ref_url="https://www.suse.com/security/cve/CVE-2021-47650/" source="CVE"/>
		<reference ref_id="CVE-2021-47651" ref_url="https://www.suse.com/security/cve/CVE-2021-47651/" source="CVE"/>
		<reference ref_id="CVE-2021-47652" ref_url="https://www.suse.com/security/cve/CVE-2021-47652/" source="CVE"/>
		<reference ref_id="CVE-2021-47653" ref_url="https://www.suse.com/security/cve/CVE-2021-47653/" source="CVE"/>
		<reference ref_id="CVE-2021-47654" ref_url="https://www.suse.com/security/cve/CVE-2021-47654/" source="CVE"/>
		<reference ref_id="CVE-2021-47656" ref_url="https://www.suse.com/security/cve/CVE-2021-47656/" source="CVE"/>
		<reference ref_id="CVE-2021-47657" ref_url="https://www.suse.com/security/cve/CVE-2021-47657/" source="CVE"/>
		<reference ref_id="CVE-2021-47659" ref_url="https://www.suse.com/security/cve/CVE-2021-47659/" source="CVE"/>
		<reference ref_id="CVE-2022-0168" ref_url="https://www.suse.com/security/cve/CVE-2022-0168/" source="CVE"/>
		<reference ref_id="CVE-2022-0995" ref_url="https://www.suse.com/security/cve/CVE-2022-0995/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-2977" ref_url="https://www.suse.com/security/cve/CVE-2022-2977/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-3303" ref_url="https://www.suse.com/security/cve/CVE-2022-3303/" source="CVE"/>
		<reference ref_id="CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435/" source="CVE"/>
		<reference ref_id="CVE-2022-49044" ref_url="https://www.suse.com/security/cve/CVE-2022-49044/" source="CVE"/>
		<reference ref_id="CVE-2022-49050" ref_url="https://www.suse.com/security/cve/CVE-2022-49050/" source="CVE"/>
		<reference ref_id="CVE-2022-49051" ref_url="https://www.suse.com/security/cve/CVE-2022-49051/" source="CVE"/>
		<reference ref_id="CVE-2022-49053" ref_url="https://www.suse.com/security/cve/CVE-2022-49053/" source="CVE"/>
		<reference ref_id="CVE-2022-49054" ref_url="https://www.suse.com/security/cve/CVE-2022-49054/" source="CVE"/>
		<reference ref_id="CVE-2022-49055" ref_url="https://www.suse.com/security/cve/CVE-2022-49055/" source="CVE"/>
		<reference ref_id="CVE-2022-49058" ref_url="https://www.suse.com/security/cve/CVE-2022-49058/" source="CVE"/>
		<reference ref_id="CVE-2022-49059" ref_url="https://www.suse.com/security/cve/CVE-2022-49059/" source="CVE"/>
		<reference ref_id="CVE-2022-49060" ref_url="https://www.suse.com/security/cve/CVE-2022-49060/" source="CVE"/>
		<reference ref_id="CVE-2022-49061" ref_url="https://www.suse.com/security/cve/CVE-2022-49061/" source="CVE"/>
		<reference ref_id="CVE-2022-49063" ref_url="https://www.suse.com/security/cve/CVE-2022-49063/" source="CVE"/>
		<reference ref_id="CVE-2022-49065" ref_url="https://www.suse.com/security/cve/CVE-2022-49065/" source="CVE"/>
		<reference ref_id="CVE-2022-49066" ref_url="https://www.suse.com/security/cve/CVE-2022-49066/" source="CVE"/>
		<reference ref_id="CVE-2022-49073" ref_url="https://www.suse.com/security/cve/CVE-2022-49073/" source="CVE"/>
		<reference ref_id="CVE-2022-49074" ref_url="https://www.suse.com/security/cve/CVE-2022-49074/" source="CVE"/>
		<reference ref_id="CVE-2022-49076" ref_url="https://www.suse.com/security/cve/CVE-2022-49076/" source="CVE"/>
		<reference ref_id="CVE-2022-49078" ref_url="https://www.suse.com/security/cve/CVE-2022-49078/" source="CVE"/>
		<reference ref_id="CVE-2022-49082" ref_url="https://www.suse.com/security/cve/CVE-2022-49082/" source="CVE"/>
		<reference ref_id="CVE-2022-49083" ref_url="https://www.suse.com/security/cve/CVE-2022-49083/" source="CVE"/>
		<reference ref_id="CVE-2022-49084" ref_url="https://www.suse.com/security/cve/CVE-2022-49084/" source="CVE"/>
		<reference ref_id="CVE-2022-49085" ref_url="https://www.suse.com/security/cve/CVE-2022-49085/" source="CVE"/>
		<reference ref_id="CVE-2022-49086" ref_url="https://www.suse.com/security/cve/CVE-2022-49086/" source="CVE"/>
		<reference ref_id="CVE-2022-49088" ref_url="https://www.suse.com/security/cve/CVE-2022-49088/" source="CVE"/>
		<reference ref_id="CVE-2022-49089" ref_url="https://www.suse.com/security/cve/CVE-2022-49089/" source="CVE"/>
		<reference ref_id="CVE-2022-49090" ref_url="https://www.suse.com/security/cve/CVE-2022-49090/" source="CVE"/>
		<reference ref_id="CVE-2022-49091" ref_url="https://www.suse.com/security/cve/CVE-2022-49091/" source="CVE"/>
		<reference ref_id="CVE-2022-49092" ref_url="https://www.suse.com/security/cve/CVE-2022-49092/" source="CVE"/>
		<reference ref_id="CVE-2022-49093" ref_url="https://www.suse.com/security/cve/CVE-2022-49093/" source="CVE"/>
		<reference ref_id="CVE-2022-49095" ref_url="https://www.suse.com/security/cve/CVE-2022-49095/" source="CVE"/>
		<reference ref_id="CVE-2022-49096" ref_url="https://www.suse.com/security/cve/CVE-2022-49096/" source="CVE"/>
		<reference ref_id="CVE-2022-49097" ref_url="https://www.suse.com/security/cve/CVE-2022-49097/" source="CVE"/>
		<reference ref_id="CVE-2022-49098" ref_url="https://www.suse.com/security/cve/CVE-2022-49098/" source="CVE"/>
		<reference ref_id="CVE-2022-49099" ref_url="https://www.suse.com/security/cve/CVE-2022-49099/" source="CVE"/>
		<reference ref_id="CVE-2022-49100" ref_url="https://www.suse.com/security/cve/CVE-2022-49100/" source="CVE"/>
		<reference ref_id="CVE-2022-49102" ref_url="https://www.suse.com/security/cve/CVE-2022-49102/" source="CVE"/>
		<reference ref_id="CVE-2022-49103" ref_url="https://www.suse.com/security/cve/CVE-2022-49103/" source="CVE"/>
		<reference ref_id="CVE-2022-49104" ref_url="https://www.suse.com/security/cve/CVE-2022-49104/" source="CVE"/>
		<reference ref_id="CVE-2022-49105" ref_url="https://www.suse.com/security/cve/CVE-2022-49105/" source="CVE"/>
		<reference ref_id="CVE-2022-49106" ref_url="https://www.suse.com/security/cve/CVE-2022-49106/" source="CVE"/>
		<reference ref_id="CVE-2022-49107" ref_url="https://www.suse.com/security/cve/CVE-2022-49107/" source="CVE"/>
		<reference ref_id="CVE-2022-49109" ref_url="https://www.suse.com/security/cve/CVE-2022-49109/" source="CVE"/>
		<reference ref_id="CVE-2022-49111" ref_url="https://www.suse.com/security/cve/CVE-2022-49111/" source="CVE"/>
		<reference ref_id="CVE-2022-49112" ref_url="https://www.suse.com/security/cve/CVE-2022-49112/" source="CVE"/>
		<reference ref_id="CVE-2022-49113" ref_url="https://www.suse.com/security/cve/CVE-2022-49113/" source="CVE"/>
		<reference ref_id="CVE-2022-49114" ref_url="https://www.suse.com/security/cve/CVE-2022-49114/" source="CVE"/>
		<reference ref_id="CVE-2022-49115" ref_url="https://www.suse.com/security/cve/CVE-2022-49115/" source="CVE"/>
		<reference ref_id="CVE-2022-49116" ref_url="https://www.suse.com/security/cve/CVE-2022-49116/" source="CVE"/>
		<reference ref_id="CVE-2022-49118" ref_url="https://www.suse.com/security/cve/CVE-2022-49118/" source="CVE"/>
		<reference ref_id="CVE-2022-49119" ref_url="https://www.suse.com/security/cve/CVE-2022-49119/" source="CVE"/>
		<reference ref_id="CVE-2022-49120" ref_url="https://www.suse.com/security/cve/CVE-2022-49120/" source="CVE"/>
		<reference ref_id="CVE-2022-49121" ref_url="https://www.suse.com/security/cve/CVE-2022-49121/" source="CVE"/>
		<reference ref_id="CVE-2022-49122" ref_url="https://www.suse.com/security/cve/CVE-2022-49122/" source="CVE"/>
		<reference ref_id="CVE-2022-49126" ref_url="https://www.suse.com/security/cve/CVE-2022-49126/" source="CVE"/>
		<reference ref_id="CVE-2022-49128" ref_url="https://www.suse.com/security/cve/CVE-2022-49128/" source="CVE"/>
		<reference ref_id="CVE-2022-49129" ref_url="https://www.suse.com/security/cve/CVE-2022-49129/" source="CVE"/>
		<reference ref_id="CVE-2022-49130" ref_url="https://www.suse.com/security/cve/CVE-2022-49130/" source="CVE"/>
		<reference ref_id="CVE-2022-49131" ref_url="https://www.suse.com/security/cve/CVE-2022-49131/" source="CVE"/>
		<reference ref_id="CVE-2022-49132" ref_url="https://www.suse.com/security/cve/CVE-2022-49132/" source="CVE"/>
		<reference ref_id="CVE-2022-49135" ref_url="https://www.suse.com/security/cve/CVE-2022-49135/" source="CVE"/>
		<reference ref_id="CVE-2022-49137" ref_url="https://www.suse.com/security/cve/CVE-2022-49137/" source="CVE"/>
		<reference ref_id="CVE-2022-49145" ref_url="https://www.suse.com/security/cve/CVE-2022-49145/" source="CVE"/>
		<reference ref_id="CVE-2022-49147" ref_url="https://www.suse.com/security/cve/CVE-2022-49147/" source="CVE"/>
		<reference ref_id="CVE-2022-49148" ref_url="https://www.suse.com/security/cve/CVE-2022-49148/" source="CVE"/>
		<reference ref_id="CVE-2022-49151" ref_url="https://www.suse.com/security/cve/CVE-2022-49151/" source="CVE"/>
		<reference ref_id="CVE-2022-49153" ref_url="https://www.suse.com/security/cve/CVE-2022-49153/" source="CVE"/>
		<reference ref_id="CVE-2022-49154" ref_url="https://www.suse.com/security/cve/CVE-2022-49154/" source="CVE"/>
		<reference ref_id="CVE-2022-49155" ref_url="https://www.suse.com/security/cve/CVE-2022-49155/" source="CVE"/>
		<reference ref_id="CVE-2022-49156" ref_url="https://www.suse.com/security/cve/CVE-2022-49156/" source="CVE"/>
		<reference ref_id="CVE-2022-49157" ref_url="https://www.suse.com/security/cve/CVE-2022-49157/" source="CVE"/>
		<reference ref_id="CVE-2022-49158" ref_url="https://www.suse.com/security/cve/CVE-2022-49158/" source="CVE"/>
		<reference ref_id="CVE-2022-49159" ref_url="https://www.suse.com/security/cve/CVE-2022-49159/" source="CVE"/>
		<reference ref_id="CVE-2022-49160" ref_url="https://www.suse.com/security/cve/CVE-2022-49160/" source="CVE"/>
		<reference ref_id="CVE-2022-49162" ref_url="https://www.suse.com/security/cve/CVE-2022-49162/" source="CVE"/>
		<reference ref_id="CVE-2022-49163" ref_url="https://www.suse.com/security/cve/CVE-2022-49163/" source="CVE"/>
		<reference ref_id="CVE-2022-49164" ref_url="https://www.suse.com/security/cve/CVE-2022-49164/" source="CVE"/>
		<reference ref_id="CVE-2022-49165" ref_url="https://www.suse.com/security/cve/CVE-2022-49165/" source="CVE"/>
		<reference ref_id="CVE-2022-49174" ref_url="https://www.suse.com/security/cve/CVE-2022-49174/" source="CVE"/>
		<reference ref_id="CVE-2022-49175" ref_url="https://www.suse.com/security/cve/CVE-2022-49175/" source="CVE"/>
		<reference ref_id="CVE-2022-49176" ref_url="https://www.suse.com/security/cve/CVE-2022-49176/" source="CVE"/>
		<reference ref_id="CVE-2022-49177" ref_url="https://www.suse.com/security/cve/CVE-2022-49177/" source="CVE"/>
		<reference ref_id="CVE-2022-49179" ref_url="https://www.suse.com/security/cve/CVE-2022-49179/" source="CVE"/>
		<reference ref_id="CVE-2022-49180" ref_url="https://www.suse.com/security/cve/CVE-2022-49180/" source="CVE"/>
		<reference ref_id="CVE-2022-49182" ref_url="https://www.suse.com/security/cve/CVE-2022-49182/" source="CVE"/>
		<reference ref_id="CVE-2022-49185" ref_url="https://www.suse.com/security/cve/CVE-2022-49185/" source="CVE"/>
		<reference ref_id="CVE-2022-49187" ref_url="https://www.suse.com/security/cve/CVE-2022-49187/" source="CVE"/>
		<reference ref_id="CVE-2022-49188" ref_url="https://www.suse.com/security/cve/CVE-2022-49188/" source="CVE"/>
		<reference ref_id="CVE-2022-49189" ref_url="https://www.suse.com/security/cve/CVE-2022-49189/" source="CVE"/>
		<reference ref_id="CVE-2022-49193" ref_url="https://www.suse.com/security/cve/CVE-2022-49193/" source="CVE"/>
		<reference ref_id="CVE-2022-49194" ref_url="https://www.suse.com/security/cve/CVE-2022-49194/" source="CVE"/>
		<reference ref_id="CVE-2022-49196" ref_url="https://www.suse.com/security/cve/CVE-2022-49196/" source="CVE"/>
		<reference ref_id="CVE-2022-49199" ref_url="https://www.suse.com/security/cve/CVE-2022-49199/" source="CVE"/>
		<reference ref_id="CVE-2022-49200" ref_url="https://www.suse.com/security/cve/CVE-2022-49200/" source="CVE"/>
		<reference ref_id="CVE-2022-49201" ref_url="https://www.suse.com/security/cve/CVE-2022-49201/" source="CVE"/>
		<reference ref_id="CVE-2022-49206" ref_url="https://www.suse.com/security/cve/CVE-2022-49206/" source="CVE"/>
		<reference ref_id="CVE-2022-49208" ref_url="https://www.suse.com/security/cve/CVE-2022-49208/" source="CVE"/>
		<reference ref_id="CVE-2022-49212" ref_url="https://www.suse.com/security/cve/CVE-2022-49212/" source="CVE"/>
		<reference ref_id="CVE-2022-49213" ref_url="https://www.suse.com/security/cve/CVE-2022-49213/" source="CVE"/>
		<reference ref_id="CVE-2022-49214" ref_url="https://www.suse.com/security/cve/CVE-2022-49214/" source="CVE"/>
		<reference ref_id="CVE-2022-49216" ref_url="https://www.suse.com/security/cve/CVE-2022-49216/" source="CVE"/>
		<reference ref_id="CVE-2022-49217" ref_url="https://www.suse.com/security/cve/CVE-2022-49217/" source="CVE"/>
		<reference ref_id="CVE-2022-49218" ref_url="https://www.suse.com/security/cve/CVE-2022-49218/" source="CVE"/>
		<reference ref_id="CVE-2022-49221" ref_url="https://www.suse.com/security/cve/CVE-2022-49221/" source="CVE"/>
		<reference ref_id="CVE-2022-49222" ref_url="https://www.suse.com/security/cve/CVE-2022-49222/" source="CVE"/>
		<reference ref_id="CVE-2022-49224" ref_url="https://www.suse.com/security/cve/CVE-2022-49224/" source="CVE"/>
		<reference ref_id="CVE-2022-49226" ref_url="https://www.suse.com/security/cve/CVE-2022-49226/" source="CVE"/>
		<reference ref_id="CVE-2022-49227" ref_url="https://www.suse.com/security/cve/CVE-2022-49227/" source="CVE"/>
		<reference ref_id="CVE-2022-49232" ref_url="https://www.suse.com/security/cve/CVE-2022-49232/" source="CVE"/>
		<reference ref_id="CVE-2022-49235" ref_url="https://www.suse.com/security/cve/CVE-2022-49235/" source="CVE"/>
		<reference ref_id="CVE-2022-49236" ref_url="https://www.suse.com/security/cve/CVE-2022-49236/" source="CVE"/>
		<reference ref_id="CVE-2022-49239" ref_url="https://www.suse.com/security/cve/CVE-2022-49239/" source="CVE"/>
		<reference ref_id="CVE-2022-49241" ref_url="https://www.suse.com/security/cve/CVE-2022-49241/" source="CVE"/>
		<reference ref_id="CVE-2022-49242" ref_url="https://www.suse.com/security/cve/CVE-2022-49242/" source="CVE"/>
		<reference ref_id="CVE-2022-49243" ref_url="https://www.suse.com/security/cve/CVE-2022-49243/" source="CVE"/>
		<reference ref_id="CVE-2022-49244" ref_url="https://www.suse.com/security/cve/CVE-2022-49244/" source="CVE"/>
		<reference ref_id="CVE-2022-49246" ref_url="https://www.suse.com/security/cve/CVE-2022-49246/" source="CVE"/>
		<reference ref_id="CVE-2022-49247" ref_url="https://www.suse.com/security/cve/CVE-2022-49247/" source="CVE"/>
		<reference ref_id="CVE-2022-49248" ref_url="https://www.suse.com/security/cve/CVE-2022-49248/" source="CVE"/>
		<reference ref_id="CVE-2022-49249" ref_url="https://www.suse.com/security/cve/CVE-2022-49249/" source="CVE"/>
		<reference ref_id="CVE-2022-49250" ref_url="https://www.suse.com/security/cve/CVE-2022-49250/" source="CVE"/>
		<reference ref_id="CVE-2022-49251" ref_url="https://www.suse.com/security/cve/CVE-2022-49251/" source="CVE"/>
		<reference ref_id="CVE-2022-49252" ref_url="https://www.suse.com/security/cve/CVE-2022-49252/" source="CVE"/>
		<reference ref_id="CVE-2022-49253" ref_url="https://www.suse.com/security/cve/CVE-2022-49253/" source="CVE"/>
		<reference ref_id="CVE-2022-49254" ref_url="https://www.suse.com/security/cve/CVE-2022-49254/" source="CVE"/>
		<reference ref_id="CVE-2022-49256" ref_url="https://www.suse.com/security/cve/CVE-2022-49256/" source="CVE"/>
		<reference ref_id="CVE-2022-49257" ref_url="https://www.suse.com/security/cve/CVE-2022-49257/" source="CVE"/>
		<reference ref_id="CVE-2022-49258" ref_url="https://www.suse.com/security/cve/CVE-2022-49258/" source="CVE"/>
		<reference ref_id="CVE-2022-49259" ref_url="https://www.suse.com/security/cve/CVE-2022-49259/" source="CVE"/>
		<reference ref_id="CVE-2022-49260" ref_url="https://www.suse.com/security/cve/CVE-2022-49260/" source="CVE"/>
		<reference ref_id="CVE-2022-49261" ref_url="https://www.suse.com/security/cve/CVE-2022-49261/" source="CVE"/>
		<reference ref_id="CVE-2022-49262" ref_url="https://www.suse.com/security/cve/CVE-2022-49262/" source="CVE"/>
		<reference ref_id="CVE-2022-49263" ref_url="https://www.suse.com/security/cve/CVE-2022-49263/" source="CVE"/>
		<reference ref_id="CVE-2022-49264" ref_url="https://www.suse.com/security/cve/CVE-2022-49264/" source="CVE"/>
		<reference ref_id="CVE-2022-49265" ref_url="https://www.suse.com/security/cve/CVE-2022-49265/" source="CVE"/>
		<reference ref_id="CVE-2022-49266" ref_url="https://www.suse.com/security/cve/CVE-2022-49266/" source="CVE"/>
		<reference ref_id="CVE-2022-49268" ref_url="https://www.suse.com/security/cve/CVE-2022-49268/" source="CVE"/>
		<reference ref_id="CVE-2022-49269" ref_url="https://www.suse.com/security/cve/CVE-2022-49269/" source="CVE"/>
		<reference ref_id="CVE-2022-49270" ref_url="https://www.suse.com/security/cve/CVE-2022-49270/" source="CVE"/>
		<reference ref_id="CVE-2022-49271" ref_url="https://www.suse.com/security/cve/CVE-2022-49271/" source="CVE"/>
		<reference ref_id="CVE-2022-49272" ref_url="https://www.suse.com/security/cve/CVE-2022-49272/" source="CVE"/>
		<reference ref_id="CVE-2022-49273" ref_url="https://www.suse.com/security/cve/CVE-2022-49273/" source="CVE"/>
		<reference ref_id="CVE-2022-49274" ref_url="https://www.suse.com/security/cve/CVE-2022-49274/" source="CVE"/>
		<reference ref_id="CVE-2022-49275" ref_url="https://www.suse.com/security/cve/CVE-2022-49275/" source="CVE"/>
		<reference ref_id="CVE-2022-49276" ref_url="https://www.suse.com/security/cve/CVE-2022-49276/" source="CVE"/>
		<reference ref_id="CVE-2022-49277" ref_url="https://www.suse.com/security/cve/CVE-2022-49277/" source="CVE"/>
		<reference ref_id="CVE-2022-49278" ref_url="https://www.suse.com/security/cve/CVE-2022-49278/" source="CVE"/>
		<reference ref_id="CVE-2022-49279" ref_url="https://www.suse.com/security/cve/CVE-2022-49279/" source="CVE"/>
		<reference ref_id="CVE-2022-49280" ref_url="https://www.suse.com/security/cve/CVE-2022-49280/" source="CVE"/>
		<reference ref_id="CVE-2022-49281" ref_url="https://www.suse.com/security/cve/CVE-2022-49281/" source="CVE"/>
		<reference ref_id="CVE-2022-49283" ref_url="https://www.suse.com/security/cve/CVE-2022-49283/" source="CVE"/>
		<reference ref_id="CVE-2022-49285" ref_url="https://www.suse.com/security/cve/CVE-2022-49285/" source="CVE"/>
		<reference ref_id="CVE-2022-49286" ref_url="https://www.suse.com/security/cve/CVE-2022-49286/" source="CVE"/>
		<reference ref_id="CVE-2022-49287" ref_url="https://www.suse.com/security/cve/CVE-2022-49287/" source="CVE"/>
		<reference ref_id="CVE-2022-49288" ref_url="https://www.suse.com/security/cve/CVE-2022-49288/" source="CVE"/>
		<reference ref_id="CVE-2022-49290" ref_url="https://www.suse.com/security/cve/CVE-2022-49290/" source="CVE"/>
		<reference ref_id="CVE-2022-49291" ref_url="https://www.suse.com/security/cve/CVE-2022-49291/" source="CVE"/>
		<reference ref_id="CVE-2022-49292" ref_url="https://www.suse.com/security/cve/CVE-2022-49292/" source="CVE"/>
		<reference ref_id="CVE-2022-49293" ref_url="https://www.suse.com/security/cve/CVE-2022-49293/" source="CVE"/>
		<reference ref_id="CVE-2022-49294" ref_url="https://www.suse.com/security/cve/CVE-2022-49294/" source="CVE"/>
		<reference ref_id="CVE-2022-49295" ref_url="https://www.suse.com/security/cve/CVE-2022-49295/" source="CVE"/>
		<reference ref_id="CVE-2022-49297" ref_url="https://www.suse.com/security/cve/CVE-2022-49297/" source="CVE"/>
		<reference ref_id="CVE-2022-49298" ref_url="https://www.suse.com/security/cve/CVE-2022-49298/" source="CVE"/>
		<reference ref_id="CVE-2022-49299" ref_url="https://www.suse.com/security/cve/CVE-2022-49299/" source="CVE"/>
		<reference ref_id="CVE-2022-49300" ref_url="https://www.suse.com/security/cve/CVE-2022-49300/" source="CVE"/>
		<reference ref_id="CVE-2022-49301" ref_url="https://www.suse.com/security/cve/CVE-2022-49301/" source="CVE"/>
		<reference ref_id="CVE-2022-49302" ref_url="https://www.suse.com/security/cve/CVE-2022-49302/" source="CVE"/>
		<reference ref_id="CVE-2022-49304" ref_url="https://www.suse.com/security/cve/CVE-2022-49304/" source="CVE"/>
		<reference ref_id="CVE-2022-49305" ref_url="https://www.suse.com/security/cve/CVE-2022-49305/" source="CVE"/>
		<reference ref_id="CVE-2022-49307" ref_url="https://www.suse.com/security/cve/CVE-2022-49307/" source="CVE"/>
		<reference ref_id="CVE-2022-49308" ref_url="https://www.suse.com/security/cve/CVE-2022-49308/" source="CVE"/>
		<reference ref_id="CVE-2022-49309" ref_url="https://www.suse.com/security/cve/CVE-2022-49309/" source="CVE"/>
		<reference ref_id="CVE-2022-49310" ref_url="https://www.suse.com/security/cve/CVE-2022-49310/" source="CVE"/>
		<reference ref_id="CVE-2022-49311" ref_url="https://www.suse.com/security/cve/CVE-2022-49311/" source="CVE"/>
		<reference ref_id="CVE-2022-49312" ref_url="https://www.suse.com/security/cve/CVE-2022-49312/" source="CVE"/>
		<reference ref_id="CVE-2022-49313" ref_url="https://www.suse.com/security/cve/CVE-2022-49313/" source="CVE"/>
		<reference ref_id="CVE-2022-49314" ref_url="https://www.suse.com/security/cve/CVE-2022-49314/" source="CVE"/>
		<reference ref_id="CVE-2022-49315" ref_url="https://www.suse.com/security/cve/CVE-2022-49315/" source="CVE"/>
		<reference ref_id="CVE-2022-49316" ref_url="https://www.suse.com/security/cve/CVE-2022-49316/" source="CVE"/>
		<reference ref_id="CVE-2022-49319" ref_url="https://www.suse.com/security/cve/CVE-2022-49319/" source="CVE"/>
		<reference ref_id="CVE-2022-49320" ref_url="https://www.suse.com/security/cve/CVE-2022-49320/" source="CVE"/>
		<reference ref_id="CVE-2022-49321" ref_url="https://www.suse.com/security/cve/CVE-2022-49321/" source="CVE"/>
		<reference ref_id="CVE-2022-49322" ref_url="https://www.suse.com/security/cve/CVE-2022-49322/" source="CVE"/>
		<reference ref_id="CVE-2022-49323" ref_url="https://www.suse.com/security/cve/CVE-2022-49323/" source="CVE"/>
		<reference ref_id="CVE-2022-49326" ref_url="https://www.suse.com/security/cve/CVE-2022-49326/" source="CVE"/>
		<reference ref_id="CVE-2022-49327" ref_url="https://www.suse.com/security/cve/CVE-2022-49327/" source="CVE"/>
		<reference ref_id="CVE-2022-49328" ref_url="https://www.suse.com/security/cve/CVE-2022-49328/" source="CVE"/>
		<reference ref_id="CVE-2022-49331" ref_url="https://www.suse.com/security/cve/CVE-2022-49331/" source="CVE"/>
		<reference ref_id="CVE-2022-49332" ref_url="https://www.suse.com/security/cve/CVE-2022-49332/" source="CVE"/>
		<reference ref_id="CVE-2022-49335" ref_url="https://www.suse.com/security/cve/CVE-2022-49335/" source="CVE"/>
		<reference ref_id="CVE-2022-49336" ref_url="https://www.suse.com/security/cve/CVE-2022-49336/" source="CVE"/>
		<reference ref_id="CVE-2022-49337" ref_url="https://www.suse.com/security/cve/CVE-2022-49337/" source="CVE"/>
		<reference ref_id="CVE-2022-49339" ref_url="https://www.suse.com/security/cve/CVE-2022-49339/" source="CVE"/>
		<reference ref_id="CVE-2022-49341" ref_url="https://www.suse.com/security/cve/CVE-2022-49341/" source="CVE"/>
		<reference ref_id="CVE-2022-49342" ref_url="https://www.suse.com/security/cve/CVE-2022-49342/" source="CVE"/>
		<reference ref_id="CVE-2022-49343" ref_url="https://www.suse.com/security/cve/CVE-2022-49343/" source="CVE"/>
		<reference ref_id="CVE-2022-49345" ref_url="https://www.suse.com/security/cve/CVE-2022-49345/" source="CVE"/>
		<reference ref_id="CVE-2022-49346" ref_url="https://www.suse.com/security/cve/CVE-2022-49346/" source="CVE"/>
		<reference ref_id="CVE-2022-49347" ref_url="https://www.suse.com/security/cve/CVE-2022-49347/" source="CVE"/>
		<reference ref_id="CVE-2022-49348" ref_url="https://www.suse.com/security/cve/CVE-2022-49348/" source="CVE"/>
		<reference ref_id="CVE-2022-49349" ref_url="https://www.suse.com/security/cve/CVE-2022-49349/" source="CVE"/>
		<reference ref_id="CVE-2022-49350" ref_url="https://www.suse.com/security/cve/CVE-2022-49350/" source="CVE"/>
		<reference ref_id="CVE-2022-49351" ref_url="https://www.suse.com/security/cve/CVE-2022-49351/" source="CVE"/>
		<reference ref_id="CVE-2022-49352" ref_url="https://www.suse.com/security/cve/CVE-2022-49352/" source="CVE"/>
		<reference ref_id="CVE-2022-49354" ref_url="https://www.suse.com/security/cve/CVE-2022-49354/" source="CVE"/>
		<reference ref_id="CVE-2022-49356" ref_url="https://www.suse.com/security/cve/CVE-2022-49356/" source="CVE"/>
		<reference ref_id="CVE-2022-49357" ref_url="https://www.suse.com/security/cve/CVE-2022-49357/" source="CVE"/>
		<reference ref_id="CVE-2022-49367" ref_url="https://www.suse.com/security/cve/CVE-2022-49367/" source="CVE"/>
		<reference ref_id="CVE-2022-49368" ref_url="https://www.suse.com/security/cve/CVE-2022-49368/" source="CVE"/>
		<reference ref_id="CVE-2022-49370" ref_url="https://www.suse.com/security/cve/CVE-2022-49370/" source="CVE"/>
		<reference ref_id="CVE-2022-49371" ref_url="https://www.suse.com/security/cve/CVE-2022-49371/" source="CVE"/>
		<reference ref_id="CVE-2022-49373" ref_url="https://www.suse.com/security/cve/CVE-2022-49373/" source="CVE"/>
		<reference ref_id="CVE-2022-49375" ref_url="https://www.suse.com/security/cve/CVE-2022-49375/" source="CVE"/>
		<reference ref_id="CVE-2022-49376" ref_url="https://www.suse.com/security/cve/CVE-2022-49376/" source="CVE"/>
		<reference ref_id="CVE-2022-49377" ref_url="https://www.suse.com/security/cve/CVE-2022-49377/" source="CVE"/>
		<reference ref_id="CVE-2022-49378" ref_url="https://www.suse.com/security/cve/CVE-2022-49378/" source="CVE"/>
		<reference ref_id="CVE-2022-49379" ref_url="https://www.suse.com/security/cve/CVE-2022-49379/" source="CVE"/>
		<reference ref_id="CVE-2022-49381" ref_url="https://www.suse.com/security/cve/CVE-2022-49381/" source="CVE"/>
		<reference ref_id="CVE-2022-49382" ref_url="https://www.suse.com/security/cve/CVE-2022-49382/" source="CVE"/>
		<reference ref_id="CVE-2022-49384" ref_url="https://www.suse.com/security/cve/CVE-2022-49384/" source="CVE"/>
		<reference ref_id="CVE-2022-49385" ref_url="https://www.suse.com/security/cve/CVE-2022-49385/" source="CVE"/>
		<reference ref_id="CVE-2022-49386" ref_url="https://www.suse.com/security/cve/CVE-2022-49386/" source="CVE"/>
		<reference ref_id="CVE-2022-49389" ref_url="https://www.suse.com/security/cve/CVE-2022-49389/" source="CVE"/>
		<reference ref_id="CVE-2022-49392" ref_url="https://www.suse.com/security/cve/CVE-2022-49392/" source="CVE"/>
		<reference ref_id="CVE-2022-49394" ref_url="https://www.suse.com/security/cve/CVE-2022-49394/" source="CVE"/>
		<reference ref_id="CVE-2022-49396" ref_url="https://www.suse.com/security/cve/CVE-2022-49396/" source="CVE"/>
		<reference ref_id="CVE-2022-49397" ref_url="https://www.suse.com/security/cve/CVE-2022-49397/" source="CVE"/>
		<reference ref_id="CVE-2022-49398" ref_url="https://www.suse.com/security/cve/CVE-2022-49398/" source="CVE"/>
		<reference ref_id="CVE-2022-49399" ref_url="https://www.suse.com/security/cve/CVE-2022-49399/" source="CVE"/>
		<reference ref_id="CVE-2022-49400" ref_url="https://www.suse.com/security/cve/CVE-2022-49400/" source="CVE"/>
		<reference ref_id="CVE-2022-49402" ref_url="https://www.suse.com/security/cve/CVE-2022-49402/" source="CVE"/>
		<reference ref_id="CVE-2022-49404" ref_url="https://www.suse.com/security/cve/CVE-2022-49404/" source="CVE"/>
		<reference ref_id="CVE-2022-49407" ref_url="https://www.suse.com/security/cve/CVE-2022-49407/" source="CVE"/>
		<reference ref_id="CVE-2022-49409" ref_url="https://www.suse.com/security/cve/CVE-2022-49409/" source="CVE"/>
		<reference ref_id="CVE-2022-49410" ref_url="https://www.suse.com/security/cve/CVE-2022-49410/" source="CVE"/>
		<reference ref_id="CVE-2022-49411" ref_url="https://www.suse.com/security/cve/CVE-2022-49411/" source="CVE"/>
		<reference ref_id="CVE-2022-49412" ref_url="https://www.suse.com/security/cve/CVE-2022-49412/" source="CVE"/>
		<reference ref_id="CVE-2022-49413" ref_url="https://www.suse.com/security/cve/CVE-2022-49413/" source="CVE"/>
		<reference ref_id="CVE-2022-49414" ref_url="https://www.suse.com/security/cve/CVE-2022-49414/" source="CVE"/>
		<reference ref_id="CVE-2022-49416" ref_url="https://www.suse.com/security/cve/CVE-2022-49416/" source="CVE"/>
		<reference ref_id="CVE-2022-49418" ref_url="https://www.suse.com/security/cve/CVE-2022-49418/" source="CVE"/>
		<reference ref_id="CVE-2022-49421" ref_url="https://www.suse.com/security/cve/CVE-2022-49421/" source="CVE"/>
		<reference ref_id="CVE-2022-49422" ref_url="https://www.suse.com/security/cve/CVE-2022-49422/" source="CVE"/>
		<reference ref_id="CVE-2022-49424" ref_url="https://www.suse.com/security/cve/CVE-2022-49424/" source="CVE"/>
		<reference ref_id="CVE-2022-49426" ref_url="https://www.suse.com/security/cve/CVE-2022-49426/" source="CVE"/>
		<reference ref_id="CVE-2022-49427" ref_url="https://www.suse.com/security/cve/CVE-2022-49427/" source="CVE"/>
		<reference ref_id="CVE-2022-49429" ref_url="https://www.suse.com/security/cve/CVE-2022-49429/" source="CVE"/>
		<reference ref_id="CVE-2022-49430" ref_url="https://www.suse.com/security/cve/CVE-2022-49430/" source="CVE"/>
		<reference ref_id="CVE-2022-49431" ref_url="https://www.suse.com/security/cve/CVE-2022-49431/" source="CVE"/>
		<reference ref_id="CVE-2022-49432" ref_url="https://www.suse.com/security/cve/CVE-2022-49432/" source="CVE"/>
		<reference ref_id="CVE-2022-49433" ref_url="https://www.suse.com/security/cve/CVE-2022-49433/" source="CVE"/>
		<reference ref_id="CVE-2022-49434" ref_url="https://www.suse.com/security/cve/CVE-2022-49434/" source="CVE"/>
		<reference ref_id="CVE-2022-49435" ref_url="https://www.suse.com/security/cve/CVE-2022-49435/" source="CVE"/>
		<reference ref_id="CVE-2022-49437" ref_url="https://www.suse.com/security/cve/CVE-2022-49437/" source="CVE"/>
		<reference ref_id="CVE-2022-49438" ref_url="https://www.suse.com/security/cve/CVE-2022-49438/" source="CVE"/>
		<reference ref_id="CVE-2022-49440" ref_url="https://www.suse.com/security/cve/CVE-2022-49440/" source="CVE"/>
		<reference ref_id="CVE-2022-49441" ref_url="https://www.suse.com/security/cve/CVE-2022-49441/" source="CVE"/>
		<reference ref_id="CVE-2022-49442" ref_url="https://www.suse.com/security/cve/CVE-2022-49442/" source="CVE"/>
		<reference ref_id="CVE-2022-49443" ref_url="https://www.suse.com/security/cve/CVE-2022-49443/" source="CVE"/>
		<reference ref_id="CVE-2022-49444" ref_url="https://www.suse.com/security/cve/CVE-2022-49444/" source="CVE"/>
		<reference ref_id="CVE-2022-49445" ref_url="https://www.suse.com/security/cve/CVE-2022-49445/" source="CVE"/>
		<reference ref_id="CVE-2022-49447" ref_url="https://www.suse.com/security/cve/CVE-2022-49447/" source="CVE"/>
		<reference ref_id="CVE-2022-49448" ref_url="https://www.suse.com/security/cve/CVE-2022-49448/" source="CVE"/>
		<reference ref_id="CVE-2022-49449" ref_url="https://www.suse.com/security/cve/CVE-2022-49449/" source="CVE"/>
		<reference ref_id="CVE-2022-49451" ref_url="https://www.suse.com/security/cve/CVE-2022-49451/" source="CVE"/>
		<reference ref_id="CVE-2022-49453" ref_url="https://www.suse.com/security/cve/CVE-2022-49453/" source="CVE"/>
		<reference ref_id="CVE-2022-49455" ref_url="https://www.suse.com/security/cve/CVE-2022-49455/" source="CVE"/>
		<reference ref_id="CVE-2022-49459" ref_url="https://www.suse.com/security/cve/CVE-2022-49459/" source="CVE"/>
		<reference ref_id="CVE-2022-49460" ref_url="https://www.suse.com/security/cve/CVE-2022-49460/" source="CVE"/>
		<reference ref_id="CVE-2022-49462" ref_url="https://www.suse.com/security/cve/CVE-2022-49462/" source="CVE"/>
		<reference ref_id="CVE-2022-49463" ref_url="https://www.suse.com/security/cve/CVE-2022-49463/" source="CVE"/>
		<reference ref_id="CVE-2022-49465" ref_url="https://www.suse.com/security/cve/CVE-2022-49465/" source="CVE"/>
		<reference ref_id="CVE-2022-49466" ref_url="https://www.suse.com/security/cve/CVE-2022-49466/" source="CVE"/>
		<reference ref_id="CVE-2022-49467" ref_url="https://www.suse.com/security/cve/CVE-2022-49467/" source="CVE"/>
		<reference ref_id="CVE-2022-49468" ref_url="https://www.suse.com/security/cve/CVE-2022-49468/" source="CVE"/>
		<reference ref_id="CVE-2022-49472" ref_url="https://www.suse.com/security/cve/CVE-2022-49472/" source="CVE"/>
		<reference ref_id="CVE-2022-49473" ref_url="https://www.suse.com/security/cve/CVE-2022-49473/" source="CVE"/>
		<reference ref_id="CVE-2022-49474" ref_url="https://www.suse.com/security/cve/CVE-2022-49474/" source="CVE"/>
		<reference ref_id="CVE-2022-49475" ref_url="https://www.suse.com/security/cve/CVE-2022-49475/" source="CVE"/>
		<reference ref_id="CVE-2022-49477" ref_url="https://www.suse.com/security/cve/CVE-2022-49477/" source="CVE"/>
		<reference ref_id="CVE-2022-49478" ref_url="https://www.suse.com/security/cve/CVE-2022-49478/" source="CVE"/>
		<reference ref_id="CVE-2022-49480" ref_url="https://www.suse.com/security/cve/CVE-2022-49480/" source="CVE"/>
		<reference ref_id="CVE-2022-49481" ref_url="https://www.suse.com/security/cve/CVE-2022-49481/" source="CVE"/>
		<reference ref_id="CVE-2022-49482" ref_url="https://www.suse.com/security/cve/CVE-2022-49482/" source="CVE"/>
		<reference ref_id="CVE-2022-49486" ref_url="https://www.suse.com/security/cve/CVE-2022-49486/" source="CVE"/>
		<reference ref_id="CVE-2022-49487" ref_url="https://www.suse.com/security/cve/CVE-2022-49487/" source="CVE"/>
		<reference ref_id="CVE-2022-49488" ref_url="https://www.suse.com/security/cve/CVE-2022-49488/" source="CVE"/>
		<reference ref_id="CVE-2022-49489" ref_url="https://www.suse.com/security/cve/CVE-2022-49489/" source="CVE"/>
		<reference ref_id="CVE-2022-49490" ref_url="https://www.suse.com/security/cve/CVE-2022-49490/" source="CVE"/>
		<reference ref_id="CVE-2022-49491" ref_url="https://www.suse.com/security/cve/CVE-2022-49491/" source="CVE"/>
		<reference ref_id="CVE-2022-49492" ref_url="https://www.suse.com/security/cve/CVE-2022-49492/" source="CVE"/>
		<reference ref_id="CVE-2022-49493" ref_url="https://www.suse.com/security/cve/CVE-2022-49493/" source="CVE"/>
		<reference ref_id="CVE-2022-49494" ref_url="https://www.suse.com/security/cve/CVE-2022-49494/" source="CVE"/>
		<reference ref_id="CVE-2022-49495" ref_url="https://www.suse.com/security/cve/CVE-2022-49495/" source="CVE"/>
		<reference ref_id="CVE-2022-49498" ref_url="https://www.suse.com/security/cve/CVE-2022-49498/" source="CVE"/>
		<reference ref_id="CVE-2022-49501" ref_url="https://www.suse.com/security/cve/CVE-2022-49501/" source="CVE"/>
		<reference ref_id="CVE-2022-49502" ref_url="https://www.suse.com/security/cve/CVE-2022-49502/" source="CVE"/>
		<reference ref_id="CVE-2022-49503" ref_url="https://www.suse.com/security/cve/CVE-2022-49503/" source="CVE"/>
		<reference ref_id="CVE-2022-49504" ref_url="https://www.suse.com/security/cve/CVE-2022-49504/" source="CVE"/>
		<reference ref_id="CVE-2022-49505" ref_url="https://www.suse.com/security/cve/CVE-2022-49505/" source="CVE"/>
		<reference ref_id="CVE-2022-49506" ref_url="https://www.suse.com/security/cve/CVE-2022-49506/" source="CVE"/>
		<reference ref_id="CVE-2022-49507" ref_url="https://www.suse.com/security/cve/CVE-2022-49507/" source="CVE"/>
		<reference ref_id="CVE-2022-49508" ref_url="https://www.suse.com/security/cve/CVE-2022-49508/" source="CVE"/>
		<reference ref_id="CVE-2022-49509" ref_url="https://www.suse.com/security/cve/CVE-2022-49509/" source="CVE"/>
		<reference ref_id="CVE-2022-49512" ref_url="https://www.suse.com/security/cve/CVE-2022-49512/" source="CVE"/>
		<reference ref_id="CVE-2022-49514" ref_url="https://www.suse.com/security/cve/CVE-2022-49514/" source="CVE"/>
		<reference ref_id="CVE-2022-49515" ref_url="https://www.suse.com/security/cve/CVE-2022-49515/" source="CVE"/>
		<reference ref_id="CVE-2022-49517" ref_url="https://www.suse.com/security/cve/CVE-2022-49517/" source="CVE"/>
		<reference ref_id="CVE-2022-49519" ref_url="https://www.suse.com/security/cve/CVE-2022-49519/" source="CVE"/>
		<reference ref_id="CVE-2022-49520" ref_url="https://www.suse.com/security/cve/CVE-2022-49520/" source="CVE"/>
		<reference ref_id="CVE-2022-49521" ref_url="https://www.suse.com/security/cve/CVE-2022-49521/" source="CVE"/>
		<reference ref_id="CVE-2022-49522" ref_url="https://www.suse.com/security/cve/CVE-2022-49522/" source="CVE"/>
		<reference ref_id="CVE-2022-49523" ref_url="https://www.suse.com/security/cve/CVE-2022-49523/" source="CVE"/>
		<reference ref_id="CVE-2022-49524" ref_url="https://www.suse.com/security/cve/CVE-2022-49524/" source="CVE"/>
		<reference ref_id="CVE-2022-49525" ref_url="https://www.suse.com/security/cve/CVE-2022-49525/" source="CVE"/>
		<reference ref_id="CVE-2022-49526" ref_url="https://www.suse.com/security/cve/CVE-2022-49526/" source="CVE"/>
		<reference ref_id="CVE-2022-49527" ref_url="https://www.suse.com/security/cve/CVE-2022-49527/" source="CVE"/>
		<reference ref_id="CVE-2022-49532" ref_url="https://www.suse.com/security/cve/CVE-2022-49532/" source="CVE"/>
		<reference ref_id="CVE-2022-49534" ref_url="https://www.suse.com/security/cve/CVE-2022-49534/" source="CVE"/>
		<reference ref_id="CVE-2022-49535" ref_url="https://www.suse.com/security/cve/CVE-2022-49535/" source="CVE"/>
		<reference ref_id="CVE-2022-49536" ref_url="https://www.suse.com/security/cve/CVE-2022-49536/" source="CVE"/>
		<reference ref_id="CVE-2022-49537" ref_url="https://www.suse.com/security/cve/CVE-2022-49537/" source="CVE"/>
		<reference ref_id="CVE-2022-49541" ref_url="https://www.suse.com/security/cve/CVE-2022-49541/" source="CVE"/>
		<reference ref_id="CVE-2022-49542" ref_url="https://www.suse.com/security/cve/CVE-2022-49542/" source="CVE"/>
		<reference ref_id="CVE-2022-49544" ref_url="https://www.suse.com/security/cve/CVE-2022-49544/" source="CVE"/>
		<reference ref_id="CVE-2022-49545" ref_url="https://www.suse.com/security/cve/CVE-2022-49545/" source="CVE"/>
		<reference ref_id="CVE-2022-49546" ref_url="https://www.suse.com/security/cve/CVE-2022-49546/" source="CVE"/>
		<reference ref_id="CVE-2022-49549" ref_url="https://www.suse.com/security/cve/CVE-2022-49549/" source="CVE"/>
		<reference ref_id="CVE-2022-49551" ref_url="https://www.suse.com/security/cve/CVE-2022-49551/" source="CVE"/>
		<reference ref_id="CVE-2022-49555" ref_url="https://www.suse.com/security/cve/CVE-2022-49555/" source="CVE"/>
		<reference ref_id="CVE-2022-49556" ref_url="https://www.suse.com/security/cve/CVE-2022-49556/" source="CVE"/>
		<reference ref_id="CVE-2022-49559" ref_url="https://www.suse.com/security/cve/CVE-2022-49559/" source="CVE"/>
		<reference ref_id="CVE-2022-49562" ref_url="https://www.suse.com/security/cve/CVE-2022-49562/" source="CVE"/>
		<reference ref_id="CVE-2022-49563" ref_url="https://www.suse.com/security/cve/CVE-2022-49563/" source="CVE"/>
		<reference ref_id="CVE-2022-49564" ref_url="https://www.suse.com/security/cve/CVE-2022-49564/" source="CVE"/>
		<reference ref_id="CVE-2022-49566" ref_url="https://www.suse.com/security/cve/CVE-2022-49566/" source="CVE"/>
		<reference ref_id="CVE-2022-49568" ref_url="https://www.suse.com/security/cve/CVE-2022-49568/" source="CVE"/>
		<reference ref_id="CVE-2022-49569" ref_url="https://www.suse.com/security/cve/CVE-2022-49569/" source="CVE"/>
		<reference ref_id="CVE-2022-49570" ref_url="https://www.suse.com/security/cve/CVE-2022-49570/" source="CVE"/>
		<reference ref_id="CVE-2022-49579" ref_url="https://www.suse.com/security/cve/CVE-2022-49579/" source="CVE"/>
		<reference ref_id="CVE-2022-49581" ref_url="https://www.suse.com/security/cve/CVE-2022-49581/" source="CVE"/>
		<reference ref_id="CVE-2022-49583" ref_url="https://www.suse.com/security/cve/CVE-2022-49583/" source="CVE"/>
		<reference ref_id="CVE-2022-49584" ref_url="https://www.suse.com/security/cve/CVE-2022-49584/" source="CVE"/>
		<reference ref_id="CVE-2022-49591" ref_url="https://www.suse.com/security/cve/CVE-2022-49591/" source="CVE"/>
		<reference ref_id="CVE-2022-49592" ref_url="https://www.suse.com/security/cve/CVE-2022-49592/" source="CVE"/>
		<reference ref_id="CVE-2022-49603" ref_url="https://www.suse.com/security/cve/CVE-2022-49603/" source="CVE"/>
		<reference ref_id="CVE-2022-49605" ref_url="https://www.suse.com/security/cve/CVE-2022-49605/" source="CVE"/>
		<reference ref_id="CVE-2022-49606" ref_url="https://www.suse.com/security/cve/CVE-2022-49606/" source="CVE"/>
		<reference ref_id="CVE-2022-49607" ref_url="https://www.suse.com/security/cve/CVE-2022-49607/" source="CVE"/>
		<reference ref_id="CVE-2022-49609" ref_url="https://www.suse.com/security/cve/CVE-2022-49609/" source="CVE"/>
		<reference ref_id="CVE-2022-49610" ref_url="https://www.suse.com/security/cve/CVE-2022-49610/" source="CVE"/>
		<reference ref_id="CVE-2022-49611" ref_url="https://www.suse.com/security/cve/CVE-2022-49611/" source="CVE"/>
		<reference ref_id="CVE-2022-49613" ref_url="https://www.suse.com/security/cve/CVE-2022-49613/" source="CVE"/>
		<reference ref_id="CVE-2022-49615" ref_url="https://www.suse.com/security/cve/CVE-2022-49615/" source="CVE"/>
		<reference ref_id="CVE-2022-49616" ref_url="https://www.suse.com/security/cve/CVE-2022-49616/" source="CVE"/>
		<reference ref_id="CVE-2022-49617" ref_url="https://www.suse.com/security/cve/CVE-2022-49617/" source="CVE"/>
		<reference ref_id="CVE-2022-49618" ref_url="https://www.suse.com/security/cve/CVE-2022-49618/" source="CVE"/>
		<reference ref_id="CVE-2022-49621" ref_url="https://www.suse.com/security/cve/CVE-2022-49621/" source="CVE"/>
		<reference ref_id="CVE-2022-49623" ref_url="https://www.suse.com/security/cve/CVE-2022-49623/" source="CVE"/>
		<reference ref_id="CVE-2022-49625" ref_url="https://www.suse.com/security/cve/CVE-2022-49625/" source="CVE"/>
		<reference ref_id="CVE-2022-49626" ref_url="https://www.suse.com/security/cve/CVE-2022-49626/" source="CVE"/>
		<reference ref_id="CVE-2022-49627" ref_url="https://www.suse.com/security/cve/CVE-2022-49627/" source="CVE"/>
		<reference ref_id="CVE-2022-49628" ref_url="https://www.suse.com/security/cve/CVE-2022-49628/" source="CVE"/>
		<reference ref_id="CVE-2022-49631" ref_url="https://www.suse.com/security/cve/CVE-2022-49631/" source="CVE"/>
		<reference ref_id="CVE-2022-49634" ref_url="https://www.suse.com/security/cve/CVE-2022-49634/" source="CVE"/>
		<reference ref_id="CVE-2022-49640" ref_url="https://www.suse.com/security/cve/CVE-2022-49640/" source="CVE"/>
		<reference ref_id="CVE-2022-49641" ref_url="https://www.suse.com/security/cve/CVE-2022-49641/" source="CVE"/>
		<reference ref_id="CVE-2022-49642" ref_url="https://www.suse.com/security/cve/CVE-2022-49642/" source="CVE"/>
		<reference ref_id="CVE-2022-49643" ref_url="https://www.suse.com/security/cve/CVE-2022-49643/" source="CVE"/>
		<reference ref_id="CVE-2022-49644" ref_url="https://www.suse.com/security/cve/CVE-2022-49644/" source="CVE"/>
		<reference ref_id="CVE-2022-49645" ref_url="https://www.suse.com/security/cve/CVE-2022-49645/" source="CVE"/>
		<reference ref_id="CVE-2022-49646" ref_url="https://www.suse.com/security/cve/CVE-2022-49646/" source="CVE"/>
		<reference ref_id="CVE-2022-49647" ref_url="https://www.suse.com/security/cve/CVE-2022-49647/" source="CVE"/>
		<reference ref_id="CVE-2022-49648" ref_url="https://www.suse.com/security/cve/CVE-2022-49648/" source="CVE"/>
		<reference ref_id="CVE-2022-49649" ref_url="https://www.suse.com/security/cve/CVE-2022-49649/" source="CVE"/>
		<reference ref_id="CVE-2022-49650" ref_url="https://www.suse.com/security/cve/CVE-2022-49650/" source="CVE"/>
		<reference ref_id="CVE-2022-49652" ref_url="https://www.suse.com/security/cve/CVE-2022-49652/" source="CVE"/>
		<reference ref_id="CVE-2022-49653" ref_url="https://www.suse.com/security/cve/CVE-2022-49653/" source="CVE"/>
		<reference ref_id="CVE-2022-49656" ref_url="https://www.suse.com/security/cve/CVE-2022-49656/" source="CVE"/>
		<reference ref_id="CVE-2022-49657" ref_url="https://www.suse.com/security/cve/CVE-2022-49657/" source="CVE"/>
		<reference ref_id="CVE-2022-49661" ref_url="https://www.suse.com/security/cve/CVE-2022-49661/" source="CVE"/>
		<reference ref_id="CVE-2022-49663" ref_url="https://www.suse.com/security/cve/CVE-2022-49663/" source="CVE"/>
		<reference ref_id="CVE-2022-49665" ref_url="https://www.suse.com/security/cve/CVE-2022-49665/" source="CVE"/>
		<reference ref_id="CVE-2022-49667" ref_url="https://www.suse.com/security/cve/CVE-2022-49667/" source="CVE"/>
		<reference ref_id="CVE-2022-49668" ref_url="https://www.suse.com/security/cve/CVE-2022-49668/" source="CVE"/>
		<reference ref_id="CVE-2022-49670" ref_url="https://www.suse.com/security/cve/CVE-2022-49670/" source="CVE"/>
		<reference ref_id="CVE-2022-49671" ref_url="https://www.suse.com/security/cve/CVE-2022-49671/" source="CVE"/>
		<reference ref_id="CVE-2022-49672" ref_url="https://www.suse.com/security/cve/CVE-2022-49672/" source="CVE"/>
		<reference ref_id="CVE-2022-49673" ref_url="https://www.suse.com/security/cve/CVE-2022-49673/" source="CVE"/>
		<reference ref_id="CVE-2022-49674" ref_url="https://www.suse.com/security/cve/CVE-2022-49674/" source="CVE"/>
		<reference ref_id="CVE-2022-49675" ref_url="https://www.suse.com/security/cve/CVE-2022-49675/" source="CVE"/>
		<reference ref_id="CVE-2022-49676" ref_url="https://www.suse.com/security/cve/CVE-2022-49676/" source="CVE"/>
		<reference ref_id="CVE-2022-49677" ref_url="https://www.suse.com/security/cve/CVE-2022-49677/" source="CVE"/>
		<reference ref_id="CVE-2022-49678" ref_url="https://www.suse.com/security/cve/CVE-2022-49678/" source="CVE"/>
		<reference ref_id="CVE-2022-49679" ref_url="https://www.suse.com/security/cve/CVE-2022-49679/" source="CVE"/>
		<reference ref_id="CVE-2022-49680" ref_url="https://www.suse.com/security/cve/CVE-2022-49680/" source="CVE"/>
		<reference ref_id="CVE-2022-49683" ref_url="https://www.suse.com/security/cve/CVE-2022-49683/" source="CVE"/>
		<reference ref_id="CVE-2022-49685" ref_url="https://www.suse.com/security/cve/CVE-2022-49685/" source="CVE"/>
		<reference ref_id="CVE-2022-49687" ref_url="https://www.suse.com/security/cve/CVE-2022-49687/" source="CVE"/>
		<reference ref_id="CVE-2022-49688" ref_url="https://www.suse.com/security/cve/CVE-2022-49688/" source="CVE"/>
		<reference ref_id="CVE-2022-49693" ref_url="https://www.suse.com/security/cve/CVE-2022-49693/" source="CVE"/>
		<reference ref_id="CVE-2022-49695" ref_url="https://www.suse.com/security/cve/CVE-2022-49695/" source="CVE"/>
		<reference ref_id="CVE-2022-49699" ref_url="https://www.suse.com/security/cve/CVE-2022-49699/" source="CVE"/>
		<reference ref_id="CVE-2022-49700" ref_url="https://www.suse.com/security/cve/CVE-2022-49700/" source="CVE"/>
		<reference ref_id="CVE-2022-49701" ref_url="https://www.suse.com/security/cve/CVE-2022-49701/" source="CVE"/>
		<reference ref_id="CVE-2022-49703" ref_url="https://www.suse.com/security/cve/CVE-2022-49703/" source="CVE"/>
		<reference ref_id="CVE-2022-49704" ref_url="https://www.suse.com/security/cve/CVE-2022-49704/" source="CVE"/>
		<reference ref_id="CVE-2022-49705" ref_url="https://www.suse.com/security/cve/CVE-2022-49705/" source="CVE"/>
		<reference ref_id="CVE-2022-49707" ref_url="https://www.suse.com/security/cve/CVE-2022-49707/" source="CVE"/>
		<reference ref_id="CVE-2022-49708" ref_url="https://www.suse.com/security/cve/CVE-2022-49708/" source="CVE"/>
		<reference ref_id="CVE-2022-49710" ref_url="https://www.suse.com/security/cve/CVE-2022-49710/" source="CVE"/>
		<reference ref_id="CVE-2022-49711" ref_url="https://www.suse.com/security/cve/CVE-2022-49711/" source="CVE"/>
		<reference ref_id="CVE-2022-49712" ref_url="https://www.suse.com/security/cve/CVE-2022-49712/" source="CVE"/>
		<reference ref_id="CVE-2022-49713" ref_url="https://www.suse.com/security/cve/CVE-2022-49713/" source="CVE"/>
		<reference ref_id="CVE-2022-49714" ref_url="https://www.suse.com/security/cve/CVE-2022-49714/" source="CVE"/>
		<reference ref_id="CVE-2022-49715" ref_url="https://www.suse.com/security/cve/CVE-2022-49715/" source="CVE"/>
		<reference ref_id="CVE-2022-49716" ref_url="https://www.suse.com/security/cve/CVE-2022-49716/" source="CVE"/>
		<reference ref_id="CVE-2022-49719" ref_url="https://www.suse.com/security/cve/CVE-2022-49719/" source="CVE"/>
		<reference ref_id="CVE-2022-49720" ref_url="https://www.suse.com/security/cve/CVE-2022-49720/" source="CVE"/>
		<reference ref_id="CVE-2022-49721" ref_url="https://www.suse.com/security/cve/CVE-2022-49721/" source="CVE"/>
		<reference ref_id="CVE-2022-49722" ref_url="https://www.suse.com/security/cve/CVE-2022-49722/" source="CVE"/>
		<reference ref_id="CVE-2022-49723" ref_url="https://www.suse.com/security/cve/CVE-2022-49723/" source="CVE"/>
		<reference ref_id="CVE-2022-49724" ref_url="https://www.suse.com/security/cve/CVE-2022-49724/" source="CVE"/>
		<reference ref_id="CVE-2022-49725" ref_url="https://www.suse.com/security/cve/CVE-2022-49725/" source="CVE"/>
		<reference ref_id="CVE-2022-49726" ref_url="https://www.suse.com/security/cve/CVE-2022-49726/" source="CVE"/>
		<reference ref_id="CVE-2022-49729" ref_url="https://www.suse.com/security/cve/CVE-2022-49729/" source="CVE"/>
		<reference ref_id="CVE-2022-49730" ref_url="https://www.suse.com/security/cve/CVE-2022-49730/" source="CVE"/>
		<reference ref_id="CVE-2022-49731" ref_url="https://www.suse.com/security/cve/CVE-2022-49731/" source="CVE"/>
		<reference ref_id="CVE-2022-49733" ref_url="https://www.suse.com/security/cve/CVE-2022-49733/" source="CVE"/>
		<reference ref_id="CVE-2022-49739" ref_url="https://www.suse.com/security/cve/CVE-2022-49739/" source="CVE"/>
		<reference ref_id="CVE-2022-49746" ref_url="https://www.suse.com/security/cve/CVE-2022-49746/" source="CVE"/>
		<reference ref_id="CVE-2022-49748" ref_url="https://www.suse.com/security/cve/CVE-2022-49748/" source="CVE"/>
		<reference ref_id="CVE-2022-49751" ref_url="https://www.suse.com/security/cve/CVE-2022-49751/" source="CVE"/>
		<reference ref_id="CVE-2022-49753" ref_url="https://www.suse.com/security/cve/CVE-2022-49753/" source="CVE"/>
		<reference ref_id="CVE-2022-49755" ref_url="https://www.suse.com/security/cve/CVE-2022-49755/" source="CVE"/>
		<reference ref_id="CVE-2022-49759" ref_url="https://www.suse.com/security/cve/CVE-2022-49759/" source="CVE"/>
		<reference ref_id="CVE-2023-0179" ref_url="https://www.suse.com/security/cve/CVE-2023-0179/" source="CVE"/>
		<reference ref_id="CVE-2023-1652" ref_url="https://www.suse.com/security/cve/CVE-2023-1652/" source="CVE"/>
		<reference ref_id="CVE-2023-2162" ref_url="https://www.suse.com/security/cve/CVE-2023-2162/" source="CVE"/>
		<reference ref_id="CVE-2023-28410" ref_url="https://www.suse.com/security/cve/CVE-2023-28410/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-52930" ref_url="https://www.suse.com/security/cve/CVE-2023-52930/" source="CVE"/>
		<reference ref_id="CVE-2023-52933" ref_url="https://www.suse.com/security/cve/CVE-2023-52933/" source="CVE"/>
		<reference ref_id="CVE-2023-52935" ref_url="https://www.suse.com/security/cve/CVE-2023-52935/" source="CVE"/>
		<reference ref_id="CVE-2023-52939" ref_url="https://www.suse.com/security/cve/CVE-2023-52939/" source="CVE"/>
		<reference ref_id="CVE-2023-52941" ref_url="https://www.suse.com/security/cve/CVE-2023-52941/" source="CVE"/>
		<reference ref_id="CVE-2023-52973" ref_url="https://www.suse.com/security/cve/CVE-2023-52973/" source="CVE"/>
		<reference ref_id="CVE-2023-52974" ref_url="https://www.suse.com/security/cve/CVE-2023-52974/" source="CVE"/>
		<reference ref_id="CVE-2023-52975" ref_url="https://www.suse.com/security/cve/CVE-2023-52975/" source="CVE"/>
		<reference ref_id="CVE-2023-52976" ref_url="https://www.suse.com/security/cve/CVE-2023-52976/" source="CVE"/>
		<reference ref_id="CVE-2023-52979" ref_url="https://www.suse.com/security/cve/CVE-2023-52979/" source="CVE"/>
		<reference ref_id="CVE-2023-52983" ref_url="https://www.suse.com/security/cve/CVE-2023-52983/" source="CVE"/>
		<reference ref_id="CVE-2023-52984" ref_url="https://www.suse.com/security/cve/CVE-2023-52984/" source="CVE"/>
		<reference ref_id="CVE-2023-52988" ref_url="https://www.suse.com/security/cve/CVE-2023-52988/" source="CVE"/>
		<reference ref_id="CVE-2023-52989" ref_url="https://www.suse.com/security/cve/CVE-2023-52989/" source="CVE"/>
		<reference ref_id="CVE-2023-52992" ref_url="https://www.suse.com/security/cve/CVE-2023-52992/" source="CVE"/>
		<reference ref_id="CVE-2023-52993" ref_url="https://www.suse.com/security/cve/CVE-2023-52993/" source="CVE"/>
		<reference ref_id="CVE-2023-53000" ref_url="https://www.suse.com/security/cve/CVE-2023-53000/" source="CVE"/>
		<reference ref_id="CVE-2023-53005" ref_url="https://www.suse.com/security/cve/CVE-2023-53005/" source="CVE"/>
		<reference ref_id="CVE-2023-53006" ref_url="https://www.suse.com/security/cve/CVE-2023-53006/" source="CVE"/>
		<reference ref_id="CVE-2023-53007" ref_url="https://www.suse.com/security/cve/CVE-2023-53007/" source="CVE"/>
		<reference ref_id="CVE-2023-53008" ref_url="https://www.suse.com/security/cve/CVE-2023-53008/" source="CVE"/>
		<reference ref_id="CVE-2023-53010" ref_url="https://www.suse.com/security/cve/CVE-2023-53010/" source="CVE"/>
		<reference ref_id="CVE-2023-53015" ref_url="https://www.suse.com/security/cve/CVE-2023-53015/" source="CVE"/>
		<reference ref_id="CVE-2023-53016" ref_url="https://www.suse.com/security/cve/CVE-2023-53016/" source="CVE"/>
		<reference ref_id="CVE-2023-53019" ref_url="https://www.suse.com/security/cve/CVE-2023-53019/" source="CVE"/>
		<reference ref_id="CVE-2023-53023" ref_url="https://www.suse.com/security/cve/CVE-2023-53023/" source="CVE"/>
		<reference ref_id="CVE-2023-53024" ref_url="https://www.suse.com/security/cve/CVE-2023-53024/" source="CVE"/>
		<reference ref_id="CVE-2023-53025" ref_url="https://www.suse.com/security/cve/CVE-2023-53025/" source="CVE"/>
		<reference ref_id="CVE-2023-53026" ref_url="https://www.suse.com/security/cve/CVE-2023-53026/" source="CVE"/>
		<reference ref_id="CVE-2023-53028" ref_url="https://www.suse.com/security/cve/CVE-2023-53028/" source="CVE"/>
		<reference ref_id="CVE-2023-53029" ref_url="https://www.suse.com/security/cve/CVE-2023-53029/" source="CVE"/>
		<reference ref_id="CVE-2023-53030" ref_url="https://www.suse.com/security/cve/CVE-2023-53030/" source="CVE"/>
		<reference ref_id="CVE-2023-53033" ref_url="https://www.suse.com/security/cve/CVE-2023-53033/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-41092" ref_url="https://www.suse.com/security/cve/CVE-2024-41092/" source="CVE"/>
		<reference ref_id="CVE-2024-42098" ref_url="https://www.suse.com/security/cve/CVE-2024-42098/" source="CVE"/>
		<reference ref_id="CVE-2024-42229" ref_url="https://www.suse.com/security/cve/CVE-2024-42229/" source="CVE"/>
		<reference ref_id="CVE-2024-42240" ref_url="https://www.suse.com/security/cve/CVE-2024-42240/" source="CVE"/>
		<reference ref_id="CVE-2024-50290" ref_url="https://www.suse.com/security/cve/CVE-2024-50290/" source="CVE"/>
		<reference ref_id="CVE-2024-53063" ref_url="https://www.suse.com/security/cve/CVE-2024-53063/" source="CVE"/>
		<reference ref_id="CVE-2024-53064" ref_url="https://www.suse.com/security/cve/CVE-2024-53064/" source="CVE"/>
		<reference ref_id="CVE-2024-56651" ref_url="https://www.suse.com/security/cve/CVE-2024-56651/" source="CVE"/>
		<reference ref_id="CVE-2024-57996" ref_url="https://www.suse.com/security/cve/CVE-2024-57996/" source="CVE"/>
		<reference ref_id="CVE-2024-58014" ref_url="https://www.suse.com/security/cve/CVE-2024-58014/" source="CVE"/>
		<reference ref_id="CVE-2024-58083" ref_url="https://www.suse.com/security/cve/CVE-2024-58083/" source="CVE"/>
		<reference ref_id="CVE-2025-21693" ref_url="https://www.suse.com/security/cve/CVE-2025-21693/" source="CVE"/>
		<reference ref_id="CVE-2025-21714" ref_url="https://www.suse.com/security/cve/CVE-2025-21714/" source="CVE"/>
		<reference ref_id="CVE-2025-21718" ref_url="https://www.suse.com/security/cve/CVE-2025-21718/" source="CVE"/>
		<reference ref_id="CVE-2025-21732" ref_url="https://www.suse.com/security/cve/CVE-2025-21732/" source="CVE"/>
		<reference ref_id="CVE-2025-21753" ref_url="https://www.suse.com/security/cve/CVE-2025-21753/" source="CVE"/>
		<reference ref_id="CVE-2025-21772" ref_url="https://www.suse.com/security/cve/CVE-2025-21772/" source="CVE"/>
		<reference ref_id="CVE-2025-21780" ref_url="https://www.suse.com/security/cve/CVE-2025-21780/" source="CVE"/>
		<reference ref_id="CVE-2025-21839" ref_url="https://www.suse.com/security/cve/CVE-2025-21839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).
- CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919).
- CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207).
- CVE-2023-52935: mm/khugepaged: fix -&gt;anon_vma race (bsc#1240276).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-41092: drm/i915/gt: Fix potential UAF by revoke of fence registers (bsc#1228483).
- CVE-2024-42098: crypto: ecdh - explicitly zeroize private_key (bsc#1228779).
- CVE-2024-42229: crypto: aead,cipher - zeroize key buffer after use (bsc#1228708).
- CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464).
- CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528).
- CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076).
- CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109).
- CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036).
- CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029).
- CVE-2025-21714: RDMA/mlx5: Fix implicit ODP use after free (bsc#1237890).
- CVE-2025-21718: net: rose: fix timer races against user threads (bsc#1239073).
- CVE-2025-21732: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (bsc#1237877).
- CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875).
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911).
- CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (bsc#1239115).
- CVE-2025-21839: kABI: Fix kABI after backport od CVE-2025-21839 (bsc#1239061).

The following non-security bugs were fixed:

- ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530).
- RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
- RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing (bsc#1239016).
- RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes)
- btrfs: defrag: do not use merged extent map for their generation check (bsc#1239968).
- btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1239968).
- btrfs: fix extent map merging not happening for adjacent extents (bsc#1239968).
- btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969).
- btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969).
- gfs2: Fix inode height consistency check (git-fixes).
- mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126).
- mm: zswap: move allocations during CPU init outside the lock (git-fixes).
- net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
- net: mana: Allow variable size indirection table (bsc#1239016).
- net: mana: Avoid open coded arithmetic (bsc#1239016).
- net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (bsc#1240195).
- net: mana: Support holes in device list reply msg (bsc#1240133).
- x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-09"/>
	<updated date="2025-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180814">SUSE bug 1180814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183682">SUSE bug 1183682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190336">SUSE bug 1190336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190768">SUSE bug 1190768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190786">SUSE bug 1190786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194904">SUSE bug 1194904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195823">SUSE bug 1195823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196444">SUSE bug 1196444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197158">SUSE bug 1197158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197174">SUSE bug 1197174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197246">SUSE bug 1197246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197302">SUSE bug 1197302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197472">SUSE bug 1197472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197661">SUSE bug 1197661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197926">SUSE bug 1197926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198019">SUSE bug 1198019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198021">SUSE bug 1198021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198240">SUSE bug 1198240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198660">SUSE bug 1198660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200045">SUSE bug 1200045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200571">SUSE bug 1200571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200807">SUSE bug 1200807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200809">SUSE bug 1200809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200810">SUSE bug 1200810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200824">SUSE bug 1200824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200825">SUSE bug 1200825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200871">SUSE bug 1200871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200872">SUSE bug 1200872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201193">SUSE bug 1201193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201218">SUSE bug 1201218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201323">SUSE bug 1201323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201381">SUSE bug 1201381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201610">SUSE bug 1201610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202672">SUSE bug 1202672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202711">SUSE bug 1202711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202712">SUSE bug 1202712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202771">SUSE bug 1202771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202774">SUSE bug 1202774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202778">SUSE bug 1202778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202781">SUSE bug 1202781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203699">SUSE bug 1203699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203769">SUSE bug 1203769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204171">SUSE bug 1204171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206048">SUSE bug 1206048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206049">SUSE bug 1206049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207034">SUSE bug 1207034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207186">SUSE bug 1207186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207593">SUSE bug 1207593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207640">SUSE bug 1207640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207878">SUSE bug 1207878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209262">SUSE bug 1209262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209547">SUSE bug 1209547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209788">SUSE bug 1209788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210050">SUSE bug 1210050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210647">SUSE bug 1210647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211263">SUSE bug 1211263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228483">SUSE bug 1228483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228708">SUSE bug 1228708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228779">SUSE bug 1228779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228966">SUSE bug 1228966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231375">SUSE bug 1231375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233479">SUSE bug 1233479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233557">SUSE bug 1233557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233558">SUSE bug 1233558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234464">SUSE bug 1234464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235528">SUSE bug 1235528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237029">SUSE bug 1237029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237521">SUSE bug 1237521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237530">SUSE bug 1237530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237718">SUSE bug 1237718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237721">SUSE bug 1237721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237722">SUSE bug 1237722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237723">SUSE bug 1237723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237724">SUSE bug 1237724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237725">SUSE bug 1237725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237726">SUSE bug 1237726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237727">SUSE bug 1237727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237728">SUSE bug 1237728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237729">SUSE bug 1237729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237734">SUSE bug 1237734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237735">SUSE bug 1237735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237736">SUSE bug 1237736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237737">SUSE bug 1237737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237738">SUSE bug 1237738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237739">SUSE bug 1237739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237740">SUSE bug 1237740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237742">SUSE bug 1237742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237743">SUSE bug 1237743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237745">SUSE bug 1237745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237746">SUSE bug 1237746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237748">SUSE bug 1237748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237751">SUSE bug 1237751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237752">SUSE bug 1237752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237753">SUSE bug 1237753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237755">SUSE bug 1237755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237759">SUSE bug 1237759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237761">SUSE bug 1237761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237763">SUSE bug 1237763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237766">SUSE bug 1237766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237767">SUSE bug 1237767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237768">SUSE bug 1237768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237774">SUSE bug 1237774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237775">SUSE bug 1237775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237778">SUSE bug 1237778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237779">SUSE bug 1237779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237780">SUSE bug 1237780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237782">SUSE bug 1237782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237783">SUSE bug 1237783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237784">SUSE bug 1237784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237785">SUSE bug 1237785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237786">SUSE bug 1237786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237787">SUSE bug 1237787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237788">SUSE bug 1237788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237789">SUSE bug 1237789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237795">SUSE bug 1237795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237797">SUSE bug 1237797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237798">SUSE bug 1237798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237807">SUSE bug 1237807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237808">SUSE bug 1237808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237810">SUSE bug 1237810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237812">SUSE bug 1237812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237813">SUSE bug 1237813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237814">SUSE bug 1237814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237815">SUSE bug 1237815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237817">SUSE bug 1237817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237818">SUSE bug 1237818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237821">SUSE bug 1237821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237823">SUSE bug 1237823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237824">SUSE bug 1237824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237826">SUSE bug 1237826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237827">SUSE bug 1237827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237829">SUSE bug 1237829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237831">SUSE bug 1237831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237835">SUSE bug 1237835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237836">SUSE bug 1237836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237837">SUSE bug 1237837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237839">SUSE bug 1237839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237840">SUSE bug 1237840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237845">SUSE bug 1237845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237846">SUSE bug 1237846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237868">SUSE bug 1237868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237872">SUSE bug 1237872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237875">SUSE bug 1237875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237877">SUSE bug 1237877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237890">SUSE bug 1237890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237892">SUSE bug 1237892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237903">SUSE bug 1237903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237904">SUSE bug 1237904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237916">SUSE bug 1237916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237918">SUSE bug 1237918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237922">SUSE bug 1237922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237925">SUSE bug 1237925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237926">SUSE bug 1237926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237929">SUSE bug 1237929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237931">SUSE bug 1237931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237932">SUSE bug 1237932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237933">SUSE bug 1237933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237937">SUSE bug 1237937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237939">SUSE bug 1237939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237940">SUSE bug 1237940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237941">SUSE bug 1237941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237942">SUSE bug 1237942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237946">SUSE bug 1237946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237951">SUSE bug 1237951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237952">SUSE bug 1237952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237954">SUSE bug 1237954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237955">SUSE bug 1237955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237957">SUSE bug 1237957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237958">SUSE bug 1237958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237959">SUSE bug 1237959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237960">SUSE bug 1237960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237961">SUSE bug 1237961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237963">SUSE bug 1237963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237965">SUSE bug 1237965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237966">SUSE bug 1237966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237967">SUSE bug 1237967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237968">SUSE bug 1237968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237969">SUSE bug 1237969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237970">SUSE bug 1237970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237971">SUSE bug 1237971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237973">SUSE bug 1237973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237975">SUSE bug 1237975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237976">SUSE bug 1237976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237978">SUSE bug 1237978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237979">SUSE bug 1237979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237983">SUSE bug 1237983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237984">SUSE bug 1237984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237986">SUSE bug 1237986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237987">SUSE bug 1237987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237990">SUSE bug 1237990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237996">SUSE bug 1237996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237997">SUSE bug 1237997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237998">SUSE bug 1237998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237999">SUSE bug 1237999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238000">SUSE bug 1238000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238003">SUSE bug 1238003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238006">SUSE bug 1238006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238007">SUSE bug 1238007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238010">SUSE bug 1238010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238011">SUSE bug 1238011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238012">SUSE bug 1238012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238013">SUSE bug 1238013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238014">SUSE bug 1238014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238016">SUSE bug 1238016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238017">SUSE bug 1238017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238018">SUSE bug 1238018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238019">SUSE bug 1238019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238021">SUSE bug 1238021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238022">SUSE bug 1238022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238024">SUSE bug 1238024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238030">SUSE bug 1238030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238036">SUSE bug 1238036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238037">SUSE bug 1238037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238041">SUSE bug 1238041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238046">SUSE bug 1238046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238047">SUSE bug 1238047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238071">SUSE bug 1238071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238077">SUSE bug 1238077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238079">SUSE bug 1238079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238080">SUSE bug 1238080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238089">SUSE bug 1238089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238090">SUSE bug 1238090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238091">SUSE bug 1238091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238092">SUSE bug 1238092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238096">SUSE bug 1238096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238097">SUSE bug 1238097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238099">SUSE bug 1238099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238103">SUSE bug 1238103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238105">SUSE bug 1238105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238106">SUSE bug 1238106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238108">SUSE bug 1238108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238110">SUSE bug 1238110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238111">SUSE bug 1238111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238112">SUSE bug 1238112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238113">SUSE bug 1238113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238115">SUSE bug 1238115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238116">SUSE bug 1238116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238120">SUSE bug 1238120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238123">SUSE bug 1238123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238125">SUSE bug 1238125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238126">SUSE bug 1238126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238127">SUSE bug 1238127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238131">SUSE bug 1238131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238134">SUSE bug 1238134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238135">SUSE bug 1238135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238138">SUSE bug 1238138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238139">SUSE bug 1238139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238140">SUSE bug 1238140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238142">SUSE bug 1238142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238144">SUSE bug 1238144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238146">SUSE bug 1238146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238147">SUSE bug 1238147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238149">SUSE bug 1238149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238150">SUSE bug 1238150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238155">SUSE bug 1238155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238156">SUSE bug 1238156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238157">SUSE bug 1238157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238158">SUSE bug 1238158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238162">SUSE bug 1238162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238166">SUSE bug 1238166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238167">SUSE bug 1238167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238168">SUSE bug 1238168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238169">SUSE bug 1238169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238170">SUSE bug 1238170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238171">SUSE bug 1238171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238172">SUSE bug 1238172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238175">SUSE bug 1238175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238176">SUSE bug 1238176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238177">SUSE bug 1238177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238180">SUSE bug 1238180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238181">SUSE bug 1238181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238183">SUSE bug 1238183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238184">SUSE bug 1238184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238228">SUSE bug 1238228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238229">SUSE bug 1238229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238231">SUSE bug 1238231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238234">SUSE bug 1238234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238235">SUSE bug 1238235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238236">SUSE bug 1238236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238238">SUSE bug 1238238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238239">SUSE bug 1238239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238241">SUSE bug 1238241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238242">SUSE bug 1238242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238243">SUSE bug 1238243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238244">SUSE bug 1238244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238246">SUSE bug 1238246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238247">SUSE bug 1238247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238248">SUSE bug 1238248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238249">SUSE bug 1238249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238253">SUSE bug 1238253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238255">SUSE bug 1238255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238256">SUSE bug 1238256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238257">SUSE bug 1238257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238260">SUSE bug 1238260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238262">SUSE bug 1238262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238263">SUSE bug 1238263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238264">SUSE bug 1238264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238266">SUSE bug 1238266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238267">SUSE bug 1238267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238268">SUSE bug 1238268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238269">SUSE bug 1238269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238270">SUSE bug 1238270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238271">SUSE bug 1238271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238272">SUSE bug 1238272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238274">SUSE bug 1238274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238275">SUSE bug 1238275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238276">SUSE bug 1238276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238277">SUSE bug 1238277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238278">SUSE bug 1238278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238279">SUSE bug 1238279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238281">SUSE bug 1238281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238282">SUSE bug 1238282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238283">SUSE bug 1238283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238284">SUSE bug 1238284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238286">SUSE bug 1238286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238287">SUSE bug 1238287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238288">SUSE bug 1238288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238289">SUSE bug 1238289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238292">SUSE bug 1238292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238293">SUSE bug 1238293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238295">SUSE bug 1238295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238298">SUSE bug 1238298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238301">SUSE bug 1238301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238302">SUSE bug 1238302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238306">SUSE bug 1238306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238307">SUSE bug 1238307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238308">SUSE bug 1238308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238309">SUSE bug 1238309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238311">SUSE bug 1238311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238313">SUSE bug 1238313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238326">SUSE bug 1238326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238327">SUSE bug 1238327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238328">SUSE bug 1238328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238331">SUSE bug 1238331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238333">SUSE bug 1238333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238334">SUSE bug 1238334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238336">SUSE bug 1238336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238337">SUSE bug 1238337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238338">SUSE bug 1238338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238339">SUSE bug 1238339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238343">SUSE bug 1238343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238345">SUSE bug 1238345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238372">SUSE bug 1238372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238373">SUSE bug 1238373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238374">SUSE bug 1238374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238376">SUSE bug 1238376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238377">SUSE bug 1238377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238381">SUSE bug 1238381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238382">SUSE bug 1238382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238383">SUSE bug 1238383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238386">SUSE bug 1238386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238387">SUSE bug 1238387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238388">SUSE bug 1238388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238389">SUSE bug 1238389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238390">SUSE bug 1238390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238391">SUSE bug 1238391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238392">SUSE bug 1238392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238393">SUSE bug 1238393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238394">SUSE bug 1238394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238395">SUSE bug 1238395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238396">SUSE bug 1238396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238397">SUSE bug 1238397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238400">SUSE bug 1238400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238410">SUSE bug 1238410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238411">SUSE bug 1238411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238413">SUSE bug 1238413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238415">SUSE bug 1238415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238416">SUSE bug 1238416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238417">SUSE bug 1238417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238418">SUSE bug 1238418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238419">SUSE bug 1238419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238420">SUSE bug 1238420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238423">SUSE bug 1238423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238428">SUSE bug 1238428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238429">SUSE bug 1238429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238430">SUSE bug 1238430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238431">SUSE bug 1238431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238432">SUSE bug 1238432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238433">SUSE bug 1238433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238434">SUSE bug 1238434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238435">SUSE bug 1238435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238436">SUSE bug 1238436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238437">SUSE bug 1238437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238440">SUSE bug 1238440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238441">SUSE bug 1238441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238442">SUSE bug 1238442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238443">SUSE bug 1238443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238444">SUSE bug 1238444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238445">SUSE bug 1238445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238446">SUSE bug 1238446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238447">SUSE bug 1238447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238453">SUSE bug 1238453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238454">SUSE bug 1238454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238458">SUSE bug 1238458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238459">SUSE bug 1238459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238462">SUSE bug 1238462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238463">SUSE bug 1238463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238465">SUSE bug 1238465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238467">SUSE bug 1238467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238469">SUSE bug 1238469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238533">SUSE bug 1238533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238536">SUSE bug 1238536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238538">SUSE bug 1238538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238539">SUSE bug 1238539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238540">SUSE bug 1238540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238543">SUSE bug 1238543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238545">SUSE bug 1238545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238546">SUSE bug 1238546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238556">SUSE bug 1238556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238557">SUSE bug 1238557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238599">SUSE bug 1238599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238600">SUSE bug 1238600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238601">SUSE bug 1238601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238602">SUSE bug 1238602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238605">SUSE bug 1238605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238612">SUSE bug 1238612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238615">SUSE bug 1238615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238617">SUSE bug 1238617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238618">SUSE bug 1238618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238619">SUSE bug 1238619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238621">SUSE bug 1238621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238623">SUSE bug 1238623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238625">SUSE bug 1238625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238626">SUSE bug 1238626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238630">SUSE bug 1238630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238631">SUSE bug 1238631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238632">SUSE bug 1238632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238633">SUSE bug 1238633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238635">SUSE bug 1238635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238636">SUSE bug 1238636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238638">SUSE bug 1238638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238639">SUSE bug 1238639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238640">SUSE bug 1238640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238641">SUSE bug 1238641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238642">SUSE bug 1238642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238643">SUSE bug 1238643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238645">SUSE bug 1238645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238646">SUSE bug 1238646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238647">SUSE bug 1238647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238650">SUSE bug 1238650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238653">SUSE bug 1238653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238654">SUSE bug 1238654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238655">SUSE bug 1238655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238662">SUSE bug 1238662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238663">SUSE bug 1238663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238664">SUSE bug 1238664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238666">SUSE bug 1238666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238668">SUSE bug 1238668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238705">SUSE bug 1238705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238707">SUSE bug 1238707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238710">SUSE bug 1238710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238712">SUSE bug 1238712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238718">SUSE bug 1238718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238719">SUSE bug 1238719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238721">SUSE bug 1238721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238722">SUSE bug 1238722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238727">SUSE bug 1238727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238729">SUSE bug 1238729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238750">SUSE bug 1238750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238787">SUSE bug 1238787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238789">SUSE bug 1238789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238792">SUSE bug 1238792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238799">SUSE bug 1238799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238804">SUSE bug 1238804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238805">SUSE bug 1238805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238808">SUSE bug 1238808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238809">SUSE bug 1238809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238811">SUSE bug 1238811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238814">SUSE bug 1238814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238815">SUSE bug 1238815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238816">SUSE bug 1238816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238817">SUSE bug 1238817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238818">SUSE bug 1238818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238819">SUSE bug 1238819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238821">SUSE bug 1238821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238823">SUSE bug 1238823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238825">SUSE bug 1238825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238830">SUSE bug 1238830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238834">SUSE bug 1238834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238835">SUSE bug 1238835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238836">SUSE bug 1238836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238838">SUSE bug 1238838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238867">SUSE bug 1238867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238868">SUSE bug 1238868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238869">SUSE bug 1238869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238870">SUSE bug 1238870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238871">SUSE bug 1238871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238878">SUSE bug 1238878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238889">SUSE bug 1238889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238892">SUSE bug 1238892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238893">SUSE bug 1238893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238897">SUSE bug 1238897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238898">SUSE bug 1238898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238899">SUSE bug 1238899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238902">SUSE bug 1238902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238911">SUSE bug 1238911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238916">SUSE bug 1238916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238919">SUSE bug 1238919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238925">SUSE bug 1238925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238930">SUSE bug 1238930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238933">SUSE bug 1238933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238936">SUSE bug 1238936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238937">SUSE bug 1238937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238938">SUSE bug 1238938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238939">SUSE bug 1238939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238943">SUSE bug 1238943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238945">SUSE bug 1238945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238948">SUSE bug 1238948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238949">SUSE bug 1238949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238950">SUSE bug 1238950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238951">SUSE bug 1238951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238952">SUSE bug 1238952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238954">SUSE bug 1238954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238956">SUSE bug 1238956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238957">SUSE bug 1238957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239001">SUSE bug 1239001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239004">SUSE bug 1239004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239016">SUSE bug 1239016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239035">SUSE bug 1239035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239036">SUSE bug 1239036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239040">SUSE bug 1239040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239041">SUSE bug 1239041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239051">SUSE bug 1239051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239060">SUSE bug 1239060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239061">SUSE bug 1239061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239070">SUSE bug 1239070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239071">SUSE bug 1239071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239073">SUSE bug 1239073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239076">SUSE bug 1239076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239109">SUSE bug 1239109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239115">SUSE bug 1239115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239126">SUSE bug 1239126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239452">SUSE bug 1239452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239454">SUSE bug 1239454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239968">SUSE bug 1239968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239969">SUSE bug 1239969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240133">SUSE bug 1240133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240195">SUSE bug 1240195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240205">SUSE bug 1240205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240207">SUSE bug 1240207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240208">SUSE bug 1240208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240210">SUSE bug 1240210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240212">SUSE bug 1240212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240213">SUSE bug 1240213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240218">SUSE bug 1240218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240220">SUSE bug 1240220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240227">SUSE bug 1240227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240229">SUSE bug 1240229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240231">SUSE bug 1240231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240242">SUSE bug 1240242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240245">SUSE bug 1240245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240247">SUSE bug 1240247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240250">SUSE bug 1240250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240254">SUSE bug 1240254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240256">SUSE bug 1240256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240264">SUSE bug 1240264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240266">SUSE bug 1240266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240272">SUSE bug 1240272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240275">SUSE bug 1240275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240276">SUSE bug 1240276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240278">SUSE bug 1240278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240279">SUSE bug 1240279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240280">SUSE bug 1240280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240281">SUSE bug 1240281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240282">SUSE bug 1240282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240283">SUSE bug 1240283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240284">SUSE bug 1240284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240286">SUSE bug 1240286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240288">SUSE bug 1240288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240290">SUSE bug 1240290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240292">SUSE bug 1240292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240293">SUSE bug 1240293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240297">SUSE bug 1240297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240304">SUSE bug 1240304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240308">SUSE bug 1240308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240309">SUSE bug 1240309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240317">SUSE bug 1240317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240318">SUSE bug 1240318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240322">SUSE bug 1240322</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-4453/">CVE-2021-4453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4453">CVE-2021-4453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-4454/">CVE-2021-4454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4454">CVE-2021-4454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47631/">CVE-2021-47631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47631">CVE-2021-47631 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47632/">CVE-2021-47632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47632">CVE-2021-47632 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47633/">CVE-2021-47633 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47633">CVE-2021-47633 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47635/">CVE-2021-47635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47635">CVE-2021-47635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47636/">CVE-2021-47636 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47636">CVE-2021-47636 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47637/">CVE-2021-47637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47637">CVE-2021-47637 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47638/">CVE-2021-47638 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47638">CVE-2021-47638 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47639/">CVE-2021-47639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47639">CVE-2021-47639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47641/">CVE-2021-47641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47641">CVE-2021-47641 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47642/">CVE-2021-47642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47642">CVE-2021-47642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47643/">CVE-2021-47643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47643">CVE-2021-47643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47644/">CVE-2021-47644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47644">CVE-2021-47644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47645/">CVE-2021-47645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47645">CVE-2021-47645 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47646/">CVE-2021-47646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47646">CVE-2021-47646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47647/">CVE-2021-47647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47647">CVE-2021-47647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47648/">CVE-2021-47648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47648">CVE-2021-47648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47649/">CVE-2021-47649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47649">CVE-2021-47649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47650/">CVE-2021-47650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47650">CVE-2021-47650 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47651/">CVE-2021-47651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47651">CVE-2021-47651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47652/">CVE-2021-47652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47652">CVE-2021-47652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47653/">CVE-2021-47653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47653">CVE-2021-47653 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47654/">CVE-2021-47654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47654">CVE-2021-47654 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47656/">CVE-2021-47656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47656">CVE-2021-47656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47657/">CVE-2021-47657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47657">CVE-2021-47657 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47659/">CVE-2021-47659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47659">CVE-2021-47659 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0168/">CVE-2022-0168 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0995/">CVE-2022-0995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0995">CVE-2022-0995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2977/">CVE-2022-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2977">CVE-2022-2977 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3303/">CVE-2022-3303 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3303">CVE-2022-3303 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49044/">CVE-2022-49044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49044">CVE-2022-49044 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49050/">CVE-2022-49050 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49050">CVE-2022-49050 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="4.3/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49051/">CVE-2022-49051 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49051">CVE-2022-49051 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49053/">CVE-2022-49053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49053">CVE-2022-49053 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49054/">CVE-2022-49054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49054">CVE-2022-49054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49055/">CVE-2022-49055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49055">CVE-2022-49055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49058/">CVE-2022-49058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49058">CVE-2022-49058 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49059/">CVE-2022-49059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49059">CVE-2022-49059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49060/">CVE-2022-49060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49060">CVE-2022-49060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49061/">CVE-2022-49061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49061">CVE-2022-49061 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49063/">CVE-2022-49063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49063">CVE-2022-49063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49065/">CVE-2022-49065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49065">CVE-2022-49065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49066/">CVE-2022-49066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49066">CVE-2022-49066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49073/">CVE-2022-49073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49073">CVE-2022-49073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49074/">CVE-2022-49074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49074">CVE-2022-49074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49076/">CVE-2022-49076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49076">CVE-2022-49076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49078/">CVE-2022-49078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49078">CVE-2022-49078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49082/">CVE-2022-49082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49082">CVE-2022-49082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49083/">CVE-2022-49083 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49083">CVE-2022-49083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49084/">CVE-2022-49084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49084">CVE-2022-49084 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49085/">CVE-2022-49085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49085">CVE-2022-49085 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49086/">CVE-2022-49086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49086">CVE-2022-49086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49088/">CVE-2022-49088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49088">CVE-2022-49088 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49089/">CVE-2022-49089 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49089">CVE-2022-49089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49090/">CVE-2022-49090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49090">CVE-2022-49090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49091/">CVE-2022-49091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49091">CVE-2022-49091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49092/">CVE-2022-49092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49092">CVE-2022-49092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49093/">CVE-2022-49093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49093">CVE-2022-49093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49095/">CVE-2022-49095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49095">CVE-2022-49095 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49096/">CVE-2022-49096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49096">CVE-2022-49096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49097/">CVE-2022-49097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49097">CVE-2022-49097 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49098/">CVE-2022-49098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49098">CVE-2022-49098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49099/">CVE-2022-49099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49099">CVE-2022-49099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49100/">CVE-2022-49100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49100">CVE-2022-49100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49102/">CVE-2022-49102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49102">CVE-2022-49102 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49103/">CVE-2022-49103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49103">CVE-2022-49103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49104/">CVE-2022-49104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49104">CVE-2022-49104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49105/">CVE-2022-49105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49105">CVE-2022-49105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49106/">CVE-2022-49106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49106">CVE-2022-49106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49107/">CVE-2022-49107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49107">CVE-2022-49107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49109/">CVE-2022-49109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49109">CVE-2022-49109 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49111/">CVE-2022-49111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49111">CVE-2022-49111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49112/">CVE-2022-49112 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49112">CVE-2022-49112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49113/">CVE-2022-49113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49113">CVE-2022-49113 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49114/">CVE-2022-49114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49114">CVE-2022-49114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49115/">CVE-2022-49115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49115">CVE-2022-49115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49116/">CVE-2022-49116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49116">CVE-2022-49116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49118/">CVE-2022-49118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49118">CVE-2022-49118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49119/">CVE-2022-49119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49119">CVE-2022-49119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49120/">CVE-2022-49120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49120">CVE-2022-49120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49121/">CVE-2022-49121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49121">CVE-2022-49121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49122/">CVE-2022-49122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49122">CVE-2022-49122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49126/">CVE-2022-49126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49126">CVE-2022-49126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49128/">CVE-2022-49128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49128">CVE-2022-49128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49129/">CVE-2022-49129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49129">CVE-2022-49129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49130/">CVE-2022-49130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49130">CVE-2022-49130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49131/">CVE-2022-49131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49131">CVE-2022-49131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49132/">CVE-2022-49132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49132">CVE-2022-49132 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49135/">CVE-2022-49135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49135">CVE-2022-49135 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49137/">CVE-2022-49137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49137">CVE-2022-49137 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49145/">CVE-2022-49145 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49145">CVE-2022-49145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49147/">CVE-2022-49147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49147">CVE-2022-49147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49148/">CVE-2022-49148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49148">CVE-2022-49148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49151/">CVE-2022-49151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49151">CVE-2022-49151 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49153/">CVE-2022-49153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49153">CVE-2022-49153 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49154/">CVE-2022-49154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49154">CVE-2022-49154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49155/">CVE-2022-49155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49155">CVE-2022-49155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49156/">CVE-2022-49156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49156">CVE-2022-49156 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49157/">CVE-2022-49157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49157">CVE-2022-49157 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49158/">CVE-2022-49158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49158">CVE-2022-49158 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49159/">CVE-2022-49159 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49159">CVE-2022-49159 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49160/">CVE-2022-49160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49160">CVE-2022-49160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49162/">CVE-2022-49162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49162">CVE-2022-49162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49163/">CVE-2022-49163 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49163">CVE-2022-49163 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49164/">CVE-2022-49164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49164">CVE-2022-49164 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49165/">CVE-2022-49165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49165">CVE-2022-49165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49174/">CVE-2022-49174 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49174">CVE-2022-49174 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49175/">CVE-2022-49175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49175">CVE-2022-49175 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49176/">CVE-2022-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49176">CVE-2022-49176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49177/">CVE-2022-49177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49177">CVE-2022-49177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49179/">CVE-2022-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49179">CVE-2022-49179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49180/">CVE-2022-49180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49180">CVE-2022-49180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49182/">CVE-2022-49182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49182">CVE-2022-49182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49185/">CVE-2022-49185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49185">CVE-2022-49185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49187/">CVE-2022-49187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49187">CVE-2022-49187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49188/">CVE-2022-49188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49188">CVE-2022-49188 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49189/">CVE-2022-49189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49189">CVE-2022-49189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49193/">CVE-2022-49193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49193">CVE-2022-49193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49194/">CVE-2022-49194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49194">CVE-2022-49194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49196/">CVE-2022-49196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49196">CVE-2022-49196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49199/">CVE-2022-49199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49199">CVE-2022-49199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49200/">CVE-2022-49200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49200">CVE-2022-49200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49201/">CVE-2022-49201 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49201">CVE-2022-49201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49206/">CVE-2022-49206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49206">CVE-2022-49206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49208/">CVE-2022-49208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49208">CVE-2022-49208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49212/">CVE-2022-49212 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49212">CVE-2022-49212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49213/">CVE-2022-49213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49213">CVE-2022-49213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49214/">CVE-2022-49214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49214">CVE-2022-49214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49216/">CVE-2022-49216 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49216">CVE-2022-49216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49217/">CVE-2022-49217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49217">CVE-2022-49217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49218/">CVE-2022-49218 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49218">CVE-2022-49218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49221/">CVE-2022-49221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49221">CVE-2022-49221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49222/">CVE-2022-49222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49222">CVE-2022-49222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49224/">CVE-2022-49224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49224">CVE-2022-49224 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49226/">CVE-2022-49226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49226">CVE-2022-49226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49227/">CVE-2022-49227 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49227">CVE-2022-49227 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49232/">CVE-2022-49232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49232">CVE-2022-49232 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49235/">CVE-2022-49235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49235">CVE-2022-49235 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49236/">CVE-2022-49236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49236">CVE-2022-49236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49239/">CVE-2022-49239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49239">CVE-2022-49239 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49241/">CVE-2022-49241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49241">CVE-2022-49241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49242/">CVE-2022-49242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49242">CVE-2022-49242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49243/">CVE-2022-49243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49243">CVE-2022-49243 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49244/">CVE-2022-49244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49244">CVE-2022-49244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49246/">CVE-2022-49246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49246">CVE-2022-49246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49247/">CVE-2022-49247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49247">CVE-2022-49247 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49248/">CVE-2022-49248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49248">CVE-2022-49248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49249/">CVE-2022-49249 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49249">CVE-2022-49249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49250/">CVE-2022-49250 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49250">CVE-2022-49250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49251/">CVE-2022-49251 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49251">CVE-2022-49251 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49252/">CVE-2022-49252 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49252">CVE-2022-49252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49253/">CVE-2022-49253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49253">CVE-2022-49253 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49254/">CVE-2022-49254 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49254">CVE-2022-49254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49256/">CVE-2022-49256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49256">CVE-2022-49256 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49257/">CVE-2022-49257 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49257">CVE-2022-49257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49258/">CVE-2022-49258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49258">CVE-2022-49258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49259/">CVE-2022-49259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49259">CVE-2022-49259 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49260/">CVE-2022-49260 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49260">CVE-2022-49260 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49261/">CVE-2022-49261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49261">CVE-2022-49261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49262/">CVE-2022-49262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49262">CVE-2022-49262 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49263/">CVE-2022-49263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49263">CVE-2022-49263 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49264/">CVE-2022-49264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49264">CVE-2022-49264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49265/">CVE-2022-49265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49265">CVE-2022-49265 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49266/">CVE-2022-49266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49266">CVE-2022-49266 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49268/">CVE-2022-49268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49268">CVE-2022-49268 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49269/">CVE-2022-49269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49269">CVE-2022-49269 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49270/">CVE-2022-49270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49270">CVE-2022-49270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49271/">CVE-2022-49271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49271">CVE-2022-49271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49272/">CVE-2022-49272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49272">CVE-2022-49272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49273/">CVE-2022-49273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49273">CVE-2022-49273 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49274/">CVE-2022-49274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49274">CVE-2022-49274 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49275/">CVE-2022-49275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49275">CVE-2022-49275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49276/">CVE-2022-49276 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49276">CVE-2022-49276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49277/">CVE-2022-49277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49277">CVE-2022-49277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49278/">CVE-2022-49278 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49278">CVE-2022-49278 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49279/">CVE-2022-49279 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49279">CVE-2022-49279 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49280/">CVE-2022-49280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49280">CVE-2022-49280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49281/">CVE-2022-49281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49281">CVE-2022-49281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49283/">CVE-2022-49283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49283">CVE-2022-49283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49285/">CVE-2022-49285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49285">CVE-2022-49285 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49286/">CVE-2022-49286 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49286">CVE-2022-49286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49287/">CVE-2022-49287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49287">CVE-2022-49287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49288/">CVE-2022-49288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49288">CVE-2022-49288 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49290/">CVE-2022-49290 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49290">CVE-2022-49290 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49291/">CVE-2022-49291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49291">CVE-2022-49291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49292/">CVE-2022-49292 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49292">CVE-2022-49292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49293/">CVE-2022-49293 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49293">CVE-2022-49293 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49294/">CVE-2022-49294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49294">CVE-2022-49294 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49295/">CVE-2022-49295 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49295">CVE-2022-49295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49297/">CVE-2022-49297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49297">CVE-2022-49297 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49298/">CVE-2022-49298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49298">CVE-2022-49298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49299/">CVE-2022-49299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49299">CVE-2022-49299 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49300/">CVE-2022-49300 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49300">CVE-2022-49300 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49301/">CVE-2022-49301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49301">CVE-2022-49301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49302/">CVE-2022-49302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49302">CVE-2022-49302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49304/">CVE-2022-49304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49304">CVE-2022-49304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49305/">CVE-2022-49305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49305">CVE-2022-49305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49307/">CVE-2022-49307 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49307">CVE-2022-49307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49308/">CVE-2022-49308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49308">CVE-2022-49308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49309/">CVE-2022-49309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49309">CVE-2022-49309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49310/">CVE-2022-49310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49310">CVE-2022-49310 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49311/">CVE-2022-49311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49311">CVE-2022-49311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49312/">CVE-2022-49312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49312">CVE-2022-49312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49313/">CVE-2022-49313 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49313">CVE-2022-49313 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49314/">CVE-2022-49314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49314">CVE-2022-49314 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49315/">CVE-2022-49315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49315">CVE-2022-49315 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49316/">CVE-2022-49316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49316">CVE-2022-49316 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49319/">CVE-2022-49319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49319">CVE-2022-49319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49320/">CVE-2022-49320 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49320">CVE-2022-49320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49321/">CVE-2022-49321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49321">CVE-2022-49321 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49322/">CVE-2022-49322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49322">CVE-2022-49322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49323/">CVE-2022-49323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49323">CVE-2022-49323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49326/">CVE-2022-49326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49326">CVE-2022-49326 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49327/">CVE-2022-49327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49327">CVE-2022-49327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49328/">CVE-2022-49328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49328">CVE-2022-49328 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49331/">CVE-2022-49331 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49331">CVE-2022-49331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49332/">CVE-2022-49332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49332">CVE-2022-49332 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49335/">CVE-2022-49335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49335">CVE-2022-49335 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49336/">CVE-2022-49336 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49336">CVE-2022-49336 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49337/">CVE-2022-49337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49337">CVE-2022-49337 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49339/">CVE-2022-49339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49339">CVE-2022-49339 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49341/">CVE-2022-49341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49341">CVE-2022-49341 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49342/">CVE-2022-49342 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49342">CVE-2022-49342 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49343/">CVE-2022-49343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49343">CVE-2022-49343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49345/">CVE-2022-49345 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49345">CVE-2022-49345 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49346/">CVE-2022-49346 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49346">CVE-2022-49346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49347/">CVE-2022-49347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49347">CVE-2022-49347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49348/">CVE-2022-49348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49348">CVE-2022-49348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49349/">CVE-2022-49349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49349">CVE-2022-49349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49350/">CVE-2022-49350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49350">CVE-2022-49350 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49351/">CVE-2022-49351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49351">CVE-2022-49351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49352/">CVE-2022-49352 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49352">CVE-2022-49352 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49354/">CVE-2022-49354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49354">CVE-2022-49354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49356/">CVE-2022-49356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49356">CVE-2022-49356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49357/">CVE-2022-49357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49357">CVE-2022-49357 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49367/">CVE-2022-49367 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49367">CVE-2022-49367 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49368/">CVE-2022-49368 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49368">CVE-2022-49368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49370/">CVE-2022-49370 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49370">CVE-2022-49370 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49371/">CVE-2022-49371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49371">CVE-2022-49371 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49373/">CVE-2022-49373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49373">CVE-2022-49373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49375/">CVE-2022-49375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49375">CVE-2022-49375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49376/">CVE-2022-49376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49376">CVE-2022-49376 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49377/">CVE-2022-49377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49377">CVE-2022-49377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49378/">CVE-2022-49378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49378">CVE-2022-49378 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49379/">CVE-2022-49379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49379">CVE-2022-49379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49381/">CVE-2022-49381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49381">CVE-2022-49381 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49382/">CVE-2022-49382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49382">CVE-2022-49382 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49384/">CVE-2022-49384 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49384">CVE-2022-49384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49385/">CVE-2022-49385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49385">CVE-2022-49385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49386/">CVE-2022-49386 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49386">CVE-2022-49386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49389/">CVE-2022-49389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49389">CVE-2022-49389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49392/">CVE-2022-49392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49392">CVE-2022-49392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49394/">CVE-2022-49394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49394">CVE-2022-49394 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49396/">CVE-2022-49396 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49396">CVE-2022-49396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49397/">CVE-2022-49397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49397">CVE-2022-49397 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49398/">CVE-2022-49398 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49398">CVE-2022-49398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49399/">CVE-2022-49399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49399">CVE-2022-49399 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49400/">CVE-2022-49400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49400">CVE-2022-49400 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49402/">CVE-2022-49402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49402">CVE-2022-49402 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49404/">CVE-2022-49404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49404">CVE-2022-49404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49407/">CVE-2022-49407 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49407">CVE-2022-49407 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49409/">CVE-2022-49409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49409">CVE-2022-49409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49410/">CVE-2022-49410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49410">CVE-2022-49410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49411/">CVE-2022-49411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49411">CVE-2022-49411 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49412/">CVE-2022-49412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49412">CVE-2022-49412 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49413/">CVE-2022-49413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49413">CVE-2022-49413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49414/">CVE-2022-49414 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49414">CVE-2022-49414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49416/">CVE-2022-49416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49416">CVE-2022-49416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49418/">CVE-2022-49418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49418">CVE-2022-49418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49421/">CVE-2022-49421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49421">CVE-2022-49421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49422/">CVE-2022-49422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49422">CVE-2022-49422 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49424/">CVE-2022-49424 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49424">CVE-2022-49424 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49426/">CVE-2022-49426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49426">CVE-2022-49426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49427/">CVE-2022-49427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49427">CVE-2022-49427 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49429/">CVE-2022-49429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49429">CVE-2022-49429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49430/">CVE-2022-49430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49430">CVE-2022-49430 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49431/">CVE-2022-49431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49431">CVE-2022-49431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49432/">CVE-2022-49432 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49432">CVE-2022-49432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49433/">CVE-2022-49433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49433">CVE-2022-49433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49434/">CVE-2022-49434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49434">CVE-2022-49434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49435/">CVE-2022-49435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49435">CVE-2022-49435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49437/">CVE-2022-49437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49437">CVE-2022-49437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49438/">CVE-2022-49438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49438">CVE-2022-49438 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49440/">CVE-2022-49440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49440">CVE-2022-49440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49441/">CVE-2022-49441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49441">CVE-2022-49441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49442/">CVE-2022-49442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49442">CVE-2022-49442 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49443/">CVE-2022-49443 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49443">CVE-2022-49443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49444/">CVE-2022-49444 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49444">CVE-2022-49444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49445/">CVE-2022-49445 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49445">CVE-2022-49445 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49447/">CVE-2022-49447 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49447">CVE-2022-49447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49448/">CVE-2022-49448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49448">CVE-2022-49448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49449/">CVE-2022-49449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49449">CVE-2022-49449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49451/">CVE-2022-49451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49451">CVE-2022-49451 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49453/">CVE-2022-49453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49453">CVE-2022-49453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49455/">CVE-2022-49455 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49455">CVE-2022-49455 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49459/">CVE-2022-49459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49459">CVE-2022-49459 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49460/">CVE-2022-49460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49460">CVE-2022-49460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49462/">CVE-2022-49462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49462">CVE-2022-49462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49463/">CVE-2022-49463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49463">CVE-2022-49463 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49465/">CVE-2022-49465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49465">CVE-2022-49465 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49466/">CVE-2022-49466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49466">CVE-2022-49466 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49467/">CVE-2022-49467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49467">CVE-2022-49467 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49468/">CVE-2022-49468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49468">CVE-2022-49468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49472/">CVE-2022-49472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49472">CVE-2022-49472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49473/">CVE-2022-49473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49473">CVE-2022-49473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49474/">CVE-2022-49474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49474">CVE-2022-49474 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49475/">CVE-2022-49475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49475">CVE-2022-49475 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49477/">CVE-2022-49477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49477">CVE-2022-49477 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49478/">CVE-2022-49478 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49478">CVE-2022-49478 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49480/">CVE-2022-49480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49480">CVE-2022-49480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49481/">CVE-2022-49481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49481">CVE-2022-49481 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49482/">CVE-2022-49482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49482">CVE-2022-49482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49486/">CVE-2022-49486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49486">CVE-2022-49486 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49487/">CVE-2022-49487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49487">CVE-2022-49487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49488/">CVE-2022-49488 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49488">CVE-2022-49488 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49489/">CVE-2022-49489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49489">CVE-2022-49489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49490/">CVE-2022-49490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49490">CVE-2022-49490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49491/">CVE-2022-49491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49491">CVE-2022-49491 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49492/">CVE-2022-49492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49492">CVE-2022-49492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49493/">CVE-2022-49493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49493">CVE-2022-49493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49494/">CVE-2022-49494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49494">CVE-2022-49494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49495/">CVE-2022-49495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49495">CVE-2022-49495 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49498/">CVE-2022-49498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49498">CVE-2022-49498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49501/">CVE-2022-49501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49501">CVE-2022-49501 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49502/">CVE-2022-49502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49502">CVE-2022-49502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49503/">CVE-2022-49503 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49503">CVE-2022-49503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49504/">CVE-2022-49504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49504">CVE-2022-49504 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49505/">CVE-2022-49505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49505">CVE-2022-49505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49506/">CVE-2022-49506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49506">CVE-2022-49506 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49507/">CVE-2022-49507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49507">CVE-2022-49507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49508/">CVE-2022-49508 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49508">CVE-2022-49508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49509/">CVE-2022-49509 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49509">CVE-2022-49509 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49512/">CVE-2022-49512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49512">CVE-2022-49512 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49514/">CVE-2022-49514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49514">CVE-2022-49514 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49515/">CVE-2022-49515 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49515">CVE-2022-49515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49517/">CVE-2022-49517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49517">CVE-2022-49517 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49519/">CVE-2022-49519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49519">CVE-2022-49519 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49520/">CVE-2022-49520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49520">CVE-2022-49520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49521/">CVE-2022-49521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49521">CVE-2022-49521 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49522/">CVE-2022-49522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49522">CVE-2022-49522 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49523/">CVE-2022-49523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49523">CVE-2022-49523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49524/">CVE-2022-49524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49524">CVE-2022-49524 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49525/">CVE-2022-49525 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49525">CVE-2022-49525 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49526/">CVE-2022-49526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49526">CVE-2022-49526 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49527/">CVE-2022-49527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49527">CVE-2022-49527 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49532/">CVE-2022-49532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49532">CVE-2022-49532 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49534/">CVE-2022-49534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49534">CVE-2022-49534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49535/">CVE-2022-49535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49535">CVE-2022-49535 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49536/">CVE-2022-49536 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49536">CVE-2022-49536 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49537/">CVE-2022-49537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49537">CVE-2022-49537 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49541/">CVE-2022-49541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49541">CVE-2022-49541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49542/">CVE-2022-49542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49542">CVE-2022-49542 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49544/">CVE-2022-49544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49544">CVE-2022-49544 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49545/">CVE-2022-49545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49545">CVE-2022-49545 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49546/">CVE-2022-49546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49546">CVE-2022-49546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49549/">CVE-2022-49549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49549">CVE-2022-49549 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49551/">CVE-2022-49551 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49551">CVE-2022-49551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49555/">CVE-2022-49555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49555">CVE-2022-49555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49556/">CVE-2022-49556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49556">CVE-2022-49556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49559/">CVE-2022-49559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49559">CVE-2022-49559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49562/">CVE-2022-49562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49562">CVE-2022-49562 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49563/">CVE-2022-49563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49563">CVE-2022-49563 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49564/">CVE-2022-49564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49564">CVE-2022-49564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49566/">CVE-2022-49566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49566">CVE-2022-49566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49568/">CVE-2022-49568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49568">CVE-2022-49568 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49569/">CVE-2022-49569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49569">CVE-2022-49569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49570/">CVE-2022-49570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49570">CVE-2022-49570 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49579/">CVE-2022-49579 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49579">CVE-2022-49579 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49581/">CVE-2022-49581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49581">CVE-2022-49581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49583/">CVE-2022-49583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49583">CVE-2022-49583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49584/">CVE-2022-49584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49584">CVE-2022-49584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49591/">CVE-2022-49591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49591">CVE-2022-49591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49592/">CVE-2022-49592 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49592">CVE-2022-49592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49603/">CVE-2022-49603 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49603">CVE-2022-49603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49605/">CVE-2022-49605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49605">CVE-2022-49605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49606/">CVE-2022-49606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49606">CVE-2022-49606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49607/">CVE-2022-49607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49607">CVE-2022-49607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49609/">CVE-2022-49609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49609">CVE-2022-49609 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2022-49610/">CVE-2022-49610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49610">CVE-2022-49610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49611/">CVE-2022-49611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49611">CVE-2022-49611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49613/">CVE-2022-49613 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49613">CVE-2022-49613 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49615/">CVE-2022-49615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49615">CVE-2022-49615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49616/">CVE-2022-49616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49616">CVE-2022-49616 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49617/">CVE-2022-49617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49617">CVE-2022-49617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49618/">CVE-2022-49618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49618">CVE-2022-49618 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49621/">CVE-2022-49621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49621">CVE-2022-49621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49623/">CVE-2022-49623 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49623">CVE-2022-49623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49625/">CVE-2022-49625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49625">CVE-2022-49625 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49626/">CVE-2022-49626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49626">CVE-2022-49626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49627/">CVE-2022-49627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49627">CVE-2022-49627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49628/">CVE-2022-49628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49628">CVE-2022-49628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49631/">CVE-2022-49631 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49631">CVE-2022-49631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49634/">CVE-2022-49634 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49634">CVE-2022-49634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49640/">CVE-2022-49640 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49640">CVE-2022-49640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49641/">CVE-2022-49641 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49641">CVE-2022-49641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49642/">CVE-2022-49642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49642">CVE-2022-49642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49643/">CVE-2022-49643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49643">CVE-2022-49643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49644/">CVE-2022-49644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49644">CVE-2022-49644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49645/">CVE-2022-49645 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49645">CVE-2022-49645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49646/">CVE-2022-49646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49646">CVE-2022-49646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49647/">CVE-2022-49647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49647">CVE-2022-49647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49648/">CVE-2022-49648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49648">CVE-2022-49648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49649/">CVE-2022-49649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49649">CVE-2022-49649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49650/">CVE-2022-49650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49650">CVE-2022-49650 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49652/">CVE-2022-49652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49652">CVE-2022-49652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49653/">CVE-2022-49653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49653">CVE-2022-49653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49656/">CVE-2022-49656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49656">CVE-2022-49656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49657/">CVE-2022-49657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49657">CVE-2022-49657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49661/">CVE-2022-49661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49661">CVE-2022-49661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49663/">CVE-2022-49663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49663">CVE-2022-49663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49665/">CVE-2022-49665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49665">CVE-2022-49665 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49667/">CVE-2022-49667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49667">CVE-2022-49667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49668/">CVE-2022-49668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49668">CVE-2022-49668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49670/">CVE-2022-49670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49670">CVE-2022-49670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49671/">CVE-2022-49671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49671">CVE-2022-49671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49672/">CVE-2022-49672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49672">CVE-2022-49672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49673/">CVE-2022-49673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49673">CVE-2022-49673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49674/">CVE-2022-49674 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49674">CVE-2022-49674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49675/">CVE-2022-49675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49675">CVE-2022-49675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49676/">CVE-2022-49676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49676">CVE-2022-49676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49677/">CVE-2022-49677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49677">CVE-2022-49677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49678/">CVE-2022-49678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49678">CVE-2022-49678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49679/">CVE-2022-49679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49679">CVE-2022-49679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49680/">CVE-2022-49680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49680">CVE-2022-49680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49683/">CVE-2022-49683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49683">CVE-2022-49683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49685/">CVE-2022-49685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49685">CVE-2022-49685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49687/">CVE-2022-49687 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49687">CVE-2022-49687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49688/">CVE-2022-49688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49688">CVE-2022-49688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49693/">CVE-2022-49693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49693">CVE-2022-49693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49695/">CVE-2022-49695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49695">CVE-2022-49695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49699/">CVE-2022-49699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49699">CVE-2022-49699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49700/">CVE-2022-49700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49700">CVE-2022-49700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49701/">CVE-2022-49701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49701">CVE-2022-49701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49703/">CVE-2022-49703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49703">CVE-2022-49703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49704/">CVE-2022-49704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49704">CVE-2022-49704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49705/">CVE-2022-49705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49705">CVE-2022-49705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49707/">CVE-2022-49707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49707">CVE-2022-49707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49708/">CVE-2022-49708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49708">CVE-2022-49708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49710/">CVE-2022-49710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49710">CVE-2022-49710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49711/">CVE-2022-49711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49711">CVE-2022-49711 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49712/">CVE-2022-49712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49712">CVE-2022-49712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49713/">CVE-2022-49713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49713">CVE-2022-49713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49714/">CVE-2022-49714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49714">CVE-2022-49714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49715/">CVE-2022-49715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49715">CVE-2022-49715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49716/">CVE-2022-49716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49716">CVE-2022-49716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49719/">CVE-2022-49719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49719">CVE-2022-49719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49720/">CVE-2022-49720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49720">CVE-2022-49720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49721/">CVE-2022-49721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49721">CVE-2022-49721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49722/">CVE-2022-49722 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49722">CVE-2022-49722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49723/">CVE-2022-49723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49723">CVE-2022-49723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49724/">CVE-2022-49724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49724">CVE-2022-49724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49725/">CVE-2022-49725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49725">CVE-2022-49725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49726/">CVE-2022-49726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49726">CVE-2022-49726 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49729/">CVE-2022-49729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49729">CVE-2022-49729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49730/">CVE-2022-49730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49730">CVE-2022-49730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49731/">CVE-2022-49731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49731">CVE-2022-49731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49733/">CVE-2022-49733 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49733">CVE-2022-49733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49739/">CVE-2022-49739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49739">CVE-2022-49739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49746/">CVE-2022-49746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49746">CVE-2022-49746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49748/">CVE-2022-49748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49748">CVE-2022-49748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49751/">CVE-2022-49751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49751">CVE-2022-49751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49753/">CVE-2022-49753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49753">CVE-2022-49753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49755/">CVE-2022-49755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49755">CVE-2022-49755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49759/">CVE-2022-49759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49759">CVE-2022-49759 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0179/">CVE-2023-0179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1652/">CVE-2023-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2162/">CVE-2023-2162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28410/">CVE-2023-28410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52930/">CVE-2023-52930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52930">CVE-2023-52930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52933/">CVE-2023-52933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52933">CVE-2023-52933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52935/">CVE-2023-52935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52935">CVE-2023-52935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52939/">CVE-2023-52939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52939">CVE-2023-52939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52941/">CVE-2023-52941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52941">CVE-2023-52941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52973/">CVE-2023-52973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52973">CVE-2023-52973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52974/">CVE-2023-52974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52974">CVE-2023-52974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52975/">CVE-2023-52975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52975">CVE-2023-52975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52976/">CVE-2023-52976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52976">CVE-2023-52976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52979/">CVE-2023-52979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52979">CVE-2023-52979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52983/">CVE-2023-52983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52983">CVE-2023-52983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52984/">CVE-2023-52984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52984">CVE-2023-52984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52988/">CVE-2023-52988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52988">CVE-2023-52988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52989/">CVE-2023-52989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52989">CVE-2023-52989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52992/">CVE-2023-52992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52992">CVE-2023-52992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52993/">CVE-2023-52993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52993">CVE-2023-52993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53000/">CVE-2023-53000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53000">CVE-2023-53000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53005/">CVE-2023-53005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53005">CVE-2023-53005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53006/">CVE-2023-53006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53006">CVE-2023-53006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53007/">CVE-2023-53007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53007">CVE-2023-53007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53008/">CVE-2023-53008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53008">CVE-2023-53008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53010/">CVE-2023-53010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53010">CVE-2023-53010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53015/">CVE-2023-53015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53015">CVE-2023-53015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53016/">CVE-2023-53016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53016">CVE-2023-53016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53019/">CVE-2023-53019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53019">CVE-2023-53019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53023/">CVE-2023-53023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53023">CVE-2023-53023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53024/">CVE-2023-53024 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53024">CVE-2023-53024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53025/">CVE-2023-53025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53025">CVE-2023-53025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53026/">CVE-2023-53026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53026">CVE-2023-53026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53028/">CVE-2023-53028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53028">CVE-2023-53028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53029/">CVE-2023-53029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53029">CVE-2023-53029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53030/">CVE-2023-53030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53030">CVE-2023-53030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53033/">CVE-2023-53033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53033">CVE-2023-53033 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41092/">CVE-2024-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42098/">CVE-2024-42098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42229/">CVE-2024-42229 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42240/">CVE-2024-42240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42240">CVE-2024-42240 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50290/">CVE-2024-50290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53063/">CVE-2024-53063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53064/">CVE-2024-53064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53064">CVE-2024-53064 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56651/">CVE-2024-56651 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57996/">CVE-2024-57996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57996">CVE-2024-57996 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58014/">CVE-2024-58014 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58014">CVE-2024-58014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58083/">CVE-2024-58083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58083">CVE-2024-58083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21693/">CVE-2025-21693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21693">CVE-2025-21693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21714/">CVE-2025-21714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21714">CVE-2025-21714 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21718/">CVE-2025-21718 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21718">CVE-2025-21718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21732/">CVE-2025-21732 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21732">CVE-2025-21732 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21753/">CVE-2025-21753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21753">CVE-2025-21753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21772/">CVE-2025-21772 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21772">CVE-2025-21772 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21780/">CVE-2025-21780 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21780">CVE-2025-21780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21839/">CVE-2025-21839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21839">CVE-2025-21839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974847" comment="kernel-rt-5.14.21-150400.15.115.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974848" comment="kernel-source-rt-5.14.21-150400.15.115.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206283" version="1" class="patch">
	<metadata>
		<title>Security update for apparmor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234452" ref_url="https://bugzilla.suse.com/1234452" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2025:1193-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038955.html" source="SUSE-SU"/>
		<description>
This update for apparmor fixes the following issue:

- Allow dovecot-auth to execute unix check password from /sbin, not only from /usr/bin (bsc#1234452).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-04-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1234452">SUSE bug 1234452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974947" comment="apparmor-parser-3.0.4-150400.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974948" comment="libapparmor1-3.0.4-150400.5.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974949" comment="pam_apparmor-3.0.4-150400.5.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206284" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1207034" ref_url="https://bugzilla.suse.com/1207034" source="BUGZILLA"/>
		<reference ref_id="1207186" ref_url="https://bugzilla.suse.com/1207186" source="BUGZILLA"/>
		<reference ref_id="1207878" ref_url="https://bugzilla.suse.com/1207878" source="BUGZILLA"/>
		<reference ref_id="1209262" ref_url="https://bugzilla.suse.com/1209262" source="BUGZILLA"/>
		<reference ref_id="1209547" ref_url="https://bugzilla.suse.com/1209547" source="BUGZILLA"/>
		<reference ref_id="1209788" ref_url="https://bugzilla.suse.com/1209788" source="BUGZILLA"/>
		<reference ref_id="1210647" ref_url="https://bugzilla.suse.com/1210647" source="BUGZILLA"/>
		<reference ref_id="1213167" ref_url="https://bugzilla.suse.com/1213167" source="BUGZILLA"/>
		<reference ref_id="1225742" ref_url="https://bugzilla.suse.com/1225742" source="BUGZILLA"/>
		<reference ref_id="1231375" ref_url="https://bugzilla.suse.com/1231375" source="BUGZILLA"/>
		<reference ref_id="1233479" ref_url="https://bugzilla.suse.com/1233479" source="BUGZILLA"/>
		<reference ref_id="1233557" ref_url="https://bugzilla.suse.com/1233557" source="BUGZILLA"/>
		<reference ref_id="1233558" ref_url="https://bugzilla.suse.com/1233558" source="BUGZILLA"/>
		<reference ref_id="1234464" ref_url="https://bugzilla.suse.com/1234464" source="BUGZILLA"/>
		<reference ref_id="1235528" ref_url="https://bugzilla.suse.com/1235528" source="BUGZILLA"/>
		<reference ref_id="1237029" ref_url="https://bugzilla.suse.com/1237029" source="BUGZILLA"/>
		<reference ref_id="1237530" ref_url="https://bugzilla.suse.com/1237530" source="BUGZILLA"/>
		<reference ref_id="1237875" ref_url="https://bugzilla.suse.com/1237875" source="BUGZILLA"/>
		<reference ref_id="1237877" ref_url="https://bugzilla.suse.com/1237877" source="BUGZILLA"/>
		<reference ref_id="1237890" ref_url="https://bugzilla.suse.com/1237890" source="BUGZILLA"/>
		<reference ref_id="1237918" ref_url="https://bugzilla.suse.com/1237918" source="BUGZILLA"/>
		<reference ref_id="1238911" ref_url="https://bugzilla.suse.com/1238911" source="BUGZILLA"/>
		<reference ref_id="1238919" ref_url="https://bugzilla.suse.com/1238919" source="BUGZILLA"/>
		<reference ref_id="1239016" ref_url="https://bugzilla.suse.com/1239016" source="BUGZILLA"/>
		<reference ref_id="1239036" ref_url="https://bugzilla.suse.com/1239036" source="BUGZILLA"/>
		<reference ref_id="1239061" ref_url="https://bugzilla.suse.com/1239061" source="BUGZILLA"/>
		<reference ref_id="1239126" ref_url="https://bugzilla.suse.com/1239126" source="BUGZILLA"/>
		<reference ref_id="1239452" ref_url="https://bugzilla.suse.com/1239452" source="BUGZILLA"/>
		<reference ref_id="1239454" ref_url="https://bugzilla.suse.com/1239454" source="BUGZILLA"/>
		<reference ref_id="1239968" ref_url="https://bugzilla.suse.com/1239968" source="BUGZILLA"/>
		<reference ref_id="1239969" ref_url="https://bugzilla.suse.com/1239969" source="BUGZILLA"/>
		<reference ref_id="1240133" ref_url="https://bugzilla.suse.com/1240133" source="BUGZILLA"/>
		<reference ref_id="1240195" ref_url="https://bugzilla.suse.com/1240195" source="BUGZILLA"/>
		<reference ref_id="1240205" ref_url="https://bugzilla.suse.com/1240205" source="BUGZILLA"/>
		<reference ref_id="1240207" ref_url="https://bugzilla.suse.com/1240207" source="BUGZILLA"/>
		<reference ref_id="1240208" ref_url="https://bugzilla.suse.com/1240208" source="BUGZILLA"/>
		<reference ref_id="1240210" ref_url="https://bugzilla.suse.com/1240210" source="BUGZILLA"/>
		<reference ref_id="1240212" ref_url="https://bugzilla.suse.com/1240212" source="BUGZILLA"/>
		<reference ref_id="1240213" ref_url="https://bugzilla.suse.com/1240213" source="BUGZILLA"/>
		<reference ref_id="1240218" ref_url="https://bugzilla.suse.com/1240218" source="BUGZILLA"/>
		<reference ref_id="1240220" ref_url="https://bugzilla.suse.com/1240220" source="BUGZILLA"/>
		<reference ref_id="1240227" ref_url="https://bugzilla.suse.com/1240227" source="BUGZILLA"/>
		<reference ref_id="1240229" ref_url="https://bugzilla.suse.com/1240229" source="BUGZILLA"/>
		<reference ref_id="1240231" ref_url="https://bugzilla.suse.com/1240231" source="BUGZILLA"/>
		<reference ref_id="1240242" ref_url="https://bugzilla.suse.com/1240242" source="BUGZILLA"/>
		<reference ref_id="1240245" ref_url="https://bugzilla.suse.com/1240245" source="BUGZILLA"/>
		<reference ref_id="1240247" ref_url="https://bugzilla.suse.com/1240247" source="BUGZILLA"/>
		<reference ref_id="1240250" ref_url="https://bugzilla.suse.com/1240250" source="BUGZILLA"/>
		<reference ref_id="1240254" ref_url="https://bugzilla.suse.com/1240254" source="BUGZILLA"/>
		<reference ref_id="1240256" ref_url="https://bugzilla.suse.com/1240256" source="BUGZILLA"/>
		<reference ref_id="1240264" ref_url="https://bugzilla.suse.com/1240264" source="BUGZILLA"/>
		<reference ref_id="1240266" ref_url="https://bugzilla.suse.com/1240266" source="BUGZILLA"/>
		<reference ref_id="1240272" ref_url="https://bugzilla.suse.com/1240272" source="BUGZILLA"/>
		<reference ref_id="1240275" ref_url="https://bugzilla.suse.com/1240275" source="BUGZILLA"/>
		<reference ref_id="1240276" ref_url="https://bugzilla.suse.com/1240276" source="BUGZILLA"/>
		<reference ref_id="1240278" ref_url="https://bugzilla.suse.com/1240278" source="BUGZILLA"/>
		<reference ref_id="1240279" ref_url="https://bugzilla.suse.com/1240279" source="BUGZILLA"/>
		<reference ref_id="1240280" ref_url="https://bugzilla.suse.com/1240280" source="BUGZILLA"/>
		<reference ref_id="1240281" ref_url="https://bugzilla.suse.com/1240281" source="BUGZILLA"/>
		<reference ref_id="1240282" ref_url="https://bugzilla.suse.com/1240282" source="BUGZILLA"/>
		<reference ref_id="1240283" ref_url="https://bugzilla.suse.com/1240283" source="BUGZILLA"/>
		<reference ref_id="1240284" ref_url="https://bugzilla.suse.com/1240284" source="BUGZILLA"/>
		<reference ref_id="1240286" ref_url="https://bugzilla.suse.com/1240286" source="BUGZILLA"/>
		<reference ref_id="1240288" ref_url="https://bugzilla.suse.com/1240288" source="BUGZILLA"/>
		<reference ref_id="1240290" ref_url="https://bugzilla.suse.com/1240290" source="BUGZILLA"/>
		<reference ref_id="1240292" ref_url="https://bugzilla.suse.com/1240292" source="BUGZILLA"/>
		<reference ref_id="1240293" ref_url="https://bugzilla.suse.com/1240293" source="BUGZILLA"/>
		<reference ref_id="1240297" ref_url="https://bugzilla.suse.com/1240297" source="BUGZILLA"/>
		<reference ref_id="1240304" ref_url="https://bugzilla.suse.com/1240304" source="BUGZILLA"/>
		<reference ref_id="1240308" ref_url="https://bugzilla.suse.com/1240308" source="BUGZILLA"/>
		<reference ref_id="1240309" ref_url="https://bugzilla.suse.com/1240309" source="BUGZILLA"/>
		<reference ref_id="1240317" ref_url="https://bugzilla.suse.com/1240317" source="BUGZILLA"/>
		<reference ref_id="1240318" ref_url="https://bugzilla.suse.com/1240318" source="BUGZILLA"/>
		<reference ref_id="1240322" ref_url="https://bugzilla.suse.com/1240322" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2021-4454" ref_url="https://www.suse.com/security/cve/CVE-2021-4454/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-49053" ref_url="https://www.suse.com/security/cve/CVE-2022-49053/" source="CVE"/>
		<reference ref_id="CVE-2022-49293" ref_url="https://www.suse.com/security/cve/CVE-2022-49293/" source="CVE"/>
		<reference ref_id="CVE-2022-49465" ref_url="https://www.suse.com/security/cve/CVE-2022-49465/" source="CVE"/>
		<reference ref_id="CVE-2022-49650" ref_url="https://www.suse.com/security/cve/CVE-2022-49650/" source="CVE"/>
		<reference ref_id="CVE-2022-49739" ref_url="https://www.suse.com/security/cve/CVE-2022-49739/" source="CVE"/>
		<reference ref_id="CVE-2022-49746" ref_url="https://www.suse.com/security/cve/CVE-2022-49746/" source="CVE"/>
		<reference ref_id="CVE-2022-49748" ref_url="https://www.suse.com/security/cve/CVE-2022-49748/" source="CVE"/>
		<reference ref_id="CVE-2022-49751" ref_url="https://www.suse.com/security/cve/CVE-2022-49751/" source="CVE"/>
		<reference ref_id="CVE-2022-49753" ref_url="https://www.suse.com/security/cve/CVE-2022-49753/" source="CVE"/>
		<reference ref_id="CVE-2022-49755" ref_url="https://www.suse.com/security/cve/CVE-2022-49755/" source="CVE"/>
		<reference ref_id="CVE-2022-49759" ref_url="https://www.suse.com/security/cve/CVE-2022-49759/" source="CVE"/>
		<reference ref_id="CVE-2023-0179" ref_url="https://www.suse.com/security/cve/CVE-2023-0179/" source="CVE"/>
		<reference ref_id="CVE-2023-1652" ref_url="https://www.suse.com/security/cve/CVE-2023-1652/" source="CVE"/>
		<reference ref_id="CVE-2023-2162" ref_url="https://www.suse.com/security/cve/CVE-2023-2162/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-52930" ref_url="https://www.suse.com/security/cve/CVE-2023-52930/" source="CVE"/>
		<reference ref_id="CVE-2023-52933" ref_url="https://www.suse.com/security/cve/CVE-2023-52933/" source="CVE"/>
		<reference ref_id="CVE-2023-52935" ref_url="https://www.suse.com/security/cve/CVE-2023-52935/" source="CVE"/>
		<reference ref_id="CVE-2023-52939" ref_url="https://www.suse.com/security/cve/CVE-2023-52939/" source="CVE"/>
		<reference ref_id="CVE-2023-52941" ref_url="https://www.suse.com/security/cve/CVE-2023-52941/" source="CVE"/>
		<reference ref_id="CVE-2023-52973" ref_url="https://www.suse.com/security/cve/CVE-2023-52973/" source="CVE"/>
		<reference ref_id="CVE-2023-52974" ref_url="https://www.suse.com/security/cve/CVE-2023-52974/" source="CVE"/>
		<reference ref_id="CVE-2023-52975" ref_url="https://www.suse.com/security/cve/CVE-2023-52975/" source="CVE"/>
		<reference ref_id="CVE-2023-52976" ref_url="https://www.suse.com/security/cve/CVE-2023-52976/" source="CVE"/>
		<reference ref_id="CVE-2023-52979" ref_url="https://www.suse.com/security/cve/CVE-2023-52979/" source="CVE"/>
		<reference ref_id="CVE-2023-52983" ref_url="https://www.suse.com/security/cve/CVE-2023-52983/" source="CVE"/>
		<reference ref_id="CVE-2023-52984" ref_url="https://www.suse.com/security/cve/CVE-2023-52984/" source="CVE"/>
		<reference ref_id="CVE-2023-52988" ref_url="https://www.suse.com/security/cve/CVE-2023-52988/" source="CVE"/>
		<reference ref_id="CVE-2023-52989" ref_url="https://www.suse.com/security/cve/CVE-2023-52989/" source="CVE"/>
		<reference ref_id="CVE-2023-52992" ref_url="https://www.suse.com/security/cve/CVE-2023-52992/" source="CVE"/>
		<reference ref_id="CVE-2023-52993" ref_url="https://www.suse.com/security/cve/CVE-2023-52993/" source="CVE"/>
		<reference ref_id="CVE-2023-53000" ref_url="https://www.suse.com/security/cve/CVE-2023-53000/" source="CVE"/>
		<reference ref_id="CVE-2023-53005" ref_url="https://www.suse.com/security/cve/CVE-2023-53005/" source="CVE"/>
		<reference ref_id="CVE-2023-53006" ref_url="https://www.suse.com/security/cve/CVE-2023-53006/" source="CVE"/>
		<reference ref_id="CVE-2023-53007" ref_url="https://www.suse.com/security/cve/CVE-2023-53007/" source="CVE"/>
		<reference ref_id="CVE-2023-53008" ref_url="https://www.suse.com/security/cve/CVE-2023-53008/" source="CVE"/>
		<reference ref_id="CVE-2023-53010" ref_url="https://www.suse.com/security/cve/CVE-2023-53010/" source="CVE"/>
		<reference ref_id="CVE-2023-53015" ref_url="https://www.suse.com/security/cve/CVE-2023-53015/" source="CVE"/>
		<reference ref_id="CVE-2023-53016" ref_url="https://www.suse.com/security/cve/CVE-2023-53016/" source="CVE"/>
		<reference ref_id="CVE-2023-53019" ref_url="https://www.suse.com/security/cve/CVE-2023-53019/" source="CVE"/>
		<reference ref_id="CVE-2023-53023" ref_url="https://www.suse.com/security/cve/CVE-2023-53023/" source="CVE"/>
		<reference ref_id="CVE-2023-53024" ref_url="https://www.suse.com/security/cve/CVE-2023-53024/" source="CVE"/>
		<reference ref_id="CVE-2023-53025" ref_url="https://www.suse.com/security/cve/CVE-2023-53025/" source="CVE"/>
		<reference ref_id="CVE-2023-53026" ref_url="https://www.suse.com/security/cve/CVE-2023-53026/" source="CVE"/>
		<reference ref_id="CVE-2023-53028" ref_url="https://www.suse.com/security/cve/CVE-2023-53028/" source="CVE"/>
		<reference ref_id="CVE-2023-53029" ref_url="https://www.suse.com/security/cve/CVE-2023-53029/" source="CVE"/>
		<reference ref_id="CVE-2023-53030" ref_url="https://www.suse.com/security/cve/CVE-2023-53030/" source="CVE"/>
		<reference ref_id="CVE-2023-53033" ref_url="https://www.suse.com/security/cve/CVE-2023-53033/" source="CVE"/>
		<reference ref_id="CVE-2024-50290" ref_url="https://www.suse.com/security/cve/CVE-2024-50290/" source="CVE"/>
		<reference ref_id="CVE-2024-53063" ref_url="https://www.suse.com/security/cve/CVE-2024-53063/" source="CVE"/>
		<reference ref_id="CVE-2024-53064" ref_url="https://www.suse.com/security/cve/CVE-2024-53064/" source="CVE"/>
		<reference ref_id="CVE-2024-56651" ref_url="https://www.suse.com/security/cve/CVE-2024-56651/" source="CVE"/>
		<reference ref_id="CVE-2024-58083" ref_url="https://www.suse.com/security/cve/CVE-2024-58083/" source="CVE"/>
		<reference ref_id="CVE-2025-21693" ref_url="https://www.suse.com/security/cve/CVE-2025-21693/" source="CVE"/>
		<reference ref_id="CVE-2025-21714" ref_url="https://www.suse.com/security/cve/CVE-2025-21714/" source="CVE"/>
		<reference ref_id="CVE-2025-21732" ref_url="https://www.suse.com/security/cve/CVE-2025-21732/" source="CVE"/>
		<reference ref_id="CVE-2025-21753" ref_url="https://www.suse.com/security/cve/CVE-2025-21753/" source="CVE"/>
		<reference ref_id="CVE-2025-21772" ref_url="https://www.suse.com/security/cve/CVE-2025-21772/" source="CVE"/>
		<reference ref_id="CVE-2025-21839" ref_url="https://www.suse.com/security/cve/CVE-2025-21839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).
- CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919).
- CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207).
- CVE-2023-52935: mm/khugepaged: fix -&gt;anon_vma race (bsc#1240276).
- CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464).
- CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528).
- CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036).
- CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029).
- CVE-2025-21714: RDMA/mlx5: Fix implicit ODP use after free (bsc#1237890).
- CVE-2025-21732: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (bsc#1237877).
- CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875).
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911).

The following non-security bugs were fixed:

- ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530).
- RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
- RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing (bsc#1239016).
- RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes)
- btrfs: defrag: do not use merged extent map for their generation check (bsc#1239968).
- btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1239968).
- btrfs: fix extent map merging not happening for adjacent extents (bsc#1239968).
- btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969).
- btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969).
- gfs2: Fix inode height consistency check (git-fixes).
- mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126).
- mm: zswap: move allocations during CPU init outside the lock (git-fixes).
- net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
- net: mana: Allow variable size indirection table (bsc#1239016).
- net: mana: Avoid open coded arithmetic (bsc#1239016).
- net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (bsc#1240195).
- net: mana: Support holes in device list reply msg (bsc#1240133).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207034">SUSE bug 1207034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207186">SUSE bug 1207186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207878">SUSE bug 1207878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209262">SUSE bug 1209262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209547">SUSE bug 1209547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209788">SUSE bug 1209788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210647">SUSE bug 1210647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231375">SUSE bug 1231375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233479">SUSE bug 1233479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233557">SUSE bug 1233557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233558">SUSE bug 1233558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234464">SUSE bug 1234464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235528">SUSE bug 1235528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237029">SUSE bug 1237029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237530">SUSE bug 1237530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237875">SUSE bug 1237875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237877">SUSE bug 1237877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237890">SUSE bug 1237890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237918">SUSE bug 1237918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238911">SUSE bug 1238911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238919">SUSE bug 1238919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239016">SUSE bug 1239016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239036">SUSE bug 1239036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239061">SUSE bug 1239061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239126">SUSE bug 1239126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239452">SUSE bug 1239452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239454">SUSE bug 1239454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239968">SUSE bug 1239968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239969">SUSE bug 1239969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240133">SUSE bug 1240133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240195">SUSE bug 1240195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240205">SUSE bug 1240205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240207">SUSE bug 1240207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240208">SUSE bug 1240208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240210">SUSE bug 1240210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240212">SUSE bug 1240212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240213">SUSE bug 1240213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240218">SUSE bug 1240218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240220">SUSE bug 1240220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240227">SUSE bug 1240227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240229">SUSE bug 1240229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240231">SUSE bug 1240231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240242">SUSE bug 1240242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240245">SUSE bug 1240245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240247">SUSE bug 1240247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240250">SUSE bug 1240250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240254">SUSE bug 1240254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240256">SUSE bug 1240256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240264">SUSE bug 1240264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240266">SUSE bug 1240266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240272">SUSE bug 1240272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240275">SUSE bug 1240275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240276">SUSE bug 1240276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240278">SUSE bug 1240278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240279">SUSE bug 1240279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240280">SUSE bug 1240280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240281">SUSE bug 1240281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240282">SUSE bug 1240282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240283">SUSE bug 1240283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240284">SUSE bug 1240284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240286">SUSE bug 1240286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240288">SUSE bug 1240288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240290">SUSE bug 1240290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240292">SUSE bug 1240292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240293">SUSE bug 1240293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240297">SUSE bug 1240297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240304">SUSE bug 1240304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240308">SUSE bug 1240308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240309">SUSE bug 1240309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240317">SUSE bug 1240317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240318">SUSE bug 1240318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240322">SUSE bug 1240322</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-4454/">CVE-2021-4454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4454">CVE-2021-4454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49053/">CVE-2022-49053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49053">CVE-2022-49053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49293/">CVE-2022-49293 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49293">CVE-2022-49293 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49465/">CVE-2022-49465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49465">CVE-2022-49465 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49650/">CVE-2022-49650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49650">CVE-2022-49650 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49739/">CVE-2022-49739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49739">CVE-2022-49739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49746/">CVE-2022-49746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49746">CVE-2022-49746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49748/">CVE-2022-49748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49748">CVE-2022-49748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49751/">CVE-2022-49751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49751">CVE-2022-49751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49753/">CVE-2022-49753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49753">CVE-2022-49753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49755/">CVE-2022-49755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49755">CVE-2022-49755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49759/">CVE-2022-49759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49759">CVE-2022-49759 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0179/">CVE-2023-0179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1652/">CVE-2023-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2162/">CVE-2023-2162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52930/">CVE-2023-52930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52930">CVE-2023-52930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52933/">CVE-2023-52933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52933">CVE-2023-52933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52935/">CVE-2023-52935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52935">CVE-2023-52935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52939/">CVE-2023-52939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52939">CVE-2023-52939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52941/">CVE-2023-52941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52941">CVE-2023-52941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52973/">CVE-2023-52973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52973">CVE-2023-52973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52974/">CVE-2023-52974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52974">CVE-2023-52974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52975/">CVE-2023-52975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52975">CVE-2023-52975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52976/">CVE-2023-52976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52976">CVE-2023-52976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52979/">CVE-2023-52979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52979">CVE-2023-52979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52983/">CVE-2023-52983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52983">CVE-2023-52983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52984/">CVE-2023-52984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52984">CVE-2023-52984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52988/">CVE-2023-52988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52988">CVE-2023-52988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52989/">CVE-2023-52989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52989">CVE-2023-52989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52992/">CVE-2023-52992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52992">CVE-2023-52992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52993/">CVE-2023-52993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52993">CVE-2023-52993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53000/">CVE-2023-53000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53000">CVE-2023-53000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53005/">CVE-2023-53005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53005">CVE-2023-53005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53006/">CVE-2023-53006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53006">CVE-2023-53006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53007/">CVE-2023-53007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53007">CVE-2023-53007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53008/">CVE-2023-53008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53008">CVE-2023-53008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53010/">CVE-2023-53010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53010">CVE-2023-53010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53015/">CVE-2023-53015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53015">CVE-2023-53015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53016/">CVE-2023-53016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53016">CVE-2023-53016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53019/">CVE-2023-53019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53019">CVE-2023-53019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53023/">CVE-2023-53023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53023">CVE-2023-53023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53024/">CVE-2023-53024 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53024">CVE-2023-53024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53025/">CVE-2023-53025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53025">CVE-2023-53025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53026/">CVE-2023-53026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53026">CVE-2023-53026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53028/">CVE-2023-53028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53028">CVE-2023-53028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53029/">CVE-2023-53029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53029">CVE-2023-53029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53030/">CVE-2023-53030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53030">CVE-2023-53030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53033/">CVE-2023-53033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53033">CVE-2023-53033 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50290/">CVE-2024-50290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53063/">CVE-2024-53063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53064/">CVE-2024-53064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53064">CVE-2024-53064 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56651/">CVE-2024-56651 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58083/">CVE-2024-58083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58083">CVE-2024-58083 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21693/">CVE-2025-21693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21693">CVE-2025-21693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21714/">CVE-2025-21714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21714">CVE-2025-21714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21732/">CVE-2025-21732 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21732">CVE-2025-21732 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21753/">CVE-2025-21753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21753">CVE-2025-21753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21772/">CVE-2025-21772 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21772">CVE-2025-21772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21839/">CVE-2025-21839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21839">CVE-2025-21839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974950" comment="kernel-default-5.14.21-150400.24.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974931" comment="kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206285" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1239618" ref_url="https://bugzilla.suse.com/1239618" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8176" ref_url="https://www.suse.com/security/cve/CVE-2024-8176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038964.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2024-8176: Fixed denial of service from chaining a large number of entities caused 
  by stack overflow by resolving use of recursion (bsc#1239618)

Other fixes:
- version update to 2.7.1 (jsc#PED-12500)
     Bug fixes:
       #980 #989  Restore event pointer behavior from Expat 2.6.4
                    (that the fix to CVE-2024-8176 changed in 2.7.0);
                    affected API functions are:
                    - XML_GetCurrentByteCount
                    - XML_GetCurrentByteIndex
                    - XML_GetCurrentColumnNumber
                    - XML_GetCurrentLineNumber
                    - XML_GetInputContext
     Other changes:
       #976 #977  Autotools: Integrate files 'fuzz/xml_lpm_fuzzer.{cpp,proto}'
                    with Automake that were missing from 2.7.0 release tarballs
       #983 #984  Fix printf format specifiers for 32bit Emscripten
            #992  docs: Promote OpenSSF Best Practices self-certification
            #978  tests/benchmark: Resolve mistaken double close
            #986  Address compiler warnings
       #990 #993  Version info bumped from 11:1:10 (libexpat*.so.1.10.1)
                    to 11:2:10 (libexpat*.so.1.10.2); see https://verbump.de/
                    for what these numbers do
        Infrastructure:
            #982  CI: Start running Perl XML::Parser integration tests
            #987  CI: Enforce Clang Static Analyzer clean code
            #991  CI: Re-enable warning clang-analyzer-valist.Uninitialized
                    for clang-tidy
            #981  CI: Cover compilation with musl
       #983 #984  CI: Cover compilation with 32bit Emscripten
       #976 #977  CI: Protect against fuzzer files missing from future
                    release archives

- version update to 2.7.0
       #935 #937  Autotools: Make generated CMake files look for
                    libexpat.@SO_MAJOR@.dylib on macOS
            #925  Autotools: Sync CMake templates with CMake 3.29
  #945 #962 #966  CMake: Drop support for CMake &lt;3.13
            #942  CMake: Small fuzzing related improvements
            #921  docs: Add missing documentation of error code
                    XML_ERROR_NOT_STARTED that was introduced with 2.6.4
            #941  docs: Document need for C++11 compiler for use from C++
            #959  tests/benchmark: Fix a (harmless) TOCTTOU
            #944  Windows: Fix installer target location of file xmlwf.xml
                    for CMake
            #953  Windows: Address warning -Wunknown-warning-option
                    about -Wno-pedantic-ms-format from LLVM MinGW
            #971  Address Cppcheck warnings
       #969 #970  Mass-migrate links from http:// to https://
    #947 #958 ..
       #974 #975  Document changes since the previous release
       #974 #975  Version info bumped from 11:0:10 (libexpat*.so.1.10.0)
                    to 11:1:10 (libexpat*.so.1.10.1); see https://verbump.de/
                    for what these numbers do
		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-11"/>
	<updated date="2025-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1239618">SUSE bug 1239618</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8176/">CVE-2024-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8176">CVE-2024-8176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975016" comment="libexpat1-2.7.1-150400.3.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206286" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1232234" ref_url="https://bugzilla.suse.com/1232234" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10041" ref_url="https://www.suse.com/security/cve/CVE-2024-10041/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039051.html" source="SUSE-SU"/>
		<description>
This update for pam fixes the following issues:

- CVE-2024-10041: sensitive data exposure while performing authentications. (bsc#1232234)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-17"/>
	<updated date="2025-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232234">SUSE bug 1232234</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10041/">CVE-2024-10041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10041">CVE-2024-10041 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975907" comment="pam-1.3.0-150000.6.76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206287" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1240971" ref_url="https://bugzilla.suse.com/1240971" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-32464" ref_url="https://www.suse.com/security/cve/CVE-2025-32464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039056.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2025-32464: Fixed heap-based buffer overflow in sample_conv_regsub. (bsc#1240971)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-17"/>
	<updated date="2025-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1240971">SUSE bug 1240971</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32464/">CVE-2025-32464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32464">CVE-2025-32464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975909" comment="haproxy-2.4.22+git0.f8e3218e2-150400.3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206288" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1239749" ref_url="https://bugzilla.suse.com/1239749" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-40635" ref_url="https://www.suse.com/security/cve/CVE-2024-40635/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039060.html" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

- CVE-2024-40635: Fixed integer overflow in User ID handling (bsc#1239749) 
  
Other fixes:
- Update to containerd v1.7.27.
		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-17"/>
	<updated date="2025-04-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1239749">SUSE bug 1239749</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-40635/">CVE-2024-40635 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40635">CVE-2024-40635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975908" comment="containerd-1.7.27-150000.123.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206289" version="1" class="patch">
	<metadata>
		<title>Security update for mozjs60 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234837" ref_url="https://bugzilla.suse.com/1234837" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-56431" ref_url="https://www.suse.com/security/cve/CVE-2024-56431/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020741.html" source="SUSE-SU"/>
		<description>
This update for mozjs60 fixes the following issues:

- CVE-2024-56431: Fixed a negative shift in huffdec.c (bsc#1234837).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-24"/>
	<updated date="2025-04-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1234837">SUSE bug 1234837</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56431/">CVE-2024-56431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56431">CVE-2024-56431 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976361" comment="libmozjs-60-60.9.0-150200.6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206290" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1239680" ref_url="https://bugzilla.suse.com/1239680" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-2312" ref_url="https://www.suse.com/security/cve/CVE-2025-2312/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039091.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2025-2312: Fixed cifs.upcall making an upcall to the wrong 
  namespace in containerized environments while trying to get Kerberos 
  credentials (bsc#1239680)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-28"/>
	<updated date="2025-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1239680">SUSE bug 1239680</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2312/">CVE-2025-2312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2312">CVE-2025-2312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976502" comment="cifs-utils-6.15-150400.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206291" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1239909" ref_url="https://bugzilla.suse.com/1239909" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-2588" ref_url="https://www.suse.com/security/cve/CVE-2025-2588/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039110.html" source="SUSE-SU"/>
		<description>
This update for augeas fixes the following issues:

- CVE-2025-2588: Check for NULL pointers when calling re_case_expand in function fa_expand_nocase. (bsc#1239909)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2025-04-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1239909">SUSE bug 1239909</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-2588/">CVE-2025-2588 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2588">CVE-2025-2588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976867" comment="augeas-1.12.0-150400.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976868" comment="augeas-lenses-1.12.0-150400.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976869" comment="libaugeas0-1.12.0-150400.3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206292" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1241453" ref_url="https://bugzilla.suse.com/1241453" source="BUGZILLA"/>
		<reference ref_id="1241551" ref_url="https://bugzilla.suse.com/1241551" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-32414" ref_url="https://www.suse.com/security/cve/CVE-2025-32414/" source="CVE"/>
		<reference ref_id="CVE-2025-32415" ref_url="https://www.suse.com/security/cve/CVE-2025-32415/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039123.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2025-32414: Fixed an out-of-bounds read when parsing text via the Python API. (bsc#1241551)
- CVE-2025-32415: Fixed a crafted XML document may lead to a heap-based buffer under-read. (bsc#1241453)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-02"/>
	<updated date="2025-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1241453">SUSE bug 1241453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241551">SUSE bug 1241551</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-32414/">CVE-2025-32414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32414">CVE-2025-32414 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-32415/">CVE-2025-32415 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32415">CVE-2025-32415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977085" comment="libxml2-2-2.9.14-150400.5.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977086" comment="libxml2-tools-2.9.14-150400.5.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977087" comment="python3-libxml2-2.9.14-150400.5.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206293" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1241020" ref_url="https://bugzilla.suse.com/1241020" source="BUGZILLA"/>
		<reference ref_id="1241078" ref_url="https://bugzilla.suse.com/1241078" source="BUGZILLA"/>
		<reference ref_id="1241189" ref_url="https://bugzilla.suse.com/1241189" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-29087" ref_url="https://www.suse.com/security/cve/CVE-2025-29087/" source="CVE"/>
		<reference ref_id="CVE-2025-29088" ref_url="https://www.suse.com/security/cve/CVE-2025-29088/" source="CVE"/>
		<reference ref_id="CVE-2025-3277" ref_url="https://www.suse.com/security/cve/CVE-2025-3277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020803.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2025-29087,CVE-2025-3277: Fixed integer overflow in sqlite concat function (bsc#1241020)
- CVE-2025-29088: Fixed integer overflow through the SQLITE_DBCONFIG_LOOKASIDE component (bsc#1241078)

Other fixes:

- Updated to version 3.49.1 from Factory (jsc#SLE-16032)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1241020">SUSE bug 1241020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241078">SUSE bug 1241078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241189">SUSE bug 1241189</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29087/">CVE-2025-29087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29087">CVE-2025-29087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29088/">CVE-2025-29088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29088">CVE-2025-29088 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3277/">CVE-2025-3277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3277">CVE-2025-3277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977262" comment="libsqlite3-0-3.49.1-150000.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977268" comment="sqlite3-tcl-3.49.1-150000.3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206294" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1240750" ref_url="https://bugzilla.suse.com/1240750" source="BUGZILLA"/>
		<reference ref_id="1240752" ref_url="https://bugzilla.suse.com/1240752" source="BUGZILLA"/>
		<reference ref_id="1240756" ref_url="https://bugzilla.suse.com/1240756" source="BUGZILLA"/>
		<reference ref_id="1240757" ref_url="https://bugzilla.suse.com/1240757" source="BUGZILLA"/>
		<reference ref_id="1241164" ref_url="https://bugzilla.suse.com/1241164" source="BUGZILLA"/>
		<reference ref_id="1241222" ref_url="https://bugzilla.suse.com/1241222" source="BUGZILLA"/>
		<reference ref_id="1241686" ref_url="https://bugzilla.suse.com/1241686" source="BUGZILLA"/>
		<reference ref_id="1241688" ref_url="https://bugzilla.suse.com/1241688" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-2784" ref_url="https://www.suse.com/security/cve/CVE-2025-2784/" source="CVE"/>
		<reference ref_id="CVE-2025-32050" ref_url="https://www.suse.com/security/cve/CVE-2025-32050/" source="CVE"/>
		<reference ref_id="CVE-2025-32052" ref_url="https://www.suse.com/security/cve/CVE-2025-32052/" source="CVE"/>
		<reference ref_id="CVE-2025-32053" ref_url="https://www.suse.com/security/cve/CVE-2025-32053/" source="CVE"/>
		<reference ref_id="CVE-2025-32907" ref_url="https://www.suse.com/security/cve/CVE-2025-32907/" source="CVE"/>
		<reference ref_id="CVE-2025-32914" ref_url="https://www.suse.com/security/cve/CVE-2025-32914/" source="CVE"/>
		<reference ref_id="CVE-2025-46420" ref_url="https://www.suse.com/security/cve/CVE-2025-46420/" source="CVE"/>
		<reference ref_id="CVE-2025-46421" ref_url="https://www.suse.com/security/cve/CVE-2025-46421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039179.html" source="SUSE-SU"/>
		<description>
This update for libsoup2 fixes the following issues:

 - CVE-2025-2784: Fixed heap buffer over-read in `skip_insignificant_space` when sniffing conten (bsc#1240750) 
 - CVE-2025-32050: Fixed integer overflow in append_param_quoted (bsc#1240752) 
 - CVE-2025-32052: Fixed heap buffer overflow in sniff_unknown() (bsc#1240756) 
 - CVE-2025-32053: Fixed heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (bsc#1240757) 
 - CVE-2025-32907: Fixed excessive memory consumption in server when client requests a large amount of overlapping ranges in a single HTTP request (bsc#1241222) 
 - CVE-2025-32914: Fixed out of bounds read in `soup_multipart_new_from_message()` (bsc#1241164) 
 - CVE-2025-46420: Fixed memory leak on soup_header_parse_quality_list() via soup-headers.c (bsc#1241686) 
 - CVE-2025-46421: Fixed HTTP Authorization Header leak via an HTTP redirect (bsc#1241688)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2025-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1240750">SUSE bug 1240750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240752">SUSE bug 1240752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240756">SUSE bug 1240756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240757">SUSE bug 1240757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241164">SUSE bug 1241164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241222">SUSE bug 1241222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241686">SUSE bug 1241686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241688">SUSE bug 1241688</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2784/">CVE-2025-2784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2784">CVE-2025-2784 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32050/">CVE-2025-32050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32050">CVE-2025-32050 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32052/">CVE-2025-32052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32052">CVE-2025-32052 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32053/">CVE-2025-32053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32053">CVE-2025-32053 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32907/">CVE-2025-32907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32907">CVE-2025-32907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-32914/">CVE-2025-32914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32914">CVE-2025-32914 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46420/">CVE-2025-46420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46420">CVE-2025-46420 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46421/">CVE-2025-46421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46421">CVE-2025-46421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981623" comment="libsoup-2_4-1-2.74.2-150400.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206295" version="1" class="patch">
	<metadata>
		<title>Security update for apparmor (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1241678" ref_url="https://bugzilla.suse.com/1241678" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10041" ref_url="https://www.suse.com/security/cve/CVE-2024-10041/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1549-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039212.html" source="SUSE-SU"/>
		<description>
This update for apparmor fixes the following issues:

- Add dac_read_search capability for unix_chkpwd to allow it to read the shadow
  file even if it has 000 permissions. This is needed after the CVE-2024-10041
  fix in PAM. (bsc#1241678)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-14"/>
	<updated date="2025-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1241678">SUSE bug 1241678</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10041/">CVE-2024-10041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10041">CVE-2024-10041 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982049" comment="apparmor-parser-3.0.4-150400.5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982050" comment="libapparmor1-3.0.4-150400.5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982051" comment="pam_apparmor-3.0.4-150400.5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206296" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1201855" ref_url="https://bugzilla.suse.com/1201855" source="BUGZILLA"/>
		<reference ref_id="1230771" ref_url="https://bugzilla.suse.com/1230771" source="BUGZILLA"/>
		<reference ref_id="1238471" ref_url="https://bugzilla.suse.com/1238471" source="BUGZILLA"/>
		<reference ref_id="1238512" ref_url="https://bugzilla.suse.com/1238512" source="BUGZILLA"/>
		<reference ref_id="1238747" ref_url="https://bugzilla.suse.com/1238747" source="BUGZILLA"/>
		<reference ref_id="1238865" ref_url="https://bugzilla.suse.com/1238865" source="BUGZILLA"/>
		<reference ref_id="1239968" ref_url="https://bugzilla.suse.com/1239968" source="BUGZILLA"/>
		<reference ref_id="1240188" ref_url="https://bugzilla.suse.com/1240188" source="BUGZILLA"/>
		<reference ref_id="1240195" ref_url="https://bugzilla.suse.com/1240195" source="BUGZILLA"/>
		<reference ref_id="1240553" ref_url="https://bugzilla.suse.com/1240553" source="BUGZILLA"/>
		<reference ref_id="1240747" ref_url="https://bugzilla.suse.com/1240747" source="BUGZILLA"/>
		<reference ref_id="1240835" ref_url="https://bugzilla.suse.com/1240835" source="BUGZILLA"/>
		<reference ref_id="1241280" ref_url="https://bugzilla.suse.com/1241280" source="BUGZILLA"/>
		<reference ref_id="1241371" ref_url="https://bugzilla.suse.com/1241371" source="BUGZILLA"/>
		<reference ref_id="1241378" ref_url="https://bugzilla.suse.com/1241378" source="BUGZILLA"/>
		<reference ref_id="1241421" ref_url="https://bugzilla.suse.com/1241421" source="BUGZILLA"/>
		<reference ref_id="1241433" ref_url="https://bugzilla.suse.com/1241433" source="BUGZILLA"/>
		<reference ref_id="1241541" ref_url="https://bugzilla.suse.com/1241541" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47671" ref_url="https://www.suse.com/security/cve/CVE-2021-47671/" source="CVE"/>
		<reference ref_id="CVE-2022-49741" ref_url="https://www.suse.com/security/cve/CVE-2022-49741/" source="CVE"/>
		<reference ref_id="CVE-2024-46784" ref_url="https://www.suse.com/security/cve/CVE-2024-46784/" source="CVE"/>
		<reference ref_id="CVE-2025-21726" ref_url="https://www.suse.com/security/cve/CVE-2025-21726/" source="CVE"/>
		<reference ref_id="CVE-2025-21785" ref_url="https://www.suse.com/security/cve/CVE-2025-21785/" source="CVE"/>
		<reference ref_id="CVE-2025-21791" ref_url="https://www.suse.com/security/cve/CVE-2025-21791/" source="CVE"/>
		<reference ref_id="CVE-2025-21812" ref_url="https://www.suse.com/security/cve/CVE-2025-21812/" source="CVE"/>
		<reference ref_id="CVE-2025-21886" ref_url="https://www.suse.com/security/cve/CVE-2025-21886/" source="CVE"/>
		<reference ref_id="CVE-2025-22004" ref_url="https://www.suse.com/security/cve/CVE-2025-22004/" source="CVE"/>
		<reference ref_id="CVE-2025-22020" ref_url="https://www.suse.com/security/cve/CVE-2025-22020/" source="CVE"/>
		<reference ref_id="CVE-2025-22029" ref_url="https://www.suse.com/security/cve/CVE-2025-22029/" source="CVE"/>
		<reference ref_id="CVE-2025-22045" ref_url="https://www.suse.com/security/cve/CVE-2025-22045/" source="CVE"/>
		<reference ref_id="CVE-2025-22055" ref_url="https://www.suse.com/security/cve/CVE-2025-22055/" source="CVE"/>
		<reference ref_id="CVE-2025-22097" ref_url="https://www.suse.com/security/cve/CVE-2025-22097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2025-21726: padata: avoid UAF for reorder_work (bsc#1238865).
- CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747).
- CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).
- CVE-2025-21812: ax25: rcu protect dev-&gt;ax25_ptr (bsc#1238471).
- CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).
- CVE-2025-22020: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (bsc#1241280).
- CVE-2025-22029: exec: fix the racy usage of fs_struct-&gt;in_exec (bsc#1241378).
- CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433).
- CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).
- CVE-2025-22097: drm/vkms: Fix use after free and double free on init error (bsc#1241541).

The following non-security bugs were fixed:

- scsi: smartpqi: Add ctrl ready timeout module parameter (jsc#PED-1557, bsc#1201855, bsc#1240553).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-16"/>
	<updated date="2025-05-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201855">SUSE bug 1201855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230771">SUSE bug 1230771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238471">SUSE bug 1238471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238512">SUSE bug 1238512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238747">SUSE bug 1238747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238865">SUSE bug 1238865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239968">SUSE bug 1239968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240188">SUSE bug 1240188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240195">SUSE bug 1240195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240553">SUSE bug 1240553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240747">SUSE bug 1240747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240835">SUSE bug 1240835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241280">SUSE bug 1241280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241371">SUSE bug 1241371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241378">SUSE bug 1241378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241421">SUSE bug 1241421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241433">SUSE bug 1241433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241541">SUSE bug 1241541</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47671/">CVE-2021-47671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47671">CVE-2021-47671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49741/">CVE-2022-49741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49741">CVE-2022-49741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46784/">CVE-2024-46784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21726/">CVE-2025-21726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21726">CVE-2025-21726 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21785/">CVE-2025-21785 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21791/">CVE-2025-21791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21791">CVE-2025-21791 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21812/">CVE-2025-21812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21812">CVE-2025-21812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21886/">CVE-2025-21886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21886">CVE-2025-21886 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22004/">CVE-2025-22004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22020/">CVE-2025-22020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22029/">CVE-2025-22029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22029">CVE-2025-22029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22045/">CVE-2025-22045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22045">CVE-2025-22045 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22055/">CVE-2025-22055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22055">CVE-2025-22055 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22097/">CVE-2025-22097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982176" comment="kernel-rt-5.14.21-150400.15.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982177" comment="kernel-source-rt-5.14.21-150400.15.118.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206297" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1228634" ref_url="https://bugzilla.suse.com/1228634" source="BUGZILLA"/>
		<reference ref_id="1232533" ref_url="https://bugzilla.suse.com/1232533" source="BUGZILLA"/>
		<reference ref_id="1241012" ref_url="https://bugzilla.suse.com/1241012" source="BUGZILLA"/>
		<reference ref_id="1241045" ref_url="https://bugzilla.suse.com/1241045" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-32728" ref_url="https://www.suse.com/security/cve/CVE-2025-32728/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:1576-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039241.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- Security issues fixed:
    
  * CVE-2025-32728: Fixed a logic error in DisableForwarding option (bsc#1241012)
    
- Other bugs fixed:

  * Allow KEX hashes greater than 256 bits (bsc#1241045)
  * Fixed hostname being left out of the audit output (bsc#1228634)
  * Fixed failures with very large MOTDs (bsc#1232533)

		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-19"/>
	<updated date="2025-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228634">SUSE bug 1228634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232533">SUSE bug 1232533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241012">SUSE bug 1241012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241045">SUSE bug 1241045</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32728/">CVE-2025-32728 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32728">CVE-2025-32728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982446" comment="openssh-8.4p1-150300.3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982447" comment="openssh-clients-8.4p1-150300.3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982448" comment="openssh-common-8.4p1-150300.3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982449" comment="openssh-fips-8.4p1-150300.3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982450" comment="openssh-server-8.4p1-150300.3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206298" version="1" class="patch">
	<metadata>
		<title>Security update for brltty (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1235438" ref_url="https://bugzilla.suse.com/1235438" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2025:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039247.html" source="SUSE-SU"/>
		<description>
This update for brltty fixes the following issues:

- Avoid having brlapi.key temporarily world-readable during creation (bsc#1235438).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-19"/>
	<updated date="2025-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1235438">SUSE bug 1235438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982403" comment="system-user-brltty-6.4-150400.4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206299" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1240897" ref_url="https://bugzilla.suse.com/1240897" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-3360" ref_url="https://www.suse.com/security/cve/CVE-2025-3360/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039259.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2025-3360: Fixed integer overflow and buffer underread when parsing a very long 
  and invalid ISO 8601 timestamp with g_date_time_new_from_iso8601() (bsc#1240897)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-20"/>
	<updated date="2025-05-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1240897">SUSE bug 1240897</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3360/">CVE-2025-3360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3360">CVE-2025-3360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982503" comment="glib2-tools-2.70.5-150400.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982504" comment="libgio-2_0-0-2.70.5-150400.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982505" comment="libglib-2_0-0-2.70.5-150400.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982506" comment="libgmodule-2_0-0-2.70.5-150400.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982507" comment="libgobject-2_0-0-2.70.5-150400.3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206300" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1201855" ref_url="https://bugzilla.suse.com/1201855" source="BUGZILLA"/>
		<reference ref_id="1230771" ref_url="https://bugzilla.suse.com/1230771" source="BUGZILLA"/>
		<reference ref_id="1238471" ref_url="https://bugzilla.suse.com/1238471" source="BUGZILLA"/>
		<reference ref_id="1238512" ref_url="https://bugzilla.suse.com/1238512" source="BUGZILLA"/>
		<reference ref_id="1238747" ref_url="https://bugzilla.suse.com/1238747" source="BUGZILLA"/>
		<reference ref_id="1238865" ref_url="https://bugzilla.suse.com/1238865" source="BUGZILLA"/>
		<reference ref_id="1239968" ref_url="https://bugzilla.suse.com/1239968" source="BUGZILLA"/>
		<reference ref_id="1240188" ref_url="https://bugzilla.suse.com/1240188" source="BUGZILLA"/>
		<reference ref_id="1240195" ref_url="https://bugzilla.suse.com/1240195" source="BUGZILLA"/>
		<reference ref_id="1240553" ref_url="https://bugzilla.suse.com/1240553" source="BUGZILLA"/>
		<reference ref_id="1240747" ref_url="https://bugzilla.suse.com/1240747" source="BUGZILLA"/>
		<reference ref_id="1240835" ref_url="https://bugzilla.suse.com/1240835" source="BUGZILLA"/>
		<reference ref_id="1241280" ref_url="https://bugzilla.suse.com/1241280" source="BUGZILLA"/>
		<reference ref_id="1241371" ref_url="https://bugzilla.suse.com/1241371" source="BUGZILLA"/>
		<reference ref_id="1241421" ref_url="https://bugzilla.suse.com/1241421" source="BUGZILLA"/>
		<reference ref_id="1241433" ref_url="https://bugzilla.suse.com/1241433" source="BUGZILLA"/>
		<reference ref_id="1241541" ref_url="https://bugzilla.suse.com/1241541" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47671" ref_url="https://www.suse.com/security/cve/CVE-2021-47671/" source="CVE"/>
		<reference ref_id="CVE-2022-49741" ref_url="https://www.suse.com/security/cve/CVE-2022-49741/" source="CVE"/>
		<reference ref_id="CVE-2024-46784" ref_url="https://www.suse.com/security/cve/CVE-2024-46784/" source="CVE"/>
		<reference ref_id="CVE-2025-21726" ref_url="https://www.suse.com/security/cve/CVE-2025-21726/" source="CVE"/>
		<reference ref_id="CVE-2025-21785" ref_url="https://www.suse.com/security/cve/CVE-2025-21785/" source="CVE"/>
		<reference ref_id="CVE-2025-21791" ref_url="https://www.suse.com/security/cve/CVE-2025-21791/" source="CVE"/>
		<reference ref_id="CVE-2025-21812" ref_url="https://www.suse.com/security/cve/CVE-2025-21812/" source="CVE"/>
		<reference ref_id="CVE-2025-21886" ref_url="https://www.suse.com/security/cve/CVE-2025-21886/" source="CVE"/>
		<reference ref_id="CVE-2025-22004" ref_url="https://www.suse.com/security/cve/CVE-2025-22004/" source="CVE"/>
		<reference ref_id="CVE-2025-22020" ref_url="https://www.suse.com/security/cve/CVE-2025-22020/" source="CVE"/>
		<reference ref_id="CVE-2025-22045" ref_url="https://www.suse.com/security/cve/CVE-2025-22045/" source="CVE"/>
		<reference ref_id="CVE-2025-22055" ref_url="https://www.suse.com/security/cve/CVE-2025-22055/" source="CVE"/>
		<reference ref_id="CVE-2025-22097" ref_url="https://www.suse.com/security/cve/CVE-2025-22097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039279.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2025-21726: padata: avoid UAF for reorder_work (bsc#1238865).
- CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747).
- CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).
- CVE-2025-21812: ax25: rcu protect dev-&gt;ax25_ptr (bsc#1238471).
- CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).
- CVE-2025-22020: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (bsc#1241280).
- CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433).
- CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).
- CVE-2025-22097: drm/vkms: Fix use after free and double free on init error (bsc#1241541).

The following non-security bugs were fixed:

- scsi: smartpqi: Add ctrl ready timeout module parameter (jsc#PED-1557, bsc#1201855, bsc#1240553).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-21"/>
	<updated date="2025-05-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201855">SUSE bug 1201855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230771">SUSE bug 1230771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238471">SUSE bug 1238471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238512">SUSE bug 1238512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238747">SUSE bug 1238747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238865">SUSE bug 1238865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239968">SUSE bug 1239968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240188">SUSE bug 1240188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240195">SUSE bug 1240195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240553">SUSE bug 1240553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240747">SUSE bug 1240747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240835">SUSE bug 1240835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241280">SUSE bug 1241280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241371">SUSE bug 1241371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241421">SUSE bug 1241421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241433">SUSE bug 1241433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241541">SUSE bug 1241541</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47671/">CVE-2021-47671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47671">CVE-2021-47671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49741/">CVE-2022-49741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49741">CVE-2022-49741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46784/">CVE-2024-46784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21726/">CVE-2025-21726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21726">CVE-2025-21726 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21785/">CVE-2025-21785 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21791/">CVE-2025-21791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21791">CVE-2025-21791 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21812/">CVE-2025-21812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21812">CVE-2025-21812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21886/">CVE-2025-21886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21886">CVE-2025-21886 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22004/">CVE-2025-22004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22020/">CVE-2025-22020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22045/">CVE-2025-22045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22045">CVE-2025-22045 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22055/">CVE-2025-22055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22055">CVE-2025-22055 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22097/">CVE-2025-22097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982921" comment="kernel-default-5.14.21-150400.24.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982902" comment="kernel-default-base-5.14.21-150400.24.164.1.150400.24.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206301" version="1" class="patch">
	<metadata>
		<title>Security update for s390-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1242622" ref_url="https://bugzilla.suse.com/1242622" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039275.html" source="SUSE-SU"/>
		<description>

This update for s390-tools rebuilds the existing package with the new 4k RSA secure boot key.

Security issues fixed:

- CVE-2025-3416: Fixed Use-After-Free in Md::fetch and Cipher::fetch in rust-openssl crate. (bsc#1242622)

Other issues:

- Added the new IBM z17 (9175) processor type
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-21"/>
	<updated date="2025-05-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1242622">SUSE bug 1242622</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982751" comment="libekmfweb1-2.31.0-150400.7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982753" comment="libkmipclient1-2.31.0-150400.7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982755" comment="s390-tools-2.31.0-150400.7.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982757" comment="s390-tools-genprotimg-data-2.31.0-150400.7.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206302" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234101" ref_url="https://bugzilla.suse.com/1234101" source="BUGZILLA"/>
		<reference ref_id="1234102" ref_url="https://bugzilla.suse.com/1234102" source="BUGZILLA"/>
		<reference ref_id="1234103" ref_url="https://bugzilla.suse.com/1234103" source="BUGZILLA"/>
		<reference ref_id="1234104" ref_url="https://bugzilla.suse.com/1234104" source="BUGZILLA"/>
		<reference ref_id="1235475" ref_url="https://bugzilla.suse.com/1235475" source="BUGZILLA"/>
		<reference ref_id="1235895" ref_url="https://bugzilla.suse.com/1235895" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-12085" ref_url="https://www.suse.com/security/cve/CVE-2024-12085/" source="CVE"/>
		<reference ref_id="CVE-2024-12086" ref_url="https://www.suse.com/security/cve/CVE-2024-12086/" source="CVE"/>
		<reference ref_id="CVE-2024-12087" ref_url="https://www.suse.com/security/cve/CVE-2024-12087/" source="CVE"/>
		<reference ref_id="CVE-2024-12088" ref_url="https://www.suse.com/security/cve/CVE-2024-12088/" source="CVE"/>
		<reference ref_id="CVE-2024-12747" ref_url="https://www.suse.com/security/cve/CVE-2024-12747/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020168.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes the following issues:

- CVE-2024-12085: leak of uninitialized stack data on the server leading to possible ASLR bypass. (bsc#1234101)
- CVE-2024-12086: leak of a client machine's file contents through the processing of checksum data. (bsc#1234102)
- CVE-2024-12087: arbitrary file overwrite possible on clients when symlink syncing is enabled. (bsc#1234103)
- CVE-2024-12088: bypass of the --safe-links flag may allow the placement of unsafe symlinks in a client. (bsc#1234104)
- CVE-2024-12747: Fixed a race condition in rsync handling symbolic links. (bsc#1235475)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-17"/>
	<updated date="2025-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234101">SUSE bug 1234101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234102">SUSE bug 1234102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234103">SUSE bug 1234103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234104">SUSE bug 1234104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235475">SUSE bug 1235475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235895">SUSE bug 1235895</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12085/">CVE-2024-12085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12085">CVE-2024-12085 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12086/">CVE-2024-12086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12086">CVE-2024-12086 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12087/">CVE-2024-12087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12087">CVE-2024-12087 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12088/">CVE-2024-12088 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12088">CVE-2024-12088 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12747/">CVE-2024-12747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12747">CVE-2024-12747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960717" comment="rsync-3.2.3-150400.3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206303" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243123" ref_url="https://bugzilla.suse.com/1243123" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-43420" ref_url="https://www.suse.com/security/cve/CVE-2024-43420/" source="CVE"/>
		<reference ref_id="CVE-2024-45332" ref_url="https://www.suse.com/security/cve/CVE-2024-45332/" source="CVE"/>
		<reference ref_id="CVE-2025-20012" ref_url="https://www.suse.com/security/cve/CVE-2025-20012/" source="CVE"/>
		<reference ref_id="CVE-2025-20054" ref_url="https://www.suse.com/security/cve/CVE-2025-20054/" source="CVE"/>
		<reference ref_id="CVE-2025-20103" ref_url="https://www.suse.com/security/cve/CVE-2025-20103/" source="CVE"/>
		<reference ref_id="CVE-2025-20623" ref_url="https://www.suse.com/security/cve/CVE-2025-20623/" source="CVE"/>
		<reference ref_id="CVE-2025-24495" ref_url="https://www.suse.com/security/cve/CVE-2025-24495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Intel CPU Microcode was updated to the 20250512 release (bsc#1243123)
  
- CVE-2024-28956: Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-20103: Insufficient resource pool in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access.
- CVE-2025-20054: Uncaught exception in the core management mechanism for some Intel Processors may allow an authenticated user to potentially enable denial of service via local access.
- CVE-2024-43420: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-20623: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Core processors (10th Generation) may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2024-45332: Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-24495: Incorrect initialization of resource in the branch prediction unit for some Intel Core Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2025-20012: Incorrect behavior order for some Intel Core Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access.
- Updates for functional issues.  
    
- New Platforms

  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ARL-U          | A1       | 06-b5-00/80 |          | 0000000a | Core Ultra Processor (Series2)
  | ARL-S/HX (8P)  | B0       | 06-c6-02/82 |          | 00000118 | Core Ultra Processor (Series2)
  | ARL-H          | A1       | 06-c5-02/82 |          | 00000118 | Core Ultra Processor (Series2)
  | GNR-AP/SP      | B0       | 06-ad-01/95 |          | 010003a2 | Xeon Scalable Gen6
  | GNR-AP/SP      | H0       | 06-ad-01/20 |          | 0a0000d1 | Xeon Scalable Gen6
  | LNL            | B0       | 06-bd-01/80 |          | 0000011f | Core Ultra 200 V Series Processor

- Updated Platforms

  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL            | C0       | 06-97-02/07 | 00000038 | 0000003a | Core Gen12
  | ADL            | H0       | 06-97-05/07 | 00000038 | 0000003a | Core Gen12
  | ADL            | L0       | 06-9a-03/80 | 00000436 | 00000437 | Core Gen12
  | ADL            | R0       | 06-9a-04/80 | 00000436 | 00000437 | Core Gen12 
  | ADL-N          | N0       | 06-be-00/19 | 0000001c | 0000001d | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile
  | AZB            | A0/R0    | 06-9a-04/40 | 00000009 | 0000000a | Intel(R) Atom(R) C1100
  | CFL-H          | R0       | 06-9e-0d/22 | 00000102 | 00000104 | Core Gen9 Mobile
  | CLX-SP         | B1       | 06-55-07/bf | 05003707 | 05003901 | Xeon Scalable Gen2
  | CML-H          | R1       | 06-a5-02/20 | 000000fc | 00000100 | Core Gen10 Mobile
  | CML-S102       | Q0       | 06-a5-05/22 | 000000fc | 00000100 | Core Gen10
  | CML-S62        | G1       | 06-a5-03/22 | 000000fc | 00000100 | Core Gen10
  | CML-U42        | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile
  | CML-U62 V1     | A0       | 06-a6-00/80 | 000000fe | 00000102 | Core Gen10 Mobile
  | CML-U62 V2     | K1       | 06-a6-01/80 | 000000fc | 00000100 | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen10 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf | 07002904 | 07002b01 | Xeon Scalable Gen3
  | EMR-SP         | A1       | 06-cf-02/87 | 21000291 | 210002a9 | Xeon Scalable Gen5
  | GLK-R          | R0       | 06-7a-08/01 | 00000024 | 00000026 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-D          | B0       | 06-6c-01/10 | 010002c0 | 010002d0 | Xeon D-17xx, D-27xx
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000c6 | 000000ca | Core Gen10 Mobile
  | ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003f5 | 0d000404 | Xeon Scalable Gen3
  | MTL            | C0       | 06-aa-04/e6 | 00000020 | 00000024 | Core Ultra Processor
  | RKL-S          | B0       | 06-a7-01/02 | 00000063 | 00000064 | Core Gen11
  | RPL-E/HX/S     | B0       | 06-b7-01/32 | 0000012c | 0000012f | Core Gen13/Gen14
  | RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004124 | 00004128 | Core Gen13
  | RPL-HX/S       | C0       | 06-bf-02/07 | 00000038 | 0000003a | Core Gen13/Gen14
  | RPL-S          | H0       | 06-bf-05/07 | 00000038 | 0000003a | Core Gen13/Gen14
  | RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004124 | 00004128 | Core Gen13
  | SPR-HBM        | Bx       | 06-8f-08/10 | 2c0003e0 | 2c0003f7 | Xeon Max
  | SPR-SP         | E4/S2    | 06-8f-07/87 | 2b000620 | 2b000639 | Xeon Scalable Gen4
  | SPR-SP         | E5/S3    | 06-8f-08/87 | 2b000620 | 2b000639 | Xeon Scalable Gen4
  | SRF-SP         | C0       | 06-af-03/01 | 03000330 | 03000341 | Xeon 6700-Series Processors with E-Cores
  | TGL            | B0/B1    | 06-8c-01/80 | 000000b8 | 000000bc | Core Gen11 Mobile
  | TGL-H          | R0       | 06-8d-01/c2 | 00000052 | 00000056 | Core Gen11 Mobile
  | TGL-R          | C0       | 06-8c-02/c2 | 00000038 | 0000003c | Core Gen11 Mobile
  | TWL            | N0       | 06-be-00/19 | 0000001c | 0000001d | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
  | WHL-U          | V0       | 06-8e-0c/94 | 000000fc | 00000100 | Core Gen8 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-22"/>
	<updated date="2025-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1243123">SUSE bug 1243123</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-43420/">CVE-2024-43420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43420">CVE-2024-43420 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-45332/">CVE-2024-45332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45332">CVE-2024-45332 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20012/">CVE-2025-20012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20012">CVE-2025-20012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20054/">CVE-2025-20054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20054">CVE-2025-20054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-20103/">CVE-2025-20103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20103">CVE-2025-20103 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20623/">CVE-2025-20623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20623">CVE-2025-20623 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24495/">CVE-2025-24495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24495">CVE-2025-24495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982955" comment="ucode-intel-20250512-150200.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206304" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1237147" ref_url="https://bugzilla.suse.com/1237147" source="BUGZILLA"/>
		<reference ref_id="1237180" ref_url="https://bugzilla.suse.com/1237180" source="BUGZILLA"/>
		<reference ref_id="1241938" ref_url="https://bugzilla.suse.com/1241938" source="BUGZILLA"/>
		<reference ref_id="1243106" ref_url="https://bugzilla.suse.com/1243106" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-22247" ref_url="https://www.suse.com/security/cve/CVE-2025-22247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01658-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039310.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

Update to 12.5.2:

Security fixes:

- CVE-2025-22247: Fixed Insecure file handling (bsc#1243106)

Other fixes:

- Fixed GCC 15 compile time error (bsc#1241938)
- Fixed building with containerd 1.7.25+ (bsc#1237147)
- Ensure vmtoolsd.service and vgauthd.service are set to enabled by default (bsc#1237180)

Full changelog:

https://github.com/vmware/open-vm-tools/blob/stable-12.5.2/ReleaseNotes.md
https://github.com/vmware/open-vm-tools/blob/stable-12.5.2/open-vm-tools/ChangeLog
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-22"/>
	<updated date="2025-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1237147">SUSE bug 1237147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237180">SUSE bug 1237180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241938">SUSE bug 1241938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243106">SUSE bug 1243106</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22247/">CVE-2025-22247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22247">CVE-2025-22247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983021" comment="libvmtools0-12.5.2-150300.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983022" comment="open-vm-tools-12.5.2-150300.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206305" version="1" class="patch">
	<metadata>
		<title>Security update for python-tornado (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243268" ref_url="https://bugzilla.suse.com/1243268" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47287" ref_url="https://www.suse.com/security/cve/CVE-2025-47287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039378.html" source="SUSE-SU"/>
		<description>
This update for python-tornado fixes the following issues:

- CVE-2025-47287: excessive logging when parsing malformed `multipart/form-data` can lead to a denial-of-service
  (bsc#1243268).  
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-28"/>
	<updated date="2025-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1243268">SUSE bug 1243268</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47287/">CVE-2025-47287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47287">CVE-2025-47287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983820" comment="python3-tornado-4.5.3-150000.3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206306" version="1" class="patch">
	<metadata>
		<title>Security update for iputils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1242300" ref_url="https://bugzilla.suse.com/1242300" source="BUGZILLA"/>
		<reference ref_id="1243284" ref_url="https://bugzilla.suse.com/1243284" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47268" ref_url="https://www.suse.com/security/cve/CVE-2025-47268/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039466.html" source="SUSE-SU"/>
		<description>
This update for iputils fixes the following issues:

Security fixes:
    
- CVE-2025-47268: Fixed integer overflow in RTT calculation can lead to undefined behavior (bsc#1242300).

Other bug fixes:
    
- Fixed incorrect IPV4 TTL value when using SOCK_DGRAM on big endian systems (bsc#1243284).
  
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1242300">SUSE bug 1242300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243284">SUSE bug 1243284</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47268/">CVE-2025-47268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47268">CVE-2025-47268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985227" comment="iputils-20211215-150400.3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206307" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234128" ref_url="https://bugzilla.suse.com/1234128" source="BUGZILLA"/>
		<reference ref_id="1243317" ref_url="https://bugzilla.suse.com/1243317" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-4802" ref_url="https://www.suse.com/security/cve/CVE-2025-4802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039476.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2025-4802: possible execution of attacker controlled code when statically linked setuid binaries using dlopen
  search for libraries to load in LD_LIBRARY_PATH (bsc#1243317).

Other issues fixed:

- Multi-threaded application hang due to deadlock when `pthread_cond_signal` fails to wake up `pthread_cond_wait`
  as a consequence of a bug related to stealing of signals (bsc#1234128).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234128">SUSE bug 1234128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243317">SUSE bug 1243317</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4802/">CVE-2025-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985223" comment="glibc-2.31-150300.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985224" comment="glibc-devel-2.31-150300.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985225" comment="glibc-locale-2.31-150300.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985226" comment="glibc-locale-base-2.31-150300.95.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206308" version="1" class="patch">
	<metadata>
		<title>Security update for python3-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243313" ref_url="https://bugzilla.suse.com/1243313" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040131.html" source="SUSE-SU"/>
		<description>
This update for python3-setuptools fixes the following issues:

- CVE-2025-47273: path traversal in PackageIndex.download may lead to an arbitrary file write (bsc#1243313).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-04"/>
	<updated date="2025-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1243313">SUSE bug 1243313</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985865" comment="python3-setuptools-44.1.1-150400.9.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206309" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1241162" ref_url="https://bugzilla.suse.com/1241162" source="BUGZILLA"/>
		<reference ref_id="1241214" ref_url="https://bugzilla.suse.com/1241214" source="BUGZILLA"/>
		<reference ref_id="1241226" ref_url="https://bugzilla.suse.com/1241226" source="BUGZILLA"/>
		<reference ref_id="1241238" ref_url="https://bugzilla.suse.com/1241238" source="BUGZILLA"/>
		<reference ref_id="1241252" ref_url="https://bugzilla.suse.com/1241252" source="BUGZILLA"/>
		<reference ref_id="1241263" ref_url="https://bugzilla.suse.com/1241263" source="BUGZILLA"/>
		<reference ref_id="1243332" ref_url="https://bugzilla.suse.com/1243332" source="BUGZILLA"/>
		<reference ref_id="1243423" ref_url="https://bugzilla.suse.com/1243423" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-32906" ref_url="https://www.suse.com/security/cve/CVE-2025-32906/" source="CVE"/>
		<reference ref_id="CVE-2025-32909" ref_url="https://www.suse.com/security/cve/CVE-2025-32909/" source="CVE"/>
		<reference ref_id="CVE-2025-32910" ref_url="https://www.suse.com/security/cve/CVE-2025-32910/" source="CVE"/>
		<reference ref_id="CVE-2025-32911" ref_url="https://www.suse.com/security/cve/CVE-2025-32911/" source="CVE"/>
		<reference ref_id="CVE-2025-32912" ref_url="https://www.suse.com/security/cve/CVE-2025-32912/" source="CVE"/>
		<reference ref_id="CVE-2025-32913" ref_url="https://www.suse.com/security/cve/CVE-2025-32913/" source="CVE"/>
		<reference ref_id="CVE-2025-4948" ref_url="https://www.suse.com/security/cve/CVE-2025-4948/" source="CVE"/>
		<reference ref_id="CVE-2025-4969" ref_url="https://www.suse.com/security/cve/CVE-2025-4969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01864-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040214.html" source="SUSE-SU"/>
		<description>
This update for libsoup2 fixes the following issues:

- CVE-2025-4948: Fixed integer underflow in soup_multipart_new_from_message() leading to denial of service (bsc#1243332) 
- CVE-2025-4969: Fixed off-by-one out-of-bounds read may lead to infoleak (bsc#1243423) 
- CVE-2025-32906: Fixed out of bounds reads in soup_headers_parse_request() (bsc#1241263) 
- CVE-2025-32909: Fixed NULL pointer dereference in the sniff_mp4 function in soup-content-sniffer.c (bsc#1241226) 
- CVE-2025-32910: Fixed null pointer deference on client when server omits the realm parameter in an Unauthorized response with Digest authentication (bsc#1241252) 
- CVE-2025-32911: Fixed double free on soup_message_headers_get_content_disposition() via 'params'. (bsc#1241238) 
- CVE-2025-32912: Fixed NULL pointer dereference in SoupAuthDigest (bsc#1241214) 
- CVE-2025-32913: Fixed NULL pointer dereference in soup_message_headers_get_content_disposition (bsc#1241162) 
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-10"/>
	<updated date="2025-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1241162">SUSE bug 1241162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241214">SUSE bug 1241214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241226">SUSE bug 1241226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241238">SUSE bug 1241238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241252">SUSE bug 1241252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241263">SUSE bug 1241263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243332">SUSE bug 1243332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243423">SUSE bug 1243423</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32906/">CVE-2025-32906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32906">CVE-2025-32906 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32909/">CVE-2025-32909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32909">CVE-2025-32909 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32910/">CVE-2025-32910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32910">CVE-2025-32910 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-32911/">CVE-2025-32911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32911">CVE-2025-32911 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32912/">CVE-2025-32912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32912">CVE-2025-32912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32913/">CVE-2025-32913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32913">CVE-2025-32913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4948/">CVE-2025-4948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4948">CVE-2025-4948 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4969/">CVE-2025-4969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4969">CVE-2025-4969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988211" comment="libsoup-2_4-1-2.74.2-150400.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206310" version="1" class="patch">
	<metadata>
		<title>Security update for sysstat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1202473" ref_url="https://bugzilla.suse.com/1202473" source="BUGZILLA"/>
		<reference ref_id="1205224" ref_url="https://bugzilla.suse.com/1205224" source="BUGZILLA"/>
		<reference ref_id="1211507" ref_url="https://bugzilla.suse.com/1211507" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39377" ref_url="https://www.suse.com/security/cve/CVE-2022-39377/" source="CVE"/>
		<reference ref_id="CVE-2023-33204" ref_url="https://www.suse.com/security/cve/CVE-2023-33204/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020063.html" source="SUSE-SU"/>
		<description>
This update for sysstat fixes the following issues:

  - CVE-2023-33204: Fixed a multiplication integer overflow in check_overflow in common.c (bsc#1211507)
  - CVE-2022-39377: Fixed arithmetic overflow in allocate_structures() (bsc#1205224)

		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-06"/>
	<updated date="2025-01-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1202473">SUSE bug 1202473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205224">SUSE bug 1205224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211507">SUSE bug 1211507</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39377/">CVE-2022-39377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39377">CVE-2022-39377 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33204/">CVE-2023-33204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33204">CVE-2023-33204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959147" comment="sysstat-12.0.2-150000.3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206311" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1204569" ref_url="https://bugzilla.suse.com/1204569" source="BUGZILLA"/>
		<reference ref_id="1204619" ref_url="https://bugzilla.suse.com/1204619" source="BUGZILLA"/>
		<reference ref_id="1204705" ref_url="https://bugzilla.suse.com/1204705" source="BUGZILLA"/>
		<reference ref_id="1205282" ref_url="https://bugzilla.suse.com/1205282" source="BUGZILLA"/>
		<reference ref_id="1206051" ref_url="https://bugzilla.suse.com/1206051" source="BUGZILLA"/>
		<reference ref_id="1206073" ref_url="https://bugzilla.suse.com/1206073" source="BUGZILLA"/>
		<reference ref_id="1206649" ref_url="https://bugzilla.suse.com/1206649" source="BUGZILLA"/>
		<reference ref_id="1206886" ref_url="https://bugzilla.suse.com/1206886" source="BUGZILLA"/>
		<reference ref_id="1206887" ref_url="https://bugzilla.suse.com/1206887" source="BUGZILLA"/>
		<reference ref_id="1208542" ref_url="https://bugzilla.suse.com/1208542" source="BUGZILLA"/>
		<reference ref_id="1209292" ref_url="https://bugzilla.suse.com/1209292" source="BUGZILLA"/>
		<reference ref_id="1209556" ref_url="https://bugzilla.suse.com/1209556" source="BUGZILLA"/>
		<reference ref_id="1209684" ref_url="https://bugzilla.suse.com/1209684" source="BUGZILLA"/>
		<reference ref_id="1210337" ref_url="https://bugzilla.suse.com/1210337" source="BUGZILLA"/>
		<reference ref_id="1210763" ref_url="https://bugzilla.suse.com/1210763" source="BUGZILLA"/>
		<reference ref_id="1210767" ref_url="https://bugzilla.suse.com/1210767" source="BUGZILLA"/>
		<reference ref_id="1211465" ref_url="https://bugzilla.suse.com/1211465" source="BUGZILLA"/>
		<reference ref_id="1213012" ref_url="https://bugzilla.suse.com/1213012" source="BUGZILLA"/>
		<reference ref_id="1213013" ref_url="https://bugzilla.suse.com/1213013" source="BUGZILLA"/>
		<reference ref_id="1213094" ref_url="https://bugzilla.suse.com/1213094" source="BUGZILLA"/>
		<reference ref_id="1213096" ref_url="https://bugzilla.suse.com/1213096" source="BUGZILLA"/>
		<reference ref_id="1213946" ref_url="https://bugzilla.suse.com/1213946" source="BUGZILLA"/>
		<reference ref_id="1214991" ref_url="https://bugzilla.suse.com/1214991" source="BUGZILLA"/>
		<reference ref_id="1218470" ref_url="https://bugzilla.suse.com/1218470" source="BUGZILLA"/>
		<reference ref_id="1232649" ref_url="https://bugzilla.suse.com/1232649" source="BUGZILLA"/>
		<reference ref_id="1234887" ref_url="https://bugzilla.suse.com/1234887" source="BUGZILLA"/>
		<reference ref_id="1235100" ref_url="https://bugzilla.suse.com/1235100" source="BUGZILLA"/>
		<reference ref_id="1237981" ref_url="https://bugzilla.suse.com/1237981" source="BUGZILLA"/>
		<reference ref_id="1238032" ref_url="https://bugzilla.suse.com/1238032" source="BUGZILLA"/>
		<reference ref_id="1240177" ref_url="https://bugzilla.suse.com/1240177" source="BUGZILLA"/>
		<reference ref_id="1240802" ref_url="https://bugzilla.suse.com/1240802" source="BUGZILLA"/>
		<reference ref_id="1241525" ref_url="https://bugzilla.suse.com/1241525" source="BUGZILLA"/>
		<reference ref_id="1241526" ref_url="https://bugzilla.suse.com/1241526" source="BUGZILLA"/>
		<reference ref_id="1241640" ref_url="https://bugzilla.suse.com/1241640" source="BUGZILLA"/>
		<reference ref_id="1241648" ref_url="https://bugzilla.suse.com/1241648" source="BUGZILLA"/>
		<reference ref_id="1242147" ref_url="https://bugzilla.suse.com/1242147" source="BUGZILLA"/>
		<reference ref_id="1242150" ref_url="https://bugzilla.suse.com/1242150" source="BUGZILLA"/>
		<reference ref_id="1242151" ref_url="https://bugzilla.suse.com/1242151" source="BUGZILLA"/>
		<reference ref_id="1242154" ref_url="https://bugzilla.suse.com/1242154" source="BUGZILLA"/>
		<reference ref_id="1242157" ref_url="https://bugzilla.suse.com/1242157" source="BUGZILLA"/>
		<reference ref_id="1242158" ref_url="https://bugzilla.suse.com/1242158" source="BUGZILLA"/>
		<reference ref_id="1242164" ref_url="https://bugzilla.suse.com/1242164" source="BUGZILLA"/>
		<reference ref_id="1242165" ref_url="https://bugzilla.suse.com/1242165" source="BUGZILLA"/>
		<reference ref_id="1242169" ref_url="https://bugzilla.suse.com/1242169" source="BUGZILLA"/>
		<reference ref_id="1242215" ref_url="https://bugzilla.suse.com/1242215" source="BUGZILLA"/>
		<reference ref_id="1242218" ref_url="https://bugzilla.suse.com/1242218" source="BUGZILLA"/>
		<reference ref_id="1242219" ref_url="https://bugzilla.suse.com/1242219" source="BUGZILLA"/>
		<reference ref_id="1242222" ref_url="https://bugzilla.suse.com/1242222" source="BUGZILLA"/>
		<reference ref_id="1242226" ref_url="https://bugzilla.suse.com/1242226" source="BUGZILLA"/>
		<reference ref_id="1242227" ref_url="https://bugzilla.suse.com/1242227" source="BUGZILLA"/>
		<reference ref_id="1242228" ref_url="https://bugzilla.suse.com/1242228" source="BUGZILLA"/>
		<reference ref_id="1242229" ref_url="https://bugzilla.suse.com/1242229" source="BUGZILLA"/>
		<reference ref_id="1242230" ref_url="https://bugzilla.suse.com/1242230" source="BUGZILLA"/>
		<reference ref_id="1242231" ref_url="https://bugzilla.suse.com/1242231" source="BUGZILLA"/>
		<reference ref_id="1242232" ref_url="https://bugzilla.suse.com/1242232" source="BUGZILLA"/>
		<reference ref_id="1242237" ref_url="https://bugzilla.suse.com/1242237" source="BUGZILLA"/>
		<reference ref_id="1242239" ref_url="https://bugzilla.suse.com/1242239" source="BUGZILLA"/>
		<reference ref_id="1242241" ref_url="https://bugzilla.suse.com/1242241" source="BUGZILLA"/>
		<reference ref_id="1242244" ref_url="https://bugzilla.suse.com/1242244" source="BUGZILLA"/>
		<reference ref_id="1242245" ref_url="https://bugzilla.suse.com/1242245" source="BUGZILLA"/>
		<reference ref_id="1242248" ref_url="https://bugzilla.suse.com/1242248" source="BUGZILLA"/>
		<reference ref_id="1242261" ref_url="https://bugzilla.suse.com/1242261" source="BUGZILLA"/>
		<reference ref_id="1242264" ref_url="https://bugzilla.suse.com/1242264" source="BUGZILLA"/>
		<reference ref_id="1242265" ref_url="https://bugzilla.suse.com/1242265" source="BUGZILLA"/>
		<reference ref_id="1242270" ref_url="https://bugzilla.suse.com/1242270" source="BUGZILLA"/>
		<reference ref_id="1242276" ref_url="https://bugzilla.suse.com/1242276" source="BUGZILLA"/>
		<reference ref_id="1242279" ref_url="https://bugzilla.suse.com/1242279" source="BUGZILLA"/>
		<reference ref_id="1242280" ref_url="https://bugzilla.suse.com/1242280" source="BUGZILLA"/>
		<reference ref_id="1242281" ref_url="https://bugzilla.suse.com/1242281" source="BUGZILLA"/>
		<reference ref_id="1242282" ref_url="https://bugzilla.suse.com/1242282" source="BUGZILLA"/>
		<reference ref_id="1242284" ref_url="https://bugzilla.suse.com/1242284" source="BUGZILLA"/>
		<reference ref_id="1242285" ref_url="https://bugzilla.suse.com/1242285" source="BUGZILLA"/>
		<reference ref_id="1242289" ref_url="https://bugzilla.suse.com/1242289" source="BUGZILLA"/>
		<reference ref_id="1242294" ref_url="https://bugzilla.suse.com/1242294" source="BUGZILLA"/>
		<reference ref_id="1242305" ref_url="https://bugzilla.suse.com/1242305" source="BUGZILLA"/>
		<reference ref_id="1242312" ref_url="https://bugzilla.suse.com/1242312" source="BUGZILLA"/>
		<reference ref_id="1242320" ref_url="https://bugzilla.suse.com/1242320" source="BUGZILLA"/>
		<reference ref_id="1242338" ref_url="https://bugzilla.suse.com/1242338" source="BUGZILLA"/>
		<reference ref_id="1242352" ref_url="https://bugzilla.suse.com/1242352" source="BUGZILLA"/>
		<reference ref_id="1242353" ref_url="https://bugzilla.suse.com/1242353" source="BUGZILLA"/>
		<reference ref_id="1242355" ref_url="https://bugzilla.suse.com/1242355" source="BUGZILLA"/>
		<reference ref_id="1242357" ref_url="https://bugzilla.suse.com/1242357" source="BUGZILLA"/>
		<reference ref_id="1242358" ref_url="https://bugzilla.suse.com/1242358" source="BUGZILLA"/>
		<reference ref_id="1242361" ref_url="https://bugzilla.suse.com/1242361" source="BUGZILLA"/>
		<reference ref_id="1242365" ref_url="https://bugzilla.suse.com/1242365" source="BUGZILLA"/>
		<reference ref_id="1242366" ref_url="https://bugzilla.suse.com/1242366" source="BUGZILLA"/>
		<reference ref_id="1242369" ref_url="https://bugzilla.suse.com/1242369" source="BUGZILLA"/>
		<reference ref_id="1242370" ref_url="https://bugzilla.suse.com/1242370" source="BUGZILLA"/>
		<reference ref_id="1242371" ref_url="https://bugzilla.suse.com/1242371" source="BUGZILLA"/>
		<reference ref_id="1242372" ref_url="https://bugzilla.suse.com/1242372" source="BUGZILLA"/>
		<reference ref_id="1242377" ref_url="https://bugzilla.suse.com/1242377" source="BUGZILLA"/>
		<reference ref_id="1242378" ref_url="https://bugzilla.suse.com/1242378" source="BUGZILLA"/>
		<reference ref_id="1242380" ref_url="https://bugzilla.suse.com/1242380" source="BUGZILLA"/>
		<reference ref_id="1242382" ref_url="https://bugzilla.suse.com/1242382" source="BUGZILLA"/>
		<reference ref_id="1242385" ref_url="https://bugzilla.suse.com/1242385" source="BUGZILLA"/>
		<reference ref_id="1242387" ref_url="https://bugzilla.suse.com/1242387" source="BUGZILLA"/>
		<reference ref_id="1242389" ref_url="https://bugzilla.suse.com/1242389" source="BUGZILLA"/>
		<reference ref_id="1242391" ref_url="https://bugzilla.suse.com/1242391" source="BUGZILLA"/>
		<reference ref_id="1242392" ref_url="https://bugzilla.suse.com/1242392" source="BUGZILLA"/>
		<reference ref_id="1242394" ref_url="https://bugzilla.suse.com/1242394" source="BUGZILLA"/>
		<reference ref_id="1242398" ref_url="https://bugzilla.suse.com/1242398" source="BUGZILLA"/>
		<reference ref_id="1242399" ref_url="https://bugzilla.suse.com/1242399" source="BUGZILLA"/>
		<reference ref_id="1242402" ref_url="https://bugzilla.suse.com/1242402" source="BUGZILLA"/>
		<reference ref_id="1242403" ref_url="https://bugzilla.suse.com/1242403" source="BUGZILLA"/>
		<reference ref_id="1242409" ref_url="https://bugzilla.suse.com/1242409" source="BUGZILLA"/>
		<reference ref_id="1242411" ref_url="https://bugzilla.suse.com/1242411" source="BUGZILLA"/>
		<reference ref_id="1242415" ref_url="https://bugzilla.suse.com/1242415" source="BUGZILLA"/>
		<reference ref_id="1242416" ref_url="https://bugzilla.suse.com/1242416" source="BUGZILLA"/>
		<reference ref_id="1242421" ref_url="https://bugzilla.suse.com/1242421" source="BUGZILLA"/>
		<reference ref_id="1242422" ref_url="https://bugzilla.suse.com/1242422" source="BUGZILLA"/>
		<reference ref_id="1242426" ref_url="https://bugzilla.suse.com/1242426" source="BUGZILLA"/>
		<reference ref_id="1242428" ref_url="https://bugzilla.suse.com/1242428" source="BUGZILLA"/>
		<reference ref_id="1242440" ref_url="https://bugzilla.suse.com/1242440" source="BUGZILLA"/>
		<reference ref_id="1242443" ref_url="https://bugzilla.suse.com/1242443" source="BUGZILLA"/>
		<reference ref_id="1242449" ref_url="https://bugzilla.suse.com/1242449" source="BUGZILLA"/>
		<reference ref_id="1242452" ref_url="https://bugzilla.suse.com/1242452" source="BUGZILLA"/>
		<reference ref_id="1242453" ref_url="https://bugzilla.suse.com/1242453" source="BUGZILLA"/>
		<reference ref_id="1242454" ref_url="https://bugzilla.suse.com/1242454" source="BUGZILLA"/>
		<reference ref_id="1242455" ref_url="https://bugzilla.suse.com/1242455" source="BUGZILLA"/>
		<reference ref_id="1242456" ref_url="https://bugzilla.suse.com/1242456" source="BUGZILLA"/>
		<reference ref_id="1242458" ref_url="https://bugzilla.suse.com/1242458" source="BUGZILLA"/>
		<reference ref_id="1242464" ref_url="https://bugzilla.suse.com/1242464" source="BUGZILLA"/>
		<reference ref_id="1242467" ref_url="https://bugzilla.suse.com/1242467" source="BUGZILLA"/>
		<reference ref_id="1242469" ref_url="https://bugzilla.suse.com/1242469" source="BUGZILLA"/>
		<reference ref_id="1242473" ref_url="https://bugzilla.suse.com/1242473" source="BUGZILLA"/>
		<reference ref_id="1242478" ref_url="https://bugzilla.suse.com/1242478" source="BUGZILLA"/>
		<reference ref_id="1242481" ref_url="https://bugzilla.suse.com/1242481" source="BUGZILLA"/>
		<reference ref_id="1242484" ref_url="https://bugzilla.suse.com/1242484" source="BUGZILLA"/>
		<reference ref_id="1242489" ref_url="https://bugzilla.suse.com/1242489" source="BUGZILLA"/>
		<reference ref_id="1242493" ref_url="https://bugzilla.suse.com/1242493" source="BUGZILLA"/>
		<reference ref_id="1242497" ref_url="https://bugzilla.suse.com/1242497" source="BUGZILLA"/>
		<reference ref_id="1242527" ref_url="https://bugzilla.suse.com/1242527" source="BUGZILLA"/>
		<reference ref_id="1242542" ref_url="https://bugzilla.suse.com/1242542" source="BUGZILLA"/>
		<reference ref_id="1242544" ref_url="https://bugzilla.suse.com/1242544" source="BUGZILLA"/>
		<reference ref_id="1242545" ref_url="https://bugzilla.suse.com/1242545" source="BUGZILLA"/>
		<reference ref_id="1242547" ref_url="https://bugzilla.suse.com/1242547" source="BUGZILLA"/>
		<reference ref_id="1242548" ref_url="https://bugzilla.suse.com/1242548" source="BUGZILLA"/>
		<reference ref_id="1242549" ref_url="https://bugzilla.suse.com/1242549" source="BUGZILLA"/>
		<reference ref_id="1242550" ref_url="https://bugzilla.suse.com/1242550" source="BUGZILLA"/>
		<reference ref_id="1242551" ref_url="https://bugzilla.suse.com/1242551" source="BUGZILLA"/>
		<reference ref_id="1242558" ref_url="https://bugzilla.suse.com/1242558" source="BUGZILLA"/>
		<reference ref_id="1242570" ref_url="https://bugzilla.suse.com/1242570" source="BUGZILLA"/>
		<reference ref_id="1242580" ref_url="https://bugzilla.suse.com/1242580" source="BUGZILLA"/>
		<reference ref_id="1242586" ref_url="https://bugzilla.suse.com/1242586" source="BUGZILLA"/>
		<reference ref_id="1242589" ref_url="https://bugzilla.suse.com/1242589" source="BUGZILLA"/>
		<reference ref_id="1242596" ref_url="https://bugzilla.suse.com/1242596" source="BUGZILLA"/>
		<reference ref_id="1242597" ref_url="https://bugzilla.suse.com/1242597" source="BUGZILLA"/>
		<reference ref_id="1242685" ref_url="https://bugzilla.suse.com/1242685" source="BUGZILLA"/>
		<reference ref_id="1242686" ref_url="https://bugzilla.suse.com/1242686" source="BUGZILLA"/>
		<reference ref_id="1242688" ref_url="https://bugzilla.suse.com/1242688" source="BUGZILLA"/>
		<reference ref_id="1242689" ref_url="https://bugzilla.suse.com/1242689" source="BUGZILLA"/>
		<reference ref_id="1242695" ref_url="https://bugzilla.suse.com/1242695" source="BUGZILLA"/>
		<reference ref_id="1242716" ref_url="https://bugzilla.suse.com/1242716" source="BUGZILLA"/>
		<reference ref_id="1242733" ref_url="https://bugzilla.suse.com/1242733" source="BUGZILLA"/>
		<reference ref_id="1242734" ref_url="https://bugzilla.suse.com/1242734" source="BUGZILLA"/>
		<reference ref_id="1242735" ref_url="https://bugzilla.suse.com/1242735" source="BUGZILLA"/>
		<reference ref_id="1242736" ref_url="https://bugzilla.suse.com/1242736" source="BUGZILLA"/>
		<reference ref_id="1242739" ref_url="https://bugzilla.suse.com/1242739" source="BUGZILLA"/>
		<reference ref_id="1242743" ref_url="https://bugzilla.suse.com/1242743" source="BUGZILLA"/>
		<reference ref_id="1242744" ref_url="https://bugzilla.suse.com/1242744" source="BUGZILLA"/>
		<reference ref_id="1242745" ref_url="https://bugzilla.suse.com/1242745" source="BUGZILLA"/>
		<reference ref_id="1242746" ref_url="https://bugzilla.suse.com/1242746" source="BUGZILLA"/>
		<reference ref_id="1242747" ref_url="https://bugzilla.suse.com/1242747" source="BUGZILLA"/>
		<reference ref_id="1242749" ref_url="https://bugzilla.suse.com/1242749" source="BUGZILLA"/>
		<reference ref_id="1242752" ref_url="https://bugzilla.suse.com/1242752" source="BUGZILLA"/>
		<reference ref_id="1242753" ref_url="https://bugzilla.suse.com/1242753" source="BUGZILLA"/>
		<reference ref_id="1242756" ref_url="https://bugzilla.suse.com/1242756" source="BUGZILLA"/>
		<reference ref_id="1242759" ref_url="https://bugzilla.suse.com/1242759" source="BUGZILLA"/>
		<reference ref_id="1242762" ref_url="https://bugzilla.suse.com/1242762" source="BUGZILLA"/>
		<reference ref_id="1242765" ref_url="https://bugzilla.suse.com/1242765" source="BUGZILLA"/>
		<reference ref_id="1242767" ref_url="https://bugzilla.suse.com/1242767" source="BUGZILLA"/>
		<reference ref_id="1242778" ref_url="https://bugzilla.suse.com/1242778" source="BUGZILLA"/>
		<reference ref_id="1242779" ref_url="https://bugzilla.suse.com/1242779" source="BUGZILLA"/>
		<reference ref_id="1242790" ref_url="https://bugzilla.suse.com/1242790" source="BUGZILLA"/>
		<reference ref_id="1242791" ref_url="https://bugzilla.suse.com/1242791" source="BUGZILLA"/>
		<reference ref_id="1243047" ref_url="https://bugzilla.suse.com/1243047" source="BUGZILLA"/>
		<reference ref_id="1243133" ref_url="https://bugzilla.suse.com/1243133" source="BUGZILLA"/>
		<reference ref_id="1243649" ref_url="https://bugzilla.suse.com/1243649" source="BUGZILLA"/>
		<reference ref_id="1243660" ref_url="https://bugzilla.suse.com/1243660" source="BUGZILLA"/>
		<reference ref_id="1243737" ref_url="https://bugzilla.suse.com/1243737" source="BUGZILLA"/>
		<reference ref_id="1243919" ref_url="https://bugzilla.suse.com/1243919" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3564" ref_url="https://www.suse.com/security/cve/CVE-2022-3564/" source="CVE"/>
		<reference ref_id="CVE-2022-3619" ref_url="https://www.suse.com/security/cve/CVE-2022-3619/" source="CVE"/>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<reference ref_id="CVE-2022-49110" ref_url="https://www.suse.com/security/cve/CVE-2022-49110/" source="CVE"/>
		<reference ref_id="CVE-2022-49139" ref_url="https://www.suse.com/security/cve/CVE-2022-49139/" source="CVE"/>
		<reference ref_id="CVE-2022-49767" ref_url="https://www.suse.com/security/cve/CVE-2022-49767/" source="CVE"/>
		<reference ref_id="CVE-2022-49769" ref_url="https://www.suse.com/security/cve/CVE-2022-49769/" source="CVE"/>
		<reference ref_id="CVE-2022-49770" ref_url="https://www.suse.com/security/cve/CVE-2022-49770/" source="CVE"/>
		<reference ref_id="CVE-2022-49771" ref_url="https://www.suse.com/security/cve/CVE-2022-49771/" source="CVE"/>
		<reference ref_id="CVE-2022-49772" ref_url="https://www.suse.com/security/cve/CVE-2022-49772/" source="CVE"/>
		<reference ref_id="CVE-2022-49775" ref_url="https://www.suse.com/security/cve/CVE-2022-49775/" source="CVE"/>
		<reference ref_id="CVE-2022-49776" ref_url="https://www.suse.com/security/cve/CVE-2022-49776/" source="CVE"/>
		<reference ref_id="CVE-2022-49777" ref_url="https://www.suse.com/security/cve/CVE-2022-49777/" source="CVE"/>
		<reference ref_id="CVE-2022-49779" ref_url="https://www.suse.com/security/cve/CVE-2022-49779/" source="CVE"/>
		<reference ref_id="CVE-2022-49783" ref_url="https://www.suse.com/security/cve/CVE-2022-49783/" source="CVE"/>
		<reference ref_id="CVE-2022-49787" ref_url="https://www.suse.com/security/cve/CVE-2022-49787/" source="CVE"/>
		<reference ref_id="CVE-2022-49788" ref_url="https://www.suse.com/security/cve/CVE-2022-49788/" source="CVE"/>
		<reference ref_id="CVE-2022-49789" ref_url="https://www.suse.com/security/cve/CVE-2022-49789/" source="CVE"/>
		<reference ref_id="CVE-2022-49790" ref_url="https://www.suse.com/security/cve/CVE-2022-49790/" source="CVE"/>
		<reference ref_id="CVE-2022-49792" ref_url="https://www.suse.com/security/cve/CVE-2022-49792/" source="CVE"/>
		<reference ref_id="CVE-2022-49793" ref_url="https://www.suse.com/security/cve/CVE-2022-49793/" source="CVE"/>
		<reference ref_id="CVE-2022-49794" ref_url="https://www.suse.com/security/cve/CVE-2022-49794/" source="CVE"/>
		<reference ref_id="CVE-2022-49796" ref_url="https://www.suse.com/security/cve/CVE-2022-49796/" source="CVE"/>
		<reference ref_id="CVE-2022-49797" ref_url="https://www.suse.com/security/cve/CVE-2022-49797/" source="CVE"/>
		<reference ref_id="CVE-2022-49799" ref_url="https://www.suse.com/security/cve/CVE-2022-49799/" source="CVE"/>
		<reference ref_id="CVE-2022-49800" ref_url="https://www.suse.com/security/cve/CVE-2022-49800/" source="CVE"/>
		<reference ref_id="CVE-2022-49801" ref_url="https://www.suse.com/security/cve/CVE-2022-49801/" source="CVE"/>
		<reference ref_id="CVE-2022-49802" ref_url="https://www.suse.com/security/cve/CVE-2022-49802/" source="CVE"/>
		<reference ref_id="CVE-2022-49807" ref_url="https://www.suse.com/security/cve/CVE-2022-49807/" source="CVE"/>
		<reference ref_id="CVE-2022-49809" ref_url="https://www.suse.com/security/cve/CVE-2022-49809/" source="CVE"/>
		<reference ref_id="CVE-2022-49810" ref_url="https://www.suse.com/security/cve/CVE-2022-49810/" source="CVE"/>
		<reference ref_id="CVE-2022-49812" ref_url="https://www.suse.com/security/cve/CVE-2022-49812/" source="CVE"/>
		<reference ref_id="CVE-2022-49813" ref_url="https://www.suse.com/security/cve/CVE-2022-49813/" source="CVE"/>
		<reference ref_id="CVE-2022-49818" ref_url="https://www.suse.com/security/cve/CVE-2022-49818/" source="CVE"/>
		<reference ref_id="CVE-2022-49821" ref_url="https://www.suse.com/security/cve/CVE-2022-49821/" source="CVE"/>
		<reference ref_id="CVE-2022-49822" ref_url="https://www.suse.com/security/cve/CVE-2022-49822/" source="CVE"/>
		<reference ref_id="CVE-2022-49823" ref_url="https://www.suse.com/security/cve/CVE-2022-49823/" source="CVE"/>
		<reference ref_id="CVE-2022-49824" ref_url="https://www.suse.com/security/cve/CVE-2022-49824/" source="CVE"/>
		<reference ref_id="CVE-2022-49825" ref_url="https://www.suse.com/security/cve/CVE-2022-49825/" source="CVE"/>
		<reference ref_id="CVE-2022-49826" ref_url="https://www.suse.com/security/cve/CVE-2022-49826/" source="CVE"/>
		<reference ref_id="CVE-2022-49827" ref_url="https://www.suse.com/security/cve/CVE-2022-49827/" source="CVE"/>
		<reference ref_id="CVE-2022-49830" ref_url="https://www.suse.com/security/cve/CVE-2022-49830/" source="CVE"/>
		<reference ref_id="CVE-2022-49832" ref_url="https://www.suse.com/security/cve/CVE-2022-49832/" source="CVE"/>
		<reference ref_id="CVE-2022-49834" ref_url="https://www.suse.com/security/cve/CVE-2022-49834/" source="CVE"/>
		<reference ref_id="CVE-2022-49835" ref_url="https://www.suse.com/security/cve/CVE-2022-49835/" source="CVE"/>
		<reference ref_id="CVE-2022-49836" ref_url="https://www.suse.com/security/cve/CVE-2022-49836/" source="CVE"/>
		<reference ref_id="CVE-2022-49839" ref_url="https://www.suse.com/security/cve/CVE-2022-49839/" source="CVE"/>
		<reference ref_id="CVE-2022-49841" ref_url="https://www.suse.com/security/cve/CVE-2022-49841/" source="CVE"/>
		<reference ref_id="CVE-2022-49842" ref_url="https://www.suse.com/security/cve/CVE-2022-49842/" source="CVE"/>
		<reference ref_id="CVE-2022-49845" ref_url="https://www.suse.com/security/cve/CVE-2022-49845/" source="CVE"/>
		<reference ref_id="CVE-2022-49846" ref_url="https://www.suse.com/security/cve/CVE-2022-49846/" source="CVE"/>
		<reference ref_id="CVE-2022-49850" ref_url="https://www.suse.com/security/cve/CVE-2022-49850/" source="CVE"/>
		<reference ref_id="CVE-2022-49853" ref_url="https://www.suse.com/security/cve/CVE-2022-49853/" source="CVE"/>
		<reference ref_id="CVE-2022-49858" ref_url="https://www.suse.com/security/cve/CVE-2022-49858/" source="CVE"/>
		<reference ref_id="CVE-2022-49860" ref_url="https://www.suse.com/security/cve/CVE-2022-49860/" source="CVE"/>
		<reference ref_id="CVE-2022-49861" ref_url="https://www.suse.com/security/cve/CVE-2022-49861/" source="CVE"/>
		<reference ref_id="CVE-2022-49863" ref_url="https://www.suse.com/security/cve/CVE-2022-49863/" source="CVE"/>
		<reference ref_id="CVE-2022-49864" ref_url="https://www.suse.com/security/cve/CVE-2022-49864/" source="CVE"/>
		<reference ref_id="CVE-2022-49865" ref_url="https://www.suse.com/security/cve/CVE-2022-49865/" source="CVE"/>
		<reference ref_id="CVE-2022-49868" ref_url="https://www.suse.com/security/cve/CVE-2022-49868/" source="CVE"/>
		<reference ref_id="CVE-2022-49869" ref_url="https://www.suse.com/security/cve/CVE-2022-49869/" source="CVE"/>
		<reference ref_id="CVE-2022-49870" ref_url="https://www.suse.com/security/cve/CVE-2022-49870/" source="CVE"/>
		<reference ref_id="CVE-2022-49871" ref_url="https://www.suse.com/security/cve/CVE-2022-49871/" source="CVE"/>
		<reference ref_id="CVE-2022-49874" ref_url="https://www.suse.com/security/cve/CVE-2022-49874/" source="CVE"/>
		<reference ref_id="CVE-2022-49879" ref_url="https://www.suse.com/security/cve/CVE-2022-49879/" source="CVE"/>
		<reference ref_id="CVE-2022-49880" ref_url="https://www.suse.com/security/cve/CVE-2022-49880/" source="CVE"/>
		<reference ref_id="CVE-2022-49881" ref_url="https://www.suse.com/security/cve/CVE-2022-49881/" source="CVE"/>
		<reference ref_id="CVE-2022-49885" ref_url="https://www.suse.com/security/cve/CVE-2022-49885/" source="CVE"/>
		<reference ref_id="CVE-2022-49887" ref_url="https://www.suse.com/security/cve/CVE-2022-49887/" source="CVE"/>
		<reference ref_id="CVE-2022-49888" ref_url="https://www.suse.com/security/cve/CVE-2022-49888/" source="CVE"/>
		<reference ref_id="CVE-2022-49889" ref_url="https://www.suse.com/security/cve/CVE-2022-49889/" source="CVE"/>
		<reference ref_id="CVE-2022-49890" ref_url="https://www.suse.com/security/cve/CVE-2022-49890/" source="CVE"/>
		<reference ref_id="CVE-2022-49891" ref_url="https://www.suse.com/security/cve/CVE-2022-49891/" source="CVE"/>
		<reference ref_id="CVE-2022-49892" ref_url="https://www.suse.com/security/cve/CVE-2022-49892/" source="CVE"/>
		<reference ref_id="CVE-2022-49900" ref_url="https://www.suse.com/security/cve/CVE-2022-49900/" source="CVE"/>
		<reference ref_id="CVE-2022-49905" ref_url="https://www.suse.com/security/cve/CVE-2022-49905/" source="CVE"/>
		<reference ref_id="CVE-2022-49906" ref_url="https://www.suse.com/security/cve/CVE-2022-49906/" source="CVE"/>
		<reference ref_id="CVE-2022-49908" ref_url="https://www.suse.com/security/cve/CVE-2022-49908/" source="CVE"/>
		<reference ref_id="CVE-2022-49909" ref_url="https://www.suse.com/security/cve/CVE-2022-49909/" source="CVE"/>
		<reference ref_id="CVE-2022-49910" ref_url="https://www.suse.com/security/cve/CVE-2022-49910/" source="CVE"/>
		<reference ref_id="CVE-2022-49915" ref_url="https://www.suse.com/security/cve/CVE-2022-49915/" source="CVE"/>
		<reference ref_id="CVE-2022-49916" ref_url="https://www.suse.com/security/cve/CVE-2022-49916/" source="CVE"/>
		<reference ref_id="CVE-2022-49922" ref_url="https://www.suse.com/security/cve/CVE-2022-49922/" source="CVE"/>
		<reference ref_id="CVE-2022-49923" ref_url="https://www.suse.com/security/cve/CVE-2022-49923/" source="CVE"/>
		<reference ref_id="CVE-2022-49924" ref_url="https://www.suse.com/security/cve/CVE-2022-49924/" source="CVE"/>
		<reference ref_id="CVE-2022-49925" ref_url="https://www.suse.com/security/cve/CVE-2022-49925/" source="CVE"/>
		<reference ref_id="CVE-2022-49927" ref_url="https://www.suse.com/security/cve/CVE-2022-49927/" source="CVE"/>
		<reference ref_id="CVE-2022-49928" ref_url="https://www.suse.com/security/cve/CVE-2022-49928/" source="CVE"/>
		<reference ref_id="CVE-2022-49931" ref_url="https://www.suse.com/security/cve/CVE-2022-49931/" source="CVE"/>
		<reference ref_id="CVE-2023-1990" ref_url="https://www.suse.com/security/cve/CVE-2023-1990/" source="CVE"/>
		<reference ref_id="CVE-2023-53035" ref_url="https://www.suse.com/security/cve/CVE-2023-53035/" source="CVE"/>
		<reference ref_id="CVE-2023-53038" ref_url="https://www.suse.com/security/cve/CVE-2023-53038/" source="CVE"/>
		<reference ref_id="CVE-2023-53039" ref_url="https://www.suse.com/security/cve/CVE-2023-53039/" source="CVE"/>
		<reference ref_id="CVE-2023-53040" ref_url="https://www.suse.com/security/cve/CVE-2023-53040/" source="CVE"/>
		<reference ref_id="CVE-2023-53041" ref_url="https://www.suse.com/security/cve/CVE-2023-53041/" source="CVE"/>
		<reference ref_id="CVE-2023-53044" ref_url="https://www.suse.com/security/cve/CVE-2023-53044/" source="CVE"/>
		<reference ref_id="CVE-2023-53045" ref_url="https://www.suse.com/security/cve/CVE-2023-53045/" source="CVE"/>
		<reference ref_id="CVE-2023-53049" ref_url="https://www.suse.com/security/cve/CVE-2023-53049/" source="CVE"/>
		<reference ref_id="CVE-2023-53051" ref_url="https://www.suse.com/security/cve/CVE-2023-53051/" source="CVE"/>
		<reference ref_id="CVE-2023-53052" ref_url="https://www.suse.com/security/cve/CVE-2023-53052/" source="CVE"/>
		<reference ref_id="CVE-2023-53054" ref_url="https://www.suse.com/security/cve/CVE-2023-53054/" source="CVE"/>
		<reference ref_id="CVE-2023-53056" ref_url="https://www.suse.com/security/cve/CVE-2023-53056/" source="CVE"/>
		<reference ref_id="CVE-2023-53058" ref_url="https://www.suse.com/security/cve/CVE-2023-53058/" source="CVE"/>
		<reference ref_id="CVE-2023-53059" ref_url="https://www.suse.com/security/cve/CVE-2023-53059/" source="CVE"/>
		<reference ref_id="CVE-2023-53060" ref_url="https://www.suse.com/security/cve/CVE-2023-53060/" source="CVE"/>
		<reference ref_id="CVE-2023-53062" ref_url="https://www.suse.com/security/cve/CVE-2023-53062/" source="CVE"/>
		<reference ref_id="CVE-2023-53064" ref_url="https://www.suse.com/security/cve/CVE-2023-53064/" source="CVE"/>
		<reference ref_id="CVE-2023-53065" ref_url="https://www.suse.com/security/cve/CVE-2023-53065/" source="CVE"/>
		<reference ref_id="CVE-2023-53066" ref_url="https://www.suse.com/security/cve/CVE-2023-53066/" source="CVE"/>
		<reference ref_id="CVE-2023-53068" ref_url="https://www.suse.com/security/cve/CVE-2023-53068/" source="CVE"/>
		<reference ref_id="CVE-2023-53075" ref_url="https://www.suse.com/security/cve/CVE-2023-53075/" source="CVE"/>
		<reference ref_id="CVE-2023-53077" ref_url="https://www.suse.com/security/cve/CVE-2023-53077/" source="CVE"/>
		<reference ref_id="CVE-2023-53078" ref_url="https://www.suse.com/security/cve/CVE-2023-53078/" source="CVE"/>
		<reference ref_id="CVE-2023-53079" ref_url="https://www.suse.com/security/cve/CVE-2023-53079/" source="CVE"/>
		<reference ref_id="CVE-2023-53081" ref_url="https://www.suse.com/security/cve/CVE-2023-53081/" source="CVE"/>
		<reference ref_id="CVE-2023-53084" ref_url="https://www.suse.com/security/cve/CVE-2023-53084/" source="CVE"/>
		<reference ref_id="CVE-2023-53087" ref_url="https://www.suse.com/security/cve/CVE-2023-53087/" source="CVE"/>
		<reference ref_id="CVE-2023-53089" ref_url="https://www.suse.com/security/cve/CVE-2023-53089/" source="CVE"/>
		<reference ref_id="CVE-2023-53090" ref_url="https://www.suse.com/security/cve/CVE-2023-53090/" source="CVE"/>
		<reference ref_id="CVE-2023-53091" ref_url="https://www.suse.com/security/cve/CVE-2023-53091/" source="CVE"/>
		<reference ref_id="CVE-2023-53092" ref_url="https://www.suse.com/security/cve/CVE-2023-53092/" source="CVE"/>
		<reference ref_id="CVE-2023-53093" ref_url="https://www.suse.com/security/cve/CVE-2023-53093/" source="CVE"/>
		<reference ref_id="CVE-2023-53096" ref_url="https://www.suse.com/security/cve/CVE-2023-53096/" source="CVE"/>
		<reference ref_id="CVE-2023-53098" ref_url="https://www.suse.com/security/cve/CVE-2023-53098/" source="CVE"/>
		<reference ref_id="CVE-2023-53099" ref_url="https://www.suse.com/security/cve/CVE-2023-53099/" source="CVE"/>
		<reference ref_id="CVE-2023-53100" ref_url="https://www.suse.com/security/cve/CVE-2023-53100/" source="CVE"/>
		<reference ref_id="CVE-2023-53101" ref_url="https://www.suse.com/security/cve/CVE-2023-53101/" source="CVE"/>
		<reference ref_id="CVE-2023-53106" ref_url="https://www.suse.com/security/cve/CVE-2023-53106/" source="CVE"/>
		<reference ref_id="CVE-2023-53108" ref_url="https://www.suse.com/security/cve/CVE-2023-53108/" source="CVE"/>
		<reference ref_id="CVE-2023-53111" ref_url="https://www.suse.com/security/cve/CVE-2023-53111/" source="CVE"/>
		<reference ref_id="CVE-2023-53114" ref_url="https://www.suse.com/security/cve/CVE-2023-53114/" source="CVE"/>
		<reference ref_id="CVE-2023-53116" ref_url="https://www.suse.com/security/cve/CVE-2023-53116/" source="CVE"/>
		<reference ref_id="CVE-2023-53118" ref_url="https://www.suse.com/security/cve/CVE-2023-53118/" source="CVE"/>
		<reference ref_id="CVE-2023-53119" ref_url="https://www.suse.com/security/cve/CVE-2023-53119/" source="CVE"/>
		<reference ref_id="CVE-2023-53123" ref_url="https://www.suse.com/security/cve/CVE-2023-53123/" source="CVE"/>
		<reference ref_id="CVE-2023-53124" ref_url="https://www.suse.com/security/cve/CVE-2023-53124/" source="CVE"/>
		<reference ref_id="CVE-2023-53125" ref_url="https://www.suse.com/security/cve/CVE-2023-53125/" source="CVE"/>
		<reference ref_id="CVE-2023-53131" ref_url="https://www.suse.com/security/cve/CVE-2023-53131/" source="CVE"/>
		<reference ref_id="CVE-2023-53134" ref_url="https://www.suse.com/security/cve/CVE-2023-53134/" source="CVE"/>
		<reference ref_id="CVE-2023-53137" ref_url="https://www.suse.com/security/cve/CVE-2023-53137/" source="CVE"/>
		<reference ref_id="CVE-2023-53139" ref_url="https://www.suse.com/security/cve/CVE-2023-53139/" source="CVE"/>
		<reference ref_id="CVE-2023-53140" ref_url="https://www.suse.com/security/cve/CVE-2023-53140/" source="CVE"/>
		<reference ref_id="CVE-2023-53142" ref_url="https://www.suse.com/security/cve/CVE-2023-53142/" source="CVE"/>
		<reference ref_id="CVE-2023-53143" ref_url="https://www.suse.com/security/cve/CVE-2023-53143/" source="CVE"/>
		<reference ref_id="CVE-2023-53145" ref_url="https://www.suse.com/security/cve/CVE-2023-53145/" source="CVE"/>
		<reference ref_id="CVE-2024-53168" ref_url="https://www.suse.com/security/cve/CVE-2024-53168/" source="CVE"/>
		<reference ref_id="CVE-2024-56558" ref_url="https://www.suse.com/security/cve/CVE-2024-56558/" source="CVE"/>
		<reference ref_id="CVE-2025-21888" ref_url="https://www.suse.com/security/cve/CVE-2025-21888/" source="CVE"/>
		<reference ref_id="CVE-2025-21999" ref_url="https://www.suse.com/security/cve/CVE-2025-21999/" source="CVE"/>
		<reference ref_id="CVE-2025-22056" ref_url="https://www.suse.com/security/cve/CVE-2025-22056/" source="CVE"/>
		<reference ref_id="CVE-2025-22060" ref_url="https://www.suse.com/security/cve/CVE-2025-22060/" source="CVE"/>
		<reference ref_id="CVE-2025-23138" ref_url="https://www.suse.com/security/cve/CVE-2025-23138/" source="CVE"/>
		<reference ref_id="CVE-2025-23145" ref_url="https://www.suse.com/security/cve/CVE-2025-23145/" source="CVE"/>
		<reference ref_id="CVE-2025-37785" ref_url="https://www.suse.com/security/cve/CVE-2025-37785/" source="CVE"/>
		<reference ref_id="CVE-2025-37789" ref_url="https://www.suse.com/security/cve/CVE-2025-37789/" source="CVE"/>
		<reference ref_id="CVE-2025-37948" ref_url="https://www.suse.com/security/cve/CVE-2025-37948/" source="CVE"/>
		<reference ref_id="CVE-2025-37963" ref_url="https://www.suse.com/security/cve/CVE-2025-37963/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49110: netfilter: conntrack: revisit gc autotuning (bsc#1237981).
- CVE-2022-49139: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt (bsc#1238032).
- CVE-2022-49767: 9p/trans_fd: always use O_NONBLOCK read/write (bsc#1242493).
- CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245).
- CVE-2024-53168: net: make sock_inuse_add() available (bsc#1234887).
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100).
- CVE-2025-21888: RDMA/mlx5: Fix a WARN during dereg_mr for DM type (bsc#1240177).
- CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).
- CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525).
- CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526).
- CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648).
- CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596).
- CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).
- CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).

The following non-security bugs were fixed:

- Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (bsc#1243737).
- Refresh fixes for cBPF issue (bsc#1242778)
- Remove debug flavor (bsc#1243919)
- arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778).
- arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778).
- arm64: insn: Add support for encoding DSB (bsc#1242778).
- arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778).
- arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778).
- arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778).
- hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (bsc#1243737).
- hv_netvsc: Remove rmsg_pgcnt (bsc#1243737).
- hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (bsc#1243737).
- mtd: phram: Add the kernel lock down check (bsc#1232649).
- ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes).
- powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes).
- x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
- x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
- x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-12"/>
	<updated date="2025-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204569">SUSE bug 1204569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204619">SUSE bug 1204619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204705">SUSE bug 1204705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205282">SUSE bug 1205282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206051">SUSE bug 1206051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206073">SUSE bug 1206073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206649">SUSE bug 1206649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206886">SUSE bug 1206886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206887">SUSE bug 1206887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208542">SUSE bug 1208542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209292">SUSE bug 1209292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209556">SUSE bug 1209556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209684">SUSE bug 1209684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210337">SUSE bug 1210337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210763">SUSE bug 1210763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210767">SUSE bug 1210767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211465">SUSE bug 1211465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213012">SUSE bug 1213012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213013">SUSE bug 1213013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213094">SUSE bug 1213094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213096">SUSE bug 1213096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213946">SUSE bug 1213946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214991">SUSE bug 1214991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218470">SUSE bug 1218470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232649">SUSE bug 1232649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234887">SUSE bug 1234887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235100">SUSE bug 1235100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237981">SUSE bug 1237981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238032">SUSE bug 1238032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240177">SUSE bug 1240177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240802">SUSE bug 1240802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241525">SUSE bug 1241525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241526">SUSE bug 1241526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241640">SUSE bug 1241640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241648">SUSE bug 1241648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242147">SUSE bug 1242147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242150">SUSE bug 1242150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242151">SUSE bug 1242151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242154">SUSE bug 1242154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242157">SUSE bug 1242157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242158">SUSE bug 1242158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242164">SUSE bug 1242164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242165">SUSE bug 1242165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242169">SUSE bug 1242169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242215">SUSE bug 1242215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242218">SUSE bug 1242218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242219">SUSE bug 1242219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242222">SUSE bug 1242222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242226">SUSE bug 1242226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242227">SUSE bug 1242227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242228">SUSE bug 1242228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242229">SUSE bug 1242229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242230">SUSE bug 1242230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242231">SUSE bug 1242231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242232">SUSE bug 1242232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242237">SUSE bug 1242237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242239">SUSE bug 1242239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242241">SUSE bug 1242241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242244">SUSE bug 1242244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242245">SUSE bug 1242245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242248">SUSE bug 1242248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242261">SUSE bug 1242261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242264">SUSE bug 1242264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242265">SUSE bug 1242265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242270">SUSE bug 1242270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242276">SUSE bug 1242276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242279">SUSE bug 1242279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242280">SUSE bug 1242280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242281">SUSE bug 1242281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242282">SUSE bug 1242282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242284">SUSE bug 1242284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242285">SUSE bug 1242285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242289">SUSE bug 1242289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242294">SUSE bug 1242294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242305">SUSE bug 1242305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242312">SUSE bug 1242312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242320">SUSE bug 1242320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242338">SUSE bug 1242338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242352">SUSE bug 1242352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242353">SUSE bug 1242353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242355">SUSE bug 1242355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242357">SUSE bug 1242357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242358">SUSE bug 1242358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242361">SUSE bug 1242361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242365">SUSE bug 1242365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242366">SUSE bug 1242366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242369">SUSE bug 1242369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242370">SUSE bug 1242370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242371">SUSE bug 1242371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242372">SUSE bug 1242372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242377">SUSE bug 1242377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242378">SUSE bug 1242378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242380">SUSE bug 1242380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242382">SUSE bug 1242382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242385">SUSE bug 1242385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242387">SUSE bug 1242387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242389">SUSE bug 1242389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242391">SUSE bug 1242391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242392">SUSE bug 1242392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242394">SUSE bug 1242394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242398">SUSE bug 1242398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242399">SUSE bug 1242399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242402">SUSE bug 1242402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242403">SUSE bug 1242403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242409">SUSE bug 1242409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242411">SUSE bug 1242411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242415">SUSE bug 1242415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242416">SUSE bug 1242416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242421">SUSE bug 1242421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242422">SUSE bug 1242422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242426">SUSE bug 1242426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242428">SUSE bug 1242428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242440">SUSE bug 1242440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242443">SUSE bug 1242443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242449">SUSE bug 1242449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242452">SUSE bug 1242452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242453">SUSE bug 1242453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242454">SUSE bug 1242454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242455">SUSE bug 1242455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242456">SUSE bug 1242456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242458">SUSE bug 1242458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242464">SUSE bug 1242464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242467">SUSE bug 1242467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242469">SUSE bug 1242469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242473">SUSE bug 1242473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242478">SUSE bug 1242478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242481">SUSE bug 1242481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242484">SUSE bug 1242484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242489">SUSE bug 1242489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242493">SUSE bug 1242493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242497">SUSE bug 1242497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242527">SUSE bug 1242527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242542">SUSE bug 1242542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242544">SUSE bug 1242544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242545">SUSE bug 1242545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242547">SUSE bug 1242547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242548">SUSE bug 1242548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242549">SUSE bug 1242549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242550">SUSE bug 1242550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242551">SUSE bug 1242551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242558">SUSE bug 1242558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242570">SUSE bug 1242570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242580">SUSE bug 1242580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242586">SUSE bug 1242586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242589">SUSE bug 1242589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242596">SUSE bug 1242596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242597">SUSE bug 1242597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242685">SUSE bug 1242685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242686">SUSE bug 1242686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242688">SUSE bug 1242688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242689">SUSE bug 1242689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242695">SUSE bug 1242695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242716">SUSE bug 1242716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242733">SUSE bug 1242733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242734">SUSE bug 1242734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242735">SUSE bug 1242735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242736">SUSE bug 1242736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242739">SUSE bug 1242739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242743">SUSE bug 1242743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242744">SUSE bug 1242744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242745">SUSE bug 1242745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242746">SUSE bug 1242746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242747">SUSE bug 1242747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242749">SUSE bug 1242749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242752">SUSE bug 1242752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242753">SUSE bug 1242753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242756">SUSE bug 1242756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242759">SUSE bug 1242759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242762">SUSE bug 1242762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242765">SUSE bug 1242765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242767">SUSE bug 1242767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242778">SUSE bug 1242778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242779">SUSE bug 1242779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242790">SUSE bug 1242790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242791">SUSE bug 1242791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243047">SUSE bug 1243047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243133">SUSE bug 1243133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243649">SUSE bug 1243649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243660">SUSE bug 1243660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243737">SUSE bug 1243737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243919">SUSE bug 1243919</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3564/">CVE-2022-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3619/">CVE-2022-3619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49110/">CVE-2022-49110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49110">CVE-2022-49110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49139/">CVE-2022-49139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49139">CVE-2022-49139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49767/">CVE-2022-49767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49767">CVE-2022-49767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49769/">CVE-2022-49769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49769">CVE-2022-49769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49770/">CVE-2022-49770 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49770">CVE-2022-49770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49771/">CVE-2022-49771 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49771">CVE-2022-49771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49772/">CVE-2022-49772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49772">CVE-2022-49772 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49775/">CVE-2022-49775 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49775">CVE-2022-49775 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49776/">CVE-2022-49776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49776">CVE-2022-49776 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49777/">CVE-2022-49777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49777">CVE-2022-49777 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49779/">CVE-2022-49779 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49779">CVE-2022-49779 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49783/">CVE-2022-49783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49783">CVE-2022-49783 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49787/">CVE-2022-49787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49787">CVE-2022-49787 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49788/">CVE-2022-49788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49788">CVE-2022-49788 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49789/">CVE-2022-49789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49789">CVE-2022-49789 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49790/">CVE-2022-49790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49790">CVE-2022-49790 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49792/">CVE-2022-49792 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49792">CVE-2022-49792 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49793/">CVE-2022-49793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49793">CVE-2022-49793 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49794/">CVE-2022-49794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49794">CVE-2022-49794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49796/">CVE-2022-49796 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49796">CVE-2022-49796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49797/">CVE-2022-49797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49797">CVE-2022-49797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49799/">CVE-2022-49799 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49799">CVE-2022-49799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49800/">CVE-2022-49800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49800">CVE-2022-49800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49801/">CVE-2022-49801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49801">CVE-2022-49801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49802/">CVE-2022-49802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49802">CVE-2022-49802 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49807/">CVE-2022-49807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49807">CVE-2022-49807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49809/">CVE-2022-49809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49809">CVE-2022-49809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49810/">CVE-2022-49810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49810">CVE-2022-49810 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49812/">CVE-2022-49812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49812">CVE-2022-49812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49813/">CVE-2022-49813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49813">CVE-2022-49813 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49818/">CVE-2022-49818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49818">CVE-2022-49818 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49821/">CVE-2022-49821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49821">CVE-2022-49821 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49822/">CVE-2022-49822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49822">CVE-2022-49822 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49823/">CVE-2022-49823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49823">CVE-2022-49823 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49824/">CVE-2022-49824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49824">CVE-2022-49824 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49825/">CVE-2022-49825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49825">CVE-2022-49825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49826/">CVE-2022-49826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49826">CVE-2022-49826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49827/">CVE-2022-49827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49827">CVE-2022-49827 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49830/">CVE-2022-49830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49830">CVE-2022-49830 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49832/">CVE-2022-49832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49832">CVE-2022-49832 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49834/">CVE-2022-49834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49834">CVE-2022-49834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49835/">CVE-2022-49835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49835">CVE-2022-49835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49836/">CVE-2022-49836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49836">CVE-2022-49836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49839/">CVE-2022-49839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49839">CVE-2022-49839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49841/">CVE-2022-49841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49841">CVE-2022-49841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49842/">CVE-2022-49842 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49842">CVE-2022-49842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49845/">CVE-2022-49845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49845">CVE-2022-49845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49846/">CVE-2022-49846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49846">CVE-2022-49846 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49850/">CVE-2022-49850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49850">CVE-2022-49850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49853/">CVE-2022-49853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49853">CVE-2022-49853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49858/">CVE-2022-49858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49858">CVE-2022-49858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49860/">CVE-2022-49860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49860">CVE-2022-49860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49861/">CVE-2022-49861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49861">CVE-2022-49861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49863/">CVE-2022-49863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49863">CVE-2022-49863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49864/">CVE-2022-49864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49864">CVE-2022-49864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49865/">CVE-2022-49865 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49865">CVE-2022-49865 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-49868/">CVE-2022-49868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49868">CVE-2022-49868 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49869/">CVE-2022-49869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49869">CVE-2022-49869 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-49870/">CVE-2022-49870 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49870">CVE-2022-49870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49871/">CVE-2022-49871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49871">CVE-2022-49871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49874/">CVE-2022-49874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49874">CVE-2022-49874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49879/">CVE-2022-49879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49879">CVE-2022-49879 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49880/">CVE-2022-49880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49880">CVE-2022-49880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49881/">CVE-2022-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49881">CVE-2022-49881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49885/">CVE-2022-49885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49885">CVE-2022-49885 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49887/">CVE-2022-49887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49887">CVE-2022-49887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49888/">CVE-2022-49888 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49888">CVE-2022-49888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49889/">CVE-2022-49889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49889">CVE-2022-49889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49890/">CVE-2022-49890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49890">CVE-2022-49890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49891/">CVE-2022-49891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49891">CVE-2022-49891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49892/">CVE-2022-49892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49892">CVE-2022-49892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49900/">CVE-2022-49900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49900">CVE-2022-49900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49905/">CVE-2022-49905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49905">CVE-2022-49905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49906/">CVE-2022-49906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49906">CVE-2022-49906 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49908/">CVE-2022-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49908">CVE-2022-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49909/">CVE-2022-49909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49909">CVE-2022-49909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49910/">CVE-2022-49910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49910">CVE-2022-49910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49915/">CVE-2022-49915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49915">CVE-2022-49915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49916/">CVE-2022-49916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49916">CVE-2022-49916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49922/">CVE-2022-49922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49922">CVE-2022-49922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49923/">CVE-2022-49923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49923">CVE-2022-49923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49924/">CVE-2022-49924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49924">CVE-2022-49924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49925/">CVE-2022-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49925">CVE-2022-49925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49927/">CVE-2022-49927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49927">CVE-2022-49927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49928/">CVE-2022-49928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49928">CVE-2022-49928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49931/">CVE-2022-49931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49931">CVE-2022-49931 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1990/">CVE-2023-1990 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53035/">CVE-2023-53035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53035">CVE-2023-53035 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53038/">CVE-2023-53038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53038">CVE-2023-53038 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53039/">CVE-2023-53039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53039">CVE-2023-53039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53040/">CVE-2023-53040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53040">CVE-2023-53040 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53041/">CVE-2023-53041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53041">CVE-2023-53041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53044/">CVE-2023-53044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53044">CVE-2023-53044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53045/">CVE-2023-53045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53045">CVE-2023-53045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53049/">CVE-2023-53049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53049">CVE-2023-53049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53051/">CVE-2023-53051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53051">CVE-2023-53051 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53052/">CVE-2023-53052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53052">CVE-2023-53052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53054/">CVE-2023-53054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53054">CVE-2023-53054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53056/">CVE-2023-53056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53056">CVE-2023-53056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53058/">CVE-2023-53058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53058">CVE-2023-53058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53059/">CVE-2023-53059 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53059">CVE-2023-53059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53060/">CVE-2023-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53060">CVE-2023-53060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53062/">CVE-2023-53062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53062">CVE-2023-53062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53064/">CVE-2023-53064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53064">CVE-2023-53064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53065/">CVE-2023-53065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53065">CVE-2023-53065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53066/">CVE-2023-53066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53066">CVE-2023-53066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53068/">CVE-2023-53068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53068">CVE-2023-53068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53075/">CVE-2023-53075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53075">CVE-2023-53075 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53077/">CVE-2023-53077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53077">CVE-2023-53077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53078/">CVE-2023-53078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53078">CVE-2023-53078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53079/">CVE-2023-53079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53079">CVE-2023-53079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53081/">CVE-2023-53081 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53081">CVE-2023-53081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53084/">CVE-2023-53084 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53084">CVE-2023-53084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53087/">CVE-2023-53087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53087">CVE-2023-53087 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53089/">CVE-2023-53089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53089">CVE-2023-53089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53090/">CVE-2023-53090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53090">CVE-2023-53090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53091/">CVE-2023-53091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53091">CVE-2023-53091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53092/">CVE-2023-53092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53092">CVE-2023-53092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53093/">CVE-2023-53093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53093">CVE-2023-53093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53096/">CVE-2023-53096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53096">CVE-2023-53096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53098/">CVE-2023-53098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53098">CVE-2023-53098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53099/">CVE-2023-53099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53099">CVE-2023-53099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53100/">CVE-2023-53100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53100">CVE-2023-53100 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53101/">CVE-2023-53101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53101">CVE-2023-53101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53106/">CVE-2023-53106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53106">CVE-2023-53106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53108/">CVE-2023-53108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53108">CVE-2023-53108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53111/">CVE-2023-53111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53111">CVE-2023-53111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53114/">CVE-2023-53114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53114">CVE-2023-53114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53116/">CVE-2023-53116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53116">CVE-2023-53116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53118/">CVE-2023-53118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53118">CVE-2023-53118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53119/">CVE-2023-53119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53119">CVE-2023-53119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53123/">CVE-2023-53123 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53123">CVE-2023-53123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53124/">CVE-2023-53124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53124">CVE-2023-53124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53125/">CVE-2023-53125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53125">CVE-2023-53125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53131/">CVE-2023-53131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53131">CVE-2023-53131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53134/">CVE-2023-53134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53134">CVE-2023-53134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53137/">CVE-2023-53137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53137">CVE-2023-53137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53139/">CVE-2023-53139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53139">CVE-2023-53139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53140/">CVE-2023-53140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53140">CVE-2023-53140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53142/">CVE-2023-53142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53142">CVE-2023-53142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53143/">CVE-2023-53143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53143">CVE-2023-53143 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53145/">CVE-2023-53145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53145">CVE-2023-53145 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53168/">CVE-2024-53168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53168">CVE-2024-53168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56558/">CVE-2024-56558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56558">CVE-2024-56558 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21888/">CVE-2025-21888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21888">CVE-2025-21888 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21999/">CVE-2025-21999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21999">CVE-2025-21999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22056/">CVE-2025-22056 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22056">CVE-2025-22056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22060/">CVE-2025-22060 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22060">CVE-2025-22060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23138/">CVE-2025-23138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23138">CVE-2025-23138 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23145/">CVE-2025-23145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23145">CVE-2025-23145 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37785/">CVE-2025-37785 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37785">CVE-2025-37785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37789/">CVE-2025-37789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37789">CVE-2025-37789 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37948/">CVE-2025-37948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37948">CVE-2025-37948 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37963/">CVE-2025-37963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37963">CVE-2025-37963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988212" comment="kernel-rt-5.14.21-150400.15.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988213" comment="kernel-source-rt-5.14.21-150400.15.121.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206312" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1244039" ref_url="https://bugzilla.suse.com/1244039" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-47081" ref_url="https://www.suse.com/security/cve/CVE-2024-47081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:01998-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040362.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2024-47081: fixed netrc credential leak (bsc#1244039).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-18"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1244039">SUSE bug 1244039</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47081/">CVE-2024-47081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47081">CVE-2024-47081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987055" comment="python3-requests-2.25.1-150300.3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206313" version="1" class="patch">
	<metadata>
		<title>Security update for pam_u2f (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1233517" ref_url="https://bugzilla.suse.com/1233517" source="BUGZILLA"/>
		<reference ref_id="1235961" ref_url="https://bugzilla.suse.com/1235961" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-23013" ref_url="https://www.suse.com/security/cve/CVE-2025-23013/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020186.html" source="SUSE-SU"/>
		<description>
This update for pam_u2f fixes the following issues:

- CVE-2025-23013: Fixed problematic PAM_IGNORE return values in `pam_sm_authenticate()` (bsc#1233517)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233517">SUSE bug 1233517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235961">SUSE bug 1235961</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-23013/">CVE-2025-23013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23013">CVE-2025-23013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961041" comment="pam_u2f-1.2.0-150400.4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206314" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243226" ref_url="https://bugzilla.suse.com/1243226" source="BUGZILLA"/>
		<reference ref_id="1244509" ref_url="https://bugzilla.suse.com/1244509" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-6018" ref_url="https://www.suse.com/security/cve/CVE-2025-6018/" source="CVE"/>
		<reference ref_id="CVE-2025-6020" ref_url="https://www.suse.com/security/cve/CVE-2025-6020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02013-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040370.html" source="SUSE-SU"/>
		<description>
This update for pam fixes the following issues:

- CVE-2025-6018: pam_env: Change the default to not read the user .pam_environment file (bsc#1243226).
- CVE-2025-6020: pam_namespace: convert functions that may operate on a user-controlled path to operate on file descriptors instead of absolute path (bsc#1244509).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-18"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1243226">SUSE bug 1243226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244509">SUSE bug 1244509</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6018/">CVE-2025-6018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6018">CVE-2025-6018 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6020/">CVE-2025-6020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6020">CVE-2025-6020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988178" comment="pam-1.3.0-150000.6.83.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206315" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1242269" ref_url="https://bugzilla.suse.com/1242269" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-46802" ref_url="https://www.suse.com/security/cve/CVE-2025-46802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02016-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040374.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

Security issues fixed:
    
- CVE-2025-46802: temporary `chmod` of a user's TTY to mode 0666 when attempting to attach to a multi-user session
  allows for TTY hijacking (bsc#1242269).

Other issues fixed:

- Use TTY file descriptor passing after a suspend (`MSG_CONT`).
- Fix resume after suspend in multi-user mode.
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-19"/>
	<updated date="2025-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1242269">SUSE bug 1242269</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46802/">CVE-2025-46802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46802">CVE-2025-46802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988214" comment="screen-4.6.2-150000.5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206316" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1244079" ref_url="https://bugzilla.suse.com/1244079" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-40909" ref_url="https://www.suse.com/security/cve/CVE-2025-40909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02027-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040380.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2025-40909: Do not change the current directory when cloning an open directory handle (bsc#1244079).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-19"/>
	<updated date="2025-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1244079">SUSE bug 1244079</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-40909/">CVE-2025-40909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40909">CVE-2025-40909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988186" comment="perl-5.26.1-150300.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988187" comment="perl-base-5.26.1-150300.17.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206317" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1170891" ref_url="https://bugzilla.suse.com/1170891" source="BUGZILLA"/>
		<reference ref_id="1173139" ref_url="https://bugzilla.suse.com/1173139" source="BUGZILLA"/>
		<reference ref_id="1185010" ref_url="https://bugzilla.suse.com/1185010" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190428" ref_url="https://bugzilla.suse.com/1190428" source="BUGZILLA"/>
		<reference ref_id="1209798" ref_url="https://bugzilla.suse.com/1209798" source="BUGZILLA"/>
		<reference ref_id="1215304" ref_url="https://bugzilla.suse.com/1215304" source="BUGZILLA"/>
		<reference ref_id="1222878" ref_url="https://bugzilla.suse.com/1222878" source="BUGZILLA"/>
		<reference ref_id="1228466" ref_url="https://bugzilla.suse.com/1228466" source="BUGZILLA"/>
		<reference ref_id="1230697" ref_url="https://bugzilla.suse.com/1230697" source="BUGZILLA"/>
		<reference ref_id="1232436" ref_url="https://bugzilla.suse.com/1232436" source="BUGZILLA"/>
		<reference ref_id="1233070" ref_url="https://bugzilla.suse.com/1233070" source="BUGZILLA"/>
		<reference ref_id="1233642" ref_url="https://bugzilla.suse.com/1233642" source="BUGZILLA"/>
		<reference ref_id="1234281" ref_url="https://bugzilla.suse.com/1234281" source="BUGZILLA"/>
		<reference ref_id="1234282" ref_url="https://bugzilla.suse.com/1234282" source="BUGZILLA"/>
		<reference ref_id="1234846" ref_url="https://bugzilla.suse.com/1234846" source="BUGZILLA"/>
		<reference ref_id="1234853" ref_url="https://bugzilla.suse.com/1234853" source="BUGZILLA"/>
		<reference ref_id="1234891" ref_url="https://bugzilla.suse.com/1234891" source="BUGZILLA"/>
		<reference ref_id="1234921" ref_url="https://bugzilla.suse.com/1234921" source="BUGZILLA"/>
		<reference ref_id="1234960" ref_url="https://bugzilla.suse.com/1234960" source="BUGZILLA"/>
		<reference ref_id="1234963" ref_url="https://bugzilla.suse.com/1234963" source="BUGZILLA"/>
		<reference ref_id="1235004" ref_url="https://bugzilla.suse.com/1235004" source="BUGZILLA"/>
		<reference ref_id="1235035" ref_url="https://bugzilla.suse.com/1235035" source="BUGZILLA"/>
		<reference ref_id="1235054" ref_url="https://bugzilla.suse.com/1235054" source="BUGZILLA"/>
		<reference ref_id="1235056" ref_url="https://bugzilla.suse.com/1235056" source="BUGZILLA"/>
		<reference ref_id="1235061" ref_url="https://bugzilla.suse.com/1235061" source="BUGZILLA"/>
		<reference ref_id="1235073" ref_url="https://bugzilla.suse.com/1235073" source="BUGZILLA"/>
		<reference ref_id="1235220" ref_url="https://bugzilla.suse.com/1235220" source="BUGZILLA"/>
		<reference ref_id="1235224" ref_url="https://bugzilla.suse.com/1235224" source="BUGZILLA"/>
		<reference ref_id="1235246" ref_url="https://bugzilla.suse.com/1235246" source="BUGZILLA"/>
		<reference ref_id="1235507" ref_url="https://bugzilla.suse.com/1235507" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47202" ref_url="https://www.suse.com/security/cve/CVE-2021-47202/" source="CVE"/>
		<reference ref_id="CVE-2022-49035" ref_url="https://www.suse.com/security/cve/CVE-2022-49035/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154/" source="CVE"/>
		<reference ref_id="CVE-2024-53095" ref_url="https://www.suse.com/security/cve/CVE-2024-53095/" source="CVE"/>
		<reference ref_id="CVE-2024-53142" ref_url="https://www.suse.com/security/cve/CVE-2024-53142/" source="CVE"/>
		<reference ref_id="CVE-2024-53146" ref_url="https://www.suse.com/security/cve/CVE-2024-53146/" source="CVE"/>
		<reference ref_id="CVE-2024-53156" ref_url="https://www.suse.com/security/cve/CVE-2024-53156/" source="CVE"/>
		<reference ref_id="CVE-2024-53173" ref_url="https://www.suse.com/security/cve/CVE-2024-53173/" source="CVE"/>
		<reference ref_id="CVE-2024-53179" ref_url="https://www.suse.com/security/cve/CVE-2024-53179/" source="CVE"/>
		<reference ref_id="CVE-2024-53206" ref_url="https://www.suse.com/security/cve/CVE-2024-53206/" source="CVE"/>
		<reference ref_id="CVE-2024-53214" ref_url="https://www.suse.com/security/cve/CVE-2024-53214/" source="CVE"/>
		<reference ref_id="CVE-2024-53239" ref_url="https://www.suse.com/security/cve/CVE-2024-53239/" source="CVE"/>
		<reference ref_id="CVE-2024-53240" ref_url="https://www.suse.com/security/cve/CVE-2024-53240/" source="CVE"/>
		<reference ref_id="CVE-2024-53241" ref_url="https://www.suse.com/security/cve/CVE-2024-53241/" source="CVE"/>
		<reference ref_id="CVE-2024-56539" ref_url="https://www.suse.com/security/cve/CVE-2024-56539/" source="CVE"/>
		<reference ref_id="CVE-2024-56548" ref_url="https://www.suse.com/security/cve/CVE-2024-56548/" source="CVE"/>
		<reference ref_id="CVE-2024-56570" ref_url="https://www.suse.com/security/cve/CVE-2024-56570/" source="CVE"/>
		<reference ref_id="CVE-2024-56598" ref_url="https://www.suse.com/security/cve/CVE-2024-56598/" source="CVE"/>
		<reference ref_id="CVE-2024-56604" ref_url="https://www.suse.com/security/cve/CVE-2024-56604/" source="CVE"/>
		<reference ref_id="CVE-2024-56605" ref_url="https://www.suse.com/security/cve/CVE-2024-56605/" source="CVE"/>
		<reference ref_id="CVE-2024-56619" ref_url="https://www.suse.com/security/cve/CVE-2024-56619/" source="CVE"/>
		<reference ref_id="CVE-2024-8805" ref_url="https://www.suse.com/security/cve/CVE-2024-8805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-41087: Fix double free on error (bsc#1228466).
- CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642).
- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).
- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).
- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).
- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).
- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).
- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
- CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282).
- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).
- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).
- CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).
- CVE-2024-56598: jfs: array-index-out-of-bounds fix in dtReadFirst (bsc#1235220).
- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).
- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).
- CVE-2024-56619: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (bsc#1235224).
- CVE-2024-8805: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (bsc#1230697).

The following non-security bugs were fixed:

- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139)
- KVM: x86: fix sending PV IPI (git-fixes).
- fixup 'rpm: support gz and zst compression methods' once more (bsc#1190428, bsc#1190358)
- idpf: add support for SW triggered interrupts (bsc#1235507).
- idpf: enable WB_ON_ITR (bsc#1235507).
- idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).
- kernel-binary: do not BuildIgnore m4. It is actually needed for regenerating zconf when it is not up-to-date due to merge.
- net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).
- rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to take over grep -c option that broke the conditional expression
- scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).
- smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: this fixes issue discussed in bsc#1233642].
- supported.conf: add bsc1185010 dependency
- supported.conf: hyperv_drm (jsc#sle-19733)
- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).
- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- x86: Annotate call_on_stack() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-21"/>
	<updated date="2025-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170891">SUSE bug 1170891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173139">SUSE bug 1173139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185010">SUSE bug 1185010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190428">SUSE bug 1190428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209798">SUSE bug 1209798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215304">SUSE bug 1215304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222878">SUSE bug 1222878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228466">SUSE bug 1228466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230697">SUSE bug 1230697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232436">SUSE bug 1232436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233070">SUSE bug 1233070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233642">SUSE bug 1233642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234281">SUSE bug 1234281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234282">SUSE bug 1234282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234846">SUSE bug 1234846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234853">SUSE bug 1234853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234891">SUSE bug 1234891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234921">SUSE bug 1234921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234960">SUSE bug 1234960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234963">SUSE bug 1234963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235004">SUSE bug 1235004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235035">SUSE bug 1235035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235054">SUSE bug 1235054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235056">SUSE bug 1235056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235061">SUSE bug 1235061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235073">SUSE bug 1235073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235220">SUSE bug 1235220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235224">SUSE bug 1235224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235246">SUSE bug 1235246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235507">SUSE bug 1235507</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47202/">CVE-2021-47202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47202">CVE-2021-47202 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49035/">CVE-2022-49035 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49035">CVE-2022-49035 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53095/">CVE-2024-53095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53095">CVE-2024-53095 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-53142/">CVE-2024-53142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53142">CVE-2024-53142 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53146/">CVE-2024-53146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53146">CVE-2024-53146 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53156/">CVE-2024-53156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53156">CVE-2024-53156 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53173/">CVE-2024-53173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53179/">CVE-2024-53179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53179">CVE-2024-53179 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53206/">CVE-2024-53206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53206">CVE-2024-53206 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53214/">CVE-2024-53214 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53214">CVE-2024-53214 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53239/">CVE-2024-53239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53239">CVE-2024-53239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53240/">CVE-2024-53240 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53241/">CVE-2024-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56539/">CVE-2024-56539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56539">CVE-2024-56539 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56548/">CVE-2024-56548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56548">CVE-2024-56548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56570/">CVE-2024-56570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56570">CVE-2024-56570 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56598/">CVE-2024-56598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56604/">CVE-2024-56604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56605/">CVE-2024-56605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56619/">CVE-2024-56619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8805/">CVE-2024-8805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8805">CVE-2024-8805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961042" comment="kernel-default-5.14.21-150400.24.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960907" comment="kernel-default-base-5.14.21-150400.24.147.1.150400.24.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206318" version="1" class="patch">
	<metadata>
		<title>Security update for pam_pkcs11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243226" ref_url="https://bugzilla.suse.com/1243226" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-6018" ref_url="https://www.suse.com/security/cve/CVE-2025-6018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040388.html" source="SUSE-SU"/>
		<description>
This update for pam_pkcs11 fixes the following issues:

- CVE-2025-6018: Removes pam_env from auth stack for security reason (bsc#1243226).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-20"/>
	<updated date="2025-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1243226">SUSE bug 1243226</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6018/">CVE-2025-6018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6018">CVE-2025-6018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988188" comment="pam_pkcs11-0.6.10-150100.3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206319" version="1" class="patch">
	<metadata>
		<title>Security update for ignition (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1239192" ref_url="https://bugzilla.suse.com/1239192" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040405.html" source="SUSE-SU"/>
		<description>
This update for ignition fixes the following issues:

- CVE-2025-22868: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239192).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-20"/>
	<updated date="2025-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1239192">SUSE bug 1239192</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988230" comment="ignition-2.15.0-150400.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988231" comment="ignition-dracut-grub2-2.15.0-150400.4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206320" version="1" class="patch">
	<metadata>
		<title>Security update for libblockdev (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243285" ref_url="https://bugzilla.suse.com/1243285" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-6019" ref_url="https://www.suse.com/security/cve/CVE-2025-6019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040402.html" source="SUSE-SU"/>
		<description>
This update for libblockdev fixes the following issues:

- CVE-2025-6019: Suppress privilege escalation during xfs fs resize (bsc#1243285).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-20"/>
	<updated date="2025-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1243285">SUSE bug 1243285</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6019/">CVE-2025-6019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6019">CVE-2025-6019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988215" comment="libbd_btrfs2-2.26-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988216" comment="libbd_crypto2-2.26-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988217" comment="libbd_fs2-2.26-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988218" comment="libbd_loop2-2.26-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988219" comment="libbd_lvm2-2.26-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988220" comment="libbd_mdraid2-2.26-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988221" comment="libbd_part2-2.26-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988222" comment="libbd_swap2-2.26-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988223" comment="libbd_utils2-2.26-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988224" comment="libblockdev-2.26-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988225" comment="libblockdev2-2.26-150400.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206321" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1161007" ref_url="https://bugzilla.suse.com/1161007" source="BUGZILLA"/>
		<reference ref_id="1167603" ref_url="https://bugzilla.suse.com/1167603" source="BUGZILLA"/>
		<reference ref_id="1193951" ref_url="https://bugzilla.suse.com/1193951" source="BUGZILLA"/>
		<reference ref_id="1243721" ref_url="https://bugzilla.suse.com/1243721" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21913" ref_url="https://www.suse.com/security/cve/CVE-2020-21913/" source="CVE"/>
		<reference ref_id="CVE-2025-5222" ref_url="https://www.suse.com/security/cve/CVE-2025-5222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040452.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2025-5222: Stack buffer overflow in the SRBRoot:addTag function (bsc#1243721).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-24"/>
	<updated date="2025-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161007">SUSE bug 1161007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167603">SUSE bug 1167603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193951">SUSE bug 1193951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243721">SUSE bug 1243721</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21913/">CVE-2020-21913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21913">CVE-2020-21913 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-5222/">CVE-2025-5222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5222">CVE-2025-5222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988194" comment="libicu-suse65_1-65.1-150200.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987600" comment="libicu65_1-bedata-65.1-150200.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987601" comment="libicu65_1-ledata-65.1-150200.4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206322" version="1" class="patch">
	<metadata>
		<title>Security update for pam-config (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243226" ref_url="https://bugzilla.suse.com/1243226" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-6018" ref_url="https://www.suse.com/security/cve/CVE-2025-6018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040449.html" source="SUSE-SU"/>
		<description>
This update for pam-config fixes the following issues:

- CVE-2025-6018: Stop adding pam_env in AUTH stack, and be sure to put this module at the really end of the SESSION stack (bsc#1243226).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-24"/>
	<updated date="2025-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1243226">SUSE bug 1243226</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6018/">CVE-2025-6018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6018">CVE-2025-6018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988195" comment="pam-config-1.1-150200.3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206323" version="1" class="patch">
	<metadata>
		<title>Recommended update for podman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1239776" ref_url="https://bugzilla.suse.com/1239776" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="SUSE-RU-2025:02091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040458.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- Added patch to remove using rw as a default mount option (bsc#1239776)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-24"/>
	<updated date="2025-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1239776">SUSE bug 1239776</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009988228" comment="podman-4.9.5-150400.4.47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009988229" comment="podman-remote-4.9.5-150400.4.47.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206324" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1245274" ref_url="https://bugzilla.suse.com/1245274" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-32462" ref_url="https://www.suse.com/security/cve/CVE-2025-32462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040567.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2025-32462: Fixed a possible local privilege escalation via the --host option (bsc#1245274).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-06-30"/>
	<updated date="2025-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1245274">SUSE bug 1245274</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32462/">CVE-2025-32462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32462">CVE-2025-32462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997415" comment="sudo-1.9.9-150400.4.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206325" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230092" ref_url="https://bugzilla.suse.com/1230092" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45310" ref_url="https://www.suse.com/security/cve/CVE-2024-45310/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040584.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:
  
- CVE-2024-45310: Fixed unintentional creation of empty files/directories on host (bsc#1230092)

Other fixes:

- Update to runc v1.2.6.
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-02"/>
	<updated date="2025-07-02"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1230092">SUSE bug 1230092</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45310/">CVE-2024-45310 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998138" comment="runc-1.2.6-150000.73.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206326" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1228776" ref_url="https://bugzilla.suse.com/1228776" source="BUGZILLA"/>
		<reference ref_id="1239602" ref_url="https://bugzilla.suse.com/1239602" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-41965" ref_url="https://www.suse.com/security/cve/CVE-2024-41965/" source="CVE"/>
		<reference ref_id="CVE-2025-29768" ref_url="https://www.suse.com/security/cve/CVE-2025-29768/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040612.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2024-41965: Fixed improper neutralization of argument delimiters in zip.vim that could have led to data loss (bsc#1228776).
- CVE-2025-29768: Fixed double-free in dialog_changed() (bsc#1239602).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-04"/>
	<updated date="2025-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228776">SUSE bug 1228776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239602">SUSE bug 1239602</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41965/">CVE-2024-41965 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41965">CVE-2024-41965 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-29768/">CVE-2025-29768 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-29768">CVE-2025-29768 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998960" comment="vim-data-common-9.1.1406-150000.5.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998991" comment="vim-small-9.1.1406-150000.5.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998992" comment="xxd-9.1.1406-150000.5.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206327" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1204569" ref_url="https://bugzilla.suse.com/1204569" source="BUGZILLA"/>
		<reference ref_id="1204619" ref_url="https://bugzilla.suse.com/1204619" source="BUGZILLA"/>
		<reference ref_id="1204705" ref_url="https://bugzilla.suse.com/1204705" source="BUGZILLA"/>
		<reference ref_id="1205282" ref_url="https://bugzilla.suse.com/1205282" source="BUGZILLA"/>
		<reference ref_id="1206051" ref_url="https://bugzilla.suse.com/1206051" source="BUGZILLA"/>
		<reference ref_id="1206073" ref_url="https://bugzilla.suse.com/1206073" source="BUGZILLA"/>
		<reference ref_id="1206649" ref_url="https://bugzilla.suse.com/1206649" source="BUGZILLA"/>
		<reference ref_id="1206886" ref_url="https://bugzilla.suse.com/1206886" source="BUGZILLA"/>
		<reference ref_id="1206887" ref_url="https://bugzilla.suse.com/1206887" source="BUGZILLA"/>
		<reference ref_id="1208542" ref_url="https://bugzilla.suse.com/1208542" source="BUGZILLA"/>
		<reference ref_id="1209292" ref_url="https://bugzilla.suse.com/1209292" source="BUGZILLA"/>
		<reference ref_id="1209556" ref_url="https://bugzilla.suse.com/1209556" source="BUGZILLA"/>
		<reference ref_id="1209684" ref_url="https://bugzilla.suse.com/1209684" source="BUGZILLA"/>
		<reference ref_id="1210337" ref_url="https://bugzilla.suse.com/1210337" source="BUGZILLA"/>
		<reference ref_id="1210763" ref_url="https://bugzilla.suse.com/1210763" source="BUGZILLA"/>
		<reference ref_id="1210767" ref_url="https://bugzilla.suse.com/1210767" source="BUGZILLA"/>
		<reference ref_id="1211465" ref_url="https://bugzilla.suse.com/1211465" source="BUGZILLA"/>
		<reference ref_id="1213012" ref_url="https://bugzilla.suse.com/1213012" source="BUGZILLA"/>
		<reference ref_id="1213013" ref_url="https://bugzilla.suse.com/1213013" source="BUGZILLA"/>
		<reference ref_id="1213094" ref_url="https://bugzilla.suse.com/1213094" source="BUGZILLA"/>
		<reference ref_id="1213096" ref_url="https://bugzilla.suse.com/1213096" source="BUGZILLA"/>
		<reference ref_id="1213946" ref_url="https://bugzilla.suse.com/1213946" source="BUGZILLA"/>
		<reference ref_id="1214991" ref_url="https://bugzilla.suse.com/1214991" source="BUGZILLA"/>
		<reference ref_id="1218470" ref_url="https://bugzilla.suse.com/1218470" source="BUGZILLA"/>
		<reference ref_id="1232649" ref_url="https://bugzilla.suse.com/1232649" source="BUGZILLA"/>
		<reference ref_id="1234887" ref_url="https://bugzilla.suse.com/1234887" source="BUGZILLA"/>
		<reference ref_id="1235100" ref_url="https://bugzilla.suse.com/1235100" source="BUGZILLA"/>
		<reference ref_id="1237981" ref_url="https://bugzilla.suse.com/1237981" source="BUGZILLA"/>
		<reference ref_id="1238032" ref_url="https://bugzilla.suse.com/1238032" source="BUGZILLA"/>
		<reference ref_id="1240177" ref_url="https://bugzilla.suse.com/1240177" source="BUGZILLA"/>
		<reference ref_id="1240802" ref_url="https://bugzilla.suse.com/1240802" source="BUGZILLA"/>
		<reference ref_id="1241525" ref_url="https://bugzilla.suse.com/1241525" source="BUGZILLA"/>
		<reference ref_id="1241526" ref_url="https://bugzilla.suse.com/1241526" source="BUGZILLA"/>
		<reference ref_id="1241640" ref_url="https://bugzilla.suse.com/1241640" source="BUGZILLA"/>
		<reference ref_id="1241648" ref_url="https://bugzilla.suse.com/1241648" source="BUGZILLA"/>
		<reference ref_id="1242147" ref_url="https://bugzilla.suse.com/1242147" source="BUGZILLA"/>
		<reference ref_id="1242150" ref_url="https://bugzilla.suse.com/1242150" source="BUGZILLA"/>
		<reference ref_id="1242151" ref_url="https://bugzilla.suse.com/1242151" source="BUGZILLA"/>
		<reference ref_id="1242154" ref_url="https://bugzilla.suse.com/1242154" source="BUGZILLA"/>
		<reference ref_id="1242157" ref_url="https://bugzilla.suse.com/1242157" source="BUGZILLA"/>
		<reference ref_id="1242158" ref_url="https://bugzilla.suse.com/1242158" source="BUGZILLA"/>
		<reference ref_id="1242164" ref_url="https://bugzilla.suse.com/1242164" source="BUGZILLA"/>
		<reference ref_id="1242165" ref_url="https://bugzilla.suse.com/1242165" source="BUGZILLA"/>
		<reference ref_id="1242169" ref_url="https://bugzilla.suse.com/1242169" source="BUGZILLA"/>
		<reference ref_id="1242215" ref_url="https://bugzilla.suse.com/1242215" source="BUGZILLA"/>
		<reference ref_id="1242218" ref_url="https://bugzilla.suse.com/1242218" source="BUGZILLA"/>
		<reference ref_id="1242219" ref_url="https://bugzilla.suse.com/1242219" source="BUGZILLA"/>
		<reference ref_id="1242222" ref_url="https://bugzilla.suse.com/1242222" source="BUGZILLA"/>
		<reference ref_id="1242226" ref_url="https://bugzilla.suse.com/1242226" source="BUGZILLA"/>
		<reference ref_id="1242227" ref_url="https://bugzilla.suse.com/1242227" source="BUGZILLA"/>
		<reference ref_id="1242228" ref_url="https://bugzilla.suse.com/1242228" source="BUGZILLA"/>
		<reference ref_id="1242229" ref_url="https://bugzilla.suse.com/1242229" source="BUGZILLA"/>
		<reference ref_id="1242230" ref_url="https://bugzilla.suse.com/1242230" source="BUGZILLA"/>
		<reference ref_id="1242231" ref_url="https://bugzilla.suse.com/1242231" source="BUGZILLA"/>
		<reference ref_id="1242232" ref_url="https://bugzilla.suse.com/1242232" source="BUGZILLA"/>
		<reference ref_id="1242237" ref_url="https://bugzilla.suse.com/1242237" source="BUGZILLA"/>
		<reference ref_id="1242239" ref_url="https://bugzilla.suse.com/1242239" source="BUGZILLA"/>
		<reference ref_id="1242241" ref_url="https://bugzilla.suse.com/1242241" source="BUGZILLA"/>
		<reference ref_id="1242244" ref_url="https://bugzilla.suse.com/1242244" source="BUGZILLA"/>
		<reference ref_id="1242245" ref_url="https://bugzilla.suse.com/1242245" source="BUGZILLA"/>
		<reference ref_id="1242248" ref_url="https://bugzilla.suse.com/1242248" source="BUGZILLA"/>
		<reference ref_id="1242261" ref_url="https://bugzilla.suse.com/1242261" source="BUGZILLA"/>
		<reference ref_id="1242264" ref_url="https://bugzilla.suse.com/1242264" source="BUGZILLA"/>
		<reference ref_id="1242265" ref_url="https://bugzilla.suse.com/1242265" source="BUGZILLA"/>
		<reference ref_id="1242270" ref_url="https://bugzilla.suse.com/1242270" source="BUGZILLA"/>
		<reference ref_id="1242276" ref_url="https://bugzilla.suse.com/1242276" source="BUGZILLA"/>
		<reference ref_id="1242279" ref_url="https://bugzilla.suse.com/1242279" source="BUGZILLA"/>
		<reference ref_id="1242280" ref_url="https://bugzilla.suse.com/1242280" source="BUGZILLA"/>
		<reference ref_id="1242281" ref_url="https://bugzilla.suse.com/1242281" source="BUGZILLA"/>
		<reference ref_id="1242282" ref_url="https://bugzilla.suse.com/1242282" source="BUGZILLA"/>
		<reference ref_id="1242284" ref_url="https://bugzilla.suse.com/1242284" source="BUGZILLA"/>
		<reference ref_id="1242285" ref_url="https://bugzilla.suse.com/1242285" source="BUGZILLA"/>
		<reference ref_id="1242289" ref_url="https://bugzilla.suse.com/1242289" source="BUGZILLA"/>
		<reference ref_id="1242294" ref_url="https://bugzilla.suse.com/1242294" source="BUGZILLA"/>
		<reference ref_id="1242305" ref_url="https://bugzilla.suse.com/1242305" source="BUGZILLA"/>
		<reference ref_id="1242312" ref_url="https://bugzilla.suse.com/1242312" source="BUGZILLA"/>
		<reference ref_id="1242320" ref_url="https://bugzilla.suse.com/1242320" source="BUGZILLA"/>
		<reference ref_id="1242338" ref_url="https://bugzilla.suse.com/1242338" source="BUGZILLA"/>
		<reference ref_id="1242352" ref_url="https://bugzilla.suse.com/1242352" source="BUGZILLA"/>
		<reference ref_id="1242353" ref_url="https://bugzilla.suse.com/1242353" source="BUGZILLA"/>
		<reference ref_id="1242355" ref_url="https://bugzilla.suse.com/1242355" source="BUGZILLA"/>
		<reference ref_id="1242357" ref_url="https://bugzilla.suse.com/1242357" source="BUGZILLA"/>
		<reference ref_id="1242358" ref_url="https://bugzilla.suse.com/1242358" source="BUGZILLA"/>
		<reference ref_id="1242361" ref_url="https://bugzilla.suse.com/1242361" source="BUGZILLA"/>
		<reference ref_id="1242365" ref_url="https://bugzilla.suse.com/1242365" source="BUGZILLA"/>
		<reference ref_id="1242366" ref_url="https://bugzilla.suse.com/1242366" source="BUGZILLA"/>
		<reference ref_id="1242369" ref_url="https://bugzilla.suse.com/1242369" source="BUGZILLA"/>
		<reference ref_id="1242370" ref_url="https://bugzilla.suse.com/1242370" source="BUGZILLA"/>
		<reference ref_id="1242371" ref_url="https://bugzilla.suse.com/1242371" source="BUGZILLA"/>
		<reference ref_id="1242372" ref_url="https://bugzilla.suse.com/1242372" source="BUGZILLA"/>
		<reference ref_id="1242377" ref_url="https://bugzilla.suse.com/1242377" source="BUGZILLA"/>
		<reference ref_id="1242378" ref_url="https://bugzilla.suse.com/1242378" source="BUGZILLA"/>
		<reference ref_id="1242380" ref_url="https://bugzilla.suse.com/1242380" source="BUGZILLA"/>
		<reference ref_id="1242382" ref_url="https://bugzilla.suse.com/1242382" source="BUGZILLA"/>
		<reference ref_id="1242385" ref_url="https://bugzilla.suse.com/1242385" source="BUGZILLA"/>
		<reference ref_id="1242387" ref_url="https://bugzilla.suse.com/1242387" source="BUGZILLA"/>
		<reference ref_id="1242389" ref_url="https://bugzilla.suse.com/1242389" source="BUGZILLA"/>
		<reference ref_id="1242391" ref_url="https://bugzilla.suse.com/1242391" source="BUGZILLA"/>
		<reference ref_id="1242392" ref_url="https://bugzilla.suse.com/1242392" source="BUGZILLA"/>
		<reference ref_id="1242394" ref_url="https://bugzilla.suse.com/1242394" source="BUGZILLA"/>
		<reference ref_id="1242398" ref_url="https://bugzilla.suse.com/1242398" source="BUGZILLA"/>
		<reference ref_id="1242399" ref_url="https://bugzilla.suse.com/1242399" source="BUGZILLA"/>
		<reference ref_id="1242402" ref_url="https://bugzilla.suse.com/1242402" source="BUGZILLA"/>
		<reference ref_id="1242403" ref_url="https://bugzilla.suse.com/1242403" source="BUGZILLA"/>
		<reference ref_id="1242409" ref_url="https://bugzilla.suse.com/1242409" source="BUGZILLA"/>
		<reference ref_id="1242411" ref_url="https://bugzilla.suse.com/1242411" source="BUGZILLA"/>
		<reference ref_id="1242415" ref_url="https://bugzilla.suse.com/1242415" source="BUGZILLA"/>
		<reference ref_id="1242416" ref_url="https://bugzilla.suse.com/1242416" source="BUGZILLA"/>
		<reference ref_id="1242421" ref_url="https://bugzilla.suse.com/1242421" source="BUGZILLA"/>
		<reference ref_id="1242422" ref_url="https://bugzilla.suse.com/1242422" source="BUGZILLA"/>
		<reference ref_id="1242426" ref_url="https://bugzilla.suse.com/1242426" source="BUGZILLA"/>
		<reference ref_id="1242428" ref_url="https://bugzilla.suse.com/1242428" source="BUGZILLA"/>
		<reference ref_id="1242440" ref_url="https://bugzilla.suse.com/1242440" source="BUGZILLA"/>
		<reference ref_id="1242443" ref_url="https://bugzilla.suse.com/1242443" source="BUGZILLA"/>
		<reference ref_id="1242449" ref_url="https://bugzilla.suse.com/1242449" source="BUGZILLA"/>
		<reference ref_id="1242452" ref_url="https://bugzilla.suse.com/1242452" source="BUGZILLA"/>
		<reference ref_id="1242453" ref_url="https://bugzilla.suse.com/1242453" source="BUGZILLA"/>
		<reference ref_id="1242454" ref_url="https://bugzilla.suse.com/1242454" source="BUGZILLA"/>
		<reference ref_id="1242455" ref_url="https://bugzilla.suse.com/1242455" source="BUGZILLA"/>
		<reference ref_id="1242456" ref_url="https://bugzilla.suse.com/1242456" source="BUGZILLA"/>
		<reference ref_id="1242458" ref_url="https://bugzilla.suse.com/1242458" source="BUGZILLA"/>
		<reference ref_id="1242464" ref_url="https://bugzilla.suse.com/1242464" source="BUGZILLA"/>
		<reference ref_id="1242467" ref_url="https://bugzilla.suse.com/1242467" source="BUGZILLA"/>
		<reference ref_id="1242469" ref_url="https://bugzilla.suse.com/1242469" source="BUGZILLA"/>
		<reference ref_id="1242473" ref_url="https://bugzilla.suse.com/1242473" source="BUGZILLA"/>
		<reference ref_id="1242478" ref_url="https://bugzilla.suse.com/1242478" source="BUGZILLA"/>
		<reference ref_id="1242481" ref_url="https://bugzilla.suse.com/1242481" source="BUGZILLA"/>
		<reference ref_id="1242484" ref_url="https://bugzilla.suse.com/1242484" source="BUGZILLA"/>
		<reference ref_id="1242489" ref_url="https://bugzilla.suse.com/1242489" source="BUGZILLA"/>
		<reference ref_id="1242493" ref_url="https://bugzilla.suse.com/1242493" source="BUGZILLA"/>
		<reference ref_id="1242497" ref_url="https://bugzilla.suse.com/1242497" source="BUGZILLA"/>
		<reference ref_id="1242527" ref_url="https://bugzilla.suse.com/1242527" source="BUGZILLA"/>
		<reference ref_id="1242542" ref_url="https://bugzilla.suse.com/1242542" source="BUGZILLA"/>
		<reference ref_id="1242544" ref_url="https://bugzilla.suse.com/1242544" source="BUGZILLA"/>
		<reference ref_id="1242545" ref_url="https://bugzilla.suse.com/1242545" source="BUGZILLA"/>
		<reference ref_id="1242547" ref_url="https://bugzilla.suse.com/1242547" source="BUGZILLA"/>
		<reference ref_id="1242548" ref_url="https://bugzilla.suse.com/1242548" source="BUGZILLA"/>
		<reference ref_id="1242549" ref_url="https://bugzilla.suse.com/1242549" source="BUGZILLA"/>
		<reference ref_id="1242550" ref_url="https://bugzilla.suse.com/1242550" source="BUGZILLA"/>
		<reference ref_id="1242551" ref_url="https://bugzilla.suse.com/1242551" source="BUGZILLA"/>
		<reference ref_id="1242558" ref_url="https://bugzilla.suse.com/1242558" source="BUGZILLA"/>
		<reference ref_id="1242570" ref_url="https://bugzilla.suse.com/1242570" source="BUGZILLA"/>
		<reference ref_id="1242580" ref_url="https://bugzilla.suse.com/1242580" source="BUGZILLA"/>
		<reference ref_id="1242586" ref_url="https://bugzilla.suse.com/1242586" source="BUGZILLA"/>
		<reference ref_id="1242589" ref_url="https://bugzilla.suse.com/1242589" source="BUGZILLA"/>
		<reference ref_id="1242596" ref_url="https://bugzilla.suse.com/1242596" source="BUGZILLA"/>
		<reference ref_id="1242597" ref_url="https://bugzilla.suse.com/1242597" source="BUGZILLA"/>
		<reference ref_id="1242685" ref_url="https://bugzilla.suse.com/1242685" source="BUGZILLA"/>
		<reference ref_id="1242686" ref_url="https://bugzilla.suse.com/1242686" source="BUGZILLA"/>
		<reference ref_id="1242688" ref_url="https://bugzilla.suse.com/1242688" source="BUGZILLA"/>
		<reference ref_id="1242689" ref_url="https://bugzilla.suse.com/1242689" source="BUGZILLA"/>
		<reference ref_id="1242695" ref_url="https://bugzilla.suse.com/1242695" source="BUGZILLA"/>
		<reference ref_id="1242716" ref_url="https://bugzilla.suse.com/1242716" source="BUGZILLA"/>
		<reference ref_id="1242733" ref_url="https://bugzilla.suse.com/1242733" source="BUGZILLA"/>
		<reference ref_id="1242734" ref_url="https://bugzilla.suse.com/1242734" source="BUGZILLA"/>
		<reference ref_id="1242735" ref_url="https://bugzilla.suse.com/1242735" source="BUGZILLA"/>
		<reference ref_id="1242736" ref_url="https://bugzilla.suse.com/1242736" source="BUGZILLA"/>
		<reference ref_id="1242739" ref_url="https://bugzilla.suse.com/1242739" source="BUGZILLA"/>
		<reference ref_id="1242743" ref_url="https://bugzilla.suse.com/1242743" source="BUGZILLA"/>
		<reference ref_id="1242744" ref_url="https://bugzilla.suse.com/1242744" source="BUGZILLA"/>
		<reference ref_id="1242745" ref_url="https://bugzilla.suse.com/1242745" source="BUGZILLA"/>
		<reference ref_id="1242746" ref_url="https://bugzilla.suse.com/1242746" source="BUGZILLA"/>
		<reference ref_id="1242747" ref_url="https://bugzilla.suse.com/1242747" source="BUGZILLA"/>
		<reference ref_id="1242749" ref_url="https://bugzilla.suse.com/1242749" source="BUGZILLA"/>
		<reference ref_id="1242752" ref_url="https://bugzilla.suse.com/1242752" source="BUGZILLA"/>
		<reference ref_id="1242753" ref_url="https://bugzilla.suse.com/1242753" source="BUGZILLA"/>
		<reference ref_id="1242756" ref_url="https://bugzilla.suse.com/1242756" source="BUGZILLA"/>
		<reference ref_id="1242759" ref_url="https://bugzilla.suse.com/1242759" source="BUGZILLA"/>
		<reference ref_id="1242762" ref_url="https://bugzilla.suse.com/1242762" source="BUGZILLA"/>
		<reference ref_id="1242765" ref_url="https://bugzilla.suse.com/1242765" source="BUGZILLA"/>
		<reference ref_id="1242767" ref_url="https://bugzilla.suse.com/1242767" source="BUGZILLA"/>
		<reference ref_id="1242778" ref_url="https://bugzilla.suse.com/1242778" source="BUGZILLA"/>
		<reference ref_id="1242779" ref_url="https://bugzilla.suse.com/1242779" source="BUGZILLA"/>
		<reference ref_id="1242790" ref_url="https://bugzilla.suse.com/1242790" source="BUGZILLA"/>
		<reference ref_id="1242791" ref_url="https://bugzilla.suse.com/1242791" source="BUGZILLA"/>
		<reference ref_id="1243047" ref_url="https://bugzilla.suse.com/1243047" source="BUGZILLA"/>
		<reference ref_id="1243133" ref_url="https://bugzilla.suse.com/1243133" source="BUGZILLA"/>
		<reference ref_id="1243649" ref_url="https://bugzilla.suse.com/1243649" source="BUGZILLA"/>
		<reference ref_id="1243660" ref_url="https://bugzilla.suse.com/1243660" source="BUGZILLA"/>
		<reference ref_id="1243737" ref_url="https://bugzilla.suse.com/1243737" source="BUGZILLA"/>
		<reference ref_id="1243919" ref_url="https://bugzilla.suse.com/1243919" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3564" ref_url="https://www.suse.com/security/cve/CVE-2022-3564/" source="CVE"/>
		<reference ref_id="CVE-2022-3619" ref_url="https://www.suse.com/security/cve/CVE-2022-3619/" source="CVE"/>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<reference ref_id="CVE-2022-49110" ref_url="https://www.suse.com/security/cve/CVE-2022-49110/" source="CVE"/>
		<reference ref_id="CVE-2022-49139" ref_url="https://www.suse.com/security/cve/CVE-2022-49139/" source="CVE"/>
		<reference ref_id="CVE-2022-49767" ref_url="https://www.suse.com/security/cve/CVE-2022-49767/" source="CVE"/>
		<reference ref_id="CVE-2022-49769" ref_url="https://www.suse.com/security/cve/CVE-2022-49769/" source="CVE"/>
		<reference ref_id="CVE-2022-49770" ref_url="https://www.suse.com/security/cve/CVE-2022-49770/" source="CVE"/>
		<reference ref_id="CVE-2022-49771" ref_url="https://www.suse.com/security/cve/CVE-2022-49771/" source="CVE"/>
		<reference ref_id="CVE-2022-49772" ref_url="https://www.suse.com/security/cve/CVE-2022-49772/" source="CVE"/>
		<reference ref_id="CVE-2022-49775" ref_url="https://www.suse.com/security/cve/CVE-2022-49775/" source="CVE"/>
		<reference ref_id="CVE-2022-49776" ref_url="https://www.suse.com/security/cve/CVE-2022-49776/" source="CVE"/>
		<reference ref_id="CVE-2022-49777" ref_url="https://www.suse.com/security/cve/CVE-2022-49777/" source="CVE"/>
		<reference ref_id="CVE-2022-49779" ref_url="https://www.suse.com/security/cve/CVE-2022-49779/" source="CVE"/>
		<reference ref_id="CVE-2022-49783" ref_url="https://www.suse.com/security/cve/CVE-2022-49783/" source="CVE"/>
		<reference ref_id="CVE-2022-49787" ref_url="https://www.suse.com/security/cve/CVE-2022-49787/" source="CVE"/>
		<reference ref_id="CVE-2022-49788" ref_url="https://www.suse.com/security/cve/CVE-2022-49788/" source="CVE"/>
		<reference ref_id="CVE-2022-49789" ref_url="https://www.suse.com/security/cve/CVE-2022-49789/" source="CVE"/>
		<reference ref_id="CVE-2022-49790" ref_url="https://www.suse.com/security/cve/CVE-2022-49790/" source="CVE"/>
		<reference ref_id="CVE-2022-49792" ref_url="https://www.suse.com/security/cve/CVE-2022-49792/" source="CVE"/>
		<reference ref_id="CVE-2022-49793" ref_url="https://www.suse.com/security/cve/CVE-2022-49793/" source="CVE"/>
		<reference ref_id="CVE-2022-49794" ref_url="https://www.suse.com/security/cve/CVE-2022-49794/" source="CVE"/>
		<reference ref_id="CVE-2022-49796" ref_url="https://www.suse.com/security/cve/CVE-2022-49796/" source="CVE"/>
		<reference ref_id="CVE-2022-49797" ref_url="https://www.suse.com/security/cve/CVE-2022-49797/" source="CVE"/>
		<reference ref_id="CVE-2022-49799" ref_url="https://www.suse.com/security/cve/CVE-2022-49799/" source="CVE"/>
		<reference ref_id="CVE-2022-49800" ref_url="https://www.suse.com/security/cve/CVE-2022-49800/" source="CVE"/>
		<reference ref_id="CVE-2022-49801" ref_url="https://www.suse.com/security/cve/CVE-2022-49801/" source="CVE"/>
		<reference ref_id="CVE-2022-49802" ref_url="https://www.suse.com/security/cve/CVE-2022-49802/" source="CVE"/>
		<reference ref_id="CVE-2022-49807" ref_url="https://www.suse.com/security/cve/CVE-2022-49807/" source="CVE"/>
		<reference ref_id="CVE-2022-49809" ref_url="https://www.suse.com/security/cve/CVE-2022-49809/" source="CVE"/>
		<reference ref_id="CVE-2022-49810" ref_url="https://www.suse.com/security/cve/CVE-2022-49810/" source="CVE"/>
		<reference ref_id="CVE-2022-49812" ref_url="https://www.suse.com/security/cve/CVE-2022-49812/" source="CVE"/>
		<reference ref_id="CVE-2022-49813" ref_url="https://www.suse.com/security/cve/CVE-2022-49813/" source="CVE"/>
		<reference ref_id="CVE-2022-49818" ref_url="https://www.suse.com/security/cve/CVE-2022-49818/" source="CVE"/>
		<reference ref_id="CVE-2022-49821" ref_url="https://www.suse.com/security/cve/CVE-2022-49821/" source="CVE"/>
		<reference ref_id="CVE-2022-49822" ref_url="https://www.suse.com/security/cve/CVE-2022-49822/" source="CVE"/>
		<reference ref_id="CVE-2022-49823" ref_url="https://www.suse.com/security/cve/CVE-2022-49823/" source="CVE"/>
		<reference ref_id="CVE-2022-49824" ref_url="https://www.suse.com/security/cve/CVE-2022-49824/" source="CVE"/>
		<reference ref_id="CVE-2022-49825" ref_url="https://www.suse.com/security/cve/CVE-2022-49825/" source="CVE"/>
		<reference ref_id="CVE-2022-49826" ref_url="https://www.suse.com/security/cve/CVE-2022-49826/" source="CVE"/>
		<reference ref_id="CVE-2022-49827" ref_url="https://www.suse.com/security/cve/CVE-2022-49827/" source="CVE"/>
		<reference ref_id="CVE-2022-49830" ref_url="https://www.suse.com/security/cve/CVE-2022-49830/" source="CVE"/>
		<reference ref_id="CVE-2022-49832" ref_url="https://www.suse.com/security/cve/CVE-2022-49832/" source="CVE"/>
		<reference ref_id="CVE-2022-49834" ref_url="https://www.suse.com/security/cve/CVE-2022-49834/" source="CVE"/>
		<reference ref_id="CVE-2022-49835" ref_url="https://www.suse.com/security/cve/CVE-2022-49835/" source="CVE"/>
		<reference ref_id="CVE-2022-49836" ref_url="https://www.suse.com/security/cve/CVE-2022-49836/" source="CVE"/>
		<reference ref_id="CVE-2022-49839" ref_url="https://www.suse.com/security/cve/CVE-2022-49839/" source="CVE"/>
		<reference ref_id="CVE-2022-49841" ref_url="https://www.suse.com/security/cve/CVE-2022-49841/" source="CVE"/>
		<reference ref_id="CVE-2022-49842" ref_url="https://www.suse.com/security/cve/CVE-2022-49842/" source="CVE"/>
		<reference ref_id="CVE-2022-49845" ref_url="https://www.suse.com/security/cve/CVE-2022-49845/" source="CVE"/>
		<reference ref_id="CVE-2022-49846" ref_url="https://www.suse.com/security/cve/CVE-2022-49846/" source="CVE"/>
		<reference ref_id="CVE-2022-49850" ref_url="https://www.suse.com/security/cve/CVE-2022-49850/" source="CVE"/>
		<reference ref_id="CVE-2022-49853" ref_url="https://www.suse.com/security/cve/CVE-2022-49853/" source="CVE"/>
		<reference ref_id="CVE-2022-49858" ref_url="https://www.suse.com/security/cve/CVE-2022-49858/" source="CVE"/>
		<reference ref_id="CVE-2022-49860" ref_url="https://www.suse.com/security/cve/CVE-2022-49860/" source="CVE"/>
		<reference ref_id="CVE-2022-49861" ref_url="https://www.suse.com/security/cve/CVE-2022-49861/" source="CVE"/>
		<reference ref_id="CVE-2022-49863" ref_url="https://www.suse.com/security/cve/CVE-2022-49863/" source="CVE"/>
		<reference ref_id="CVE-2022-49864" ref_url="https://www.suse.com/security/cve/CVE-2022-49864/" source="CVE"/>
		<reference ref_id="CVE-2022-49865" ref_url="https://www.suse.com/security/cve/CVE-2022-49865/" source="CVE"/>
		<reference ref_id="CVE-2022-49868" ref_url="https://www.suse.com/security/cve/CVE-2022-49868/" source="CVE"/>
		<reference ref_id="CVE-2022-49869" ref_url="https://www.suse.com/security/cve/CVE-2022-49869/" source="CVE"/>
		<reference ref_id="CVE-2022-49870" ref_url="https://www.suse.com/security/cve/CVE-2022-49870/" source="CVE"/>
		<reference ref_id="CVE-2022-49871" ref_url="https://www.suse.com/security/cve/CVE-2022-49871/" source="CVE"/>
		<reference ref_id="CVE-2022-49874" ref_url="https://www.suse.com/security/cve/CVE-2022-49874/" source="CVE"/>
		<reference ref_id="CVE-2022-49879" ref_url="https://www.suse.com/security/cve/CVE-2022-49879/" source="CVE"/>
		<reference ref_id="CVE-2022-49880" ref_url="https://www.suse.com/security/cve/CVE-2022-49880/" source="CVE"/>
		<reference ref_id="CVE-2022-49881" ref_url="https://www.suse.com/security/cve/CVE-2022-49881/" source="CVE"/>
		<reference ref_id="CVE-2022-49885" ref_url="https://www.suse.com/security/cve/CVE-2022-49885/" source="CVE"/>
		<reference ref_id="CVE-2022-49887" ref_url="https://www.suse.com/security/cve/CVE-2022-49887/" source="CVE"/>
		<reference ref_id="CVE-2022-49888" ref_url="https://www.suse.com/security/cve/CVE-2022-49888/" source="CVE"/>
		<reference ref_id="CVE-2022-49889" ref_url="https://www.suse.com/security/cve/CVE-2022-49889/" source="CVE"/>
		<reference ref_id="CVE-2022-49890" ref_url="https://www.suse.com/security/cve/CVE-2022-49890/" source="CVE"/>
		<reference ref_id="CVE-2022-49891" ref_url="https://www.suse.com/security/cve/CVE-2022-49891/" source="CVE"/>
		<reference ref_id="CVE-2022-49892" ref_url="https://www.suse.com/security/cve/CVE-2022-49892/" source="CVE"/>
		<reference ref_id="CVE-2022-49900" ref_url="https://www.suse.com/security/cve/CVE-2022-49900/" source="CVE"/>
		<reference ref_id="CVE-2022-49905" ref_url="https://www.suse.com/security/cve/CVE-2022-49905/" source="CVE"/>
		<reference ref_id="CVE-2022-49906" ref_url="https://www.suse.com/security/cve/CVE-2022-49906/" source="CVE"/>
		<reference ref_id="CVE-2022-49908" ref_url="https://www.suse.com/security/cve/CVE-2022-49908/" source="CVE"/>
		<reference ref_id="CVE-2022-49909" ref_url="https://www.suse.com/security/cve/CVE-2022-49909/" source="CVE"/>
		<reference ref_id="CVE-2022-49910" ref_url="https://www.suse.com/security/cve/CVE-2022-49910/" source="CVE"/>
		<reference ref_id="CVE-2022-49915" ref_url="https://www.suse.com/security/cve/CVE-2022-49915/" source="CVE"/>
		<reference ref_id="CVE-2022-49916" ref_url="https://www.suse.com/security/cve/CVE-2022-49916/" source="CVE"/>
		<reference ref_id="CVE-2022-49922" ref_url="https://www.suse.com/security/cve/CVE-2022-49922/" source="CVE"/>
		<reference ref_id="CVE-2022-49923" ref_url="https://www.suse.com/security/cve/CVE-2022-49923/" source="CVE"/>
		<reference ref_id="CVE-2022-49924" ref_url="https://www.suse.com/security/cve/CVE-2022-49924/" source="CVE"/>
		<reference ref_id="CVE-2022-49925" ref_url="https://www.suse.com/security/cve/CVE-2022-49925/" source="CVE"/>
		<reference ref_id="CVE-2022-49927" ref_url="https://www.suse.com/security/cve/CVE-2022-49927/" source="CVE"/>
		<reference ref_id="CVE-2022-49928" ref_url="https://www.suse.com/security/cve/CVE-2022-49928/" source="CVE"/>
		<reference ref_id="CVE-2022-49931" ref_url="https://www.suse.com/security/cve/CVE-2022-49931/" source="CVE"/>
		<reference ref_id="CVE-2023-1990" ref_url="https://www.suse.com/security/cve/CVE-2023-1990/" source="CVE"/>
		<reference ref_id="CVE-2023-53035" ref_url="https://www.suse.com/security/cve/CVE-2023-53035/" source="CVE"/>
		<reference ref_id="CVE-2023-53038" ref_url="https://www.suse.com/security/cve/CVE-2023-53038/" source="CVE"/>
		<reference ref_id="CVE-2023-53039" ref_url="https://www.suse.com/security/cve/CVE-2023-53039/" source="CVE"/>
		<reference ref_id="CVE-2023-53040" ref_url="https://www.suse.com/security/cve/CVE-2023-53040/" source="CVE"/>
		<reference ref_id="CVE-2023-53041" ref_url="https://www.suse.com/security/cve/CVE-2023-53041/" source="CVE"/>
		<reference ref_id="CVE-2023-53044" ref_url="https://www.suse.com/security/cve/CVE-2023-53044/" source="CVE"/>
		<reference ref_id="CVE-2023-53045" ref_url="https://www.suse.com/security/cve/CVE-2023-53045/" source="CVE"/>
		<reference ref_id="CVE-2023-53049" ref_url="https://www.suse.com/security/cve/CVE-2023-53049/" source="CVE"/>
		<reference ref_id="CVE-2023-53051" ref_url="https://www.suse.com/security/cve/CVE-2023-53051/" source="CVE"/>
		<reference ref_id="CVE-2023-53052" ref_url="https://www.suse.com/security/cve/CVE-2023-53052/" source="CVE"/>
		<reference ref_id="CVE-2023-53054" ref_url="https://www.suse.com/security/cve/CVE-2023-53054/" source="CVE"/>
		<reference ref_id="CVE-2023-53056" ref_url="https://www.suse.com/security/cve/CVE-2023-53056/" source="CVE"/>
		<reference ref_id="CVE-2023-53058" ref_url="https://www.suse.com/security/cve/CVE-2023-53058/" source="CVE"/>
		<reference ref_id="CVE-2023-53059" ref_url="https://www.suse.com/security/cve/CVE-2023-53059/" source="CVE"/>
		<reference ref_id="CVE-2023-53060" ref_url="https://www.suse.com/security/cve/CVE-2023-53060/" source="CVE"/>
		<reference ref_id="CVE-2023-53062" ref_url="https://www.suse.com/security/cve/CVE-2023-53062/" source="CVE"/>
		<reference ref_id="CVE-2023-53064" ref_url="https://www.suse.com/security/cve/CVE-2023-53064/" source="CVE"/>
		<reference ref_id="CVE-2023-53065" ref_url="https://www.suse.com/security/cve/CVE-2023-53065/" source="CVE"/>
		<reference ref_id="CVE-2023-53066" ref_url="https://www.suse.com/security/cve/CVE-2023-53066/" source="CVE"/>
		<reference ref_id="CVE-2023-53068" ref_url="https://www.suse.com/security/cve/CVE-2023-53068/" source="CVE"/>
		<reference ref_id="CVE-2023-53075" ref_url="https://www.suse.com/security/cve/CVE-2023-53075/" source="CVE"/>
		<reference ref_id="CVE-2023-53077" ref_url="https://www.suse.com/security/cve/CVE-2023-53077/" source="CVE"/>
		<reference ref_id="CVE-2023-53078" ref_url="https://www.suse.com/security/cve/CVE-2023-53078/" source="CVE"/>
		<reference ref_id="CVE-2023-53079" ref_url="https://www.suse.com/security/cve/CVE-2023-53079/" source="CVE"/>
		<reference ref_id="CVE-2023-53081" ref_url="https://www.suse.com/security/cve/CVE-2023-53081/" source="CVE"/>
		<reference ref_id="CVE-2023-53084" ref_url="https://www.suse.com/security/cve/CVE-2023-53084/" source="CVE"/>
		<reference ref_id="CVE-2023-53087" ref_url="https://www.suse.com/security/cve/CVE-2023-53087/" source="CVE"/>
		<reference ref_id="CVE-2023-53089" ref_url="https://www.suse.com/security/cve/CVE-2023-53089/" source="CVE"/>
		<reference ref_id="CVE-2023-53090" ref_url="https://www.suse.com/security/cve/CVE-2023-53090/" source="CVE"/>
		<reference ref_id="CVE-2023-53091" ref_url="https://www.suse.com/security/cve/CVE-2023-53091/" source="CVE"/>
		<reference ref_id="CVE-2023-53092" ref_url="https://www.suse.com/security/cve/CVE-2023-53092/" source="CVE"/>
		<reference ref_id="CVE-2023-53093" ref_url="https://www.suse.com/security/cve/CVE-2023-53093/" source="CVE"/>
		<reference ref_id="CVE-2023-53096" ref_url="https://www.suse.com/security/cve/CVE-2023-53096/" source="CVE"/>
		<reference ref_id="CVE-2023-53098" ref_url="https://www.suse.com/security/cve/CVE-2023-53098/" source="CVE"/>
		<reference ref_id="CVE-2023-53099" ref_url="https://www.suse.com/security/cve/CVE-2023-53099/" source="CVE"/>
		<reference ref_id="CVE-2023-53100" ref_url="https://www.suse.com/security/cve/CVE-2023-53100/" source="CVE"/>
		<reference ref_id="CVE-2023-53101" ref_url="https://www.suse.com/security/cve/CVE-2023-53101/" source="CVE"/>
		<reference ref_id="CVE-2023-53106" ref_url="https://www.suse.com/security/cve/CVE-2023-53106/" source="CVE"/>
		<reference ref_id="CVE-2023-53108" ref_url="https://www.suse.com/security/cve/CVE-2023-53108/" source="CVE"/>
		<reference ref_id="CVE-2023-53111" ref_url="https://www.suse.com/security/cve/CVE-2023-53111/" source="CVE"/>
		<reference ref_id="CVE-2023-53114" ref_url="https://www.suse.com/security/cve/CVE-2023-53114/" source="CVE"/>
		<reference ref_id="CVE-2023-53116" ref_url="https://www.suse.com/security/cve/CVE-2023-53116/" source="CVE"/>
		<reference ref_id="CVE-2023-53118" ref_url="https://www.suse.com/security/cve/CVE-2023-53118/" source="CVE"/>
		<reference ref_id="CVE-2023-53119" ref_url="https://www.suse.com/security/cve/CVE-2023-53119/" source="CVE"/>
		<reference ref_id="CVE-2023-53123" ref_url="https://www.suse.com/security/cve/CVE-2023-53123/" source="CVE"/>
		<reference ref_id="CVE-2023-53124" ref_url="https://www.suse.com/security/cve/CVE-2023-53124/" source="CVE"/>
		<reference ref_id="CVE-2023-53125" ref_url="https://www.suse.com/security/cve/CVE-2023-53125/" source="CVE"/>
		<reference ref_id="CVE-2023-53131" ref_url="https://www.suse.com/security/cve/CVE-2023-53131/" source="CVE"/>
		<reference ref_id="CVE-2023-53134" ref_url="https://www.suse.com/security/cve/CVE-2023-53134/" source="CVE"/>
		<reference ref_id="CVE-2023-53137" ref_url="https://www.suse.com/security/cve/CVE-2023-53137/" source="CVE"/>
		<reference ref_id="CVE-2023-53139" ref_url="https://www.suse.com/security/cve/CVE-2023-53139/" source="CVE"/>
		<reference ref_id="CVE-2023-53140" ref_url="https://www.suse.com/security/cve/CVE-2023-53140/" source="CVE"/>
		<reference ref_id="CVE-2023-53142" ref_url="https://www.suse.com/security/cve/CVE-2023-53142/" source="CVE"/>
		<reference ref_id="CVE-2023-53143" ref_url="https://www.suse.com/security/cve/CVE-2023-53143/" source="CVE"/>
		<reference ref_id="CVE-2023-53145" ref_url="https://www.suse.com/security/cve/CVE-2023-53145/" source="CVE"/>
		<reference ref_id="CVE-2024-53168" ref_url="https://www.suse.com/security/cve/CVE-2024-53168/" source="CVE"/>
		<reference ref_id="CVE-2024-56558" ref_url="https://www.suse.com/security/cve/CVE-2024-56558/" source="CVE"/>
		<reference ref_id="CVE-2025-21888" ref_url="https://www.suse.com/security/cve/CVE-2025-21888/" source="CVE"/>
		<reference ref_id="CVE-2025-21999" ref_url="https://www.suse.com/security/cve/CVE-2025-21999/" source="CVE"/>
		<reference ref_id="CVE-2025-22056" ref_url="https://www.suse.com/security/cve/CVE-2025-22056/" source="CVE"/>
		<reference ref_id="CVE-2025-22060" ref_url="https://www.suse.com/security/cve/CVE-2025-22060/" source="CVE"/>
		<reference ref_id="CVE-2025-23138" ref_url="https://www.suse.com/security/cve/CVE-2025-23138/" source="CVE"/>
		<reference ref_id="CVE-2025-23145" ref_url="https://www.suse.com/security/cve/CVE-2025-23145/" source="CVE"/>
		<reference ref_id="CVE-2025-37785" ref_url="https://www.suse.com/security/cve/CVE-2025-37785/" source="CVE"/>
		<reference ref_id="CVE-2025-37789" ref_url="https://www.suse.com/security/cve/CVE-2025-37789/" source="CVE"/>
		<reference ref_id="CVE-2025-37948" ref_url="https://www.suse.com/security/cve/CVE-2025-37948/" source="CVE"/>
		<reference ref_id="CVE-2025-37963" ref_url="https://www.suse.com/security/cve/CVE-2025-37963/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-49110: netfilter: conntrack: revisit gc autotuning (bsc#1237981).
- CVE-2022-49139: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt (bsc#1238032).
- CVE-2022-49767: 9p/trans_fd: always use O_NONBLOCK read/write (bsc#1242493).
- CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245).
- CVE-2022-49858: octeontx2-pf: Fix SQE threshold checking (bsc#1242589).
- CVE-2023-53058: net/mlx5: E-Switch, Fix an Oops in error handling code (bsc#1242237).
- CVE-2023-53060: igb: revert rtnl_lock() that causes deadlock (bsc#1242241).
- CVE-2023-53064: iavf: Fix hang on reboot with ice (bsc#1242222).
- CVE-2023-53066: qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info (bsc#1242227).
- CVE-2023-53079: net/mlx5: Fix steering rules cleanup (bsc#1242765).
- CVE-2023-53114: i40e: Fix kernel crash during reboot when adapter is in recovery mode (bsc#1242398).
- CVE-2023-53134: bnxt_en: Avoid order-5 memory allocation for TPA data (bsc#1242380)
- CVE-2024-53168: net: make sock_inuse_add() available (bsc#1234887).
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100).
- CVE-2025-21888: RDMA/mlx5: Fix a WARN during dereg_mr for DM type (bsc#1240177).
- CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).
- CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525).
- CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526).
- CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648).
- CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596).
- CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).
- CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).

The following non-security bugs were fixed:

- Refresh fixes for cBPF issue (bsc#1242778)
- Remove debug flavor (bsc#1243919).
- Update metadata and put them into the sorted part of the series
- arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778).
- arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778).
- arm64: insn: Add support for encoding DSB (bsc#1242778).
- arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778).
- arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778).
- arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778).
- hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (bsc#1243737).
- hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (bsc#1243737).
- hv_netvsc: Remove rmsg_pgcnt (bsc#1243737).
- hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (bsc#1243737).
- mtd: phram: Add the kernel lock down check (bsc#1232649).
- ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes).
- powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes).
- x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
- x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
- x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-10"/>
	<updated date="2025-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204569">SUSE bug 1204569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204619">SUSE bug 1204619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204705">SUSE bug 1204705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205282">SUSE bug 1205282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206051">SUSE bug 1206051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206073">SUSE bug 1206073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206649">SUSE bug 1206649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206886">SUSE bug 1206886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206887">SUSE bug 1206887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208542">SUSE bug 1208542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209292">SUSE bug 1209292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209556">SUSE bug 1209556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209684">SUSE bug 1209684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210337">SUSE bug 1210337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210763">SUSE bug 1210763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210767">SUSE bug 1210767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211465">SUSE bug 1211465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213012">SUSE bug 1213012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213013">SUSE bug 1213013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213094">SUSE bug 1213094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213096">SUSE bug 1213096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213946">SUSE bug 1213946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214991">SUSE bug 1214991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218470">SUSE bug 1218470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232649">SUSE bug 1232649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234887">SUSE bug 1234887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235100">SUSE bug 1235100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237981">SUSE bug 1237981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238032">SUSE bug 1238032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240177">SUSE bug 1240177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240802">SUSE bug 1240802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241525">SUSE bug 1241525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241526">SUSE bug 1241526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241640">SUSE bug 1241640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241648">SUSE bug 1241648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242147">SUSE bug 1242147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242150">SUSE bug 1242150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242151">SUSE bug 1242151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242154">SUSE bug 1242154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242157">SUSE bug 1242157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242158">SUSE bug 1242158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242164">SUSE bug 1242164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242165">SUSE bug 1242165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242169">SUSE bug 1242169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242215">SUSE bug 1242215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242218">SUSE bug 1242218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242219">SUSE bug 1242219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242222">SUSE bug 1242222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242226">SUSE bug 1242226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242227">SUSE bug 1242227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242228">SUSE bug 1242228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242229">SUSE bug 1242229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242230">SUSE bug 1242230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242231">SUSE bug 1242231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242232">SUSE bug 1242232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242237">SUSE bug 1242237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242239">SUSE bug 1242239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242241">SUSE bug 1242241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242244">SUSE bug 1242244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242245">SUSE bug 1242245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242248">SUSE bug 1242248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242261">SUSE bug 1242261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242264">SUSE bug 1242264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242265">SUSE bug 1242265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242270">SUSE bug 1242270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242276">SUSE bug 1242276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242279">SUSE bug 1242279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242280">SUSE bug 1242280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242281">SUSE bug 1242281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242282">SUSE bug 1242282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242284">SUSE bug 1242284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242285">SUSE bug 1242285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242289">SUSE bug 1242289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242294">SUSE bug 1242294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242305">SUSE bug 1242305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242312">SUSE bug 1242312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242320">SUSE bug 1242320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242338">SUSE bug 1242338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242352">SUSE bug 1242352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242353">SUSE bug 1242353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242355">SUSE bug 1242355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242357">SUSE bug 1242357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242358">SUSE bug 1242358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242361">SUSE bug 1242361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242365">SUSE bug 1242365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242366">SUSE bug 1242366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242369">SUSE bug 1242369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242370">SUSE bug 1242370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242371">SUSE bug 1242371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242372">SUSE bug 1242372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242377">SUSE bug 1242377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242378">SUSE bug 1242378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242380">SUSE bug 1242380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242382">SUSE bug 1242382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242385">SUSE bug 1242385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242387">SUSE bug 1242387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242389">SUSE bug 1242389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242391">SUSE bug 1242391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242392">SUSE bug 1242392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242394">SUSE bug 1242394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242398">SUSE bug 1242398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242399">SUSE bug 1242399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242402">SUSE bug 1242402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242403">SUSE bug 1242403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242409">SUSE bug 1242409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242411">SUSE bug 1242411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242415">SUSE bug 1242415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242416">SUSE bug 1242416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242421">SUSE bug 1242421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242422">SUSE bug 1242422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242426">SUSE bug 1242426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242428">SUSE bug 1242428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242440">SUSE bug 1242440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242443">SUSE bug 1242443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242449">SUSE bug 1242449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242452">SUSE bug 1242452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242453">SUSE bug 1242453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242454">SUSE bug 1242454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242455">SUSE bug 1242455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242456">SUSE bug 1242456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242458">SUSE bug 1242458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242464">SUSE bug 1242464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242467">SUSE bug 1242467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242469">SUSE bug 1242469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242473">SUSE bug 1242473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242478">SUSE bug 1242478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242481">SUSE bug 1242481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242484">SUSE bug 1242484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242489">SUSE bug 1242489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242493">SUSE bug 1242493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242497">SUSE bug 1242497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242527">SUSE bug 1242527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242542">SUSE bug 1242542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242544">SUSE bug 1242544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242545">SUSE bug 1242545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242547">SUSE bug 1242547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242548">SUSE bug 1242548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242549">SUSE bug 1242549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242550">SUSE bug 1242550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242551">SUSE bug 1242551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242558">SUSE bug 1242558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242570">SUSE bug 1242570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242580">SUSE bug 1242580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242586">SUSE bug 1242586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242589">SUSE bug 1242589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242596">SUSE bug 1242596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242597">SUSE bug 1242597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242685">SUSE bug 1242685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242686">SUSE bug 1242686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242688">SUSE bug 1242688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242689">SUSE bug 1242689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242695">SUSE bug 1242695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242716">SUSE bug 1242716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242733">SUSE bug 1242733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242734">SUSE bug 1242734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242735">SUSE bug 1242735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242736">SUSE bug 1242736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242739">SUSE bug 1242739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242743">SUSE bug 1242743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242744">SUSE bug 1242744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242745">SUSE bug 1242745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242746">SUSE bug 1242746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242747">SUSE bug 1242747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242749">SUSE bug 1242749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242752">SUSE bug 1242752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242753">SUSE bug 1242753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242756">SUSE bug 1242756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242759">SUSE bug 1242759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242762">SUSE bug 1242762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242765">SUSE bug 1242765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242767">SUSE bug 1242767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242778">SUSE bug 1242778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242779">SUSE bug 1242779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242790">SUSE bug 1242790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242791">SUSE bug 1242791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243047">SUSE bug 1243047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243133">SUSE bug 1243133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243649">SUSE bug 1243649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243660">SUSE bug 1243660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243737">SUSE bug 1243737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243919">SUSE bug 1243919</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3564/">CVE-2022-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3619/">CVE-2022-3619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49110/">CVE-2022-49110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49110">CVE-2022-49110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49139/">CVE-2022-49139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49139">CVE-2022-49139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49767/">CVE-2022-49767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49767">CVE-2022-49767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49769/">CVE-2022-49769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49769">CVE-2022-49769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49770/">CVE-2022-49770 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49770">CVE-2022-49770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49771/">CVE-2022-49771 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49771">CVE-2022-49771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49772/">CVE-2022-49772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49772">CVE-2022-49772 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49775/">CVE-2022-49775 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49775">CVE-2022-49775 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49776/">CVE-2022-49776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49776">CVE-2022-49776 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49777/">CVE-2022-49777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49777">CVE-2022-49777 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49779/">CVE-2022-49779 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49779">CVE-2022-49779 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49783/">CVE-2022-49783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49783">CVE-2022-49783 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49787/">CVE-2022-49787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49787">CVE-2022-49787 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49788/">CVE-2022-49788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49788">CVE-2022-49788 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49789/">CVE-2022-49789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49789">CVE-2022-49789 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49790/">CVE-2022-49790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49790">CVE-2022-49790 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49792/">CVE-2022-49792 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49792">CVE-2022-49792 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49793/">CVE-2022-49793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49793">CVE-2022-49793 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49794/">CVE-2022-49794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49794">CVE-2022-49794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49796/">CVE-2022-49796 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49796">CVE-2022-49796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49797/">CVE-2022-49797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49797">CVE-2022-49797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49799/">CVE-2022-49799 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49799">CVE-2022-49799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49800/">CVE-2022-49800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49800">CVE-2022-49800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49801/">CVE-2022-49801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49801">CVE-2022-49801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49802/">CVE-2022-49802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49802">CVE-2022-49802 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49807/">CVE-2022-49807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49807">CVE-2022-49807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49809/">CVE-2022-49809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49809">CVE-2022-49809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49810/">CVE-2022-49810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49810">CVE-2022-49810 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49812/">CVE-2022-49812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49812">CVE-2022-49812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49813/">CVE-2022-49813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49813">CVE-2022-49813 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49818/">CVE-2022-49818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49818">CVE-2022-49818 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49821/">CVE-2022-49821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49821">CVE-2022-49821 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49822/">CVE-2022-49822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49822">CVE-2022-49822 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49823/">CVE-2022-49823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49823">CVE-2022-49823 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49824/">CVE-2022-49824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49824">CVE-2022-49824 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49825/">CVE-2022-49825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49825">CVE-2022-49825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49826/">CVE-2022-49826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49826">CVE-2022-49826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49827/">CVE-2022-49827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49827">CVE-2022-49827 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49830/">CVE-2022-49830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49830">CVE-2022-49830 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49832/">CVE-2022-49832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49832">CVE-2022-49832 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49834/">CVE-2022-49834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49834">CVE-2022-49834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49835/">CVE-2022-49835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49835">CVE-2022-49835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49836/">CVE-2022-49836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49836">CVE-2022-49836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49839/">CVE-2022-49839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49839">CVE-2022-49839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49841/">CVE-2022-49841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49841">CVE-2022-49841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49842/">CVE-2022-49842 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49842">CVE-2022-49842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49845/">CVE-2022-49845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49845">CVE-2022-49845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49846/">CVE-2022-49846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49846">CVE-2022-49846 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49850/">CVE-2022-49850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49850">CVE-2022-49850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49853/">CVE-2022-49853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49853">CVE-2022-49853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49858/">CVE-2022-49858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49858">CVE-2022-49858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49860/">CVE-2022-49860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49860">CVE-2022-49860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49861/">CVE-2022-49861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49861">CVE-2022-49861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49863/">CVE-2022-49863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49863">CVE-2022-49863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49864/">CVE-2022-49864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49864">CVE-2022-49864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49865/">CVE-2022-49865 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49865">CVE-2022-49865 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-49868/">CVE-2022-49868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49868">CVE-2022-49868 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49869/">CVE-2022-49869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49869">CVE-2022-49869 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-49870/">CVE-2022-49870 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49870">CVE-2022-49870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49871/">CVE-2022-49871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49871">CVE-2022-49871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49874/">CVE-2022-49874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49874">CVE-2022-49874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49879/">CVE-2022-49879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49879">CVE-2022-49879 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49880/">CVE-2022-49880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49880">CVE-2022-49880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49881/">CVE-2022-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49881">CVE-2022-49881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49885/">CVE-2022-49885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49885">CVE-2022-49885 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49887/">CVE-2022-49887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49887">CVE-2022-49887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49888/">CVE-2022-49888 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49888">CVE-2022-49888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49889/">CVE-2022-49889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49889">CVE-2022-49889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49890/">CVE-2022-49890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49890">CVE-2022-49890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49891/">CVE-2022-49891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49891">CVE-2022-49891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49892/">CVE-2022-49892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49892">CVE-2022-49892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49900/">CVE-2022-49900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49900">CVE-2022-49900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49905/">CVE-2022-49905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49905">CVE-2022-49905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49906/">CVE-2022-49906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49906">CVE-2022-49906 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49908/">CVE-2022-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49908">CVE-2022-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49909/">CVE-2022-49909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49909">CVE-2022-49909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49910/">CVE-2022-49910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49910">CVE-2022-49910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49915/">CVE-2022-49915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49915">CVE-2022-49915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49916/">CVE-2022-49916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49916">CVE-2022-49916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49922/">CVE-2022-49922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49922">CVE-2022-49922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49923/">CVE-2022-49923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49923">CVE-2022-49923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49924/">CVE-2022-49924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49924">CVE-2022-49924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49925/">CVE-2022-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49925">CVE-2022-49925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49927/">CVE-2022-49927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49927">CVE-2022-49927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49928/">CVE-2022-49928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49928">CVE-2022-49928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49931/">CVE-2022-49931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49931">CVE-2022-49931 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1990/">CVE-2023-1990 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1990">CVE-2023-1990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53035/">CVE-2023-53035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53035">CVE-2023-53035 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53038/">CVE-2023-53038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53038">CVE-2023-53038 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53039/">CVE-2023-53039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53039">CVE-2023-53039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53040/">CVE-2023-53040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53040">CVE-2023-53040 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53041/">CVE-2023-53041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53041">CVE-2023-53041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53044/">CVE-2023-53044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53044">CVE-2023-53044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53045/">CVE-2023-53045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53045">CVE-2023-53045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53049/">CVE-2023-53049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53049">CVE-2023-53049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53051/">CVE-2023-53051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53051">CVE-2023-53051 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53052/">CVE-2023-53052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53052">CVE-2023-53052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53054/">CVE-2023-53054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53054">CVE-2023-53054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53056/">CVE-2023-53056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53056">CVE-2023-53056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53058/">CVE-2023-53058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53058">CVE-2023-53058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53059/">CVE-2023-53059 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53059">CVE-2023-53059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53060/">CVE-2023-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53060">CVE-2023-53060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53062/">CVE-2023-53062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53062">CVE-2023-53062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53064/">CVE-2023-53064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53064">CVE-2023-53064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53065/">CVE-2023-53065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53065">CVE-2023-53065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53066/">CVE-2023-53066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53066">CVE-2023-53066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53068/">CVE-2023-53068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53068">CVE-2023-53068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53075/">CVE-2023-53075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53075">CVE-2023-53075 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53077/">CVE-2023-53077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53077">CVE-2023-53077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53078/">CVE-2023-53078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53078">CVE-2023-53078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53079/">CVE-2023-53079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53079">CVE-2023-53079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53081/">CVE-2023-53081 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53081">CVE-2023-53081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53084/">CVE-2023-53084 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53084">CVE-2023-53084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53087/">CVE-2023-53087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53087">CVE-2023-53087 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53089/">CVE-2023-53089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53089">CVE-2023-53089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53090/">CVE-2023-53090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53090">CVE-2023-53090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53091/">CVE-2023-53091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53091">CVE-2023-53091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53092/">CVE-2023-53092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53092">CVE-2023-53092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53093/">CVE-2023-53093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53093">CVE-2023-53093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53096/">CVE-2023-53096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53096">CVE-2023-53096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53098/">CVE-2023-53098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53098">CVE-2023-53098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53099/">CVE-2023-53099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53099">CVE-2023-53099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53100/">CVE-2023-53100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53100">CVE-2023-53100 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53101/">CVE-2023-53101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53101">CVE-2023-53101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53106/">CVE-2023-53106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53106">CVE-2023-53106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53108/">CVE-2023-53108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53108">CVE-2023-53108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53111/">CVE-2023-53111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53111">CVE-2023-53111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53114/">CVE-2023-53114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53114">CVE-2023-53114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53116/">CVE-2023-53116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53116">CVE-2023-53116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53118/">CVE-2023-53118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53118">CVE-2023-53118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53119/">CVE-2023-53119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53119">CVE-2023-53119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53123/">CVE-2023-53123 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53123">CVE-2023-53123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53124/">CVE-2023-53124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53124">CVE-2023-53124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53125/">CVE-2023-53125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53125">CVE-2023-53125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53131/">CVE-2023-53131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53131">CVE-2023-53131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53134/">CVE-2023-53134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53134">CVE-2023-53134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53137/">CVE-2023-53137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53137">CVE-2023-53137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53139/">CVE-2023-53139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53139">CVE-2023-53139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53140/">CVE-2023-53140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53140">CVE-2023-53140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53142/">CVE-2023-53142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53142">CVE-2023-53142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53143/">CVE-2023-53143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53143">CVE-2023-53143 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53145/">CVE-2023-53145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53145">CVE-2023-53145 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53168/">CVE-2024-53168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53168">CVE-2024-53168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56558/">CVE-2024-56558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56558">CVE-2024-56558 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21888/">CVE-2025-21888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21888">CVE-2025-21888 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21999/">CVE-2025-21999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21999">CVE-2025-21999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22056/">CVE-2025-22056 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22056">CVE-2025-22056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22060/">CVE-2025-22060 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22060">CVE-2025-22060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23138/">CVE-2025-23138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23138">CVE-2025-23138 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23145/">CVE-2025-23145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23145">CVE-2025-23145 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37785/">CVE-2025-37785 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37785">CVE-2025-37785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37789/">CVE-2025-37789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37789">CVE-2025-37789 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37948/">CVE-2025-37948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37948">CVE-2025-37948 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37963/">CVE-2025-37963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37963">CVE-2025-37963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999495" comment="kernel-default-5.14.21-150400.24.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999487" comment="kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206328" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1245309" ref_url="https://bugzilla.suse.com/1245309" source="BUGZILLA"/>
		<reference ref_id="1245310" ref_url="https://bugzilla.suse.com/1245310" source="BUGZILLA"/>
		<reference ref_id="1245311" ref_url="https://bugzilla.suse.com/1245311" source="BUGZILLA"/>
		<reference ref_id="1245314" ref_url="https://bugzilla.suse.com/1245314" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-4877" ref_url="https://www.suse.com/security/cve/CVE-2025-4877/" source="CVE"/>
		<reference ref_id="CVE-2025-4878" ref_url="https://www.suse.com/security/cve/CVE-2025-4878/" source="CVE"/>
		<reference ref_id="CVE-2025-5318" ref_url="https://www.suse.com/security/cve/CVE-2025-5318/" source="CVE"/>
		<reference ref_id="CVE-2025-5372" ref_url="https://www.suse.com/security/cve/CVE-2025-5372/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040682.html" source="SUSE-SU"/>
		<description>
This update for libssh fixes the following issues:

- CVE-2025-4877: Fixed write beyond bounds in binary to base64 conversion functions (bsc#1245309).
- CVE-2025-4878: Fixed use of uninitialized variable in privatekey_from_file() (bsc#1245310).
- CVE-2025-5318: Fixed likely read beyond bounds in sftp server handle management (bsc#1245311).
- CVE-2025-5372: Fixed ssh_kdf() returns a success code on certain failures (bsc#1245314).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-10"/>
	<updated date="2025-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1245309">SUSE bug 1245309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245310">SUSE bug 1245310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245311">SUSE bug 1245311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245314">SUSE bug 1245314</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4877/">CVE-2025-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4877">CVE-2025-4877 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4878/">CVE-2025-4878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4878">CVE-2025-4878 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5318/">CVE-2025-5318 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5318">CVE-2025-5318 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5372/">CVE-2025-5372 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5372">CVE-2025-5372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006069" comment="libssh-config-0.9.8-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006070" comment="libssh4-0.9.8-150400.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206329" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1239765" ref_url="https://bugzilla.suse.com/1239765" source="BUGZILLA"/>
		<reference ref_id="1240150" ref_url="https://bugzilla.suse.com/1240150" source="BUGZILLA"/>
		<reference ref_id="1241830" ref_url="https://bugzilla.suse.com/1241830" source="BUGZILLA"/>
		<reference ref_id="1242114" ref_url="https://bugzilla.suse.com/1242114" source="BUGZILLA"/>
		<reference ref_id="1243833" ref_url="https://bugzilla.suse.com/1243833" source="BUGZILLA"/>
		<reference ref_id="1244035" ref_url="https://bugzilla.suse.com/1244035" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-0495" ref_url="https://www.suse.com/security/cve/CVE-2025-0495/" source="CVE"/>
		<reference ref_id="CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040684.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

Update to Docker 28.2.2-ce (bsc#1243833, bsc#1242114):

- CVE-2025-0495: Fixed credential leakage to telemetry endpoints when credentials 
  allowed to be set as attribute values in cache-to/cache-from configuration.(bsc#1239765)
- CVE-2025-22872: golang.org/x/net/html: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction (bsc#1241830).

Other fixes:    
 
- Update to docker-buildx v0.22.0.
- Always clear SUSEConnect suse_* secrets when starting containers (bsc#1244035).
- Disable transparent SUSEConnect support for SLE-16. (jsc#PED-12534)
- Now that the only blocker for docker-buildx support was removed for SLE-16,
  enable docker-buildx for SLE-16 as well. (jsc#PED-8905)
- SUSEConnect secrets fails in SLES rootless docker containers (bsc#1240150).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1239765">SUSE bug 1239765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240150">SUSE bug 1240150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241830">SUSE bug 1241830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242114">SUSE bug 1242114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243833">SUSE bug 1243833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244035">SUSE bug 1244035</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0495/">CVE-2025-0495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0495">CVE-2025-0495 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006067" comment="docker-28.2.2_ce-150000.227.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206330" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1244663" ref_url="https://bugzilla.suse.com/1244663" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-4565" ref_url="https://www.suse.com/security/cve/CVE-2025-4565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040711.html" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:

- CVE-2025-4565: Fix parsing of untrusted Protocol Buffers data containing an arbitrary number of recursive groups or messages that can lead to crash due to RecursionError (bsc#1244663).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-15"/>
	<updated date="2025-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1244663">SUSE bug 1244663</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4565/">CVE-2025-4565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4565">CVE-2025-4565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007702" comment="libprotobuf-lite25_1_0-25.1-150400.9.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206331" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1170891" ref_url="https://bugzilla.suse.com/1170891" source="BUGZILLA"/>
		<reference ref_id="1173139" ref_url="https://bugzilla.suse.com/1173139" source="BUGZILLA"/>
		<reference ref_id="1185010" ref_url="https://bugzilla.suse.com/1185010" source="BUGZILLA"/>
		<reference ref_id="1189998" ref_url="https://bugzilla.suse.com/1189998" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190428" ref_url="https://bugzilla.suse.com/1190428" source="BUGZILLA"/>
		<reference ref_id="1191949" ref_url="https://bugzilla.suse.com/1191949" source="BUGZILLA"/>
		<reference ref_id="1193983" ref_url="https://bugzilla.suse.com/1193983" source="BUGZILLA"/>
		<reference ref_id="1196869" ref_url="https://bugzilla.suse.com/1196869" source="BUGZILLA"/>
		<reference ref_id="1200313" ref_url="https://bugzilla.suse.com/1200313" source="BUGZILLA"/>
		<reference ref_id="1201308" ref_url="https://bugzilla.suse.com/1201308" source="BUGZILLA"/>
		<reference ref_id="1201489" ref_url="https://bugzilla.suse.com/1201489" source="BUGZILLA"/>
		<reference ref_id="1209657" ref_url="https://bugzilla.suse.com/1209657" source="BUGZILLA"/>
		<reference ref_id="1209798" ref_url="https://bugzilla.suse.com/1209798" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1215304" ref_url="https://bugzilla.suse.com/1215304" source="BUGZILLA"/>
		<reference ref_id="1216702" ref_url="https://bugzilla.suse.com/1216702" source="BUGZILLA"/>
		<reference ref_id="1217169" ref_url="https://bugzilla.suse.com/1217169" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1222721" ref_url="https://bugzilla.suse.com/1222721" source="BUGZILLA"/>
		<reference ref_id="1222878" ref_url="https://bugzilla.suse.com/1222878" source="BUGZILLA"/>
		<reference ref_id="1223481" ref_url="https://bugzilla.suse.com/1223481" source="BUGZILLA"/>
		<reference ref_id="1223501" ref_url="https://bugzilla.suse.com/1223501" source="BUGZILLA"/>
		<reference ref_id="1223512" ref_url="https://bugzilla.suse.com/1223512" source="BUGZILLA"/>
		<reference ref_id="1223520" ref_url="https://bugzilla.suse.com/1223520" source="BUGZILLA"/>
		<reference ref_id="1223894" ref_url="https://bugzilla.suse.com/1223894" source="BUGZILLA"/>
		<reference ref_id="1223921" ref_url="https://bugzilla.suse.com/1223921" source="BUGZILLA"/>
		<reference ref_id="1223922" ref_url="https://bugzilla.suse.com/1223922" source="BUGZILLA"/>
		<reference ref_id="1223923" ref_url="https://bugzilla.suse.com/1223923" source="BUGZILLA"/>
		<reference ref_id="1223924" ref_url="https://bugzilla.suse.com/1223924" source="BUGZILLA"/>
		<reference ref_id="1223929" ref_url="https://bugzilla.suse.com/1223929" source="BUGZILLA"/>
		<reference ref_id="1223931" ref_url="https://bugzilla.suse.com/1223931" source="BUGZILLA"/>
		<reference ref_id="1223932" ref_url="https://bugzilla.suse.com/1223932" source="BUGZILLA"/>
		<reference ref_id="1223934" ref_url="https://bugzilla.suse.com/1223934" source="BUGZILLA"/>
		<reference ref_id="1223941" ref_url="https://bugzilla.suse.com/1223941" source="BUGZILLA"/>
		<reference ref_id="1223948" ref_url="https://bugzilla.suse.com/1223948" source="BUGZILLA"/>
		<reference ref_id="1223952" ref_url="https://bugzilla.suse.com/1223952" source="BUGZILLA"/>
		<reference ref_id="1223953" ref_url="https://bugzilla.suse.com/1223953" source="BUGZILLA"/>
		<reference ref_id="1223957" ref_url="https://bugzilla.suse.com/1223957" source="BUGZILLA"/>
		<reference ref_id="1223962" ref_url="https://bugzilla.suse.com/1223962" source="BUGZILLA"/>
		<reference ref_id="1223963" ref_url="https://bugzilla.suse.com/1223963" source="BUGZILLA"/>
		<reference ref_id="1223964" ref_url="https://bugzilla.suse.com/1223964" source="BUGZILLA"/>
		<reference ref_id="1223996" ref_url="https://bugzilla.suse.com/1223996" source="BUGZILLA"/>
		<reference ref_id="1224099" ref_url="https://bugzilla.suse.com/1224099" source="BUGZILLA"/>
		<reference ref_id="1224482" ref_url="https://bugzilla.suse.com/1224482" source="BUGZILLA"/>
		<reference ref_id="1224511" ref_url="https://bugzilla.suse.com/1224511" source="BUGZILLA"/>
		<reference ref_id="1224592" ref_url="https://bugzilla.suse.com/1224592" source="BUGZILLA"/>
		<reference ref_id="1224685" ref_url="https://bugzilla.suse.com/1224685" source="BUGZILLA"/>
		<reference ref_id="1224730" ref_url="https://bugzilla.suse.com/1224730" source="BUGZILLA"/>
		<reference ref_id="1224816" ref_url="https://bugzilla.suse.com/1224816" source="BUGZILLA"/>
		<reference ref_id="1224895" ref_url="https://bugzilla.suse.com/1224895" source="BUGZILLA"/>
		<reference ref_id="1224898" ref_url="https://bugzilla.suse.com/1224898" source="BUGZILLA"/>
		<reference ref_id="1224900" ref_url="https://bugzilla.suse.com/1224900" source="BUGZILLA"/>
		<reference ref_id="1224901" ref_url="https://bugzilla.suse.com/1224901" source="BUGZILLA"/>
		<reference ref_id="1230697" ref_url="https://bugzilla.suse.com/1230697" source="BUGZILLA"/>
		<reference ref_id="1232436" ref_url="https://bugzilla.suse.com/1232436" source="BUGZILLA"/>
		<reference ref_id="1233070" ref_url="https://bugzilla.suse.com/1233070" source="BUGZILLA"/>
		<reference ref_id="1233642" ref_url="https://bugzilla.suse.com/1233642" source="BUGZILLA"/>
		<reference ref_id="1234281" ref_url="https://bugzilla.suse.com/1234281" source="BUGZILLA"/>
		<reference ref_id="1234282" ref_url="https://bugzilla.suse.com/1234282" source="BUGZILLA"/>
		<reference ref_id="1234846" ref_url="https://bugzilla.suse.com/1234846" source="BUGZILLA"/>
		<reference ref_id="1234853" ref_url="https://bugzilla.suse.com/1234853" source="BUGZILLA"/>
		<reference ref_id="1234891" ref_url="https://bugzilla.suse.com/1234891" source="BUGZILLA"/>
		<reference ref_id="1234921" ref_url="https://bugzilla.suse.com/1234921" source="BUGZILLA"/>
		<reference ref_id="1234960" ref_url="https://bugzilla.suse.com/1234960" source="BUGZILLA"/>
		<reference ref_id="1234963" ref_url="https://bugzilla.suse.com/1234963" source="BUGZILLA"/>
		<reference ref_id="1235004" ref_url="https://bugzilla.suse.com/1235004" source="BUGZILLA"/>
		<reference ref_id="1235035" ref_url="https://bugzilla.suse.com/1235035" source="BUGZILLA"/>
		<reference ref_id="1235054" ref_url="https://bugzilla.suse.com/1235054" source="BUGZILLA"/>
		<reference ref_id="1235056" ref_url="https://bugzilla.suse.com/1235056" source="BUGZILLA"/>
		<reference ref_id="1235061" ref_url="https://bugzilla.suse.com/1235061" source="BUGZILLA"/>
		<reference ref_id="1235073" ref_url="https://bugzilla.suse.com/1235073" source="BUGZILLA"/>
		<reference ref_id="1235220" ref_url="https://bugzilla.suse.com/1235220" source="BUGZILLA"/>
		<reference ref_id="1235224" ref_url="https://bugzilla.suse.com/1235224" source="BUGZILLA"/>
		<reference ref_id="1235246" ref_url="https://bugzilla.suse.com/1235246" source="BUGZILLA"/>
		<reference ref_id="1235507" ref_url="https://bugzilla.suse.com/1235507" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36788" ref_url="https://www.suse.com/security/cve/CVE-2020-36788/" source="CVE"/>
		<reference ref_id="CVE-2021-4148" ref_url="https://www.suse.com/security/cve/CVE-2021-4148/" source="CVE"/>
		<reference ref_id="CVE-2021-42327" ref_url="https://www.suse.com/security/cve/CVE-2021-42327/" source="CVE"/>
		<reference ref_id="CVE-2021-47202" ref_url="https://www.suse.com/security/cve/CVE-2021-47202/" source="CVE"/>
		<reference ref_id="CVE-2021-47365" ref_url="https://www.suse.com/security/cve/CVE-2021-47365/" source="CVE"/>
		<reference ref_id="CVE-2021-47489" ref_url="https://www.suse.com/security/cve/CVE-2021-47489/" source="CVE"/>
		<reference ref_id="CVE-2021-47491" ref_url="https://www.suse.com/security/cve/CVE-2021-47491/" source="CVE"/>
		<reference ref_id="CVE-2021-47492" ref_url="https://www.suse.com/security/cve/CVE-2021-47492/" source="CVE"/>
		<reference ref_id="CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632/" source="CVE"/>
		<reference ref_id="CVE-2022-48634" ref_url="https://www.suse.com/security/cve/CVE-2022-48634/" source="CVE"/>
		<reference ref_id="CVE-2022-48636" ref_url="https://www.suse.com/security/cve/CVE-2022-48636/" source="CVE"/>
		<reference ref_id="CVE-2022-48652" ref_url="https://www.suse.com/security/cve/CVE-2022-48652/" source="CVE"/>
		<reference ref_id="CVE-2022-48671" ref_url="https://www.suse.com/security/cve/CVE-2022-48671/" source="CVE"/>
		<reference ref_id="CVE-2022-48672" ref_url="https://www.suse.com/security/cve/CVE-2022-48672/" source="CVE"/>
		<reference ref_id="CVE-2022-48673" ref_url="https://www.suse.com/security/cve/CVE-2022-48673/" source="CVE"/>
		<reference ref_id="CVE-2022-48675" ref_url="https://www.suse.com/security/cve/CVE-2022-48675/" source="CVE"/>
		<reference ref_id="CVE-2022-48686" ref_url="https://www.suse.com/security/cve/CVE-2022-48686/" source="CVE"/>
		<reference ref_id="CVE-2022-48687" ref_url="https://www.suse.com/security/cve/CVE-2022-48687/" source="CVE"/>
		<reference ref_id="CVE-2022-48688" ref_url="https://www.suse.com/security/cve/CVE-2022-48688/" source="CVE"/>
		<reference ref_id="CVE-2022-48692" ref_url="https://www.suse.com/security/cve/CVE-2022-48692/" source="CVE"/>
		<reference ref_id="CVE-2022-48693" ref_url="https://www.suse.com/security/cve/CVE-2022-48693/" source="CVE"/>
		<reference ref_id="CVE-2022-48694" ref_url="https://www.suse.com/security/cve/CVE-2022-48694/" source="CVE"/>
		<reference ref_id="CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695/" source="CVE"/>
		<reference ref_id="CVE-2022-48697" ref_url="https://www.suse.com/security/cve/CVE-2022-48697/" source="CVE"/>
		<reference ref_id="CVE-2022-48699" ref_url="https://www.suse.com/security/cve/CVE-2022-48699/" source="CVE"/>
		<reference ref_id="CVE-2022-48700" ref_url="https://www.suse.com/security/cve/CVE-2022-48700/" source="CVE"/>
		<reference ref_id="CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701/" source="CVE"/>
		<reference ref_id="CVE-2022-48702" ref_url="https://www.suse.com/security/cve/CVE-2022-48702/" source="CVE"/>
		<reference ref_id="CVE-2022-48703" ref_url="https://www.suse.com/security/cve/CVE-2022-48703/" source="CVE"/>
		<reference ref_id="CVE-2022-48704" ref_url="https://www.suse.com/security/cve/CVE-2022-48704/" source="CVE"/>
		<reference ref_id="CVE-2022-49035" ref_url="https://www.suse.com/security/cve/CVE-2022-49035/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-2860" ref_url="https://www.suse.com/security/cve/CVE-2023-2860/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52654" ref_url="https://www.suse.com/security/cve/CVE-2023-52654/" source="CVE"/>
		<reference ref_id="CVE-2023-52655" ref_url="https://www.suse.com/security/cve/CVE-2023-52655/" source="CVE"/>
		<reference ref_id="CVE-2023-52676" ref_url="https://www.suse.com/security/cve/CVE-2023-52676/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-35811" ref_url="https://www.suse.com/security/cve/CVE-2024-35811/" source="CVE"/>
		<reference ref_id="CVE-2024-35815" ref_url="https://www.suse.com/security/cve/CVE-2024-35815/" source="CVE"/>
		<reference ref_id="CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895/" source="CVE"/>
		<reference ref_id="CVE-2024-35914" ref_url="https://www.suse.com/security/cve/CVE-2024-35914/" source="CVE"/>
		<reference ref_id="CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154/" source="CVE"/>
		<reference ref_id="CVE-2024-53095" ref_url="https://www.suse.com/security/cve/CVE-2024-53095/" source="CVE"/>
		<reference ref_id="CVE-2024-53142" ref_url="https://www.suse.com/security/cve/CVE-2024-53142/" source="CVE"/>
		<reference ref_id="CVE-2024-53146" ref_url="https://www.suse.com/security/cve/CVE-2024-53146/" source="CVE"/>
		<reference ref_id="CVE-2024-53156" ref_url="https://www.suse.com/security/cve/CVE-2024-53156/" source="CVE"/>
		<reference ref_id="CVE-2024-53173" ref_url="https://www.suse.com/security/cve/CVE-2024-53173/" source="CVE"/>
		<reference ref_id="CVE-2024-53179" ref_url="https://www.suse.com/security/cve/CVE-2024-53179/" source="CVE"/>
		<reference ref_id="CVE-2024-53206" ref_url="https://www.suse.com/security/cve/CVE-2024-53206/" source="CVE"/>
		<reference ref_id="CVE-2024-53214" ref_url="https://www.suse.com/security/cve/CVE-2024-53214/" source="CVE"/>
		<reference ref_id="CVE-2024-53239" ref_url="https://www.suse.com/security/cve/CVE-2024-53239/" source="CVE"/>
		<reference ref_id="CVE-2024-53240" ref_url="https://www.suse.com/security/cve/CVE-2024-53240/" source="CVE"/>
		<reference ref_id="CVE-2024-53241" ref_url="https://www.suse.com/security/cve/CVE-2024-53241/" source="CVE"/>
		<reference ref_id="CVE-2024-56539" ref_url="https://www.suse.com/security/cve/CVE-2024-56539/" source="CVE"/>
		<reference ref_id="CVE-2024-56548" ref_url="https://www.suse.com/security/cve/CVE-2024-56548/" source="CVE"/>
		<reference ref_id="CVE-2024-56570" ref_url="https://www.suse.com/security/cve/CVE-2024-56570/" source="CVE"/>
		<reference ref_id="CVE-2024-56598" ref_url="https://www.suse.com/security/cve/CVE-2024-56598/" source="CVE"/>
		<reference ref_id="CVE-2024-56604" ref_url="https://www.suse.com/security/cve/CVE-2024-56604/" source="CVE"/>
		<reference ref_id="CVE-2024-56605" ref_url="https://www.suse.com/security/cve/CVE-2024-56605/" source="CVE"/>
		<reference ref_id="CVE-2024-56619" ref_url="https://www.suse.com/security/cve/CVE-2024-56619/" source="CVE"/>
		<reference ref_id="CVE-2024-8805" ref_url="https://www.suse.com/security/cve/CVE-2024-8805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642).
- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).
- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).
- CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).
- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).
- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).
- CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
- CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (XSA-466 bsc#1234282).
- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).
- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).
- CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).
- CVE-2024-56598: jfs: array-index-out-of-bounds fix in dtReadFirst (bsc#1235220).
- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).
- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).
- CVE-2024-56619: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (bsc#1235224).
- CVE-2024-8805: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (bsc#1230697).

The following non-security bugs were fixed:

- KVM: x86: fix sending PV IPI (git-fixes).
- idpf: add support for SW triggered interrupts (bsc#1235507).
- idpf: enable WB_ON_ITR (bsc#1235507).
- idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).
- kernel-binary: do not BuildIgnore m4. It is actually needed for regenerating zconf when it is not up-to-date due to merge.
- kernel/fork: beware of __put_task_struct() calling context (bsc#1189998 (PREEMPT_RT prerequisite backports)).
- net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).
- rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to take over grep -c option that broke the conditional expression
- scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).
- smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: this fixes issue discussed in bsc#1233642].
- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).
- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- x86: Annotate call_on_stack() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-24"/>
	<updated date="2025-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170891">SUSE bug 1170891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173139">SUSE bug 1173139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185010">SUSE bug 1185010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189998">SUSE bug 1189998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190428">SUSE bug 1190428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191949">SUSE bug 1191949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193983">SUSE bug 1193983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196869">SUSE bug 1196869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200313">SUSE bug 1200313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201308">SUSE bug 1201308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201489">SUSE bug 1201489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209798">SUSE bug 1209798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215304">SUSE bug 1215304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217169">SUSE bug 1217169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222878">SUSE bug 1222878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223481">SUSE bug 1223481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223501">SUSE bug 1223501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223512">SUSE bug 1223512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223520">SUSE bug 1223520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223894">SUSE bug 1223894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223921">SUSE bug 1223921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223922">SUSE bug 1223922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223923">SUSE bug 1223923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223924">SUSE bug 1223924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223929">SUSE bug 1223929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223931">SUSE bug 1223931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223932">SUSE bug 1223932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223934">SUSE bug 1223934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223941">SUSE bug 1223941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223948">SUSE bug 1223948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223952">SUSE bug 1223952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223953">SUSE bug 1223953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223957">SUSE bug 1223957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223962">SUSE bug 1223962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223963">SUSE bug 1223963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223964">SUSE bug 1223964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223996">SUSE bug 1223996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224099">SUSE bug 1224099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224482">SUSE bug 1224482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224511">SUSE bug 1224511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224592">SUSE bug 1224592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224685">SUSE bug 1224685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224730">SUSE bug 1224730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224816">SUSE bug 1224816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224895">SUSE bug 1224895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224898">SUSE bug 1224898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224900">SUSE bug 1224900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224901">SUSE bug 1224901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230697">SUSE bug 1230697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232436">SUSE bug 1232436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233070">SUSE bug 1233070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233642">SUSE bug 1233642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234281">SUSE bug 1234281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234282">SUSE bug 1234282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234846">SUSE bug 1234846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234853">SUSE bug 1234853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234891">SUSE bug 1234891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234921">SUSE bug 1234921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234960">SUSE bug 1234960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234963">SUSE bug 1234963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235004">SUSE bug 1235004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235035">SUSE bug 1235035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235054">SUSE bug 1235054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235056">SUSE bug 1235056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235061">SUSE bug 1235061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235073">SUSE bug 1235073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235220">SUSE bug 1235220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235224">SUSE bug 1235224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235246">SUSE bug 1235246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235507">SUSE bug 1235507</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-36788/">CVE-2020-36788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36788">CVE-2020-36788 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4148/">CVE-2021-4148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4148">CVE-2021-4148 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42327/">CVE-2021-42327 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47202/">CVE-2021-47202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47202">CVE-2021-47202 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47365/">CVE-2021-47365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47365">CVE-2021-47365 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47489/">CVE-2021-47489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47489">CVE-2021-47489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47491/">CVE-2021-47491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47491">CVE-2021-47491 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47492/">CVE-2021-47492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47492">CVE-2021-47492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48634/">CVE-2022-48634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48634">CVE-2022-48634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48636/">CVE-2022-48636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48636">CVE-2022-48636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48652/">CVE-2022-48652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48652">CVE-2022-48652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48671/">CVE-2022-48671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48671">CVE-2022-48671 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48672/">CVE-2022-48672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48672">CVE-2022-48672 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48673/">CVE-2022-48673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48673">CVE-2022-48673 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48675/">CVE-2022-48675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48675">CVE-2022-48675 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48686/">CVE-2022-48686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48686">CVE-2022-48686 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48687/">CVE-2022-48687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48687">CVE-2022-48687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48688/">CVE-2022-48688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48688">CVE-2022-48688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48692/">CVE-2022-48692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48692">CVE-2022-48692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48693/">CVE-2022-48693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48693">CVE-2022-48693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48694/">CVE-2022-48694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48694">CVE-2022-48694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48697/">CVE-2022-48697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48697">CVE-2022-48697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48699/">CVE-2022-48699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48699">CVE-2022-48699 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48700/">CVE-2022-48700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48700">CVE-2022-48700 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48702/">CVE-2022-48702 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48702">CVE-2022-48702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48703/">CVE-2022-48703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48703">CVE-2022-48703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48704/">CVE-2022-48704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48704">CVE-2022-48704 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49035/">CVE-2022-49035 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49035">CVE-2022-49035 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2860/">CVE-2023-2860 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2860">CVE-2023-2860 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52654/">CVE-2023-52654 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52655/">CVE-2023-52655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52676/">CVE-2023-52676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52676">CVE-2023-52676 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35811/">CVE-2024-35811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35811">CVE-2024-35811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35815/">CVE-2024-35815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35914/">CVE-2024-35914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35914">CVE-2024-35914 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53095/">CVE-2024-53095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53095">CVE-2024-53095 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-53142/">CVE-2024-53142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53142">CVE-2024-53142 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53146/">CVE-2024-53146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53146">CVE-2024-53146 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53156/">CVE-2024-53156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53156">CVE-2024-53156 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53173/">CVE-2024-53173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53179/">CVE-2024-53179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53179">CVE-2024-53179 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53206/">CVE-2024-53206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53206">CVE-2024-53206 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53214/">CVE-2024-53214 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53214">CVE-2024-53214 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53239/">CVE-2024-53239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53239">CVE-2024-53239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53240/">CVE-2024-53240 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53240">CVE-2024-53240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53241/">CVE-2024-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56539/">CVE-2024-56539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56539">CVE-2024-56539 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56548/">CVE-2024-56548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56548">CVE-2024-56548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56570/">CVE-2024-56570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56570">CVE-2024-56570 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56598/">CVE-2024-56598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56604/">CVE-2024-56604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56605/">CVE-2024-56605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56619/">CVE-2024-56619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8805/">CVE-2024-8805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8805">CVE-2024-8805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961640" comment="kernel-rt-5.14.21-150400.15.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961641" comment="kernel-source-rt-5.14.21-150400.15.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206332" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1198410" ref_url="https://bugzilla.suse.com/1198410" source="BUGZILLA"/>
		<reference ref_id="1199356" ref_url="https://bugzilla.suse.com/1199356" source="BUGZILLA"/>
		<reference ref_id="1199487" ref_url="https://bugzilla.suse.com/1199487" source="BUGZILLA"/>
		<reference ref_id="1201160" ref_url="https://bugzilla.suse.com/1201160" source="BUGZILLA"/>
		<reference ref_id="1201956" ref_url="https://bugzilla.suse.com/1201956" source="BUGZILLA"/>
		<reference ref_id="1202094" ref_url="https://bugzilla.suse.com/1202094" source="BUGZILLA"/>
		<reference ref_id="1202095" ref_url="https://bugzilla.suse.com/1202095" source="BUGZILLA"/>
		<reference ref_id="1202564" ref_url="https://bugzilla.suse.com/1202564" source="BUGZILLA"/>
		<reference ref_id="1202716" ref_url="https://bugzilla.suse.com/1202716" source="BUGZILLA"/>
		<reference ref_id="1202823" ref_url="https://bugzilla.suse.com/1202823" source="BUGZILLA"/>
		<reference ref_id="1202860" ref_url="https://bugzilla.suse.com/1202860" source="BUGZILLA"/>
		<reference ref_id="1203197" ref_url="https://bugzilla.suse.com/1203197" source="BUGZILLA"/>
		<reference ref_id="1203361" ref_url="https://bugzilla.suse.com/1203361" source="BUGZILLA"/>
		<reference ref_id="1205220" ref_url="https://bugzilla.suse.com/1205220" source="BUGZILLA"/>
		<reference ref_id="1205514" ref_url="https://bugzilla.suse.com/1205514" source="BUGZILLA"/>
		<reference ref_id="1206664" ref_url="https://bugzilla.suse.com/1206664" source="BUGZILLA"/>
		<reference ref_id="1206878" ref_url="https://bugzilla.suse.com/1206878" source="BUGZILLA"/>
		<reference ref_id="1206880" ref_url="https://bugzilla.suse.com/1206880" source="BUGZILLA"/>
		<reference ref_id="1207361" ref_url="https://bugzilla.suse.com/1207361" source="BUGZILLA"/>
		<reference ref_id="1207638" ref_url="https://bugzilla.suse.com/1207638" source="BUGZILLA"/>
		<reference ref_id="1211226" ref_url="https://bugzilla.suse.com/1211226" source="BUGZILLA"/>
		<reference ref_id="1212051" ref_url="https://bugzilla.suse.com/1212051" source="BUGZILLA"/>
		<reference ref_id="1213090" ref_url="https://bugzilla.suse.com/1213090" source="BUGZILLA"/>
		<reference ref_id="1218184" ref_url="https://bugzilla.suse.com/1218184" source="BUGZILLA"/>
		<reference ref_id="1218234" ref_url="https://bugzilla.suse.com/1218234" source="BUGZILLA"/>
		<reference ref_id="1218470" ref_url="https://bugzilla.suse.com/1218470" source="BUGZILLA"/>
		<reference ref_id="1222634" ref_url="https://bugzilla.suse.com/1222634" source="BUGZILLA"/>
		<reference ref_id="1223675" ref_url="https://bugzilla.suse.com/1223675" source="BUGZILLA"/>
		<reference ref_id="1224095" ref_url="https://bugzilla.suse.com/1224095" source="BUGZILLA"/>
		<reference ref_id="1224597" ref_url="https://bugzilla.suse.com/1224597" source="BUGZILLA"/>
		<reference ref_id="1225468" ref_url="https://bugzilla.suse.com/1225468" source="BUGZILLA"/>
		<reference ref_id="1225820" ref_url="https://bugzilla.suse.com/1225820" source="BUGZILLA"/>
		<reference ref_id="1226514" ref_url="https://bugzilla.suse.com/1226514" source="BUGZILLA"/>
		<reference ref_id="1226552" ref_url="https://bugzilla.suse.com/1226552" source="BUGZILLA"/>
		<reference ref_id="1228659" ref_url="https://bugzilla.suse.com/1228659" source="BUGZILLA"/>
		<reference ref_id="1230827" ref_url="https://bugzilla.suse.com/1230827" source="BUGZILLA"/>
		<reference ref_id="1231293" ref_url="https://bugzilla.suse.com/1231293" source="BUGZILLA"/>
		<reference ref_id="1232504" ref_url="https://bugzilla.suse.com/1232504" source="BUGZILLA"/>
		<reference ref_id="1233551" ref_url="https://bugzilla.suse.com/1233551" source="BUGZILLA"/>
		<reference ref_id="1234156" ref_url="https://bugzilla.suse.com/1234156" source="BUGZILLA"/>
		<reference ref_id="1234381" ref_url="https://bugzilla.suse.com/1234381" source="BUGZILLA"/>
		<reference ref_id="1234454" ref_url="https://bugzilla.suse.com/1234454" source="BUGZILLA"/>
		<reference ref_id="1235637" ref_url="https://bugzilla.suse.com/1235637" source="BUGZILLA"/>
		<reference ref_id="1236333" ref_url="https://bugzilla.suse.com/1236333" source="BUGZILLA"/>
		<reference ref_id="1236821" ref_url="https://bugzilla.suse.com/1236821" source="BUGZILLA"/>
		<reference ref_id="1236822" ref_url="https://bugzilla.suse.com/1236822" source="BUGZILLA"/>
		<reference ref_id="1237159" ref_url="https://bugzilla.suse.com/1237159" source="BUGZILLA"/>
		<reference ref_id="1237312" ref_url="https://bugzilla.suse.com/1237312" source="BUGZILLA"/>
		<reference ref_id="1237313" ref_url="https://bugzilla.suse.com/1237313" source="BUGZILLA"/>
		<reference ref_id="1238303" ref_url="https://bugzilla.suse.com/1238303" source="BUGZILLA"/>
		<reference ref_id="1238526" ref_url="https://bugzilla.suse.com/1238526" source="BUGZILLA"/>
		<reference ref_id="1238570" ref_url="https://bugzilla.suse.com/1238570" source="BUGZILLA"/>
		<reference ref_id="1238876" ref_url="https://bugzilla.suse.com/1238876" source="BUGZILLA"/>
		<reference ref_id="1239986" ref_url="https://bugzilla.suse.com/1239986" source="BUGZILLA"/>
		<reference ref_id="1240785" ref_url="https://bugzilla.suse.com/1240785" source="BUGZILLA"/>
		<reference ref_id="1241038" ref_url="https://bugzilla.suse.com/1241038" source="BUGZILLA"/>
		<reference ref_id="1242221" ref_url="https://bugzilla.suse.com/1242221" source="BUGZILLA"/>
		<reference ref_id="1242414" ref_url="https://bugzilla.suse.com/1242414" source="BUGZILLA"/>
		<reference ref_id="1242417" ref_url="https://bugzilla.suse.com/1242417" source="BUGZILLA"/>
		<reference ref_id="1242504" ref_url="https://bugzilla.suse.com/1242504" source="BUGZILLA"/>
		<reference ref_id="1242596" ref_url="https://bugzilla.suse.com/1242596" source="BUGZILLA"/>
		<reference ref_id="1242782" ref_url="https://bugzilla.suse.com/1242782" source="BUGZILLA"/>
		<reference ref_id="1242924" ref_url="https://bugzilla.suse.com/1242924" source="BUGZILLA"/>
		<reference ref_id="1243001" ref_url="https://bugzilla.suse.com/1243001" source="BUGZILLA"/>
		<reference ref_id="1243330" ref_url="https://bugzilla.suse.com/1243330" source="BUGZILLA"/>
		<reference ref_id="1243543" ref_url="https://bugzilla.suse.com/1243543" source="BUGZILLA"/>
		<reference ref_id="1243627" ref_url="https://bugzilla.suse.com/1243627" source="BUGZILLA"/>
		<reference ref_id="1243832" ref_url="https://bugzilla.suse.com/1243832" source="BUGZILLA"/>
		<reference ref_id="1244114" ref_url="https://bugzilla.suse.com/1244114" source="BUGZILLA"/>
		<reference ref_id="1244179" ref_url="https://bugzilla.suse.com/1244179" source="BUGZILLA"/>
		<reference ref_id="1244234" ref_url="https://bugzilla.suse.com/1244234" source="BUGZILLA"/>
		<reference ref_id="1244241" ref_url="https://bugzilla.suse.com/1244241" source="BUGZILLA"/>
		<reference ref_id="1244277" ref_url="https://bugzilla.suse.com/1244277" source="BUGZILLA"/>
		<reference ref_id="1244309" ref_url="https://bugzilla.suse.com/1244309" source="BUGZILLA"/>
		<reference ref_id="1244337" ref_url="https://bugzilla.suse.com/1244337" source="BUGZILLA"/>
		<reference ref_id="1244732" ref_url="https://bugzilla.suse.com/1244732" source="BUGZILLA"/>
		<reference ref_id="1244764" ref_url="https://bugzilla.suse.com/1244764" source="BUGZILLA"/>
		<reference ref_id="1244765" ref_url="https://bugzilla.suse.com/1244765" source="BUGZILLA"/>
		<reference ref_id="1244767" ref_url="https://bugzilla.suse.com/1244767" source="BUGZILLA"/>
		<reference ref_id="1244770" ref_url="https://bugzilla.suse.com/1244770" source="BUGZILLA"/>
		<reference ref_id="1244771" ref_url="https://bugzilla.suse.com/1244771" source="BUGZILLA"/>
		<reference ref_id="1244773" ref_url="https://bugzilla.suse.com/1244773" source="BUGZILLA"/>
		<reference ref_id="1244774" ref_url="https://bugzilla.suse.com/1244774" source="BUGZILLA"/>
		<reference ref_id="1244776" ref_url="https://bugzilla.suse.com/1244776" source="BUGZILLA"/>
		<reference ref_id="1244779" ref_url="https://bugzilla.suse.com/1244779" source="BUGZILLA"/>
		<reference ref_id="1244780" ref_url="https://bugzilla.suse.com/1244780" source="BUGZILLA"/>
		<reference ref_id="1244781" ref_url="https://bugzilla.suse.com/1244781" source="BUGZILLA"/>
		<reference ref_id="1244782" ref_url="https://bugzilla.suse.com/1244782" source="BUGZILLA"/>
		<reference ref_id="1244783" ref_url="https://bugzilla.suse.com/1244783" source="BUGZILLA"/>
		<reference ref_id="1244784" ref_url="https://bugzilla.suse.com/1244784" source="BUGZILLA"/>
		<reference ref_id="1244786" ref_url="https://bugzilla.suse.com/1244786" source="BUGZILLA"/>
		<reference ref_id="1244787" ref_url="https://bugzilla.suse.com/1244787" source="BUGZILLA"/>
		<reference ref_id="1244788" ref_url="https://bugzilla.suse.com/1244788" source="BUGZILLA"/>
		<reference ref_id="1244790" ref_url="https://bugzilla.suse.com/1244790" source="BUGZILLA"/>
		<reference ref_id="1244793" ref_url="https://bugzilla.suse.com/1244793" source="BUGZILLA"/>
		<reference ref_id="1244794" ref_url="https://bugzilla.suse.com/1244794" source="BUGZILLA"/>
		<reference ref_id="1244796" ref_url="https://bugzilla.suse.com/1244796" source="BUGZILLA"/>
		<reference ref_id="1244797" ref_url="https://bugzilla.suse.com/1244797" source="BUGZILLA"/>
		<reference ref_id="1244798" ref_url="https://bugzilla.suse.com/1244798" source="BUGZILLA"/>
		<reference ref_id="1244800" ref_url="https://bugzilla.suse.com/1244800" source="BUGZILLA"/>
		<reference ref_id="1244802" ref_url="https://bugzilla.suse.com/1244802" source="BUGZILLA"/>
		<reference ref_id="1244804" ref_url="https://bugzilla.suse.com/1244804" source="BUGZILLA"/>
		<reference ref_id="1244807" ref_url="https://bugzilla.suse.com/1244807" source="BUGZILLA"/>
		<reference ref_id="1244808" ref_url="https://bugzilla.suse.com/1244808" source="BUGZILLA"/>
		<reference ref_id="1244811" ref_url="https://bugzilla.suse.com/1244811" source="BUGZILLA"/>
		<reference ref_id="1244813" ref_url="https://bugzilla.suse.com/1244813" source="BUGZILLA"/>
		<reference ref_id="1244814" ref_url="https://bugzilla.suse.com/1244814" source="BUGZILLA"/>
		<reference ref_id="1244815" ref_url="https://bugzilla.suse.com/1244815" source="BUGZILLA"/>
		<reference ref_id="1244816" ref_url="https://bugzilla.suse.com/1244816" source="BUGZILLA"/>
		<reference ref_id="1244819" ref_url="https://bugzilla.suse.com/1244819" source="BUGZILLA"/>
		<reference ref_id="1244820" ref_url="https://bugzilla.suse.com/1244820" source="BUGZILLA"/>
		<reference ref_id="1244823" ref_url="https://bugzilla.suse.com/1244823" source="BUGZILLA"/>
		<reference ref_id="1244824" ref_url="https://bugzilla.suse.com/1244824" source="BUGZILLA"/>
		<reference ref_id="1244825" ref_url="https://bugzilla.suse.com/1244825" source="BUGZILLA"/>
		<reference ref_id="1244830" ref_url="https://bugzilla.suse.com/1244830" source="BUGZILLA"/>
		<reference ref_id="1244831" ref_url="https://bugzilla.suse.com/1244831" source="BUGZILLA"/>
		<reference ref_id="1244832" ref_url="https://bugzilla.suse.com/1244832" source="BUGZILLA"/>
		<reference ref_id="1244834" ref_url="https://bugzilla.suse.com/1244834" source="BUGZILLA"/>
		<reference ref_id="1244836" ref_url="https://bugzilla.suse.com/1244836" source="BUGZILLA"/>
		<reference ref_id="1244838" ref_url="https://bugzilla.suse.com/1244838" source="BUGZILLA"/>
		<reference ref_id="1244839" ref_url="https://bugzilla.suse.com/1244839" source="BUGZILLA"/>
		<reference ref_id="1244840" ref_url="https://bugzilla.suse.com/1244840" source="BUGZILLA"/>
		<reference ref_id="1244841" ref_url="https://bugzilla.suse.com/1244841" source="BUGZILLA"/>
		<reference ref_id="1244842" ref_url="https://bugzilla.suse.com/1244842" source="BUGZILLA"/>
		<reference ref_id="1244843" ref_url="https://bugzilla.suse.com/1244843" source="BUGZILLA"/>
		<reference ref_id="1244845" ref_url="https://bugzilla.suse.com/1244845" source="BUGZILLA"/>
		<reference ref_id="1244846" ref_url="https://bugzilla.suse.com/1244846" source="BUGZILLA"/>
		<reference ref_id="1244848" ref_url="https://bugzilla.suse.com/1244848" source="BUGZILLA"/>
		<reference ref_id="1244849" ref_url="https://bugzilla.suse.com/1244849" source="BUGZILLA"/>
		<reference ref_id="1244851" ref_url="https://bugzilla.suse.com/1244851" source="BUGZILLA"/>
		<reference ref_id="1244853" ref_url="https://bugzilla.suse.com/1244853" source="BUGZILLA"/>
		<reference ref_id="1244854" ref_url="https://bugzilla.suse.com/1244854" source="BUGZILLA"/>
		<reference ref_id="1244856" ref_url="https://bugzilla.suse.com/1244856" source="BUGZILLA"/>
		<reference ref_id="1244860" ref_url="https://bugzilla.suse.com/1244860" source="BUGZILLA"/>
		<reference ref_id="1244861" ref_url="https://bugzilla.suse.com/1244861" source="BUGZILLA"/>
		<reference ref_id="1244866" ref_url="https://bugzilla.suse.com/1244866" source="BUGZILLA"/>
		<reference ref_id="1244867" ref_url="https://bugzilla.suse.com/1244867" source="BUGZILLA"/>
		<reference ref_id="1244868" ref_url="https://bugzilla.suse.com/1244868" source="BUGZILLA"/>
		<reference ref_id="1244869" ref_url="https://bugzilla.suse.com/1244869" source="BUGZILLA"/>
		<reference ref_id="1244870" ref_url="https://bugzilla.suse.com/1244870" source="BUGZILLA"/>
		<reference ref_id="1244871" ref_url="https://bugzilla.suse.com/1244871" source="BUGZILLA"/>
		<reference ref_id="1244872" ref_url="https://bugzilla.suse.com/1244872" source="BUGZILLA"/>
		<reference ref_id="1244873" ref_url="https://bugzilla.suse.com/1244873" source="BUGZILLA"/>
		<reference ref_id="1244875" ref_url="https://bugzilla.suse.com/1244875" source="BUGZILLA"/>
		<reference ref_id="1244876" ref_url="https://bugzilla.suse.com/1244876" source="BUGZILLA"/>
		<reference ref_id="1244878" ref_url="https://bugzilla.suse.com/1244878" source="BUGZILLA"/>
		<reference ref_id="1244879" ref_url="https://bugzilla.suse.com/1244879" source="BUGZILLA"/>
		<reference ref_id="1244881" ref_url="https://bugzilla.suse.com/1244881" source="BUGZILLA"/>
		<reference ref_id="1244883" ref_url="https://bugzilla.suse.com/1244883" source="BUGZILLA"/>
		<reference ref_id="1244884" ref_url="https://bugzilla.suse.com/1244884" source="BUGZILLA"/>
		<reference ref_id="1244886" ref_url="https://bugzilla.suse.com/1244886" source="BUGZILLA"/>
		<reference ref_id="1244887" ref_url="https://bugzilla.suse.com/1244887" source="BUGZILLA"/>
		<reference ref_id="1244890" ref_url="https://bugzilla.suse.com/1244890" source="BUGZILLA"/>
		<reference ref_id="1244895" ref_url="https://bugzilla.suse.com/1244895" source="BUGZILLA"/>
		<reference ref_id="1244899" ref_url="https://bugzilla.suse.com/1244899" source="BUGZILLA"/>
		<reference ref_id="1244900" ref_url="https://bugzilla.suse.com/1244900" source="BUGZILLA"/>
		<reference ref_id="1244901" ref_url="https://bugzilla.suse.com/1244901" source="BUGZILLA"/>
		<reference ref_id="1244902" ref_url="https://bugzilla.suse.com/1244902" source="BUGZILLA"/>
		<reference ref_id="1244903" ref_url="https://bugzilla.suse.com/1244903" source="BUGZILLA"/>
		<reference ref_id="1244908" ref_url="https://bugzilla.suse.com/1244908" source="BUGZILLA"/>
		<reference ref_id="1244911" ref_url="https://bugzilla.suse.com/1244911" source="BUGZILLA"/>
		<reference ref_id="1244915" ref_url="https://bugzilla.suse.com/1244915" source="BUGZILLA"/>
		<reference ref_id="1244936" ref_url="https://bugzilla.suse.com/1244936" source="BUGZILLA"/>
		<reference ref_id="1244941" ref_url="https://bugzilla.suse.com/1244941" source="BUGZILLA"/>
		<reference ref_id="1244942" ref_url="https://bugzilla.suse.com/1244942" source="BUGZILLA"/>
		<reference ref_id="1244943" ref_url="https://bugzilla.suse.com/1244943" source="BUGZILLA"/>
		<reference ref_id="1244944" ref_url="https://bugzilla.suse.com/1244944" source="BUGZILLA"/>
		<reference ref_id="1244945" ref_url="https://bugzilla.suse.com/1244945" source="BUGZILLA"/>
		<reference ref_id="1244948" ref_url="https://bugzilla.suse.com/1244948" source="BUGZILLA"/>
		<reference ref_id="1244949" ref_url="https://bugzilla.suse.com/1244949" source="BUGZILLA"/>
		<reference ref_id="1244950" ref_url="https://bugzilla.suse.com/1244950" source="BUGZILLA"/>
		<reference ref_id="1244956" ref_url="https://bugzilla.suse.com/1244956" source="BUGZILLA"/>
		<reference ref_id="1244958" ref_url="https://bugzilla.suse.com/1244958" source="BUGZILLA"/>
		<reference ref_id="1244959" ref_url="https://bugzilla.suse.com/1244959" source="BUGZILLA"/>
		<reference ref_id="1244965" ref_url="https://bugzilla.suse.com/1244965" source="BUGZILLA"/>
		<reference ref_id="1244966" ref_url="https://bugzilla.suse.com/1244966" source="BUGZILLA"/>
		<reference ref_id="1244967" ref_url="https://bugzilla.suse.com/1244967" source="BUGZILLA"/>
		<reference ref_id="1244968" ref_url="https://bugzilla.suse.com/1244968" source="BUGZILLA"/>
		<reference ref_id="1244969" ref_url="https://bugzilla.suse.com/1244969" source="BUGZILLA"/>
		<reference ref_id="1244970" ref_url="https://bugzilla.suse.com/1244970" source="BUGZILLA"/>
		<reference ref_id="1244974" ref_url="https://bugzilla.suse.com/1244974" source="BUGZILLA"/>
		<reference ref_id="1244976" ref_url="https://bugzilla.suse.com/1244976" source="BUGZILLA"/>
		<reference ref_id="1244977" ref_url="https://bugzilla.suse.com/1244977" source="BUGZILLA"/>
		<reference ref_id="1244978" ref_url="https://bugzilla.suse.com/1244978" source="BUGZILLA"/>
		<reference ref_id="1244979" ref_url="https://bugzilla.suse.com/1244979" source="BUGZILLA"/>
		<reference ref_id="1244983" ref_url="https://bugzilla.suse.com/1244983" source="BUGZILLA"/>
		<reference ref_id="1244984" ref_url="https://bugzilla.suse.com/1244984" source="BUGZILLA"/>
		<reference ref_id="1244985" ref_url="https://bugzilla.suse.com/1244985" source="BUGZILLA"/>
		<reference ref_id="1244986" ref_url="https://bugzilla.suse.com/1244986" source="BUGZILLA"/>
		<reference ref_id="1244991" ref_url="https://bugzilla.suse.com/1244991" source="BUGZILLA"/>
		<reference ref_id="1244992" ref_url="https://bugzilla.suse.com/1244992" source="BUGZILLA"/>
		<reference ref_id="1244993" ref_url="https://bugzilla.suse.com/1244993" source="BUGZILLA"/>
		<reference ref_id="1245006" ref_url="https://bugzilla.suse.com/1245006" source="BUGZILLA"/>
		<reference ref_id="1245007" ref_url="https://bugzilla.suse.com/1245007" source="BUGZILLA"/>
		<reference ref_id="1245009" ref_url="https://bugzilla.suse.com/1245009" source="BUGZILLA"/>
		<reference ref_id="1245011" ref_url="https://bugzilla.suse.com/1245011" source="BUGZILLA"/>
		<reference ref_id="1245012" ref_url="https://bugzilla.suse.com/1245012" source="BUGZILLA"/>
		<reference ref_id="1245018" ref_url="https://bugzilla.suse.com/1245018" source="BUGZILLA"/>
		<reference ref_id="1245019" ref_url="https://bugzilla.suse.com/1245019" source="BUGZILLA"/>
		<reference ref_id="1245024" ref_url="https://bugzilla.suse.com/1245024" source="BUGZILLA"/>
		<reference ref_id="1245028" ref_url="https://bugzilla.suse.com/1245028" source="BUGZILLA"/>
		<reference ref_id="1245031" ref_url="https://bugzilla.suse.com/1245031" source="BUGZILLA"/>
		<reference ref_id="1245032" ref_url="https://bugzilla.suse.com/1245032" source="BUGZILLA"/>
		<reference ref_id="1245033" ref_url="https://bugzilla.suse.com/1245033" source="BUGZILLA"/>
		<reference ref_id="1245038" ref_url="https://bugzilla.suse.com/1245038" source="BUGZILLA"/>
		<reference ref_id="1245039" ref_url="https://bugzilla.suse.com/1245039" source="BUGZILLA"/>
		<reference ref_id="1245041" ref_url="https://bugzilla.suse.com/1245041" source="BUGZILLA"/>
		<reference ref_id="1245047" ref_url="https://bugzilla.suse.com/1245047" source="BUGZILLA"/>
		<reference ref_id="1245051" ref_url="https://bugzilla.suse.com/1245051" source="BUGZILLA"/>
		<reference ref_id="1245057" ref_url="https://bugzilla.suse.com/1245057" source="BUGZILLA"/>
		<reference ref_id="1245058" ref_url="https://bugzilla.suse.com/1245058" source="BUGZILLA"/>
		<reference ref_id="1245060" ref_url="https://bugzilla.suse.com/1245060" source="BUGZILLA"/>
		<reference ref_id="1245062" ref_url="https://bugzilla.suse.com/1245062" source="BUGZILLA"/>
		<reference ref_id="1245064" ref_url="https://bugzilla.suse.com/1245064" source="BUGZILLA"/>
		<reference ref_id="1245069" ref_url="https://bugzilla.suse.com/1245069" source="BUGZILLA"/>
		<reference ref_id="1245072" ref_url="https://bugzilla.suse.com/1245072" source="BUGZILLA"/>
		<reference ref_id="1245073" ref_url="https://bugzilla.suse.com/1245073" source="BUGZILLA"/>
		<reference ref_id="1245088" ref_url="https://bugzilla.suse.com/1245088" source="BUGZILLA"/>
		<reference ref_id="1245089" ref_url="https://bugzilla.suse.com/1245089" source="BUGZILLA"/>
		<reference ref_id="1245092" ref_url="https://bugzilla.suse.com/1245092" source="BUGZILLA"/>
		<reference ref_id="1245093" ref_url="https://bugzilla.suse.com/1245093" source="BUGZILLA"/>
		<reference ref_id="1245098" ref_url="https://bugzilla.suse.com/1245098" source="BUGZILLA"/>
		<reference ref_id="1245103" ref_url="https://bugzilla.suse.com/1245103" source="BUGZILLA"/>
		<reference ref_id="1245117" ref_url="https://bugzilla.suse.com/1245117" source="BUGZILLA"/>
		<reference ref_id="1245118" ref_url="https://bugzilla.suse.com/1245118" source="BUGZILLA"/>
		<reference ref_id="1245119" ref_url="https://bugzilla.suse.com/1245119" source="BUGZILLA"/>
		<reference ref_id="1245121" ref_url="https://bugzilla.suse.com/1245121" source="BUGZILLA"/>
		<reference ref_id="1245122" ref_url="https://bugzilla.suse.com/1245122" source="BUGZILLA"/>
		<reference ref_id="1245125" ref_url="https://bugzilla.suse.com/1245125" source="BUGZILLA"/>
		<reference ref_id="1245129" ref_url="https://bugzilla.suse.com/1245129" source="BUGZILLA"/>
		<reference ref_id="1245131" ref_url="https://bugzilla.suse.com/1245131" source="BUGZILLA"/>
		<reference ref_id="1245133" ref_url="https://bugzilla.suse.com/1245133" source="BUGZILLA"/>
		<reference ref_id="1245134" ref_url="https://bugzilla.suse.com/1245134" source="BUGZILLA"/>
		<reference ref_id="1245135" ref_url="https://bugzilla.suse.com/1245135" source="BUGZILLA"/>
		<reference ref_id="1245136" ref_url="https://bugzilla.suse.com/1245136" source="BUGZILLA"/>
		<reference ref_id="1245138" ref_url="https://bugzilla.suse.com/1245138" source="BUGZILLA"/>
		<reference ref_id="1245139" ref_url="https://bugzilla.suse.com/1245139" source="BUGZILLA"/>
		<reference ref_id="1245140" ref_url="https://bugzilla.suse.com/1245140" source="BUGZILLA"/>
		<reference ref_id="1245142" ref_url="https://bugzilla.suse.com/1245142" source="BUGZILLA"/>
		<reference ref_id="1245146" ref_url="https://bugzilla.suse.com/1245146" source="BUGZILLA"/>
		<reference ref_id="1245147" ref_url="https://bugzilla.suse.com/1245147" source="BUGZILLA"/>
		<reference ref_id="1245149" ref_url="https://bugzilla.suse.com/1245149" source="BUGZILLA"/>
		<reference ref_id="1245152" ref_url="https://bugzilla.suse.com/1245152" source="BUGZILLA"/>
		<reference ref_id="1245154" ref_url="https://bugzilla.suse.com/1245154" source="BUGZILLA"/>
		<reference ref_id="1245180" ref_url="https://bugzilla.suse.com/1245180" source="BUGZILLA"/>
		<reference ref_id="1245183" ref_url="https://bugzilla.suse.com/1245183" source="BUGZILLA"/>
		<reference ref_id="1245189" ref_url="https://bugzilla.suse.com/1245189" source="BUGZILLA"/>
		<reference ref_id="1245191" ref_url="https://bugzilla.suse.com/1245191" source="BUGZILLA"/>
		<reference ref_id="1245195" ref_url="https://bugzilla.suse.com/1245195" source="BUGZILLA"/>
		<reference ref_id="1245197" ref_url="https://bugzilla.suse.com/1245197" source="BUGZILLA"/>
		<reference ref_id="1245265" ref_url="https://bugzilla.suse.com/1245265" source="BUGZILLA"/>
		<reference ref_id="1245348" ref_url="https://bugzilla.suse.com/1245348" source="BUGZILLA"/>
		<reference ref_id="1245431" ref_url="https://bugzilla.suse.com/1245431" source="BUGZILLA"/>
		<reference ref_id="1245455" ref_url="https://bugzilla.suse.com/1245455" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47557" ref_url="https://www.suse.com/security/cve/CVE-2021-47557/" source="CVE"/>
		<reference ref_id="CVE-2021-47595" ref_url="https://www.suse.com/security/cve/CVE-2021-47595/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-2585" ref_url="https://www.suse.com/security/cve/CVE-2022-2585/" source="CVE"/>
		<reference ref_id="CVE-2022-2586" ref_url="https://www.suse.com/security/cve/CVE-2022-2586/" source="CVE"/>
		<reference ref_id="CVE-2022-2905" ref_url="https://www.suse.com/security/cve/CVE-2022-2905/" source="CVE"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095/" source="CVE"/>
		<reference ref_id="CVE-2022-4662" ref_url="https://www.suse.com/security/cve/CVE-2022-4662/" source="CVE"/>
		<reference ref_id="CVE-2022-49934" ref_url="https://www.suse.com/security/cve/CVE-2022-49934/" source="CVE"/>
		<reference ref_id="CVE-2022-49936" ref_url="https://www.suse.com/security/cve/CVE-2022-49936/" source="CVE"/>
		<reference ref_id="CVE-2022-49937" ref_url="https://www.suse.com/security/cve/CVE-2022-49937/" source="CVE"/>
		<reference ref_id="CVE-2022-49938" ref_url="https://www.suse.com/security/cve/CVE-2022-49938/" source="CVE"/>
		<reference ref_id="CVE-2022-49940" ref_url="https://www.suse.com/security/cve/CVE-2022-49940/" source="CVE"/>
		<reference ref_id="CVE-2022-49942" ref_url="https://www.suse.com/security/cve/CVE-2022-49942/" source="CVE"/>
		<reference ref_id="CVE-2022-49945" ref_url="https://www.suse.com/security/cve/CVE-2022-49945/" source="CVE"/>
		<reference ref_id="CVE-2022-49946" ref_url="https://www.suse.com/security/cve/CVE-2022-49946/" source="CVE"/>
		<reference ref_id="CVE-2022-49948" ref_url="https://www.suse.com/security/cve/CVE-2022-49948/" source="CVE"/>
		<reference ref_id="CVE-2022-49950" ref_url="https://www.suse.com/security/cve/CVE-2022-49950/" source="CVE"/>
		<reference ref_id="CVE-2022-49952" ref_url="https://www.suse.com/security/cve/CVE-2022-49952/" source="CVE"/>
		<reference ref_id="CVE-2022-49954" ref_url="https://www.suse.com/security/cve/CVE-2022-49954/" source="CVE"/>
		<reference ref_id="CVE-2022-49956" ref_url="https://www.suse.com/security/cve/CVE-2022-49956/" source="CVE"/>
		<reference ref_id="CVE-2022-49957" ref_url="https://www.suse.com/security/cve/CVE-2022-49957/" source="CVE"/>
		<reference ref_id="CVE-2022-49958" ref_url="https://www.suse.com/security/cve/CVE-2022-49958/" source="CVE"/>
		<reference ref_id="CVE-2022-49960" ref_url="https://www.suse.com/security/cve/CVE-2022-49960/" source="CVE"/>
		<reference ref_id="CVE-2022-49964" ref_url="https://www.suse.com/security/cve/CVE-2022-49964/" source="CVE"/>
		<reference ref_id="CVE-2022-49966" ref_url="https://www.suse.com/security/cve/CVE-2022-49966/" source="CVE"/>
		<reference ref_id="CVE-2022-49968" ref_url="https://www.suse.com/security/cve/CVE-2022-49968/" source="CVE"/>
		<reference ref_id="CVE-2022-49969" ref_url="https://www.suse.com/security/cve/CVE-2022-49969/" source="CVE"/>
		<reference ref_id="CVE-2022-49977" ref_url="https://www.suse.com/security/cve/CVE-2022-49977/" source="CVE"/>
		<reference ref_id="CVE-2022-49978" ref_url="https://www.suse.com/security/cve/CVE-2022-49978/" source="CVE"/>
		<reference ref_id="CVE-2022-49981" ref_url="https://www.suse.com/security/cve/CVE-2022-49981/" source="CVE"/>
		<reference ref_id="CVE-2022-49982" ref_url="https://www.suse.com/security/cve/CVE-2022-49982/" source="CVE"/>
		<reference ref_id="CVE-2022-49983" ref_url="https://www.suse.com/security/cve/CVE-2022-49983/" source="CVE"/>
		<reference ref_id="CVE-2022-49984" ref_url="https://www.suse.com/security/cve/CVE-2022-49984/" source="CVE"/>
		<reference ref_id="CVE-2022-49985" ref_url="https://www.suse.com/security/cve/CVE-2022-49985/" source="CVE"/>
		<reference ref_id="CVE-2022-49986" ref_url="https://www.suse.com/security/cve/CVE-2022-49986/" source="CVE"/>
		<reference ref_id="CVE-2022-49987" ref_url="https://www.suse.com/security/cve/CVE-2022-49987/" source="CVE"/>
		<reference ref_id="CVE-2022-49989" ref_url="https://www.suse.com/security/cve/CVE-2022-49989/" source="CVE"/>
		<reference ref_id="CVE-2022-49990" ref_url="https://www.suse.com/security/cve/CVE-2022-49990/" source="CVE"/>
		<reference ref_id="CVE-2022-49993" ref_url="https://www.suse.com/security/cve/CVE-2022-49993/" source="CVE"/>
		<reference ref_id="CVE-2022-49995" ref_url="https://www.suse.com/security/cve/CVE-2022-49995/" source="CVE"/>
		<reference ref_id="CVE-2022-49999" ref_url="https://www.suse.com/security/cve/CVE-2022-49999/" source="CVE"/>
		<reference ref_id="CVE-2022-50005" ref_url="https://www.suse.com/security/cve/CVE-2022-50005/" source="CVE"/>
		<reference ref_id="CVE-2022-50006" ref_url="https://www.suse.com/security/cve/CVE-2022-50006/" source="CVE"/>
		<reference ref_id="CVE-2022-50008" ref_url="https://www.suse.com/security/cve/CVE-2022-50008/" source="CVE"/>
		<reference ref_id="CVE-2022-50010" ref_url="https://www.suse.com/security/cve/CVE-2022-50010/" source="CVE"/>
		<reference ref_id="CVE-2022-50011" ref_url="https://www.suse.com/security/cve/CVE-2022-50011/" source="CVE"/>
		<reference ref_id="CVE-2022-50012" ref_url="https://www.suse.com/security/cve/CVE-2022-50012/" source="CVE"/>
		<reference ref_id="CVE-2022-50019" ref_url="https://www.suse.com/security/cve/CVE-2022-50019/" source="CVE"/>
		<reference ref_id="CVE-2022-50020" ref_url="https://www.suse.com/security/cve/CVE-2022-50020/" source="CVE"/>
		<reference ref_id="CVE-2022-50021" ref_url="https://www.suse.com/security/cve/CVE-2022-50021/" source="CVE"/>
		<reference ref_id="CVE-2022-50022" ref_url="https://www.suse.com/security/cve/CVE-2022-50022/" source="CVE"/>
		<reference ref_id="CVE-2022-50023" ref_url="https://www.suse.com/security/cve/CVE-2022-50023/" source="CVE"/>
		<reference ref_id="CVE-2022-50024" ref_url="https://www.suse.com/security/cve/CVE-2022-50024/" source="CVE"/>
		<reference ref_id="CVE-2022-50026" ref_url="https://www.suse.com/security/cve/CVE-2022-50026/" source="CVE"/>
		<reference ref_id="CVE-2022-50027" ref_url="https://www.suse.com/security/cve/CVE-2022-50027/" source="CVE"/>
		<reference ref_id="CVE-2022-50028" ref_url="https://www.suse.com/security/cve/CVE-2022-50028/" source="CVE"/>
		<reference ref_id="CVE-2022-50029" ref_url="https://www.suse.com/security/cve/CVE-2022-50029/" source="CVE"/>
		<reference ref_id="CVE-2022-50030" ref_url="https://www.suse.com/security/cve/CVE-2022-50030/" source="CVE"/>
		<reference ref_id="CVE-2022-50031" ref_url="https://www.suse.com/security/cve/CVE-2022-50031/" source="CVE"/>
		<reference ref_id="CVE-2022-50032" ref_url="https://www.suse.com/security/cve/CVE-2022-50032/" source="CVE"/>
		<reference ref_id="CVE-2022-50033" ref_url="https://www.suse.com/security/cve/CVE-2022-50033/" source="CVE"/>
		<reference ref_id="CVE-2022-50034" ref_url="https://www.suse.com/security/cve/CVE-2022-50034/" source="CVE"/>
		<reference ref_id="CVE-2022-50036" ref_url="https://www.suse.com/security/cve/CVE-2022-50036/" source="CVE"/>
		<reference ref_id="CVE-2022-50038" ref_url="https://www.suse.com/security/cve/CVE-2022-50038/" source="CVE"/>
		<reference ref_id="CVE-2022-50039" ref_url="https://www.suse.com/security/cve/CVE-2022-50039/" source="CVE"/>
		<reference ref_id="CVE-2022-50040" ref_url="https://www.suse.com/security/cve/CVE-2022-50040/" source="CVE"/>
		<reference ref_id="CVE-2022-50045" ref_url="https://www.suse.com/security/cve/CVE-2022-50045/" source="CVE"/>
		<reference ref_id="CVE-2022-50046" ref_url="https://www.suse.com/security/cve/CVE-2022-50046/" source="CVE"/>
		<reference ref_id="CVE-2022-50047" ref_url="https://www.suse.com/security/cve/CVE-2022-50047/" source="CVE"/>
		<reference ref_id="CVE-2022-50051" ref_url="https://www.suse.com/security/cve/CVE-2022-50051/" source="CVE"/>
		<reference ref_id="CVE-2022-50053" ref_url="https://www.suse.com/security/cve/CVE-2022-50053/" source="CVE"/>
		<reference ref_id="CVE-2022-50055" ref_url="https://www.suse.com/security/cve/CVE-2022-50055/" source="CVE"/>
		<reference ref_id="CVE-2022-50059" ref_url="https://www.suse.com/security/cve/CVE-2022-50059/" source="CVE"/>
		<reference ref_id="CVE-2022-50060" ref_url="https://www.suse.com/security/cve/CVE-2022-50060/" source="CVE"/>
		<reference ref_id="CVE-2022-50061" ref_url="https://www.suse.com/security/cve/CVE-2022-50061/" source="CVE"/>
		<reference ref_id="CVE-2022-50062" ref_url="https://www.suse.com/security/cve/CVE-2022-50062/" source="CVE"/>
		<reference ref_id="CVE-2022-50065" ref_url="https://www.suse.com/security/cve/CVE-2022-50065/" source="CVE"/>
		<reference ref_id="CVE-2022-50066" ref_url="https://www.suse.com/security/cve/CVE-2022-50066/" source="CVE"/>
		<reference ref_id="CVE-2022-50067" ref_url="https://www.suse.com/security/cve/CVE-2022-50067/" source="CVE"/>
		<reference ref_id="CVE-2022-50068" ref_url="https://www.suse.com/security/cve/CVE-2022-50068/" source="CVE"/>
		<reference ref_id="CVE-2022-50072" ref_url="https://www.suse.com/security/cve/CVE-2022-50072/" source="CVE"/>
		<reference ref_id="CVE-2022-50073" ref_url="https://www.suse.com/security/cve/CVE-2022-50073/" source="CVE"/>
		<reference ref_id="CVE-2022-50074" ref_url="https://www.suse.com/security/cve/CVE-2022-50074/" source="CVE"/>
		<reference ref_id="CVE-2022-50076" ref_url="https://www.suse.com/security/cve/CVE-2022-50076/" source="CVE"/>
		<reference ref_id="CVE-2022-50077" ref_url="https://www.suse.com/security/cve/CVE-2022-50077/" source="CVE"/>
		<reference ref_id="CVE-2022-50079" ref_url="https://www.suse.com/security/cve/CVE-2022-50079/" source="CVE"/>
		<reference ref_id="CVE-2022-50083" ref_url="https://www.suse.com/security/cve/CVE-2022-50083/" source="CVE"/>
		<reference ref_id="CVE-2022-50084" ref_url="https://www.suse.com/security/cve/CVE-2022-50084/" source="CVE"/>
		<reference ref_id="CVE-2022-50085" ref_url="https://www.suse.com/security/cve/CVE-2022-50085/" source="CVE"/>
		<reference ref_id="CVE-2022-50087" ref_url="https://www.suse.com/security/cve/CVE-2022-50087/" source="CVE"/>
		<reference ref_id="CVE-2022-50092" ref_url="https://www.suse.com/security/cve/CVE-2022-50092/" source="CVE"/>
		<reference ref_id="CVE-2022-50093" ref_url="https://www.suse.com/security/cve/CVE-2022-50093/" source="CVE"/>
		<reference ref_id="CVE-2022-50094" ref_url="https://www.suse.com/security/cve/CVE-2022-50094/" source="CVE"/>
		<reference ref_id="CVE-2022-50095" ref_url="https://www.suse.com/security/cve/CVE-2022-50095/" source="CVE"/>
		<reference ref_id="CVE-2022-50097" ref_url="https://www.suse.com/security/cve/CVE-2022-50097/" source="CVE"/>
		<reference ref_id="CVE-2022-50098" ref_url="https://www.suse.com/security/cve/CVE-2022-50098/" source="CVE"/>
		<reference ref_id="CVE-2022-50099" ref_url="https://www.suse.com/security/cve/CVE-2022-50099/" source="CVE"/>
		<reference ref_id="CVE-2022-50100" ref_url="https://www.suse.com/security/cve/CVE-2022-50100/" source="CVE"/>
		<reference ref_id="CVE-2022-50101" ref_url="https://www.suse.com/security/cve/CVE-2022-50101/" source="CVE"/>
		<reference ref_id="CVE-2022-50102" ref_url="https://www.suse.com/security/cve/CVE-2022-50102/" source="CVE"/>
		<reference ref_id="CVE-2022-50103" ref_url="https://www.suse.com/security/cve/CVE-2022-50103/" source="CVE"/>
		<reference ref_id="CVE-2022-50104" ref_url="https://www.suse.com/security/cve/CVE-2022-50104/" source="CVE"/>
		<reference ref_id="CVE-2022-50108" ref_url="https://www.suse.com/security/cve/CVE-2022-50108/" source="CVE"/>
		<reference ref_id="CVE-2022-50109" ref_url="https://www.suse.com/security/cve/CVE-2022-50109/" source="CVE"/>
		<reference ref_id="CVE-2022-50110" ref_url="https://www.suse.com/security/cve/CVE-2022-50110/" source="CVE"/>
		<reference ref_id="CVE-2022-50111" ref_url="https://www.suse.com/security/cve/CVE-2022-50111/" source="CVE"/>
		<reference ref_id="CVE-2022-50112" ref_url="https://www.suse.com/security/cve/CVE-2022-50112/" source="CVE"/>
		<reference ref_id="CVE-2022-50116" ref_url="https://www.suse.com/security/cve/CVE-2022-50116/" source="CVE"/>
		<reference ref_id="CVE-2022-50118" ref_url="https://www.suse.com/security/cve/CVE-2022-50118/" source="CVE"/>
		<reference ref_id="CVE-2022-50120" ref_url="https://www.suse.com/security/cve/CVE-2022-50120/" source="CVE"/>
		<reference ref_id="CVE-2022-50121" ref_url="https://www.suse.com/security/cve/CVE-2022-50121/" source="CVE"/>
		<reference ref_id="CVE-2022-50124" ref_url="https://www.suse.com/security/cve/CVE-2022-50124/" source="CVE"/>
		<reference ref_id="CVE-2022-50125" ref_url="https://www.suse.com/security/cve/CVE-2022-50125/" source="CVE"/>
		<reference ref_id="CVE-2022-50126" ref_url="https://www.suse.com/security/cve/CVE-2022-50126/" source="CVE"/>
		<reference ref_id="CVE-2022-50127" ref_url="https://www.suse.com/security/cve/CVE-2022-50127/" source="CVE"/>
		<reference ref_id="CVE-2022-50129" ref_url="https://www.suse.com/security/cve/CVE-2022-50129/" source="CVE"/>
		<reference ref_id="CVE-2022-50131" ref_url="https://www.suse.com/security/cve/CVE-2022-50131/" source="CVE"/>
		<reference ref_id="CVE-2022-50132" ref_url="https://www.suse.com/security/cve/CVE-2022-50132/" source="CVE"/>
		<reference ref_id="CVE-2022-50134" ref_url="https://www.suse.com/security/cve/CVE-2022-50134/" source="CVE"/>
		<reference ref_id="CVE-2022-50136" ref_url="https://www.suse.com/security/cve/CVE-2022-50136/" source="CVE"/>
		<reference ref_id="CVE-2022-50137" ref_url="https://www.suse.com/security/cve/CVE-2022-50137/" source="CVE"/>
		<reference ref_id="CVE-2022-50138" ref_url="https://www.suse.com/security/cve/CVE-2022-50138/" source="CVE"/>
		<reference ref_id="CVE-2022-50139" ref_url="https://www.suse.com/security/cve/CVE-2022-50139/" source="CVE"/>
		<reference ref_id="CVE-2022-50140" ref_url="https://www.suse.com/security/cve/CVE-2022-50140/" source="CVE"/>
		<reference ref_id="CVE-2022-50141" ref_url="https://www.suse.com/security/cve/CVE-2022-50141/" source="CVE"/>
		<reference ref_id="CVE-2022-50142" ref_url="https://www.suse.com/security/cve/CVE-2022-50142/" source="CVE"/>
		<reference ref_id="CVE-2022-50143" ref_url="https://www.suse.com/security/cve/CVE-2022-50143/" source="CVE"/>
		<reference ref_id="CVE-2022-50145" ref_url="https://www.suse.com/security/cve/CVE-2022-50145/" source="CVE"/>
		<reference ref_id="CVE-2022-50146" ref_url="https://www.suse.com/security/cve/CVE-2022-50146/" source="CVE"/>
		<reference ref_id="CVE-2022-50149" ref_url="https://www.suse.com/security/cve/CVE-2022-50149/" source="CVE"/>
		<reference ref_id="CVE-2022-50151" ref_url="https://www.suse.com/security/cve/CVE-2022-50151/" source="CVE"/>
		<reference ref_id="CVE-2022-50152" ref_url="https://www.suse.com/security/cve/CVE-2022-50152/" source="CVE"/>
		<reference ref_id="CVE-2022-50153" ref_url="https://www.suse.com/security/cve/CVE-2022-50153/" source="CVE"/>
		<reference ref_id="CVE-2022-50154" ref_url="https://www.suse.com/security/cve/CVE-2022-50154/" source="CVE"/>
		<reference ref_id="CVE-2022-50155" ref_url="https://www.suse.com/security/cve/CVE-2022-50155/" source="CVE"/>
		<reference ref_id="CVE-2022-50156" ref_url="https://www.suse.com/security/cve/CVE-2022-50156/" source="CVE"/>
		<reference ref_id="CVE-2022-50157" ref_url="https://www.suse.com/security/cve/CVE-2022-50157/" source="CVE"/>
		<reference ref_id="CVE-2022-50158" ref_url="https://www.suse.com/security/cve/CVE-2022-50158/" source="CVE"/>
		<reference ref_id="CVE-2022-50160" ref_url="https://www.suse.com/security/cve/CVE-2022-50160/" source="CVE"/>
		<reference ref_id="CVE-2022-50161" ref_url="https://www.suse.com/security/cve/CVE-2022-50161/" source="CVE"/>
		<reference ref_id="CVE-2022-50162" ref_url="https://www.suse.com/security/cve/CVE-2022-50162/" source="CVE"/>
		<reference ref_id="CVE-2022-50164" ref_url="https://www.suse.com/security/cve/CVE-2022-50164/" source="CVE"/>
		<reference ref_id="CVE-2022-50165" ref_url="https://www.suse.com/security/cve/CVE-2022-50165/" source="CVE"/>
		<reference ref_id="CVE-2022-50169" ref_url="https://www.suse.com/security/cve/CVE-2022-50169/" source="CVE"/>
		<reference ref_id="CVE-2022-50171" ref_url="https://www.suse.com/security/cve/CVE-2022-50171/" source="CVE"/>
		<reference ref_id="CVE-2022-50172" ref_url="https://www.suse.com/security/cve/CVE-2022-50172/" source="CVE"/>
		<reference ref_id="CVE-2022-50173" ref_url="https://www.suse.com/security/cve/CVE-2022-50173/" source="CVE"/>
		<reference ref_id="CVE-2022-50175" ref_url="https://www.suse.com/security/cve/CVE-2022-50175/" source="CVE"/>
		<reference ref_id="CVE-2022-50176" ref_url="https://www.suse.com/security/cve/CVE-2022-50176/" source="CVE"/>
		<reference ref_id="CVE-2022-50178" ref_url="https://www.suse.com/security/cve/CVE-2022-50178/" source="CVE"/>
		<reference ref_id="CVE-2022-50179" ref_url="https://www.suse.com/security/cve/CVE-2022-50179/" source="CVE"/>
		<reference ref_id="CVE-2022-50181" ref_url="https://www.suse.com/security/cve/CVE-2022-50181/" source="CVE"/>
		<reference ref_id="CVE-2022-50185" ref_url="https://www.suse.com/security/cve/CVE-2022-50185/" source="CVE"/>
		<reference ref_id="CVE-2022-50187" ref_url="https://www.suse.com/security/cve/CVE-2022-50187/" source="CVE"/>
		<reference ref_id="CVE-2022-50190" ref_url="https://www.suse.com/security/cve/CVE-2022-50190/" source="CVE"/>
		<reference ref_id="CVE-2022-50191" ref_url="https://www.suse.com/security/cve/CVE-2022-50191/" source="CVE"/>
		<reference ref_id="CVE-2022-50192" ref_url="https://www.suse.com/security/cve/CVE-2022-50192/" source="CVE"/>
		<reference ref_id="CVE-2022-50194" ref_url="https://www.suse.com/security/cve/CVE-2022-50194/" source="CVE"/>
		<reference ref_id="CVE-2022-50196" ref_url="https://www.suse.com/security/cve/CVE-2022-50196/" source="CVE"/>
		<reference ref_id="CVE-2022-50197" ref_url="https://www.suse.com/security/cve/CVE-2022-50197/" source="CVE"/>
		<reference ref_id="CVE-2022-50198" ref_url="https://www.suse.com/security/cve/CVE-2022-50198/" source="CVE"/>
		<reference ref_id="CVE-2022-50199" ref_url="https://www.suse.com/security/cve/CVE-2022-50199/" source="CVE"/>
		<reference ref_id="CVE-2022-50200" ref_url="https://www.suse.com/security/cve/CVE-2022-50200/" source="CVE"/>
		<reference ref_id="CVE-2022-50201" ref_url="https://www.suse.com/security/cve/CVE-2022-50201/" source="CVE"/>
		<reference ref_id="CVE-2022-50202" ref_url="https://www.suse.com/security/cve/CVE-2022-50202/" source="CVE"/>
		<reference ref_id="CVE-2022-50203" ref_url="https://www.suse.com/security/cve/CVE-2022-50203/" source="CVE"/>
		<reference ref_id="CVE-2022-50204" ref_url="https://www.suse.com/security/cve/CVE-2022-50204/" source="CVE"/>
		<reference ref_id="CVE-2022-50206" ref_url="https://www.suse.com/security/cve/CVE-2022-50206/" source="CVE"/>
		<reference ref_id="CVE-2022-50207" ref_url="https://www.suse.com/security/cve/CVE-2022-50207/" source="CVE"/>
		<reference ref_id="CVE-2022-50208" ref_url="https://www.suse.com/security/cve/CVE-2022-50208/" source="CVE"/>
		<reference ref_id="CVE-2022-50209" ref_url="https://www.suse.com/security/cve/CVE-2022-50209/" source="CVE"/>
		<reference ref_id="CVE-2022-50211" ref_url="https://www.suse.com/security/cve/CVE-2022-50211/" source="CVE"/>
		<reference ref_id="CVE-2022-50212" ref_url="https://www.suse.com/security/cve/CVE-2022-50212/" source="CVE"/>
		<reference ref_id="CVE-2022-50213" ref_url="https://www.suse.com/security/cve/CVE-2022-50213/" source="CVE"/>
		<reference ref_id="CVE-2022-50215" ref_url="https://www.suse.com/security/cve/CVE-2022-50215/" source="CVE"/>
		<reference ref_id="CVE-2022-50218" ref_url="https://www.suse.com/security/cve/CVE-2022-50218/" source="CVE"/>
		<reference ref_id="CVE-2022-50220" ref_url="https://www.suse.com/security/cve/CVE-2022-50220/" source="CVE"/>
		<reference ref_id="CVE-2022-50222" ref_url="https://www.suse.com/security/cve/CVE-2022-50222/" source="CVE"/>
		<reference ref_id="CVE-2022-50226" ref_url="https://www.suse.com/security/cve/CVE-2022-50226/" source="CVE"/>
		<reference ref_id="CVE-2022-50228" ref_url="https://www.suse.com/security/cve/CVE-2022-50228/" source="CVE"/>
		<reference ref_id="CVE-2022-50229" ref_url="https://www.suse.com/security/cve/CVE-2022-50229/" source="CVE"/>
		<reference ref_id="CVE-2022-50231" ref_url="https://www.suse.com/security/cve/CVE-2022-50231/" source="CVE"/>
		<reference ref_id="CVE-2023-3111" ref_url="https://www.suse.com/security/cve/CVE-2023-3111/" source="CVE"/>
		<reference ref_id="CVE-2023-52924" ref_url="https://www.suse.com/security/cve/CVE-2023-52924/" source="CVE"/>
		<reference ref_id="CVE-2023-52925" ref_url="https://www.suse.com/security/cve/CVE-2023-52925/" source="CVE"/>
		<reference ref_id="CVE-2023-53048" ref_url="https://www.suse.com/security/cve/CVE-2023-53048/" source="CVE"/>
		<reference ref_id="CVE-2023-53076" ref_url="https://www.suse.com/security/cve/CVE-2023-53076/" source="CVE"/>
		<reference ref_id="CVE-2023-53097" ref_url="https://www.suse.com/security/cve/CVE-2023-53097/" source="CVE"/>
		<reference ref_id="CVE-2024-26808" ref_url="https://www.suse.com/security/cve/CVE-2024-26808/" source="CVE"/>
		<reference ref_id="CVE-2024-26924" ref_url="https://www.suse.com/security/cve/CVE-2024-26924/" source="CVE"/>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-27397" ref_url="https://www.suse.com/security/cve/CVE-2024-27397/" source="CVE"/>
		<reference ref_id="CVE-2024-35840" ref_url="https://www.suse.com/security/cve/CVE-2024-35840/" source="CVE"/>
		<reference ref_id="CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978/" source="CVE"/>
		<reference ref_id="CVE-2024-46800" ref_url="https://www.suse.com/security/cve/CVE-2024-46800/" source="CVE"/>
		<reference ref_id="CVE-2024-53057" ref_url="https://www.suse.com/security/cve/CVE-2024-53057/" source="CVE"/>
		<reference ref_id="CVE-2024-53125" ref_url="https://www.suse.com/security/cve/CVE-2024-53125/" source="CVE"/>
		<reference ref_id="CVE-2024-53141" ref_url="https://www.suse.com/security/cve/CVE-2024-53141/" source="CVE"/>
		<reference ref_id="CVE-2024-56770" ref_url="https://www.suse.com/security/cve/CVE-2024-56770/" source="CVE"/>
		<reference ref_id="CVE-2024-57947" ref_url="https://www.suse.com/security/cve/CVE-2024-57947/" source="CVE"/>
		<reference ref_id="CVE-2024-57999" ref_url="https://www.suse.com/security/cve/CVE-2024-57999/" source="CVE"/>
		<reference ref_id="CVE-2025-21700" ref_url="https://www.suse.com/security/cve/CVE-2025-21700/" source="CVE"/>
		<reference ref_id="CVE-2025-21702" ref_url="https://www.suse.com/security/cve/CVE-2025-21702/" source="CVE"/>
		<reference ref_id="CVE-2025-21703" ref_url="https://www.suse.com/security/cve/CVE-2025-21703/" source="CVE"/>
		<reference ref_id="CVE-2025-21756" ref_url="https://www.suse.com/security/cve/CVE-2025-21756/" source="CVE"/>
		<reference ref_id="CVE-2025-23141" ref_url="https://www.suse.com/security/cve/CVE-2025-23141/" source="CVE"/>
		<reference ref_id="CVE-2025-23145" ref_url="https://www.suse.com/security/cve/CVE-2025-23145/" source="CVE"/>
		<reference ref_id="CVE-2025-37752" ref_url="https://www.suse.com/security/cve/CVE-2025-37752/" source="CVE"/>
		<reference ref_id="CVE-2025-37797" ref_url="https://www.suse.com/security/cve/CVE-2025-37797/" source="CVE"/>
		<reference ref_id="CVE-2025-37798" ref_url="https://www.suse.com/security/cve/CVE-2025-37798/" source="CVE"/>
		<reference ref_id="CVE-2025-37823" ref_url="https://www.suse.com/security/cve/CVE-2025-37823/" source="CVE"/>
		<reference ref_id="CVE-2025-37890" ref_url="https://www.suse.com/security/cve/CVE-2025-37890/" source="CVE"/>
		<reference ref_id="CVE-2025-37932" ref_url="https://www.suse.com/security/cve/CVE-2025-37932/" source="CVE"/>
		<reference ref_id="CVE-2025-37953" ref_url="https://www.suse.com/security/cve/CVE-2025-37953/" source="CVE"/>
		<reference ref_id="CVE-2025-37997" ref_url="https://www.suse.com/security/cve/CVE-2025-37997/" source="CVE"/>
		<reference ref_id="CVE-2025-38000" ref_url="https://www.suse.com/security/cve/CVE-2025-38000/" source="CVE"/>
		<reference ref_id="CVE-2025-38001" ref_url="https://www.suse.com/security/cve/CVE-2025-38001/" source="CVE"/>
		<reference ref_id="CVE-2025-38014" ref_url="https://www.suse.com/security/cve/CVE-2025-38014/" source="CVE"/>
		<reference ref_id="CVE-2025-38083" ref_url="https://www.suse.com/security/cve/CVE-2025-38083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond 'nbands' (bsc#1207361 bsc#1225468).
- CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552).
- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).
- CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822).
- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).
- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).
- CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch-&gt;limit == 0 (bsc#1237312).
- CVE-2025-21703: netem: Update sch-&gt;q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).
- CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876).
- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).
- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).
- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).

The following non-security bugs were fixed:

- Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- Fix reference in 'net_sched: sch_sfq: use a temporary work area for validating configuration' (bsc#1242504)
- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build')
- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b ('bs-upload-kernel: Pass limit_packages also on multibuild')
- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.
- Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82
- Test the correct macro to detect RT kernel build Fixes: 470cd1a41502 ('kernel-binary: Support livepatch_rt with merged RT branch')
- Use gcc-13 for build on SLE16 (jsc#PED-10028).
- add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE.
- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build') Fixes: 747f601d4156 ('bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)')
- check-for-config-changes: Fix flag name typo
- doc/README.SUSE: Point to the updated version of LKMPG
- hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).
- kernel-binary: Support livepatch_rt with merged RT branch
- kernel-obs-qa: Use srchash for dependency as well
- kernel-source: Also replace bin/env
- kernel-source: Also update the search to match bin/env Fixes: dc2037cd8f94 ('kernel-source: Also replace bin/env'
- kernel-source: Do not use multiple -r in sed parameters
- kernel-source: Remove log.sh from sources
- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).
- mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).
- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)
- packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).
- packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790).
- powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790).
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used
- rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE
- rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang.
- rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64.
- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).
- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check.
- rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038). OrderWithRequires was introduced in rpm 4.9 (ie. SLE12+) to allow a package to inform the order of installation of other package without hard requiring that package. This means our kernel-binary packages no longer need to hard require perl-Bootloader or dracut, resolving the long-commented issue there. This is also needed for udev &amp; systemd-boot to ensure those packages are installed before being called by dracut (boo#1228659)
- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)
- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)
- rpm/package-descriptions: Add rt and rt_debug descriptions
- rpm/release-projects: Update the ALP projects again (bsc#1231293).
- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)
- rpm: Stop using is_kotd_qa macro This macro is set by bs-upload-kernel, and a conditional in each spec file is used to determine when to build the spec file. This logic should not really be in the spec file. Previously this was done with package links and package meta for the individula links. However, the use of package links is rejected for packages in git based release projects (nothing to do with git actually, new policy). An alternative to package links is multibuild. However, for multibuild packages package meta cannot be used to set which spec file gets built. Use prjcon buildflags instead, and remove this conditional. Depends on bs-upload-kernel adding the build flag.
- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).
- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).
- wifi: cfg80211: Add my certificate (bsc#1243001).
- wifi: cfg80211: fix certs build to not depend on file order (bsc#1243001).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-15"/>
	<updated date="2025-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198410">SUSE bug 1198410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199356">SUSE bug 1199356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199487">SUSE bug 1199487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201160">SUSE bug 1201160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201956">SUSE bug 1201956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202094">SUSE bug 1202094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202095">SUSE bug 1202095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202564">SUSE bug 1202564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202716">SUSE bug 1202716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202823">SUSE bug 1202823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202860">SUSE bug 1202860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203197">SUSE bug 1203197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203361">SUSE bug 1203361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205220">SUSE bug 1205220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205514">SUSE bug 1205514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206664">SUSE bug 1206664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206878">SUSE bug 1206878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206880">SUSE bug 1206880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207361">SUSE bug 1207361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207638">SUSE bug 1207638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211226">SUSE bug 1211226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212051">SUSE bug 1212051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213090">SUSE bug 1213090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218184">SUSE bug 1218184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218234">SUSE bug 1218234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218470">SUSE bug 1218470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222634">SUSE bug 1222634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223675">SUSE bug 1223675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224095">SUSE bug 1224095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224597">SUSE bug 1224597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225468">SUSE bug 1225468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225820">SUSE bug 1225820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226514">SUSE bug 1226514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226552">SUSE bug 1226552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228659">SUSE bug 1228659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230827">SUSE bug 1230827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231293">SUSE bug 1231293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232504">SUSE bug 1232504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233551">SUSE bug 1233551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234156">SUSE bug 1234156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234381">SUSE bug 1234381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234454">SUSE bug 1234454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235637">SUSE bug 1235637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236333">SUSE bug 1236333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236821">SUSE bug 1236821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236822">SUSE bug 1236822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237159">SUSE bug 1237159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237312">SUSE bug 1237312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237313">SUSE bug 1237313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238303">SUSE bug 1238303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238526">SUSE bug 1238526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238570">SUSE bug 1238570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238876">SUSE bug 1238876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239986">SUSE bug 1239986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240785">SUSE bug 1240785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241038">SUSE bug 1241038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242221">SUSE bug 1242221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242414">SUSE bug 1242414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242417">SUSE bug 1242417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242504">SUSE bug 1242504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242596">SUSE bug 1242596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242782">SUSE bug 1242782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242924">SUSE bug 1242924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243001">SUSE bug 1243001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243330">SUSE bug 1243330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243543">SUSE bug 1243543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243627">SUSE bug 1243627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243832">SUSE bug 1243832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244114">SUSE bug 1244114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244179">SUSE bug 1244179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244234">SUSE bug 1244234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244241">SUSE bug 1244241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244277">SUSE bug 1244277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244309">SUSE bug 1244309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244337">SUSE bug 1244337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244732">SUSE bug 1244732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244764">SUSE bug 1244764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244765">SUSE bug 1244765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244767">SUSE bug 1244767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244770">SUSE bug 1244770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244771">SUSE bug 1244771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244773">SUSE bug 1244773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244774">SUSE bug 1244774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244776">SUSE bug 1244776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244779">SUSE bug 1244779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244780">SUSE bug 1244780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244781">SUSE bug 1244781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244782">SUSE bug 1244782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244783">SUSE bug 1244783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244784">SUSE bug 1244784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244786">SUSE bug 1244786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244787">SUSE bug 1244787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244788">SUSE bug 1244788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244790">SUSE bug 1244790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244793">SUSE bug 1244793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244794">SUSE bug 1244794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244796">SUSE bug 1244796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244797">SUSE bug 1244797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244798">SUSE bug 1244798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244800">SUSE bug 1244800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244802">SUSE bug 1244802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244804">SUSE bug 1244804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244807">SUSE bug 1244807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244808">SUSE bug 1244808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244811">SUSE bug 1244811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244813">SUSE bug 1244813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244814">SUSE bug 1244814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244815">SUSE bug 1244815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244816">SUSE bug 1244816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244819">SUSE bug 1244819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244820">SUSE bug 1244820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244823">SUSE bug 1244823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244824">SUSE bug 1244824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244825">SUSE bug 1244825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244830">SUSE bug 1244830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244831">SUSE bug 1244831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244832">SUSE bug 1244832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244834">SUSE bug 1244834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244836">SUSE bug 1244836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244838">SUSE bug 1244838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244839">SUSE bug 1244839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244840">SUSE bug 1244840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244841">SUSE bug 1244841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244842">SUSE bug 1244842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244843">SUSE bug 1244843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244845">SUSE bug 1244845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244846">SUSE bug 1244846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244848">SUSE bug 1244848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244849">SUSE bug 1244849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244851">SUSE bug 1244851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244853">SUSE bug 1244853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244854">SUSE bug 1244854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244856">SUSE bug 1244856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244860">SUSE bug 1244860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244861">SUSE bug 1244861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244866">SUSE bug 1244866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244867">SUSE bug 1244867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244868">SUSE bug 1244868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244869">SUSE bug 1244869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244870">SUSE bug 1244870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244871">SUSE bug 1244871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244872">SUSE bug 1244872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244873">SUSE bug 1244873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244875">SUSE bug 1244875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244876">SUSE bug 1244876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244878">SUSE bug 1244878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244879">SUSE bug 1244879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244881">SUSE bug 1244881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244883">SUSE bug 1244883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244884">SUSE bug 1244884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244886">SUSE bug 1244886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244887">SUSE bug 1244887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244890">SUSE bug 1244890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244895">SUSE bug 1244895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244899">SUSE bug 1244899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244900">SUSE bug 1244900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244901">SUSE bug 1244901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244902">SUSE bug 1244902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244903">SUSE bug 1244903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244908">SUSE bug 1244908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244911">SUSE bug 1244911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244915">SUSE bug 1244915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244936">SUSE bug 1244936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244941">SUSE bug 1244941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244942">SUSE bug 1244942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244943">SUSE bug 1244943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244944">SUSE bug 1244944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244945">SUSE bug 1244945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244948">SUSE bug 1244948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244949">SUSE bug 1244949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244950">SUSE bug 1244950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244956">SUSE bug 1244956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244958">SUSE bug 1244958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244959">SUSE bug 1244959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244965">SUSE bug 1244965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244966">SUSE bug 1244966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244967">SUSE bug 1244967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244968">SUSE bug 1244968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244969">SUSE bug 1244969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244970">SUSE bug 1244970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244974">SUSE bug 1244974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244976">SUSE bug 1244976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244977">SUSE bug 1244977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244978">SUSE bug 1244978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244979">SUSE bug 1244979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244983">SUSE bug 1244983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244984">SUSE bug 1244984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244985">SUSE bug 1244985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244986">SUSE bug 1244986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244991">SUSE bug 1244991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244992">SUSE bug 1244992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244993">SUSE bug 1244993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245006">SUSE bug 1245006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245007">SUSE bug 1245007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245009">SUSE bug 1245009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245011">SUSE bug 1245011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245012">SUSE bug 1245012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245018">SUSE bug 1245018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245019">SUSE bug 1245019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245024">SUSE bug 1245024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245028">SUSE bug 1245028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245031">SUSE bug 1245031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245032">SUSE bug 1245032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245033">SUSE bug 1245033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245038">SUSE bug 1245038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245039">SUSE bug 1245039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245041">SUSE bug 1245041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245047">SUSE bug 1245047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245051">SUSE bug 1245051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245057">SUSE bug 1245057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245058">SUSE bug 1245058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245060">SUSE bug 1245060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245062">SUSE bug 1245062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245064">SUSE bug 1245064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245069">SUSE bug 1245069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245072">SUSE bug 1245072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245073">SUSE bug 1245073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245088">SUSE bug 1245088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245089">SUSE bug 1245089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245092">SUSE bug 1245092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245093">SUSE bug 1245093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245098">SUSE bug 1245098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245103">SUSE bug 1245103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245117">SUSE bug 1245117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245118">SUSE bug 1245118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245119">SUSE bug 1245119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245121">SUSE bug 1245121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245122">SUSE bug 1245122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245125">SUSE bug 1245125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245129">SUSE bug 1245129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245131">SUSE bug 1245131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245133">SUSE bug 1245133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245134">SUSE bug 1245134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245135">SUSE bug 1245135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245136">SUSE bug 1245136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245138">SUSE bug 1245138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245139">SUSE bug 1245139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245140">SUSE bug 1245140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245142">SUSE bug 1245142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245146">SUSE bug 1245146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245147">SUSE bug 1245147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245149">SUSE bug 1245149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245152">SUSE bug 1245152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245154">SUSE bug 1245154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245180">SUSE bug 1245180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245183">SUSE bug 1245183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245189">SUSE bug 1245189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245191">SUSE bug 1245191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245195">SUSE bug 1245195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245197">SUSE bug 1245197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245265">SUSE bug 1245265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245348">SUSE bug 1245348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245431">SUSE bug 1245431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245455">SUSE bug 1245455</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47557/">CVE-2021-47557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47557">CVE-2021-47557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47595/">CVE-2021-47595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47595">CVE-2021-47595 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2585/">CVE-2022-2585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2586/">CVE-2022-2586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2905/">CVE-2022-2905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3903">CVE-2022-3903 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4095">CVE-2022-4095 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4662/">CVE-2022-4662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4662">CVE-2022-4662 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49934/">CVE-2022-49934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49934">CVE-2022-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49936/">CVE-2022-49936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49936">CVE-2022-49936 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49937/">CVE-2022-49937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49937">CVE-2022-49937 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49938/">CVE-2022-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49938">CVE-2022-49938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49940/">CVE-2022-49940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49940">CVE-2022-49940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49942/">CVE-2022-49942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49942">CVE-2022-49942 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49945/">CVE-2022-49945 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49945">CVE-2022-49945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49946/">CVE-2022-49946 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49946">CVE-2022-49946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49948/">CVE-2022-49948 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49948">CVE-2022-49948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49950/">CVE-2022-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49950">CVE-2022-49950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49952/">CVE-2022-49952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49952">CVE-2022-49952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49954/">CVE-2022-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49954">CVE-2022-49954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49956/">CVE-2022-49956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49956">CVE-2022-49956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49957/">CVE-2022-49957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49957">CVE-2022-49957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49958/">CVE-2022-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49958">CVE-2022-49958 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49960/">CVE-2022-49960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49960">CVE-2022-49960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49964/">CVE-2022-49964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49964">CVE-2022-49964 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49966/">CVE-2022-49966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49966">CVE-2022-49966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49968/">CVE-2022-49968 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49968">CVE-2022-49968 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49969/">CVE-2022-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49969">CVE-2022-49969 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49977/">CVE-2022-49977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49977">CVE-2022-49977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49978/">CVE-2022-49978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49978">CVE-2022-49978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49981/">CVE-2022-49981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49981">CVE-2022-49981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49982/">CVE-2022-49982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49982">CVE-2022-49982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49983/">CVE-2022-49983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49983">CVE-2022-49983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49984/">CVE-2022-49984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49984">CVE-2022-49984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49985/">CVE-2022-49985 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49985">CVE-2022-49985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49986/">CVE-2022-49986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49986">CVE-2022-49986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49987/">CVE-2022-49987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49987">CVE-2022-49987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49989/">CVE-2022-49989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49989">CVE-2022-49989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49990/">CVE-2022-49990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49990">CVE-2022-49990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49993/">CVE-2022-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49993">CVE-2022-49993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49995/">CVE-2022-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49995">CVE-2022-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49999/">CVE-2022-49999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49999">CVE-2022-49999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50005/">CVE-2022-50005 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50005">CVE-2022-50005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50006/">CVE-2022-50006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50006">CVE-2022-50006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50008/">CVE-2022-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50008">CVE-2022-50008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50010/">CVE-2022-50010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50010">CVE-2022-50010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50011/">CVE-2022-50011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50011">CVE-2022-50011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50012/">CVE-2022-50012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50012">CVE-2022-50012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50019/">CVE-2022-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50019">CVE-2022-50019 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50020/">CVE-2022-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50020">CVE-2022-50020 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50021/">CVE-2022-50021 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50021">CVE-2022-50021 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50022/">CVE-2022-50022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50022">CVE-2022-50022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50023/">CVE-2022-50023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50023">CVE-2022-50023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50024/">CVE-2022-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50024">CVE-2022-50024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50026/">CVE-2022-50026 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50026">CVE-2022-50026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50027/">CVE-2022-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50027">CVE-2022-50027 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50028/">CVE-2022-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50028">CVE-2022-50028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50029/">CVE-2022-50029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50029">CVE-2022-50029 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50030/">CVE-2022-50030 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50030">CVE-2022-50030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50031/">CVE-2022-50031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50031">CVE-2022-50031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50032/">CVE-2022-50032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50032">CVE-2022-50032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50033/">CVE-2022-50033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50033">CVE-2022-50033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50034/">CVE-2022-50034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50034">CVE-2022-50034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50036/">CVE-2022-50036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50036">CVE-2022-50036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50038/">CVE-2022-50038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50038">CVE-2022-50038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50039/">CVE-2022-50039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50039">CVE-2022-50039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50040/">CVE-2022-50040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50040">CVE-2022-50040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50045/">CVE-2022-50045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50045">CVE-2022-50045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50046/">CVE-2022-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50046">CVE-2022-50046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50047/">CVE-2022-50047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50047">CVE-2022-50047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50051/">CVE-2022-50051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50051">CVE-2022-50051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50053/">CVE-2022-50053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50053">CVE-2022-50053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50055/">CVE-2022-50055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50055">CVE-2022-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50059/">CVE-2022-50059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50059">CVE-2022-50059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50060/">CVE-2022-50060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50060">CVE-2022-50060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50061/">CVE-2022-50061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50061">CVE-2022-50061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50062/">CVE-2022-50062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50062">CVE-2022-50062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50065/">CVE-2022-50065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50065">CVE-2022-50065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50066/">CVE-2022-50066 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50066">CVE-2022-50066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50067/">CVE-2022-50067 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50067">CVE-2022-50067 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50068/">CVE-2022-50068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50068">CVE-2022-50068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50072/">CVE-2022-50072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50072">CVE-2022-50072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50073/">CVE-2022-50073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50073">CVE-2022-50073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50074/">CVE-2022-50074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50074">CVE-2022-50074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50076/">CVE-2022-50076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50076">CVE-2022-50076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50077/">CVE-2022-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50077">CVE-2022-50077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50079/">CVE-2022-50079 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50079">CVE-2022-50079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50083/">CVE-2022-50083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50083">CVE-2022-50083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50084/">CVE-2022-50084 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50084">CVE-2022-50084 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50085/">CVE-2022-50085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50085">CVE-2022-50085 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50087/">CVE-2022-50087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50087">CVE-2022-50087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50092/">CVE-2022-50092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50092">CVE-2022-50092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50093/">CVE-2022-50093 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50093">CVE-2022-50093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50094/">CVE-2022-50094 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50094">CVE-2022-50094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50095/">CVE-2022-50095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50095">CVE-2022-50095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50097/">CVE-2022-50097 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50097">CVE-2022-50097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50098/">CVE-2022-50098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50098">CVE-2022-50098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50099/">CVE-2022-50099 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50099">CVE-2022-50099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50100/">CVE-2022-50100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50100">CVE-2022-50100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50101/">CVE-2022-50101 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50101">CVE-2022-50101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50102/">CVE-2022-50102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50102">CVE-2022-50102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50103/">CVE-2022-50103 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50103">CVE-2022-50103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50104/">CVE-2022-50104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50104">CVE-2022-50104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50108/">CVE-2022-50108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50108">CVE-2022-50108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50109/">CVE-2022-50109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50109">CVE-2022-50109 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50110/">CVE-2022-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50110">CVE-2022-50110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50111/">CVE-2022-50111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50111">CVE-2022-50111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50112/">CVE-2022-50112 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50112">CVE-2022-50112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50116/">CVE-2022-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50116">CVE-2022-50116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50118/">CVE-2022-50118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50118">CVE-2022-50118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50120/">CVE-2022-50120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50120">CVE-2022-50120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50121/">CVE-2022-50121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50121">CVE-2022-50121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50124/">CVE-2022-50124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50124">CVE-2022-50124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50125/">CVE-2022-50125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50125">CVE-2022-50125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50126/">CVE-2022-50126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50126">CVE-2022-50126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50127/">CVE-2022-50127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50127">CVE-2022-50127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50129/">CVE-2022-50129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50129">CVE-2022-50129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50131/">CVE-2022-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50131">CVE-2022-50131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50132/">CVE-2022-50132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50132">CVE-2022-50132 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50134/">CVE-2022-50134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50134">CVE-2022-50134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50136/">CVE-2022-50136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50136">CVE-2022-50136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50137/">CVE-2022-50137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50137">CVE-2022-50137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50138/">CVE-2022-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50138">CVE-2022-50138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50139/">CVE-2022-50139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50139">CVE-2022-50139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50140/">CVE-2022-50140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50140">CVE-2022-50140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50141/">CVE-2022-50141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50141">CVE-2022-50141 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50142/">CVE-2022-50142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50142">CVE-2022-50142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50143/">CVE-2022-50143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50143">CVE-2022-50143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50145/">CVE-2022-50145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50145">CVE-2022-50145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50146/">CVE-2022-50146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50146">CVE-2022-50146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50149/">CVE-2022-50149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50149">CVE-2022-50149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50151/">CVE-2022-50151 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50151">CVE-2022-50151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50152/">CVE-2022-50152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50152">CVE-2022-50152 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50153/">CVE-2022-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50153">CVE-2022-50153 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50154/">CVE-2022-50154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50154">CVE-2022-50154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50155/">CVE-2022-50155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50155">CVE-2022-50155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50156/">CVE-2022-50156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50156">CVE-2022-50156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50157/">CVE-2022-50157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50157">CVE-2022-50157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50158/">CVE-2022-50158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50158">CVE-2022-50158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50160/">CVE-2022-50160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50160">CVE-2022-50160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50161/">CVE-2022-50161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50161">CVE-2022-50161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50162/">CVE-2022-50162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50162">CVE-2022-50162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50164/">CVE-2022-50164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50164">CVE-2022-50164 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50165/">CVE-2022-50165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50165">CVE-2022-50165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50169/">CVE-2022-50169 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50169">CVE-2022-50169 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50171/">CVE-2022-50171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50171">CVE-2022-50171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50172/">CVE-2022-50172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50172">CVE-2022-50172 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50173/">CVE-2022-50173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50173">CVE-2022-50173 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50175/">CVE-2022-50175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50175">CVE-2022-50175 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50176/">CVE-2022-50176 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50176">CVE-2022-50176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50178/">CVE-2022-50178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50178">CVE-2022-50178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50179/">CVE-2022-50179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50179">CVE-2022-50179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50181/">CVE-2022-50181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50181">CVE-2022-50181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50185/">CVE-2022-50185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50185">CVE-2022-50185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50187/">CVE-2022-50187 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50187">CVE-2022-50187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50190/">CVE-2022-50190 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50190">CVE-2022-50190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50191/">CVE-2022-50191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50191">CVE-2022-50191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50192/">CVE-2022-50192 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50192">CVE-2022-50192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50194/">CVE-2022-50194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50194">CVE-2022-50194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50196/">CVE-2022-50196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50196">CVE-2022-50196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50197/">CVE-2022-50197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50197">CVE-2022-50197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50198/">CVE-2022-50198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50198">CVE-2022-50198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50199/">CVE-2022-50199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50199">CVE-2022-50199 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50200/">CVE-2022-50200 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50200">CVE-2022-50200 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50201/">CVE-2022-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50201">CVE-2022-50201 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50202/">CVE-2022-50202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50202">CVE-2022-50202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50203/">CVE-2022-50203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50203">CVE-2022-50203 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50204/">CVE-2022-50204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50204">CVE-2022-50204 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50206/">CVE-2022-50206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50206">CVE-2022-50206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50207/">CVE-2022-50207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50207">CVE-2022-50207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50208/">CVE-2022-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50208">CVE-2022-50208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50209/">CVE-2022-50209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50209">CVE-2022-50209 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50211/">CVE-2022-50211 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50211">CVE-2022-50211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50212/">CVE-2022-50212 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50212">CVE-2022-50212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50213/">CVE-2022-50213 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50213">CVE-2022-50213 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50215/">CVE-2022-50215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50215">CVE-2022-50215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50218/">CVE-2022-50218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50218">CVE-2022-50218 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50220/">CVE-2022-50220 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50220">CVE-2022-50220 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50222/">CVE-2022-50222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50222">CVE-2022-50222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50226/">CVE-2022-50226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50226">CVE-2022-50226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50228/">CVE-2022-50228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50228">CVE-2022-50228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50229/">CVE-2022-50229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50229">CVE-2022-50229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50231/">CVE-2022-50231 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50231">CVE-2022-50231 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3111/">CVE-2023-3111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52924/">CVE-2023-52924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52924">CVE-2023-52924 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52925/">CVE-2023-52925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52925">CVE-2023-52925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53048/">CVE-2023-53048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53048">CVE-2023-53048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53076/">CVE-2023-53076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53076">CVE-2023-53076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53097/">CVE-2023-53097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53097">CVE-2023-53097 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26808/">CVE-2024-26808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26924/">CVE-2024-26924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26924">CVE-2024-26924 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27397/">CVE-2024-27397 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27397">CVE-2024-27397 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35840/">CVE-2024-35840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35840">CVE-2024-35840 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46800/">CVE-2024-46800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53057/">CVE-2024-53057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53057">CVE-2024-53057 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53125/">CVE-2024-53125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53125">CVE-2024-53125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53141/">CVE-2024-53141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53141">CVE-2024-53141 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56770/">CVE-2024-56770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57947/">CVE-2024-57947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57947">CVE-2024-57947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57999/">CVE-2024-57999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57999">CVE-2024-57999 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21700/">CVE-2025-21700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21700">CVE-2025-21700 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21702/">CVE-2025-21702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21702">CVE-2025-21702 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21703/">CVE-2025-21703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21703">CVE-2025-21703 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21756/">CVE-2025-21756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23141/">CVE-2025-23141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23141">CVE-2025-23141 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23145/">CVE-2025-23145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23145">CVE-2025-23145 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37752/">CVE-2025-37752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37752">CVE-2025-37752 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37797/">CVE-2025-37797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37798/">CVE-2025-37798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37798">CVE-2025-37798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37823/">CVE-2025-37823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37890/">CVE-2025-37890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37932/">CVE-2025-37932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37932">CVE-2025-37932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37953/">CVE-2025-37953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37953">CVE-2025-37953 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37997/">CVE-2025-37997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37997">CVE-2025-37997 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38000/">CVE-2025-38000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38001/">CVE-2025-38001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38001">CVE-2025-38001 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38014/">CVE-2025-38014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38014">CVE-2025-38014 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38083/">CVE-2025-38083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38083">CVE-2025-38083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007703" comment="kernel-rt-5.14.21-150400.15.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007704" comment="kernel-source-rt-5.14.21-150400.15.124.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206333" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1234282" ref_url="https://bugzilla.suse.com/1234282" source="BUGZILLA"/>
		<reference ref_id="1238043" ref_url="https://bugzilla.suse.com/1238043" source="BUGZILLA"/>
		<reference ref_id="1238896" ref_url="https://bugzilla.suse.com/1238896" source="BUGZILLA"/>
		<reference ref_id="1243117" ref_url="https://bugzilla.suse.com/1243117" source="BUGZILLA"/>
		<reference ref_id="1244644" ref_url="https://bugzilla.suse.com/1244644" source="BUGZILLA"/>
		<reference ref_id="1246112" ref_url="https://bugzilla.suse.com/1246112" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-36350" ref_url="https://www.suse.com/security/cve/CVE-2024-36350/" source="CVE"/>
		<reference ref_id="CVE-2024-36357" ref_url="https://www.suse.com/security/cve/CVE-2024-36357/" source="CVE"/>
		<reference ref_id="CVE-2024-53241" ref_url="https://www.suse.com/security/cve/CVE-2024-53241/" source="CVE"/>
		<reference ref_id="CVE-2025-1713" ref_url="https://www.suse.com/security/cve/CVE-2025-1713/" source="CVE"/>
		<reference ref_id="CVE-2025-27465" ref_url="https://www.suse.com/security/cve/CVE-2025-27465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040722.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security fixes:

- CVE-2024-28956: Fixed Intel CPU: Indirect Target Selection (ITS) (XSA-469) (bsc#1243117)
- CVE-2024-53241: Fixed Xen hypercall page unsafe against speculative attacks (XSA-466) (bsc#1234282)
- CVE-2025-1713: Fixed deadlock potential with VT-d and legacy PCI device pass-through (XSA-467) (bsc#1238043)
- CVE-2024-36350, CVE-2024-36357: More AMD transient execution attacks (bsc#1246112, XSA-471)
- CVE-2025-27465: Incorrect stubs exception handling for flags recovery (bsc#1244644, XSA-470)

Other fixes:

- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-16"/>
	<updated date="2025-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234282">SUSE bug 1234282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238043">SUSE bug 1238043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238896">SUSE bug 1238896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243117">SUSE bug 1243117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244644">SUSE bug 1244644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246112">SUSE bug 1246112</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36350/">CVE-2024-36350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36350">CVE-2024-36350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36357/">CVE-2024-36357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36357">CVE-2024-36357 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53241/">CVE-2024-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-1713/">CVE-2025-1713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1713">CVE-2025-1713 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27465/">CVE-2025-27465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27465">CVE-2025-27465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007899" comment="xen-libs-4.16.7_02-150400.4.72.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206334" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1244554" ref_url="https://bugzilla.suse.com/1244554" source="BUGZILLA"/>
		<reference ref_id="1244557" ref_url="https://bugzilla.suse.com/1244557" source="BUGZILLA"/>
		<reference ref_id="1244590" ref_url="https://bugzilla.suse.com/1244590" source="BUGZILLA"/>
		<reference ref_id="1244700" ref_url="https://bugzilla.suse.com/1244700" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-49794" ref_url="https://www.suse.com/security/cve/CVE-2025-49794/" source="CVE"/>
		<reference ref_id="CVE-2025-49796" ref_url="https://www.suse.com/security/cve/CVE-2025-49796/" source="CVE"/>
		<reference ref_id="CVE-2025-6021" ref_url="https://www.suse.com/security/cve/CVE-2025-6021/" source="CVE"/>
		<reference ref_id="CVE-2025-6170" ref_url="https://www.suse.com/security/cve/CVE-2025-6170/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2025-49794: Fixed a heap use after free which could lead to denial of service. (bsc#1244554)
- CVE-2025-49796: Fixed type confusion which could lead to denial of service. (bsc#1244557)
- CVE-2025-6170: Fixed a stack buffer overflow which could lead to a crash. (bsc#1244700)
- CVE-2025-6021: Fixed an integer overflow in xmlBuildQName() which could lead to stack buffer overflow. (bsc#1244590)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-17"/>
	<updated date="2025-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1244554">SUSE bug 1244554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244557">SUSE bug 1244557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244590">SUSE bug 1244590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244700">SUSE bug 1244700</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49794/">CVE-2025-49794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49794">CVE-2025-49794 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-49796/">CVE-2025-49796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49796">CVE-2025-49796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6021/">CVE-2025-6021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6021">CVE-2025-6021 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6170/">CVE-2025-6170 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6170">CVE-2025-6170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008253" comment="libxml2-2-2.9.14-150400.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008254" comment="libxml2-tools-2.9.14-150400.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008255" comment="python3-libxml2-2.9.14-150400.5.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206335" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243767" ref_url="https://bugzilla.suse.com/1243767" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-5278" ref_url="https://www.suse.com/security/cve/CVE-2025-5278/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021851.html" source="SUSE-SU"/>
		<description>
This update for coreutils fixes the following issues:

- CVE-2025-5278: Fixed heap buffer under-read may lead to a crash or leak sensitive data (bsc#1243767)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1243767">SUSE bug 1243767</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5278/">CVE-2025-5278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5278">CVE-2025-5278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008508" comment="coreutils-8.32-150400.9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206336" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1242844" ref_url="https://bugzilla.suse.com/1242844" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-4373" ref_url="https://www.suse.com/security/cve/CVE-2025-4373/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040775.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2025-4373: integer overflow in the `g_string_insert_unichar()` function can lead to buffer underwrite and memory
  corruption (bsc#1242844).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1242844">SUSE bug 1242844</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4373/">CVE-2025-4373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4373">CVE-2025-4373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008509" comment="glib2-tools-2.70.5-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008510" comment="libgio-2_0-0-2.70.5-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008511" comment="libglib-2_0-0-2.70.5-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008512" comment="libgmodule-2_0-0-2.70.5-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008513" comment="libgobject-2_0-0-2.70.5-150400.3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206337" version="1" class="patch">
	<metadata>
		<title>Security update for jq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243450" ref_url="https://bugzilla.suse.com/1243450" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23337" ref_url="https://www.suse.com/security/cve/CVE-2024-23337/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040788.html" source="SUSE-SU"/>
		<description>
This update for jq fixes the following issues:

- CVE-2024-23337: Fixed signed integer overflow in jv.c:jvp_array_write (bsc#1243450).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1243450">SUSE bug 1243450</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23337/">CVE-2024-23337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23337">CVE-2024-23337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008506" comment="jq-1.6-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008507" comment="libjq1-1.6-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206338" version="1" class="patch">
	<metadata>
		<title>Security update for iputils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243772" ref_url="https://bugzilla.suse.com/1243772" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-48964" ref_url="https://www.suse.com/security/cve/CVE-2025-48964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02431-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040819.html" source="SUSE-SU"/>
		<description>
This update for iputils fixes the following issues:

- CVE-2025-48964: Fixed integer overflow in ping statistics via zero timestamp (bsc#1243772).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-21"/>
	<updated date="2025-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1243772">SUSE bug 1243772</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48964/">CVE-2025-48964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48964">CVE-2025-48964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008930" comment="iputils-20211215-150400.3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206339" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1221107" ref_url="https://bugzilla.suse.com/1221107" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2236" ref_url="https://www.suse.com/security/cve/CVE-2024-2236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040861.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2024-2236: timing-based side-channel flaw in RSA implementation can lead to decryption of RSA ciphertexts (bsc#1221107).  
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-22"/>
	<updated date="2025-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221107">SUSE bug 1221107</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2236/">CVE-2024-2236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2236">CVE-2024-2236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010009431" comment="libgcrypt20-1.9.4-150400.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009432" comment="libgcrypt20-hmac-1.9.4-150400.6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206340" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1244403" ref_url="https://bugzilla.suse.com/1244403" source="BUGZILLA"/>
		<reference ref_id="1244404" ref_url="https://bugzilla.suse.com/1244404" source="BUGZILLA"/>
		<reference ref_id="1244407" ref_url="https://bugzilla.suse.com/1244407" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47806" ref_url="https://www.suse.com/security/cve/CVE-2025-47806/" source="CVE"/>
		<reference ref_id="CVE-2025-47807" ref_url="https://www.suse.com/security/cve/CVE-2025-47807/" source="CVE"/>
		<reference ref_id="CVE-2025-47808" ref_url="https://www.suse.com/security/cve/CVE-2025-47808/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040870.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issues:

- CVE-2025-47808: Fixed NULL-pointer dereference in TMPlayer subtitle parser (bsc#1244404).
- CVE-2025-47807: Fixed NULL-pointer dereference in SubRip subtitle parser (bsc#1244403).
- CVE-2025-47806: Fixed stack buffer overflow in SubRip subtitle parser (bsc#1244407).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1244403">SUSE bug 1244403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244404">SUSE bug 1244404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244407">SUSE bug 1244407</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47806/">CVE-2025-47806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47806">CVE-2025-47806 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47807/">CVE-2025-47807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47807">CVE-2025-47807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47808/">CVE-2025-47808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47808">CVE-2025-47808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010036" comment="gstreamer-plugins-base-1.20.1-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010037" comment="libgstallocators-1_0-0-1.20.1-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010038" comment="libgstapp-1_0-0-1.20.1-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010039" comment="libgstaudio-1_0-0-1.20.1-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010040" comment="libgstgl-1_0-0-1.20.1-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010041" comment="libgstpbutils-1_0-0-1.20.1-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010042" comment="libgstriff-1_0-0-1.20.1-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010043" comment="libgsttag-1_0-0-1.20.1-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010044" comment="libgstvideo-1_0-0-1.20.1-150400.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206341" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236621" ref_url="https://bugzilla.suse.com/1236621" source="BUGZILLA"/>
		<reference ref_id="1243268" ref_url="https://bugzilla.suse.com/1243268" source="BUGZILLA"/>
		<reference ref_id="1244561" ref_url="https://bugzilla.suse.com/1244561" source="BUGZILLA"/>
		<reference ref_id="1244564" ref_url="https://bugzilla.suse.com/1244564" source="BUGZILLA"/>
		<reference ref_id="1244565" ref_url="https://bugzilla.suse.com/1244565" source="BUGZILLA"/>
		<reference ref_id="1244566" ref_url="https://bugzilla.suse.com/1244566" source="BUGZILLA"/>
		<reference ref_id="1244567" ref_url="https://bugzilla.suse.com/1244567" source="BUGZILLA"/>
		<reference ref_id="1244568" ref_url="https://bugzilla.suse.com/1244568" source="BUGZILLA"/>
		<reference ref_id="1244570" ref_url="https://bugzilla.suse.com/1244570" source="BUGZILLA"/>
		<reference ref_id="1244571" ref_url="https://bugzilla.suse.com/1244571" source="BUGZILLA"/>
		<reference ref_id="1244572" ref_url="https://bugzilla.suse.com/1244572" source="BUGZILLA"/>
		<reference ref_id="1244574" ref_url="https://bugzilla.suse.com/1244574" source="BUGZILLA"/>
		<reference ref_id="1244575" ref_url="https://bugzilla.suse.com/1244575" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-38822" ref_url="https://www.suse.com/security/cve/CVE-2024-38822/" source="CVE"/>
		<reference ref_id="CVE-2024-38823" ref_url="https://www.suse.com/security/cve/CVE-2024-38823/" source="CVE"/>
		<reference ref_id="CVE-2024-38824" ref_url="https://www.suse.com/security/cve/CVE-2024-38824/" source="CVE"/>
		<reference ref_id="CVE-2024-38825" ref_url="https://www.suse.com/security/cve/CVE-2024-38825/" source="CVE"/>
		<reference ref_id="CVE-2025-22236" ref_url="https://www.suse.com/security/cve/CVE-2025-22236/" source="CVE"/>
		<reference ref_id="CVE-2025-22237" ref_url="https://www.suse.com/security/cve/CVE-2025-22237/" source="CVE"/>
		<reference ref_id="CVE-2025-22238" ref_url="https://www.suse.com/security/cve/CVE-2025-22238/" source="CVE"/>
		<reference ref_id="CVE-2025-22239" ref_url="https://www.suse.com/security/cve/CVE-2025-22239/" source="CVE"/>
		<reference ref_id="CVE-2025-22240" ref_url="https://www.suse.com/security/cve/CVE-2025-22240/" source="CVE"/>
		<reference ref_id="CVE-2025-22241" ref_url="https://www.suse.com/security/cve/CVE-2025-22241/" source="CVE"/>
		<reference ref_id="CVE-2025-22242" ref_url="https://www.suse.com/security/cve/CVE-2025-22242/" source="CVE"/>
		<reference ref_id="CVE-2025-47287" ref_url="https://www.suse.com/security/cve/CVE-2025-47287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040874.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Security issues fixed:
  
  - CVE-2024-38822: Fixed Minion token validation (bsc#1244561)
  - CVE-2024-38823: Fixed server vulnerability to replay attacks when not using a TLS encrypted transport (bsc#1244564)
  - CVE-2024-38824: Fixed directory traversal vulnerability in recv_file method (bsc#1244565)
  - CVE-2024-38825: Fixed salt.auth.pki module authentication issue (bsc#1244566)
  - CVE-2025-22240: Fixed arbitrary directory creation or file deletion with GitFS (bsc#1244567)
  - CVE-2025-22236: Fixed Minion event bus authorization bypass (bsc#1244568)
  - CVE-2025-22241: Fixed the use of un-validated input in the VirtKey class (bsc#1244570)
  - CVE-2025-22237: Fixed exploitation of the 'on demand' pillar functionality (bsc#1244571)
  - CVE-2025-22238: Fixed the master's default cache vulnerability to a directory traversal attack (bsc#1244572)
  - CVE-2025-22239: Fixed the arbitrary event injection on the Salt Master (bsc#1244574) 
  - CVE-2025-22242: Fixed a Denial of Service vulnerability through file read operation (bsc#1244575)
  - CVE-2025-47287: Fixed a Denial of Service vulnerability in Tornado logging behavior (bsc#1243268)

- Other bugs fixed:

  - Added subsystem filter to udev.exportdb (bsc#1236621)
  - Fixed Ubuntu 24.04 test failures
  - Fixed refresh of osrelease and related grains on Python 3.10+
  - Fixed issue requiring proper Python flavor for dependencies
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1236621">SUSE bug 1236621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243268">SUSE bug 1243268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244561">SUSE bug 1244561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244564">SUSE bug 1244564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244565">SUSE bug 1244565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244566">SUSE bug 1244566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244567">SUSE bug 1244567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244568">SUSE bug 1244568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244570">SUSE bug 1244570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244571">SUSE bug 1244571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244572">SUSE bug 1244572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244574">SUSE bug 1244574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244575">SUSE bug 1244575</bugzilla>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38822/">CVE-2024-38822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38822">CVE-2024-38822 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38823/">CVE-2024-38823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38823">CVE-2024-38823 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38824/">CVE-2024-38824 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38824">CVE-2024-38824 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38825/">CVE-2024-38825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38825">CVE-2024-38825 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L" cvss4="6.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22236/">CVE-2025-22236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22236">CVE-2025-22236 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22237/">CVE-2025-22237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22237">CVE-2025-22237 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22238/">CVE-2025-22238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22238">CVE-2025-22238 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L" cvss4="6.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22239/">CVE-2025-22239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22239">CVE-2025-22239 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22240/">CVE-2025-22240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22240">CVE-2025-22240 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22241/">CVE-2025-22241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22241">CVE-2025-22241 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22242/">CVE-2025-22242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22242">CVE-2025-22242 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47287/">CVE-2025-47287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47287">CVE-2025-47287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010045" comment="python3-salt-3006.0-150400.8.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010046" comment="salt-3006.0-150400.8.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010047" comment="salt-minion-3006.0-150400.8.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010048" comment="salt-transactional-update-3006.0-150400.8.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206342" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246472" ref_url="https://bugzilla.suse.com/1246472" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-7519" ref_url="https://www.suse.com/security/cve/CVE-2025-7519/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02528-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040934.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2025-7519: Fixed a XML policy file with a large number of nested elements that may lead to out-of-bounds write. (bsc#1246472)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-25"/>
	<updated date="2025-07-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246472">SUSE bug 1246472</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7519/">CVE-2025-7519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7519">CVE-2025-7519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010444" comment="libpolkit0-0.116-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010445" comment="polkit-0.116-150200.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206343" version="1" class="patch">
	<metadata>
		<title>Security update for boost (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1245936" ref_url="https://bugzilla.suse.com/1245936" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040943.html" source="SUSE-SU"/>
		<description>
This update for boost fixes the following issues:

- CVE-2016-9840: Fixed out-of-bounds pointer arithmetic in zlib in beast (bsc#1245936)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-31"/>
	<updated date="2025-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1245936">SUSE bug 1245936</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010549" comment="boost-license1_66_0-1.66.0-150200.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011157" comment="libboost_system1_66_0-1.66.0-150200.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011158" comment="libboost_thread1_66_0-1.66.0-150200.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206344" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1198410" ref_url="https://bugzilla.suse.com/1198410" source="BUGZILLA"/>
		<reference ref_id="1199356" ref_url="https://bugzilla.suse.com/1199356" source="BUGZILLA"/>
		<reference ref_id="1199487" ref_url="https://bugzilla.suse.com/1199487" source="BUGZILLA"/>
		<reference ref_id="1201160" ref_url="https://bugzilla.suse.com/1201160" source="BUGZILLA"/>
		<reference ref_id="1201956" ref_url="https://bugzilla.suse.com/1201956" source="BUGZILLA"/>
		<reference ref_id="1202094" ref_url="https://bugzilla.suse.com/1202094" source="BUGZILLA"/>
		<reference ref_id="1202095" ref_url="https://bugzilla.suse.com/1202095" source="BUGZILLA"/>
		<reference ref_id="1202564" ref_url="https://bugzilla.suse.com/1202564" source="BUGZILLA"/>
		<reference ref_id="1202716" ref_url="https://bugzilla.suse.com/1202716" source="BUGZILLA"/>
		<reference ref_id="1202823" ref_url="https://bugzilla.suse.com/1202823" source="BUGZILLA"/>
		<reference ref_id="1202860" ref_url="https://bugzilla.suse.com/1202860" source="BUGZILLA"/>
		<reference ref_id="1203197" ref_url="https://bugzilla.suse.com/1203197" source="BUGZILLA"/>
		<reference ref_id="1203361" ref_url="https://bugzilla.suse.com/1203361" source="BUGZILLA"/>
		<reference ref_id="1205220" ref_url="https://bugzilla.suse.com/1205220" source="BUGZILLA"/>
		<reference ref_id="1205514" ref_url="https://bugzilla.suse.com/1205514" source="BUGZILLA"/>
		<reference ref_id="1206664" ref_url="https://bugzilla.suse.com/1206664" source="BUGZILLA"/>
		<reference ref_id="1206878" ref_url="https://bugzilla.suse.com/1206878" source="BUGZILLA"/>
		<reference ref_id="1206880" ref_url="https://bugzilla.suse.com/1206880" source="BUGZILLA"/>
		<reference ref_id="1207361" ref_url="https://bugzilla.suse.com/1207361" source="BUGZILLA"/>
		<reference ref_id="1207638" ref_url="https://bugzilla.suse.com/1207638" source="BUGZILLA"/>
		<reference ref_id="1211226" ref_url="https://bugzilla.suse.com/1211226" source="BUGZILLA"/>
		<reference ref_id="1212051" ref_url="https://bugzilla.suse.com/1212051" source="BUGZILLA"/>
		<reference ref_id="1213090" ref_url="https://bugzilla.suse.com/1213090" source="BUGZILLA"/>
		<reference ref_id="1218184" ref_url="https://bugzilla.suse.com/1218184" source="BUGZILLA"/>
		<reference ref_id="1218234" ref_url="https://bugzilla.suse.com/1218234" source="BUGZILLA"/>
		<reference ref_id="1218470" ref_url="https://bugzilla.suse.com/1218470" source="BUGZILLA"/>
		<reference ref_id="1222634" ref_url="https://bugzilla.suse.com/1222634" source="BUGZILLA"/>
		<reference ref_id="1223675" ref_url="https://bugzilla.suse.com/1223675" source="BUGZILLA"/>
		<reference ref_id="1224095" ref_url="https://bugzilla.suse.com/1224095" source="BUGZILLA"/>
		<reference ref_id="1224597" ref_url="https://bugzilla.suse.com/1224597" source="BUGZILLA"/>
		<reference ref_id="1225468" ref_url="https://bugzilla.suse.com/1225468" source="BUGZILLA"/>
		<reference ref_id="1225820" ref_url="https://bugzilla.suse.com/1225820" source="BUGZILLA"/>
		<reference ref_id="1226514" ref_url="https://bugzilla.suse.com/1226514" source="BUGZILLA"/>
		<reference ref_id="1226552" ref_url="https://bugzilla.suse.com/1226552" source="BUGZILLA"/>
		<reference ref_id="1228659" ref_url="https://bugzilla.suse.com/1228659" source="BUGZILLA"/>
		<reference ref_id="1230827" ref_url="https://bugzilla.suse.com/1230827" source="BUGZILLA"/>
		<reference ref_id="1231293" ref_url="https://bugzilla.suse.com/1231293" source="BUGZILLA"/>
		<reference ref_id="1232504" ref_url="https://bugzilla.suse.com/1232504" source="BUGZILLA"/>
		<reference ref_id="1233551" ref_url="https://bugzilla.suse.com/1233551" source="BUGZILLA"/>
		<reference ref_id="1234156" ref_url="https://bugzilla.suse.com/1234156" source="BUGZILLA"/>
		<reference ref_id="1234381" ref_url="https://bugzilla.suse.com/1234381" source="BUGZILLA"/>
		<reference ref_id="1234454" ref_url="https://bugzilla.suse.com/1234454" source="BUGZILLA"/>
		<reference ref_id="1235637" ref_url="https://bugzilla.suse.com/1235637" source="BUGZILLA"/>
		<reference ref_id="1236333" ref_url="https://bugzilla.suse.com/1236333" source="BUGZILLA"/>
		<reference ref_id="1236821" ref_url="https://bugzilla.suse.com/1236821" source="BUGZILLA"/>
		<reference ref_id="1236822" ref_url="https://bugzilla.suse.com/1236822" source="BUGZILLA"/>
		<reference ref_id="1237159" ref_url="https://bugzilla.suse.com/1237159" source="BUGZILLA"/>
		<reference ref_id="1237312" ref_url="https://bugzilla.suse.com/1237312" source="BUGZILLA"/>
		<reference ref_id="1237313" ref_url="https://bugzilla.suse.com/1237313" source="BUGZILLA"/>
		<reference ref_id="1238303" ref_url="https://bugzilla.suse.com/1238303" source="BUGZILLA"/>
		<reference ref_id="1238526" ref_url="https://bugzilla.suse.com/1238526" source="BUGZILLA"/>
		<reference ref_id="1238570" ref_url="https://bugzilla.suse.com/1238570" source="BUGZILLA"/>
		<reference ref_id="1238876" ref_url="https://bugzilla.suse.com/1238876" source="BUGZILLA"/>
		<reference ref_id="1239986" ref_url="https://bugzilla.suse.com/1239986" source="BUGZILLA"/>
		<reference ref_id="1240785" ref_url="https://bugzilla.suse.com/1240785" source="BUGZILLA"/>
		<reference ref_id="1241038" ref_url="https://bugzilla.suse.com/1241038" source="BUGZILLA"/>
		<reference ref_id="1242221" ref_url="https://bugzilla.suse.com/1242221" source="BUGZILLA"/>
		<reference ref_id="1242414" ref_url="https://bugzilla.suse.com/1242414" source="BUGZILLA"/>
		<reference ref_id="1242417" ref_url="https://bugzilla.suse.com/1242417" source="BUGZILLA"/>
		<reference ref_id="1242504" ref_url="https://bugzilla.suse.com/1242504" source="BUGZILLA"/>
		<reference ref_id="1242596" ref_url="https://bugzilla.suse.com/1242596" source="BUGZILLA"/>
		<reference ref_id="1242782" ref_url="https://bugzilla.suse.com/1242782" source="BUGZILLA"/>
		<reference ref_id="1242924" ref_url="https://bugzilla.suse.com/1242924" source="BUGZILLA"/>
		<reference ref_id="1243001" ref_url="https://bugzilla.suse.com/1243001" source="BUGZILLA"/>
		<reference ref_id="1243330" ref_url="https://bugzilla.suse.com/1243330" source="BUGZILLA"/>
		<reference ref_id="1243543" ref_url="https://bugzilla.suse.com/1243543" source="BUGZILLA"/>
		<reference ref_id="1243627" ref_url="https://bugzilla.suse.com/1243627" source="BUGZILLA"/>
		<reference ref_id="1243832" ref_url="https://bugzilla.suse.com/1243832" source="BUGZILLA"/>
		<reference ref_id="1244114" ref_url="https://bugzilla.suse.com/1244114" source="BUGZILLA"/>
		<reference ref_id="1244179" ref_url="https://bugzilla.suse.com/1244179" source="BUGZILLA"/>
		<reference ref_id="1244234" ref_url="https://bugzilla.suse.com/1244234" source="BUGZILLA"/>
		<reference ref_id="1244241" ref_url="https://bugzilla.suse.com/1244241" source="BUGZILLA"/>
		<reference ref_id="1244277" ref_url="https://bugzilla.suse.com/1244277" source="BUGZILLA"/>
		<reference ref_id="1244309" ref_url="https://bugzilla.suse.com/1244309" source="BUGZILLA"/>
		<reference ref_id="1244337" ref_url="https://bugzilla.suse.com/1244337" source="BUGZILLA"/>
		<reference ref_id="1244732" ref_url="https://bugzilla.suse.com/1244732" source="BUGZILLA"/>
		<reference ref_id="1244764" ref_url="https://bugzilla.suse.com/1244764" source="BUGZILLA"/>
		<reference ref_id="1244765" ref_url="https://bugzilla.suse.com/1244765" source="BUGZILLA"/>
		<reference ref_id="1244767" ref_url="https://bugzilla.suse.com/1244767" source="BUGZILLA"/>
		<reference ref_id="1244770" ref_url="https://bugzilla.suse.com/1244770" source="BUGZILLA"/>
		<reference ref_id="1244771" ref_url="https://bugzilla.suse.com/1244771" source="BUGZILLA"/>
		<reference ref_id="1244773" ref_url="https://bugzilla.suse.com/1244773" source="BUGZILLA"/>
		<reference ref_id="1244774" ref_url="https://bugzilla.suse.com/1244774" source="BUGZILLA"/>
		<reference ref_id="1244776" ref_url="https://bugzilla.suse.com/1244776" source="BUGZILLA"/>
		<reference ref_id="1244779" ref_url="https://bugzilla.suse.com/1244779" source="BUGZILLA"/>
		<reference ref_id="1244780" ref_url="https://bugzilla.suse.com/1244780" source="BUGZILLA"/>
		<reference ref_id="1244781" ref_url="https://bugzilla.suse.com/1244781" source="BUGZILLA"/>
		<reference ref_id="1244782" ref_url="https://bugzilla.suse.com/1244782" source="BUGZILLA"/>
		<reference ref_id="1244783" ref_url="https://bugzilla.suse.com/1244783" source="BUGZILLA"/>
		<reference ref_id="1244784" ref_url="https://bugzilla.suse.com/1244784" source="BUGZILLA"/>
		<reference ref_id="1244786" ref_url="https://bugzilla.suse.com/1244786" source="BUGZILLA"/>
		<reference ref_id="1244787" ref_url="https://bugzilla.suse.com/1244787" source="BUGZILLA"/>
		<reference ref_id="1244788" ref_url="https://bugzilla.suse.com/1244788" source="BUGZILLA"/>
		<reference ref_id="1244790" ref_url="https://bugzilla.suse.com/1244790" source="BUGZILLA"/>
		<reference ref_id="1244793" ref_url="https://bugzilla.suse.com/1244793" source="BUGZILLA"/>
		<reference ref_id="1244794" ref_url="https://bugzilla.suse.com/1244794" source="BUGZILLA"/>
		<reference ref_id="1244796" ref_url="https://bugzilla.suse.com/1244796" source="BUGZILLA"/>
		<reference ref_id="1244797" ref_url="https://bugzilla.suse.com/1244797" source="BUGZILLA"/>
		<reference ref_id="1244798" ref_url="https://bugzilla.suse.com/1244798" source="BUGZILLA"/>
		<reference ref_id="1244800" ref_url="https://bugzilla.suse.com/1244800" source="BUGZILLA"/>
		<reference ref_id="1244802" ref_url="https://bugzilla.suse.com/1244802" source="BUGZILLA"/>
		<reference ref_id="1244804" ref_url="https://bugzilla.suse.com/1244804" source="BUGZILLA"/>
		<reference ref_id="1244807" ref_url="https://bugzilla.suse.com/1244807" source="BUGZILLA"/>
		<reference ref_id="1244808" ref_url="https://bugzilla.suse.com/1244808" source="BUGZILLA"/>
		<reference ref_id="1244811" ref_url="https://bugzilla.suse.com/1244811" source="BUGZILLA"/>
		<reference ref_id="1244813" ref_url="https://bugzilla.suse.com/1244813" source="BUGZILLA"/>
		<reference ref_id="1244814" ref_url="https://bugzilla.suse.com/1244814" source="BUGZILLA"/>
		<reference ref_id="1244815" ref_url="https://bugzilla.suse.com/1244815" source="BUGZILLA"/>
		<reference ref_id="1244816" ref_url="https://bugzilla.suse.com/1244816" source="BUGZILLA"/>
		<reference ref_id="1244819" ref_url="https://bugzilla.suse.com/1244819" source="BUGZILLA"/>
		<reference ref_id="1244820" ref_url="https://bugzilla.suse.com/1244820" source="BUGZILLA"/>
		<reference ref_id="1244823" ref_url="https://bugzilla.suse.com/1244823" source="BUGZILLA"/>
		<reference ref_id="1244824" ref_url="https://bugzilla.suse.com/1244824" source="BUGZILLA"/>
		<reference ref_id="1244825" ref_url="https://bugzilla.suse.com/1244825" source="BUGZILLA"/>
		<reference ref_id="1244830" ref_url="https://bugzilla.suse.com/1244830" source="BUGZILLA"/>
		<reference ref_id="1244831" ref_url="https://bugzilla.suse.com/1244831" source="BUGZILLA"/>
		<reference ref_id="1244832" ref_url="https://bugzilla.suse.com/1244832" source="BUGZILLA"/>
		<reference ref_id="1244834" ref_url="https://bugzilla.suse.com/1244834" source="BUGZILLA"/>
		<reference ref_id="1244836" ref_url="https://bugzilla.suse.com/1244836" source="BUGZILLA"/>
		<reference ref_id="1244838" ref_url="https://bugzilla.suse.com/1244838" source="BUGZILLA"/>
		<reference ref_id="1244839" ref_url="https://bugzilla.suse.com/1244839" source="BUGZILLA"/>
		<reference ref_id="1244840" ref_url="https://bugzilla.suse.com/1244840" source="BUGZILLA"/>
		<reference ref_id="1244841" ref_url="https://bugzilla.suse.com/1244841" source="BUGZILLA"/>
		<reference ref_id="1244842" ref_url="https://bugzilla.suse.com/1244842" source="BUGZILLA"/>
		<reference ref_id="1244843" ref_url="https://bugzilla.suse.com/1244843" source="BUGZILLA"/>
		<reference ref_id="1244845" ref_url="https://bugzilla.suse.com/1244845" source="BUGZILLA"/>
		<reference ref_id="1244846" ref_url="https://bugzilla.suse.com/1244846" source="BUGZILLA"/>
		<reference ref_id="1244848" ref_url="https://bugzilla.suse.com/1244848" source="BUGZILLA"/>
		<reference ref_id="1244849" ref_url="https://bugzilla.suse.com/1244849" source="BUGZILLA"/>
		<reference ref_id="1244851" ref_url="https://bugzilla.suse.com/1244851" source="BUGZILLA"/>
		<reference ref_id="1244853" ref_url="https://bugzilla.suse.com/1244853" source="BUGZILLA"/>
		<reference ref_id="1244854" ref_url="https://bugzilla.suse.com/1244854" source="BUGZILLA"/>
		<reference ref_id="1244856" ref_url="https://bugzilla.suse.com/1244856" source="BUGZILLA"/>
		<reference ref_id="1244860" ref_url="https://bugzilla.suse.com/1244860" source="BUGZILLA"/>
		<reference ref_id="1244861" ref_url="https://bugzilla.suse.com/1244861" source="BUGZILLA"/>
		<reference ref_id="1244866" ref_url="https://bugzilla.suse.com/1244866" source="BUGZILLA"/>
		<reference ref_id="1244867" ref_url="https://bugzilla.suse.com/1244867" source="BUGZILLA"/>
		<reference ref_id="1244868" ref_url="https://bugzilla.suse.com/1244868" source="BUGZILLA"/>
		<reference ref_id="1244869" ref_url="https://bugzilla.suse.com/1244869" source="BUGZILLA"/>
		<reference ref_id="1244870" ref_url="https://bugzilla.suse.com/1244870" source="BUGZILLA"/>
		<reference ref_id="1244871" ref_url="https://bugzilla.suse.com/1244871" source="BUGZILLA"/>
		<reference ref_id="1244872" ref_url="https://bugzilla.suse.com/1244872" source="BUGZILLA"/>
		<reference ref_id="1244873" ref_url="https://bugzilla.suse.com/1244873" source="BUGZILLA"/>
		<reference ref_id="1244875" ref_url="https://bugzilla.suse.com/1244875" source="BUGZILLA"/>
		<reference ref_id="1244876" ref_url="https://bugzilla.suse.com/1244876" source="BUGZILLA"/>
		<reference ref_id="1244878" ref_url="https://bugzilla.suse.com/1244878" source="BUGZILLA"/>
		<reference ref_id="1244879" ref_url="https://bugzilla.suse.com/1244879" source="BUGZILLA"/>
		<reference ref_id="1244881" ref_url="https://bugzilla.suse.com/1244881" source="BUGZILLA"/>
		<reference ref_id="1244883" ref_url="https://bugzilla.suse.com/1244883" source="BUGZILLA"/>
		<reference ref_id="1244884" ref_url="https://bugzilla.suse.com/1244884" source="BUGZILLA"/>
		<reference ref_id="1244886" ref_url="https://bugzilla.suse.com/1244886" source="BUGZILLA"/>
		<reference ref_id="1244887" ref_url="https://bugzilla.suse.com/1244887" source="BUGZILLA"/>
		<reference ref_id="1244890" ref_url="https://bugzilla.suse.com/1244890" source="BUGZILLA"/>
		<reference ref_id="1244895" ref_url="https://bugzilla.suse.com/1244895" source="BUGZILLA"/>
		<reference ref_id="1244899" ref_url="https://bugzilla.suse.com/1244899" source="BUGZILLA"/>
		<reference ref_id="1244900" ref_url="https://bugzilla.suse.com/1244900" source="BUGZILLA"/>
		<reference ref_id="1244901" ref_url="https://bugzilla.suse.com/1244901" source="BUGZILLA"/>
		<reference ref_id="1244902" ref_url="https://bugzilla.suse.com/1244902" source="BUGZILLA"/>
		<reference ref_id="1244903" ref_url="https://bugzilla.suse.com/1244903" source="BUGZILLA"/>
		<reference ref_id="1244908" ref_url="https://bugzilla.suse.com/1244908" source="BUGZILLA"/>
		<reference ref_id="1244911" ref_url="https://bugzilla.suse.com/1244911" source="BUGZILLA"/>
		<reference ref_id="1244915" ref_url="https://bugzilla.suse.com/1244915" source="BUGZILLA"/>
		<reference ref_id="1244936" ref_url="https://bugzilla.suse.com/1244936" source="BUGZILLA"/>
		<reference ref_id="1244941" ref_url="https://bugzilla.suse.com/1244941" source="BUGZILLA"/>
		<reference ref_id="1244942" ref_url="https://bugzilla.suse.com/1244942" source="BUGZILLA"/>
		<reference ref_id="1244943" ref_url="https://bugzilla.suse.com/1244943" source="BUGZILLA"/>
		<reference ref_id="1244944" ref_url="https://bugzilla.suse.com/1244944" source="BUGZILLA"/>
		<reference ref_id="1244945" ref_url="https://bugzilla.suse.com/1244945" source="BUGZILLA"/>
		<reference ref_id="1244948" ref_url="https://bugzilla.suse.com/1244948" source="BUGZILLA"/>
		<reference ref_id="1244949" ref_url="https://bugzilla.suse.com/1244949" source="BUGZILLA"/>
		<reference ref_id="1244950" ref_url="https://bugzilla.suse.com/1244950" source="BUGZILLA"/>
		<reference ref_id="1244956" ref_url="https://bugzilla.suse.com/1244956" source="BUGZILLA"/>
		<reference ref_id="1244958" ref_url="https://bugzilla.suse.com/1244958" source="BUGZILLA"/>
		<reference ref_id="1244959" ref_url="https://bugzilla.suse.com/1244959" source="BUGZILLA"/>
		<reference ref_id="1244965" ref_url="https://bugzilla.suse.com/1244965" source="BUGZILLA"/>
		<reference ref_id="1244966" ref_url="https://bugzilla.suse.com/1244966" source="BUGZILLA"/>
		<reference ref_id="1244967" ref_url="https://bugzilla.suse.com/1244967" source="BUGZILLA"/>
		<reference ref_id="1244968" ref_url="https://bugzilla.suse.com/1244968" source="BUGZILLA"/>
		<reference ref_id="1244969" ref_url="https://bugzilla.suse.com/1244969" source="BUGZILLA"/>
		<reference ref_id="1244970" ref_url="https://bugzilla.suse.com/1244970" source="BUGZILLA"/>
		<reference ref_id="1244974" ref_url="https://bugzilla.suse.com/1244974" source="BUGZILLA"/>
		<reference ref_id="1244976" ref_url="https://bugzilla.suse.com/1244976" source="BUGZILLA"/>
		<reference ref_id="1244977" ref_url="https://bugzilla.suse.com/1244977" source="BUGZILLA"/>
		<reference ref_id="1244978" ref_url="https://bugzilla.suse.com/1244978" source="BUGZILLA"/>
		<reference ref_id="1244979" ref_url="https://bugzilla.suse.com/1244979" source="BUGZILLA"/>
		<reference ref_id="1244983" ref_url="https://bugzilla.suse.com/1244983" source="BUGZILLA"/>
		<reference ref_id="1244984" ref_url="https://bugzilla.suse.com/1244984" source="BUGZILLA"/>
		<reference ref_id="1244985" ref_url="https://bugzilla.suse.com/1244985" source="BUGZILLA"/>
		<reference ref_id="1244986" ref_url="https://bugzilla.suse.com/1244986" source="BUGZILLA"/>
		<reference ref_id="1244991" ref_url="https://bugzilla.suse.com/1244991" source="BUGZILLA"/>
		<reference ref_id="1244992" ref_url="https://bugzilla.suse.com/1244992" source="BUGZILLA"/>
		<reference ref_id="1244993" ref_url="https://bugzilla.suse.com/1244993" source="BUGZILLA"/>
		<reference ref_id="1245006" ref_url="https://bugzilla.suse.com/1245006" source="BUGZILLA"/>
		<reference ref_id="1245007" ref_url="https://bugzilla.suse.com/1245007" source="BUGZILLA"/>
		<reference ref_id="1245009" ref_url="https://bugzilla.suse.com/1245009" source="BUGZILLA"/>
		<reference ref_id="1245011" ref_url="https://bugzilla.suse.com/1245011" source="BUGZILLA"/>
		<reference ref_id="1245012" ref_url="https://bugzilla.suse.com/1245012" source="BUGZILLA"/>
		<reference ref_id="1245018" ref_url="https://bugzilla.suse.com/1245018" source="BUGZILLA"/>
		<reference ref_id="1245019" ref_url="https://bugzilla.suse.com/1245019" source="BUGZILLA"/>
		<reference ref_id="1245024" ref_url="https://bugzilla.suse.com/1245024" source="BUGZILLA"/>
		<reference ref_id="1245028" ref_url="https://bugzilla.suse.com/1245028" source="BUGZILLA"/>
		<reference ref_id="1245031" ref_url="https://bugzilla.suse.com/1245031" source="BUGZILLA"/>
		<reference ref_id="1245032" ref_url="https://bugzilla.suse.com/1245032" source="BUGZILLA"/>
		<reference ref_id="1245033" ref_url="https://bugzilla.suse.com/1245033" source="BUGZILLA"/>
		<reference ref_id="1245038" ref_url="https://bugzilla.suse.com/1245038" source="BUGZILLA"/>
		<reference ref_id="1245039" ref_url="https://bugzilla.suse.com/1245039" source="BUGZILLA"/>
		<reference ref_id="1245041" ref_url="https://bugzilla.suse.com/1245041" source="BUGZILLA"/>
		<reference ref_id="1245047" ref_url="https://bugzilla.suse.com/1245047" source="BUGZILLA"/>
		<reference ref_id="1245051" ref_url="https://bugzilla.suse.com/1245051" source="BUGZILLA"/>
		<reference ref_id="1245057" ref_url="https://bugzilla.suse.com/1245057" source="BUGZILLA"/>
		<reference ref_id="1245058" ref_url="https://bugzilla.suse.com/1245058" source="BUGZILLA"/>
		<reference ref_id="1245060" ref_url="https://bugzilla.suse.com/1245060" source="BUGZILLA"/>
		<reference ref_id="1245062" ref_url="https://bugzilla.suse.com/1245062" source="BUGZILLA"/>
		<reference ref_id="1245064" ref_url="https://bugzilla.suse.com/1245064" source="BUGZILLA"/>
		<reference ref_id="1245069" ref_url="https://bugzilla.suse.com/1245069" source="BUGZILLA"/>
		<reference ref_id="1245072" ref_url="https://bugzilla.suse.com/1245072" source="BUGZILLA"/>
		<reference ref_id="1245073" ref_url="https://bugzilla.suse.com/1245073" source="BUGZILLA"/>
		<reference ref_id="1245088" ref_url="https://bugzilla.suse.com/1245088" source="BUGZILLA"/>
		<reference ref_id="1245089" ref_url="https://bugzilla.suse.com/1245089" source="BUGZILLA"/>
		<reference ref_id="1245092" ref_url="https://bugzilla.suse.com/1245092" source="BUGZILLA"/>
		<reference ref_id="1245093" ref_url="https://bugzilla.suse.com/1245093" source="BUGZILLA"/>
		<reference ref_id="1245098" ref_url="https://bugzilla.suse.com/1245098" source="BUGZILLA"/>
		<reference ref_id="1245103" ref_url="https://bugzilla.suse.com/1245103" source="BUGZILLA"/>
		<reference ref_id="1245117" ref_url="https://bugzilla.suse.com/1245117" source="BUGZILLA"/>
		<reference ref_id="1245118" ref_url="https://bugzilla.suse.com/1245118" source="BUGZILLA"/>
		<reference ref_id="1245119" ref_url="https://bugzilla.suse.com/1245119" source="BUGZILLA"/>
		<reference ref_id="1245121" ref_url="https://bugzilla.suse.com/1245121" source="BUGZILLA"/>
		<reference ref_id="1245122" ref_url="https://bugzilla.suse.com/1245122" source="BUGZILLA"/>
		<reference ref_id="1245125" ref_url="https://bugzilla.suse.com/1245125" source="BUGZILLA"/>
		<reference ref_id="1245129" ref_url="https://bugzilla.suse.com/1245129" source="BUGZILLA"/>
		<reference ref_id="1245131" ref_url="https://bugzilla.suse.com/1245131" source="BUGZILLA"/>
		<reference ref_id="1245133" ref_url="https://bugzilla.suse.com/1245133" source="BUGZILLA"/>
		<reference ref_id="1245134" ref_url="https://bugzilla.suse.com/1245134" source="BUGZILLA"/>
		<reference ref_id="1245135" ref_url="https://bugzilla.suse.com/1245135" source="BUGZILLA"/>
		<reference ref_id="1245136" ref_url="https://bugzilla.suse.com/1245136" source="BUGZILLA"/>
		<reference ref_id="1245138" ref_url="https://bugzilla.suse.com/1245138" source="BUGZILLA"/>
		<reference ref_id="1245139" ref_url="https://bugzilla.suse.com/1245139" source="BUGZILLA"/>
		<reference ref_id="1245140" ref_url="https://bugzilla.suse.com/1245140" source="BUGZILLA"/>
		<reference ref_id="1245142" ref_url="https://bugzilla.suse.com/1245142" source="BUGZILLA"/>
		<reference ref_id="1245146" ref_url="https://bugzilla.suse.com/1245146" source="BUGZILLA"/>
		<reference ref_id="1245147" ref_url="https://bugzilla.suse.com/1245147" source="BUGZILLA"/>
		<reference ref_id="1245149" ref_url="https://bugzilla.suse.com/1245149" source="BUGZILLA"/>
		<reference ref_id="1245152" ref_url="https://bugzilla.suse.com/1245152" source="BUGZILLA"/>
		<reference ref_id="1245154" ref_url="https://bugzilla.suse.com/1245154" source="BUGZILLA"/>
		<reference ref_id="1245180" ref_url="https://bugzilla.suse.com/1245180" source="BUGZILLA"/>
		<reference ref_id="1245183" ref_url="https://bugzilla.suse.com/1245183" source="BUGZILLA"/>
		<reference ref_id="1245189" ref_url="https://bugzilla.suse.com/1245189" source="BUGZILLA"/>
		<reference ref_id="1245191" ref_url="https://bugzilla.suse.com/1245191" source="BUGZILLA"/>
		<reference ref_id="1245195" ref_url="https://bugzilla.suse.com/1245195" source="BUGZILLA"/>
		<reference ref_id="1245197" ref_url="https://bugzilla.suse.com/1245197" source="BUGZILLA"/>
		<reference ref_id="1245265" ref_url="https://bugzilla.suse.com/1245265" source="BUGZILLA"/>
		<reference ref_id="1245348" ref_url="https://bugzilla.suse.com/1245348" source="BUGZILLA"/>
		<reference ref_id="1245431" ref_url="https://bugzilla.suse.com/1245431" source="BUGZILLA"/>
		<reference ref_id="1245455" ref_url="https://bugzilla.suse.com/1245455" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47557" ref_url="https://www.suse.com/security/cve/CVE-2021-47557/" source="CVE"/>
		<reference ref_id="CVE-2021-47595" ref_url="https://www.suse.com/security/cve/CVE-2021-47595/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-2585" ref_url="https://www.suse.com/security/cve/CVE-2022-2585/" source="CVE"/>
		<reference ref_id="CVE-2022-2586" ref_url="https://www.suse.com/security/cve/CVE-2022-2586/" source="CVE"/>
		<reference ref_id="CVE-2022-2905" ref_url="https://www.suse.com/security/cve/CVE-2022-2905/" source="CVE"/>
		<reference ref_id="CVE-2022-3903" ref_url="https://www.suse.com/security/cve/CVE-2022-3903/" source="CVE"/>
		<reference ref_id="CVE-2022-4095" ref_url="https://www.suse.com/security/cve/CVE-2022-4095/" source="CVE"/>
		<reference ref_id="CVE-2022-4662" ref_url="https://www.suse.com/security/cve/CVE-2022-4662/" source="CVE"/>
		<reference ref_id="CVE-2022-49934" ref_url="https://www.suse.com/security/cve/CVE-2022-49934/" source="CVE"/>
		<reference ref_id="CVE-2022-49936" ref_url="https://www.suse.com/security/cve/CVE-2022-49936/" source="CVE"/>
		<reference ref_id="CVE-2022-49937" ref_url="https://www.suse.com/security/cve/CVE-2022-49937/" source="CVE"/>
		<reference ref_id="CVE-2022-49938" ref_url="https://www.suse.com/security/cve/CVE-2022-49938/" source="CVE"/>
		<reference ref_id="CVE-2022-49940" ref_url="https://www.suse.com/security/cve/CVE-2022-49940/" source="CVE"/>
		<reference ref_id="CVE-2022-49942" ref_url="https://www.suse.com/security/cve/CVE-2022-49942/" source="CVE"/>
		<reference ref_id="CVE-2022-49945" ref_url="https://www.suse.com/security/cve/CVE-2022-49945/" source="CVE"/>
		<reference ref_id="CVE-2022-49946" ref_url="https://www.suse.com/security/cve/CVE-2022-49946/" source="CVE"/>
		<reference ref_id="CVE-2022-49948" ref_url="https://www.suse.com/security/cve/CVE-2022-49948/" source="CVE"/>
		<reference ref_id="CVE-2022-49950" ref_url="https://www.suse.com/security/cve/CVE-2022-49950/" source="CVE"/>
		<reference ref_id="CVE-2022-49952" ref_url="https://www.suse.com/security/cve/CVE-2022-49952/" source="CVE"/>
		<reference ref_id="CVE-2022-49954" ref_url="https://www.suse.com/security/cve/CVE-2022-49954/" source="CVE"/>
		<reference ref_id="CVE-2022-49956" ref_url="https://www.suse.com/security/cve/CVE-2022-49956/" source="CVE"/>
		<reference ref_id="CVE-2022-49957" ref_url="https://www.suse.com/security/cve/CVE-2022-49957/" source="CVE"/>
		<reference ref_id="CVE-2022-49958" ref_url="https://www.suse.com/security/cve/CVE-2022-49958/" source="CVE"/>
		<reference ref_id="CVE-2022-49960" ref_url="https://www.suse.com/security/cve/CVE-2022-49960/" source="CVE"/>
		<reference ref_id="CVE-2022-49964" ref_url="https://www.suse.com/security/cve/CVE-2022-49964/" source="CVE"/>
		<reference ref_id="CVE-2022-49966" ref_url="https://www.suse.com/security/cve/CVE-2022-49966/" source="CVE"/>
		<reference ref_id="CVE-2022-49968" ref_url="https://www.suse.com/security/cve/CVE-2022-49968/" source="CVE"/>
		<reference ref_id="CVE-2022-49969" ref_url="https://www.suse.com/security/cve/CVE-2022-49969/" source="CVE"/>
		<reference ref_id="CVE-2022-49977" ref_url="https://www.suse.com/security/cve/CVE-2022-49977/" source="CVE"/>
		<reference ref_id="CVE-2022-49978" ref_url="https://www.suse.com/security/cve/CVE-2022-49978/" source="CVE"/>
		<reference ref_id="CVE-2022-49981" ref_url="https://www.suse.com/security/cve/CVE-2022-49981/" source="CVE"/>
		<reference ref_id="CVE-2022-49982" ref_url="https://www.suse.com/security/cve/CVE-2022-49982/" source="CVE"/>
		<reference ref_id="CVE-2022-49983" ref_url="https://www.suse.com/security/cve/CVE-2022-49983/" source="CVE"/>
		<reference ref_id="CVE-2022-49984" ref_url="https://www.suse.com/security/cve/CVE-2022-49984/" source="CVE"/>
		<reference ref_id="CVE-2022-49985" ref_url="https://www.suse.com/security/cve/CVE-2022-49985/" source="CVE"/>
		<reference ref_id="CVE-2022-49986" ref_url="https://www.suse.com/security/cve/CVE-2022-49986/" source="CVE"/>
		<reference ref_id="CVE-2022-49987" ref_url="https://www.suse.com/security/cve/CVE-2022-49987/" source="CVE"/>
		<reference ref_id="CVE-2022-49989" ref_url="https://www.suse.com/security/cve/CVE-2022-49989/" source="CVE"/>
		<reference ref_id="CVE-2022-49990" ref_url="https://www.suse.com/security/cve/CVE-2022-49990/" source="CVE"/>
		<reference ref_id="CVE-2022-49993" ref_url="https://www.suse.com/security/cve/CVE-2022-49993/" source="CVE"/>
		<reference ref_id="CVE-2022-49995" ref_url="https://www.suse.com/security/cve/CVE-2022-49995/" source="CVE"/>
		<reference ref_id="CVE-2022-49999" ref_url="https://www.suse.com/security/cve/CVE-2022-49999/" source="CVE"/>
		<reference ref_id="CVE-2022-50005" ref_url="https://www.suse.com/security/cve/CVE-2022-50005/" source="CVE"/>
		<reference ref_id="CVE-2022-50006" ref_url="https://www.suse.com/security/cve/CVE-2022-50006/" source="CVE"/>
		<reference ref_id="CVE-2022-50008" ref_url="https://www.suse.com/security/cve/CVE-2022-50008/" source="CVE"/>
		<reference ref_id="CVE-2022-50010" ref_url="https://www.suse.com/security/cve/CVE-2022-50010/" source="CVE"/>
		<reference ref_id="CVE-2022-50011" ref_url="https://www.suse.com/security/cve/CVE-2022-50011/" source="CVE"/>
		<reference ref_id="CVE-2022-50012" ref_url="https://www.suse.com/security/cve/CVE-2022-50012/" source="CVE"/>
		<reference ref_id="CVE-2022-50019" ref_url="https://www.suse.com/security/cve/CVE-2022-50019/" source="CVE"/>
		<reference ref_id="CVE-2022-50020" ref_url="https://www.suse.com/security/cve/CVE-2022-50020/" source="CVE"/>
		<reference ref_id="CVE-2022-50021" ref_url="https://www.suse.com/security/cve/CVE-2022-50021/" source="CVE"/>
		<reference ref_id="CVE-2022-50022" ref_url="https://www.suse.com/security/cve/CVE-2022-50022/" source="CVE"/>
		<reference ref_id="CVE-2022-50023" ref_url="https://www.suse.com/security/cve/CVE-2022-50023/" source="CVE"/>
		<reference ref_id="CVE-2022-50024" ref_url="https://www.suse.com/security/cve/CVE-2022-50024/" source="CVE"/>
		<reference ref_id="CVE-2022-50026" ref_url="https://www.suse.com/security/cve/CVE-2022-50026/" source="CVE"/>
		<reference ref_id="CVE-2022-50027" ref_url="https://www.suse.com/security/cve/CVE-2022-50027/" source="CVE"/>
		<reference ref_id="CVE-2022-50028" ref_url="https://www.suse.com/security/cve/CVE-2022-50028/" source="CVE"/>
		<reference ref_id="CVE-2022-50029" ref_url="https://www.suse.com/security/cve/CVE-2022-50029/" source="CVE"/>
		<reference ref_id="CVE-2022-50030" ref_url="https://www.suse.com/security/cve/CVE-2022-50030/" source="CVE"/>
		<reference ref_id="CVE-2022-50031" ref_url="https://www.suse.com/security/cve/CVE-2022-50031/" source="CVE"/>
		<reference ref_id="CVE-2022-50032" ref_url="https://www.suse.com/security/cve/CVE-2022-50032/" source="CVE"/>
		<reference ref_id="CVE-2022-50033" ref_url="https://www.suse.com/security/cve/CVE-2022-50033/" source="CVE"/>
		<reference ref_id="CVE-2022-50034" ref_url="https://www.suse.com/security/cve/CVE-2022-50034/" source="CVE"/>
		<reference ref_id="CVE-2022-50036" ref_url="https://www.suse.com/security/cve/CVE-2022-50036/" source="CVE"/>
		<reference ref_id="CVE-2022-50038" ref_url="https://www.suse.com/security/cve/CVE-2022-50038/" source="CVE"/>
		<reference ref_id="CVE-2022-50039" ref_url="https://www.suse.com/security/cve/CVE-2022-50039/" source="CVE"/>
		<reference ref_id="CVE-2022-50040" ref_url="https://www.suse.com/security/cve/CVE-2022-50040/" source="CVE"/>
		<reference ref_id="CVE-2022-50045" ref_url="https://www.suse.com/security/cve/CVE-2022-50045/" source="CVE"/>
		<reference ref_id="CVE-2022-50046" ref_url="https://www.suse.com/security/cve/CVE-2022-50046/" source="CVE"/>
		<reference ref_id="CVE-2022-50047" ref_url="https://www.suse.com/security/cve/CVE-2022-50047/" source="CVE"/>
		<reference ref_id="CVE-2022-50051" ref_url="https://www.suse.com/security/cve/CVE-2022-50051/" source="CVE"/>
		<reference ref_id="CVE-2022-50053" ref_url="https://www.suse.com/security/cve/CVE-2022-50053/" source="CVE"/>
		<reference ref_id="CVE-2022-50055" ref_url="https://www.suse.com/security/cve/CVE-2022-50055/" source="CVE"/>
		<reference ref_id="CVE-2022-50059" ref_url="https://www.suse.com/security/cve/CVE-2022-50059/" source="CVE"/>
		<reference ref_id="CVE-2022-50060" ref_url="https://www.suse.com/security/cve/CVE-2022-50060/" source="CVE"/>
		<reference ref_id="CVE-2022-50061" ref_url="https://www.suse.com/security/cve/CVE-2022-50061/" source="CVE"/>
		<reference ref_id="CVE-2022-50062" ref_url="https://www.suse.com/security/cve/CVE-2022-50062/" source="CVE"/>
		<reference ref_id="CVE-2022-50065" ref_url="https://www.suse.com/security/cve/CVE-2022-50065/" source="CVE"/>
		<reference ref_id="CVE-2022-50066" ref_url="https://www.suse.com/security/cve/CVE-2022-50066/" source="CVE"/>
		<reference ref_id="CVE-2022-50067" ref_url="https://www.suse.com/security/cve/CVE-2022-50067/" source="CVE"/>
		<reference ref_id="CVE-2022-50068" ref_url="https://www.suse.com/security/cve/CVE-2022-50068/" source="CVE"/>
		<reference ref_id="CVE-2022-50072" ref_url="https://www.suse.com/security/cve/CVE-2022-50072/" source="CVE"/>
		<reference ref_id="CVE-2022-50073" ref_url="https://www.suse.com/security/cve/CVE-2022-50073/" source="CVE"/>
		<reference ref_id="CVE-2022-50074" ref_url="https://www.suse.com/security/cve/CVE-2022-50074/" source="CVE"/>
		<reference ref_id="CVE-2022-50076" ref_url="https://www.suse.com/security/cve/CVE-2022-50076/" source="CVE"/>
		<reference ref_id="CVE-2022-50077" ref_url="https://www.suse.com/security/cve/CVE-2022-50077/" source="CVE"/>
		<reference ref_id="CVE-2022-50079" ref_url="https://www.suse.com/security/cve/CVE-2022-50079/" source="CVE"/>
		<reference ref_id="CVE-2022-50083" ref_url="https://www.suse.com/security/cve/CVE-2022-50083/" source="CVE"/>
		<reference ref_id="CVE-2022-50084" ref_url="https://www.suse.com/security/cve/CVE-2022-50084/" source="CVE"/>
		<reference ref_id="CVE-2022-50085" ref_url="https://www.suse.com/security/cve/CVE-2022-50085/" source="CVE"/>
		<reference ref_id="CVE-2022-50087" ref_url="https://www.suse.com/security/cve/CVE-2022-50087/" source="CVE"/>
		<reference ref_id="CVE-2022-50092" ref_url="https://www.suse.com/security/cve/CVE-2022-50092/" source="CVE"/>
		<reference ref_id="CVE-2022-50093" ref_url="https://www.suse.com/security/cve/CVE-2022-50093/" source="CVE"/>
		<reference ref_id="CVE-2022-50094" ref_url="https://www.suse.com/security/cve/CVE-2022-50094/" source="CVE"/>
		<reference ref_id="CVE-2022-50095" ref_url="https://www.suse.com/security/cve/CVE-2022-50095/" source="CVE"/>
		<reference ref_id="CVE-2022-50097" ref_url="https://www.suse.com/security/cve/CVE-2022-50097/" source="CVE"/>
		<reference ref_id="CVE-2022-50098" ref_url="https://www.suse.com/security/cve/CVE-2022-50098/" source="CVE"/>
		<reference ref_id="CVE-2022-50099" ref_url="https://www.suse.com/security/cve/CVE-2022-50099/" source="CVE"/>
		<reference ref_id="CVE-2022-50100" ref_url="https://www.suse.com/security/cve/CVE-2022-50100/" source="CVE"/>
		<reference ref_id="CVE-2022-50101" ref_url="https://www.suse.com/security/cve/CVE-2022-50101/" source="CVE"/>
		<reference ref_id="CVE-2022-50102" ref_url="https://www.suse.com/security/cve/CVE-2022-50102/" source="CVE"/>
		<reference ref_id="CVE-2022-50103" ref_url="https://www.suse.com/security/cve/CVE-2022-50103/" source="CVE"/>
		<reference ref_id="CVE-2022-50104" ref_url="https://www.suse.com/security/cve/CVE-2022-50104/" source="CVE"/>
		<reference ref_id="CVE-2022-50108" ref_url="https://www.suse.com/security/cve/CVE-2022-50108/" source="CVE"/>
		<reference ref_id="CVE-2022-50109" ref_url="https://www.suse.com/security/cve/CVE-2022-50109/" source="CVE"/>
		<reference ref_id="CVE-2022-50110" ref_url="https://www.suse.com/security/cve/CVE-2022-50110/" source="CVE"/>
		<reference ref_id="CVE-2022-50111" ref_url="https://www.suse.com/security/cve/CVE-2022-50111/" source="CVE"/>
		<reference ref_id="CVE-2022-50112" ref_url="https://www.suse.com/security/cve/CVE-2022-50112/" source="CVE"/>
		<reference ref_id="CVE-2022-50116" ref_url="https://www.suse.com/security/cve/CVE-2022-50116/" source="CVE"/>
		<reference ref_id="CVE-2022-50118" ref_url="https://www.suse.com/security/cve/CVE-2022-50118/" source="CVE"/>
		<reference ref_id="CVE-2022-50120" ref_url="https://www.suse.com/security/cve/CVE-2022-50120/" source="CVE"/>
		<reference ref_id="CVE-2022-50121" ref_url="https://www.suse.com/security/cve/CVE-2022-50121/" source="CVE"/>
		<reference ref_id="CVE-2022-50124" ref_url="https://www.suse.com/security/cve/CVE-2022-50124/" source="CVE"/>
		<reference ref_id="CVE-2022-50125" ref_url="https://www.suse.com/security/cve/CVE-2022-50125/" source="CVE"/>
		<reference ref_id="CVE-2022-50126" ref_url="https://www.suse.com/security/cve/CVE-2022-50126/" source="CVE"/>
		<reference ref_id="CVE-2022-50127" ref_url="https://www.suse.com/security/cve/CVE-2022-50127/" source="CVE"/>
		<reference ref_id="CVE-2022-50129" ref_url="https://www.suse.com/security/cve/CVE-2022-50129/" source="CVE"/>
		<reference ref_id="CVE-2022-50131" ref_url="https://www.suse.com/security/cve/CVE-2022-50131/" source="CVE"/>
		<reference ref_id="CVE-2022-50132" ref_url="https://www.suse.com/security/cve/CVE-2022-50132/" source="CVE"/>
		<reference ref_id="CVE-2022-50134" ref_url="https://www.suse.com/security/cve/CVE-2022-50134/" source="CVE"/>
		<reference ref_id="CVE-2022-50136" ref_url="https://www.suse.com/security/cve/CVE-2022-50136/" source="CVE"/>
		<reference ref_id="CVE-2022-50137" ref_url="https://www.suse.com/security/cve/CVE-2022-50137/" source="CVE"/>
		<reference ref_id="CVE-2022-50138" ref_url="https://www.suse.com/security/cve/CVE-2022-50138/" source="CVE"/>
		<reference ref_id="CVE-2022-50139" ref_url="https://www.suse.com/security/cve/CVE-2022-50139/" source="CVE"/>
		<reference ref_id="CVE-2022-50140" ref_url="https://www.suse.com/security/cve/CVE-2022-50140/" source="CVE"/>
		<reference ref_id="CVE-2022-50141" ref_url="https://www.suse.com/security/cve/CVE-2022-50141/" source="CVE"/>
		<reference ref_id="CVE-2022-50142" ref_url="https://www.suse.com/security/cve/CVE-2022-50142/" source="CVE"/>
		<reference ref_id="CVE-2022-50143" ref_url="https://www.suse.com/security/cve/CVE-2022-50143/" source="CVE"/>
		<reference ref_id="CVE-2022-50145" ref_url="https://www.suse.com/security/cve/CVE-2022-50145/" source="CVE"/>
		<reference ref_id="CVE-2022-50146" ref_url="https://www.suse.com/security/cve/CVE-2022-50146/" source="CVE"/>
		<reference ref_id="CVE-2022-50149" ref_url="https://www.suse.com/security/cve/CVE-2022-50149/" source="CVE"/>
		<reference ref_id="CVE-2022-50151" ref_url="https://www.suse.com/security/cve/CVE-2022-50151/" source="CVE"/>
		<reference ref_id="CVE-2022-50152" ref_url="https://www.suse.com/security/cve/CVE-2022-50152/" source="CVE"/>
		<reference ref_id="CVE-2022-50153" ref_url="https://www.suse.com/security/cve/CVE-2022-50153/" source="CVE"/>
		<reference ref_id="CVE-2022-50154" ref_url="https://www.suse.com/security/cve/CVE-2022-50154/" source="CVE"/>
		<reference ref_id="CVE-2022-50155" ref_url="https://www.suse.com/security/cve/CVE-2022-50155/" source="CVE"/>
		<reference ref_id="CVE-2022-50156" ref_url="https://www.suse.com/security/cve/CVE-2022-50156/" source="CVE"/>
		<reference ref_id="CVE-2022-50157" ref_url="https://www.suse.com/security/cve/CVE-2022-50157/" source="CVE"/>
		<reference ref_id="CVE-2022-50158" ref_url="https://www.suse.com/security/cve/CVE-2022-50158/" source="CVE"/>
		<reference ref_id="CVE-2022-50160" ref_url="https://www.suse.com/security/cve/CVE-2022-50160/" source="CVE"/>
		<reference ref_id="CVE-2022-50161" ref_url="https://www.suse.com/security/cve/CVE-2022-50161/" source="CVE"/>
		<reference ref_id="CVE-2022-50162" ref_url="https://www.suse.com/security/cve/CVE-2022-50162/" source="CVE"/>
		<reference ref_id="CVE-2022-50164" ref_url="https://www.suse.com/security/cve/CVE-2022-50164/" source="CVE"/>
		<reference ref_id="CVE-2022-50165" ref_url="https://www.suse.com/security/cve/CVE-2022-50165/" source="CVE"/>
		<reference ref_id="CVE-2022-50169" ref_url="https://www.suse.com/security/cve/CVE-2022-50169/" source="CVE"/>
		<reference ref_id="CVE-2022-50171" ref_url="https://www.suse.com/security/cve/CVE-2022-50171/" source="CVE"/>
		<reference ref_id="CVE-2022-50172" ref_url="https://www.suse.com/security/cve/CVE-2022-50172/" source="CVE"/>
		<reference ref_id="CVE-2022-50173" ref_url="https://www.suse.com/security/cve/CVE-2022-50173/" source="CVE"/>
		<reference ref_id="CVE-2022-50175" ref_url="https://www.suse.com/security/cve/CVE-2022-50175/" source="CVE"/>
		<reference ref_id="CVE-2022-50176" ref_url="https://www.suse.com/security/cve/CVE-2022-50176/" source="CVE"/>
		<reference ref_id="CVE-2022-50178" ref_url="https://www.suse.com/security/cve/CVE-2022-50178/" source="CVE"/>
		<reference ref_id="CVE-2022-50179" ref_url="https://www.suse.com/security/cve/CVE-2022-50179/" source="CVE"/>
		<reference ref_id="CVE-2022-50181" ref_url="https://www.suse.com/security/cve/CVE-2022-50181/" source="CVE"/>
		<reference ref_id="CVE-2022-50185" ref_url="https://www.suse.com/security/cve/CVE-2022-50185/" source="CVE"/>
		<reference ref_id="CVE-2022-50187" ref_url="https://www.suse.com/security/cve/CVE-2022-50187/" source="CVE"/>
		<reference ref_id="CVE-2022-50190" ref_url="https://www.suse.com/security/cve/CVE-2022-50190/" source="CVE"/>
		<reference ref_id="CVE-2022-50191" ref_url="https://www.suse.com/security/cve/CVE-2022-50191/" source="CVE"/>
		<reference ref_id="CVE-2022-50192" ref_url="https://www.suse.com/security/cve/CVE-2022-50192/" source="CVE"/>
		<reference ref_id="CVE-2022-50194" ref_url="https://www.suse.com/security/cve/CVE-2022-50194/" source="CVE"/>
		<reference ref_id="CVE-2022-50196" ref_url="https://www.suse.com/security/cve/CVE-2022-50196/" source="CVE"/>
		<reference ref_id="CVE-2022-50197" ref_url="https://www.suse.com/security/cve/CVE-2022-50197/" source="CVE"/>
		<reference ref_id="CVE-2022-50198" ref_url="https://www.suse.com/security/cve/CVE-2022-50198/" source="CVE"/>
		<reference ref_id="CVE-2022-50199" ref_url="https://www.suse.com/security/cve/CVE-2022-50199/" source="CVE"/>
		<reference ref_id="CVE-2022-50200" ref_url="https://www.suse.com/security/cve/CVE-2022-50200/" source="CVE"/>
		<reference ref_id="CVE-2022-50201" ref_url="https://www.suse.com/security/cve/CVE-2022-50201/" source="CVE"/>
		<reference ref_id="CVE-2022-50202" ref_url="https://www.suse.com/security/cve/CVE-2022-50202/" source="CVE"/>
		<reference ref_id="CVE-2022-50203" ref_url="https://www.suse.com/security/cve/CVE-2022-50203/" source="CVE"/>
		<reference ref_id="CVE-2022-50204" ref_url="https://www.suse.com/security/cve/CVE-2022-50204/" source="CVE"/>
		<reference ref_id="CVE-2022-50206" ref_url="https://www.suse.com/security/cve/CVE-2022-50206/" source="CVE"/>
		<reference ref_id="CVE-2022-50207" ref_url="https://www.suse.com/security/cve/CVE-2022-50207/" source="CVE"/>
		<reference ref_id="CVE-2022-50208" ref_url="https://www.suse.com/security/cve/CVE-2022-50208/" source="CVE"/>
		<reference ref_id="CVE-2022-50209" ref_url="https://www.suse.com/security/cve/CVE-2022-50209/" source="CVE"/>
		<reference ref_id="CVE-2022-50211" ref_url="https://www.suse.com/security/cve/CVE-2022-50211/" source="CVE"/>
		<reference ref_id="CVE-2022-50212" ref_url="https://www.suse.com/security/cve/CVE-2022-50212/" source="CVE"/>
		<reference ref_id="CVE-2022-50213" ref_url="https://www.suse.com/security/cve/CVE-2022-50213/" source="CVE"/>
		<reference ref_id="CVE-2022-50215" ref_url="https://www.suse.com/security/cve/CVE-2022-50215/" source="CVE"/>
		<reference ref_id="CVE-2022-50218" ref_url="https://www.suse.com/security/cve/CVE-2022-50218/" source="CVE"/>
		<reference ref_id="CVE-2022-50220" ref_url="https://www.suse.com/security/cve/CVE-2022-50220/" source="CVE"/>
		<reference ref_id="CVE-2022-50222" ref_url="https://www.suse.com/security/cve/CVE-2022-50222/" source="CVE"/>
		<reference ref_id="CVE-2022-50226" ref_url="https://www.suse.com/security/cve/CVE-2022-50226/" source="CVE"/>
		<reference ref_id="CVE-2022-50228" ref_url="https://www.suse.com/security/cve/CVE-2022-50228/" source="CVE"/>
		<reference ref_id="CVE-2022-50229" ref_url="https://www.suse.com/security/cve/CVE-2022-50229/" source="CVE"/>
		<reference ref_id="CVE-2022-50231" ref_url="https://www.suse.com/security/cve/CVE-2022-50231/" source="CVE"/>
		<reference ref_id="CVE-2023-3111" ref_url="https://www.suse.com/security/cve/CVE-2023-3111/" source="CVE"/>
		<reference ref_id="CVE-2023-52924" ref_url="https://www.suse.com/security/cve/CVE-2023-52924/" source="CVE"/>
		<reference ref_id="CVE-2023-52925" ref_url="https://www.suse.com/security/cve/CVE-2023-52925/" source="CVE"/>
		<reference ref_id="CVE-2023-53048" ref_url="https://www.suse.com/security/cve/CVE-2023-53048/" source="CVE"/>
		<reference ref_id="CVE-2023-53076" ref_url="https://www.suse.com/security/cve/CVE-2023-53076/" source="CVE"/>
		<reference ref_id="CVE-2023-53097" ref_url="https://www.suse.com/security/cve/CVE-2023-53097/" source="CVE"/>
		<reference ref_id="CVE-2024-26808" ref_url="https://www.suse.com/security/cve/CVE-2024-26808/" source="CVE"/>
		<reference ref_id="CVE-2024-26924" ref_url="https://www.suse.com/security/cve/CVE-2024-26924/" source="CVE"/>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-27397" ref_url="https://www.suse.com/security/cve/CVE-2024-27397/" source="CVE"/>
		<reference ref_id="CVE-2024-35840" ref_url="https://www.suse.com/security/cve/CVE-2024-35840/" source="CVE"/>
		<reference ref_id="CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978/" source="CVE"/>
		<reference ref_id="CVE-2024-46800" ref_url="https://www.suse.com/security/cve/CVE-2024-46800/" source="CVE"/>
		<reference ref_id="CVE-2024-53057" ref_url="https://www.suse.com/security/cve/CVE-2024-53057/" source="CVE"/>
		<reference ref_id="CVE-2024-53125" ref_url="https://www.suse.com/security/cve/CVE-2024-53125/" source="CVE"/>
		<reference ref_id="CVE-2024-53141" ref_url="https://www.suse.com/security/cve/CVE-2024-53141/" source="CVE"/>
		<reference ref_id="CVE-2024-56770" ref_url="https://www.suse.com/security/cve/CVE-2024-56770/" source="CVE"/>
		<reference ref_id="CVE-2024-57947" ref_url="https://www.suse.com/security/cve/CVE-2024-57947/" source="CVE"/>
		<reference ref_id="CVE-2024-57999" ref_url="https://www.suse.com/security/cve/CVE-2024-57999/" source="CVE"/>
		<reference ref_id="CVE-2025-21700" ref_url="https://www.suse.com/security/cve/CVE-2025-21700/" source="CVE"/>
		<reference ref_id="CVE-2025-21702" ref_url="https://www.suse.com/security/cve/CVE-2025-21702/" source="CVE"/>
		<reference ref_id="CVE-2025-21703" ref_url="https://www.suse.com/security/cve/CVE-2025-21703/" source="CVE"/>
		<reference ref_id="CVE-2025-21756" ref_url="https://www.suse.com/security/cve/CVE-2025-21756/" source="CVE"/>
		<reference ref_id="CVE-2025-23141" ref_url="https://www.suse.com/security/cve/CVE-2025-23141/" source="CVE"/>
		<reference ref_id="CVE-2025-23145" ref_url="https://www.suse.com/security/cve/CVE-2025-23145/" source="CVE"/>
		<reference ref_id="CVE-2025-37752" ref_url="https://www.suse.com/security/cve/CVE-2025-37752/" source="CVE"/>
		<reference ref_id="CVE-2025-37797" ref_url="https://www.suse.com/security/cve/CVE-2025-37797/" source="CVE"/>
		<reference ref_id="CVE-2025-37798" ref_url="https://www.suse.com/security/cve/CVE-2025-37798/" source="CVE"/>
		<reference ref_id="CVE-2025-37823" ref_url="https://www.suse.com/security/cve/CVE-2025-37823/" source="CVE"/>
		<reference ref_id="CVE-2025-37890" ref_url="https://www.suse.com/security/cve/CVE-2025-37890/" source="CVE"/>
		<reference ref_id="CVE-2025-37932" ref_url="https://www.suse.com/security/cve/CVE-2025-37932/" source="CVE"/>
		<reference ref_id="CVE-2025-37953" ref_url="https://www.suse.com/security/cve/CVE-2025-37953/" source="CVE"/>
		<reference ref_id="CVE-2025-37997" ref_url="https://www.suse.com/security/cve/CVE-2025-37997/" source="CVE"/>
		<reference ref_id="CVE-2025-38000" ref_url="https://www.suse.com/security/cve/CVE-2025-38000/" source="CVE"/>
		<reference ref_id="CVE-2025-38001" ref_url="https://www.suse.com/security/cve/CVE-2025-38001/" source="CVE"/>
		<reference ref_id="CVE-2025-38014" ref_url="https://www.suse.com/security/cve/CVE-2025-38014/" source="CVE"/>
		<reference ref_id="CVE-2025-38083" ref_url="https://www.suse.com/security/cve/CVE-2025-38083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond 'nbands' (bsc#1207361 bsc#1225468).
- CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552).
- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).
- CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822).
- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).
- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).
- CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch-&gt;limit == 0 (bsc#1237312).
- CVE-2025-21703: netem: Update sch-&gt;q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).
- CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876).
- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).
- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).
- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).

The following non-security bugs were fixed:

- Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- Fix reference in 'net_sched: sch_sfq: use a temporary work area for validating configuration' (bsc#1242504)
- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build')
- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b ('bs-upload-kernel: Pass limit_packages also on multibuild')
- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.
- Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82
- Use gcc-13 for build on SLE16 (jsc#PED-10028).
- add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE.
- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build') Fixes: 747f601d4156 ('bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)')
- check-for-config-changes: Fix flag name typo
- doc/README.SUSE: Point to the updated version of LKMPG
- hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).
- kernel-binary: Support livepatch_rt with merged RT branch
- kernel-obs-qa: Use srchash for dependency as well
- kernel-source: Also replace bin/env
- kernel-source: Also update the search to match bin/env Fixes: dc2037cd8f94 ('kernel-source: Also replace bin/env'
- kernel-source: Remove log.sh from sources
- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).
- mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).
- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)
- packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).
- packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790).
- powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790).
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used
- rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE
- rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang.
- rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64.
- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).
- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check.
- rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038).
- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)
- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)
- rpm/package-descriptions: Add rt and rt_debug descriptions
- rpm/release-projects: Update the ALP projects again (bsc#1231293).
- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)
- rpm: Stop using is_kotd_qa macro
- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).
- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).
- wifi: cfg80211: Add my certificate (bsc#1243001).
- wifi: cfg80211: fix certs build to not depend on file order (bsc#1243001).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-07-28"/>
	<updated date="2025-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198410">SUSE bug 1198410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199356">SUSE bug 1199356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199487">SUSE bug 1199487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201160">SUSE bug 1201160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201956">SUSE bug 1201956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202094">SUSE bug 1202094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202095">SUSE bug 1202095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202564">SUSE bug 1202564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202716">SUSE bug 1202716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202823">SUSE bug 1202823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202860">SUSE bug 1202860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203197">SUSE bug 1203197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203361">SUSE bug 1203361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205220">SUSE bug 1205220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205514">SUSE bug 1205514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206664">SUSE bug 1206664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206878">SUSE bug 1206878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206880">SUSE bug 1206880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207361">SUSE bug 1207361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207638">SUSE bug 1207638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211226">SUSE bug 1211226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212051">SUSE bug 1212051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213090">SUSE bug 1213090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218184">SUSE bug 1218184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218234">SUSE bug 1218234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218470">SUSE bug 1218470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222634">SUSE bug 1222634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223675">SUSE bug 1223675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224095">SUSE bug 1224095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224597">SUSE bug 1224597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225468">SUSE bug 1225468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225820">SUSE bug 1225820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226514">SUSE bug 1226514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226552">SUSE bug 1226552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228659">SUSE bug 1228659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230827">SUSE bug 1230827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231293">SUSE bug 1231293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232504">SUSE bug 1232504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233551">SUSE bug 1233551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234156">SUSE bug 1234156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234381">SUSE bug 1234381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234454">SUSE bug 1234454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235637">SUSE bug 1235637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236333">SUSE bug 1236333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236821">SUSE bug 1236821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236822">SUSE bug 1236822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237159">SUSE bug 1237159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237312">SUSE bug 1237312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237313">SUSE bug 1237313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238303">SUSE bug 1238303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238526">SUSE bug 1238526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238570">SUSE bug 1238570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238876">SUSE bug 1238876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239986">SUSE bug 1239986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240785">SUSE bug 1240785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241038">SUSE bug 1241038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242221">SUSE bug 1242221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242414">SUSE bug 1242414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242417">SUSE bug 1242417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242504">SUSE bug 1242504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242596">SUSE bug 1242596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242782">SUSE bug 1242782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242924">SUSE bug 1242924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243001">SUSE bug 1243001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243330">SUSE bug 1243330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243543">SUSE bug 1243543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243627">SUSE bug 1243627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243832">SUSE bug 1243832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244114">SUSE bug 1244114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244179">SUSE bug 1244179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244234">SUSE bug 1244234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244241">SUSE bug 1244241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244277">SUSE bug 1244277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244309">SUSE bug 1244309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244337">SUSE bug 1244337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244732">SUSE bug 1244732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244764">SUSE bug 1244764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244765">SUSE bug 1244765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244767">SUSE bug 1244767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244770">SUSE bug 1244770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244771">SUSE bug 1244771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244773">SUSE bug 1244773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244774">SUSE bug 1244774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244776">SUSE bug 1244776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244779">SUSE bug 1244779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244780">SUSE bug 1244780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244781">SUSE bug 1244781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244782">SUSE bug 1244782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244783">SUSE bug 1244783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244784">SUSE bug 1244784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244786">SUSE bug 1244786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244787">SUSE bug 1244787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244788">SUSE bug 1244788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244790">SUSE bug 1244790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244793">SUSE bug 1244793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244794">SUSE bug 1244794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244796">SUSE bug 1244796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244797">SUSE bug 1244797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244798">SUSE bug 1244798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244800">SUSE bug 1244800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244802">SUSE bug 1244802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244804">SUSE bug 1244804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244807">SUSE bug 1244807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244808">SUSE bug 1244808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244811">SUSE bug 1244811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244813">SUSE bug 1244813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244814">SUSE bug 1244814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244815">SUSE bug 1244815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244816">SUSE bug 1244816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244819">SUSE bug 1244819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244820">SUSE bug 1244820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244823">SUSE bug 1244823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244824">SUSE bug 1244824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244825">SUSE bug 1244825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244830">SUSE bug 1244830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244831">SUSE bug 1244831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244832">SUSE bug 1244832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244834">SUSE bug 1244834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244836">SUSE bug 1244836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244838">SUSE bug 1244838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244839">SUSE bug 1244839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244840">SUSE bug 1244840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244841">SUSE bug 1244841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244842">SUSE bug 1244842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244843">SUSE bug 1244843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244845">SUSE bug 1244845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244846">SUSE bug 1244846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244848">SUSE bug 1244848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244849">SUSE bug 1244849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244851">SUSE bug 1244851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244853">SUSE bug 1244853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244854">SUSE bug 1244854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244856">SUSE bug 1244856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244860">SUSE bug 1244860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244861">SUSE bug 1244861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244866">SUSE bug 1244866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244867">SUSE bug 1244867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244868">SUSE bug 1244868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244869">SUSE bug 1244869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244870">SUSE bug 1244870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244871">SUSE bug 1244871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244872">SUSE bug 1244872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244873">SUSE bug 1244873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244875">SUSE bug 1244875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244876">SUSE bug 1244876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244878">SUSE bug 1244878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244879">SUSE bug 1244879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244881">SUSE bug 1244881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244883">SUSE bug 1244883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244884">SUSE bug 1244884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244886">SUSE bug 1244886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244887">SUSE bug 1244887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244890">SUSE bug 1244890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244895">SUSE bug 1244895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244899">SUSE bug 1244899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244900">SUSE bug 1244900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244901">SUSE bug 1244901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244902">SUSE bug 1244902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244903">SUSE bug 1244903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244908">SUSE bug 1244908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244911">SUSE bug 1244911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244915">SUSE bug 1244915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244936">SUSE bug 1244936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244941">SUSE bug 1244941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244942">SUSE bug 1244942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244943">SUSE bug 1244943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244944">SUSE bug 1244944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244945">SUSE bug 1244945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244948">SUSE bug 1244948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244949">SUSE bug 1244949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244950">SUSE bug 1244950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244956">SUSE bug 1244956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244958">SUSE bug 1244958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244959">SUSE bug 1244959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244965">SUSE bug 1244965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244966">SUSE bug 1244966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244967">SUSE bug 1244967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244968">SUSE bug 1244968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244969">SUSE bug 1244969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244970">SUSE bug 1244970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244974">SUSE bug 1244974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244976">SUSE bug 1244976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244977">SUSE bug 1244977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244978">SUSE bug 1244978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244979">SUSE bug 1244979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244983">SUSE bug 1244983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244984">SUSE bug 1244984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244985">SUSE bug 1244985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244986">SUSE bug 1244986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244991">SUSE bug 1244991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244992">SUSE bug 1244992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244993">SUSE bug 1244993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245006">SUSE bug 1245006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245007">SUSE bug 1245007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245009">SUSE bug 1245009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245011">SUSE bug 1245011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245012">SUSE bug 1245012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245018">SUSE bug 1245018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245019">SUSE bug 1245019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245024">SUSE bug 1245024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245028">SUSE bug 1245028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245031">SUSE bug 1245031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245032">SUSE bug 1245032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245033">SUSE bug 1245033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245038">SUSE bug 1245038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245039">SUSE bug 1245039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245041">SUSE bug 1245041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245047">SUSE bug 1245047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245051">SUSE bug 1245051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245057">SUSE bug 1245057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245058">SUSE bug 1245058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245060">SUSE bug 1245060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245062">SUSE bug 1245062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245064">SUSE bug 1245064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245069">SUSE bug 1245069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245072">SUSE bug 1245072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245073">SUSE bug 1245073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245088">SUSE bug 1245088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245089">SUSE bug 1245089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245092">SUSE bug 1245092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245093">SUSE bug 1245093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245098">SUSE bug 1245098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245103">SUSE bug 1245103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245117">SUSE bug 1245117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245118">SUSE bug 1245118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245119">SUSE bug 1245119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245121">SUSE bug 1245121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245122">SUSE bug 1245122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245125">SUSE bug 1245125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245129">SUSE bug 1245129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245131">SUSE bug 1245131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245133">SUSE bug 1245133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245134">SUSE bug 1245134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245135">SUSE bug 1245135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245136">SUSE bug 1245136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245138">SUSE bug 1245138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245139">SUSE bug 1245139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245140">SUSE bug 1245140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245142">SUSE bug 1245142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245146">SUSE bug 1245146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245147">SUSE bug 1245147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245149">SUSE bug 1245149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245152">SUSE bug 1245152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245154">SUSE bug 1245154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245180">SUSE bug 1245180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245183">SUSE bug 1245183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245189">SUSE bug 1245189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245191">SUSE bug 1245191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245195">SUSE bug 1245195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245197">SUSE bug 1245197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245265">SUSE bug 1245265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245348">SUSE bug 1245348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245431">SUSE bug 1245431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245455">SUSE bug 1245455</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47557/">CVE-2021-47557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47557">CVE-2021-47557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47595/">CVE-2021-47595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47595">CVE-2021-47595 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2585/">CVE-2022-2585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2586/">CVE-2022-2586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2905/">CVE-2022-2905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3903/">CVE-2022-3903 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3903">CVE-2022-3903 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4095/">CVE-2022-4095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4095">CVE-2022-4095 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4662/">CVE-2022-4662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4662">CVE-2022-4662 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49934/">CVE-2022-49934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49934">CVE-2022-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49936/">CVE-2022-49936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49936">CVE-2022-49936 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49937/">CVE-2022-49937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49937">CVE-2022-49937 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49938/">CVE-2022-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49938">CVE-2022-49938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49940/">CVE-2022-49940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49940">CVE-2022-49940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49942/">CVE-2022-49942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49942">CVE-2022-49942 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49945/">CVE-2022-49945 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49945">CVE-2022-49945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49946/">CVE-2022-49946 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49946">CVE-2022-49946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49948/">CVE-2022-49948 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49948">CVE-2022-49948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49950/">CVE-2022-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49950">CVE-2022-49950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49952/">CVE-2022-49952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49952">CVE-2022-49952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49954/">CVE-2022-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49954">CVE-2022-49954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49956/">CVE-2022-49956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49956">CVE-2022-49956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49957/">CVE-2022-49957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49957">CVE-2022-49957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49958/">CVE-2022-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49958">CVE-2022-49958 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49960/">CVE-2022-49960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49960">CVE-2022-49960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49964/">CVE-2022-49964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49964">CVE-2022-49964 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49966/">CVE-2022-49966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49966">CVE-2022-49966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49968/">CVE-2022-49968 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49968">CVE-2022-49968 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49969/">CVE-2022-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49969">CVE-2022-49969 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49977/">CVE-2022-49977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49977">CVE-2022-49977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49978/">CVE-2022-49978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49978">CVE-2022-49978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49981/">CVE-2022-49981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49981">CVE-2022-49981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49982/">CVE-2022-49982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49982">CVE-2022-49982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49983/">CVE-2022-49983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49983">CVE-2022-49983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49984/">CVE-2022-49984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49984">CVE-2022-49984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49985/">CVE-2022-49985 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49985">CVE-2022-49985 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49986/">CVE-2022-49986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49986">CVE-2022-49986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49987/">CVE-2022-49987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49987">CVE-2022-49987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49989/">CVE-2022-49989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49989">CVE-2022-49989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49990/">CVE-2022-49990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49990">CVE-2022-49990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49993/">CVE-2022-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49993">CVE-2022-49993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49995/">CVE-2022-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49995">CVE-2022-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49999/">CVE-2022-49999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49999">CVE-2022-49999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50005/">CVE-2022-50005 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50005">CVE-2022-50005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50006/">CVE-2022-50006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50006">CVE-2022-50006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50008/">CVE-2022-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50008">CVE-2022-50008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50010/">CVE-2022-50010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50010">CVE-2022-50010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50011/">CVE-2022-50011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50011">CVE-2022-50011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50012/">CVE-2022-50012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50012">CVE-2022-50012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50019/">CVE-2022-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50019">CVE-2022-50019 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50020/">CVE-2022-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50020">CVE-2022-50020 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50021/">CVE-2022-50021 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50021">CVE-2022-50021 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50022/">CVE-2022-50022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50022">CVE-2022-50022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50023/">CVE-2022-50023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50023">CVE-2022-50023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50024/">CVE-2022-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50024">CVE-2022-50024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50026/">CVE-2022-50026 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50026">CVE-2022-50026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50027/">CVE-2022-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50027">CVE-2022-50027 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50028/">CVE-2022-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50028">CVE-2022-50028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50029/">CVE-2022-50029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50029">CVE-2022-50029 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50030/">CVE-2022-50030 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50030">CVE-2022-50030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50031/">CVE-2022-50031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50031">CVE-2022-50031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50032/">CVE-2022-50032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50032">CVE-2022-50032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50033/">CVE-2022-50033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50033">CVE-2022-50033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50034/">CVE-2022-50034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50034">CVE-2022-50034 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50036/">CVE-2022-50036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50036">CVE-2022-50036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50038/">CVE-2022-50038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50038">CVE-2022-50038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50039/">CVE-2022-50039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50039">CVE-2022-50039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50040/">CVE-2022-50040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50040">CVE-2022-50040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50045/">CVE-2022-50045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50045">CVE-2022-50045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50046/">CVE-2022-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50046">CVE-2022-50046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50047/">CVE-2022-50047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50047">CVE-2022-50047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50051/">CVE-2022-50051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50051">CVE-2022-50051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50053/">CVE-2022-50053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50053">CVE-2022-50053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50055/">CVE-2022-50055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50055">CVE-2022-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50059/">CVE-2022-50059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50059">CVE-2022-50059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50060/">CVE-2022-50060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50060">CVE-2022-50060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50061/">CVE-2022-50061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50061">CVE-2022-50061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50062/">CVE-2022-50062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50062">CVE-2022-50062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50065/">CVE-2022-50065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50065">CVE-2022-50065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50066/">CVE-2022-50066 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50066">CVE-2022-50066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50067/">CVE-2022-50067 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50067">CVE-2022-50067 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50068/">CVE-2022-50068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50068">CVE-2022-50068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50072/">CVE-2022-50072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50072">CVE-2022-50072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50073/">CVE-2022-50073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50073">CVE-2022-50073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50074/">CVE-2022-50074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50074">CVE-2022-50074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50076/">CVE-2022-50076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50076">CVE-2022-50076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50077/">CVE-2022-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50077">CVE-2022-50077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50079/">CVE-2022-50079 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50079">CVE-2022-50079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50083/">CVE-2022-50083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50083">CVE-2022-50083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50084/">CVE-2022-50084 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50084">CVE-2022-50084 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50085/">CVE-2022-50085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50085">CVE-2022-50085 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50087/">CVE-2022-50087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50087">CVE-2022-50087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50092/">CVE-2022-50092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50092">CVE-2022-50092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50093/">CVE-2022-50093 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50093">CVE-2022-50093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50094/">CVE-2022-50094 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50094">CVE-2022-50094 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50095/">CVE-2022-50095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50095">CVE-2022-50095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50097/">CVE-2022-50097 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50097">CVE-2022-50097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50098/">CVE-2022-50098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50098">CVE-2022-50098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50099/">CVE-2022-50099 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50099">CVE-2022-50099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50100/">CVE-2022-50100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50100">CVE-2022-50100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50101/">CVE-2022-50101 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50101">CVE-2022-50101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50102/">CVE-2022-50102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50102">CVE-2022-50102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50103/">CVE-2022-50103 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50103">CVE-2022-50103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50104/">CVE-2022-50104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50104">CVE-2022-50104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50108/">CVE-2022-50108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50108">CVE-2022-50108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50109/">CVE-2022-50109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50109">CVE-2022-50109 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50110/">CVE-2022-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50110">CVE-2022-50110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50111/">CVE-2022-50111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50111">CVE-2022-50111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50112/">CVE-2022-50112 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50112">CVE-2022-50112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50116/">CVE-2022-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50116">CVE-2022-50116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50118/">CVE-2022-50118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50118">CVE-2022-50118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50120/">CVE-2022-50120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50120">CVE-2022-50120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50121/">CVE-2022-50121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50121">CVE-2022-50121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50124/">CVE-2022-50124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50124">CVE-2022-50124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50125/">CVE-2022-50125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50125">CVE-2022-50125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50126/">CVE-2022-50126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50126">CVE-2022-50126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50127/">CVE-2022-50127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50127">CVE-2022-50127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50129/">CVE-2022-50129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50129">CVE-2022-50129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50131/">CVE-2022-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50131">CVE-2022-50131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50132/">CVE-2022-50132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50132">CVE-2022-50132 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50134/">CVE-2022-50134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50134">CVE-2022-50134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50136/">CVE-2022-50136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50136">CVE-2022-50136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50137/">CVE-2022-50137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50137">CVE-2022-50137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50138/">CVE-2022-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50138">CVE-2022-50138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50139/">CVE-2022-50139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50139">CVE-2022-50139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50140/">CVE-2022-50140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50140">CVE-2022-50140 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50141/">CVE-2022-50141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50141">CVE-2022-50141 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50142/">CVE-2022-50142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50142">CVE-2022-50142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50143/">CVE-2022-50143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50143">CVE-2022-50143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50145/">CVE-2022-50145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50145">CVE-2022-50145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50146/">CVE-2022-50146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50146">CVE-2022-50146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50149/">CVE-2022-50149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50149">CVE-2022-50149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50151/">CVE-2022-50151 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50151">CVE-2022-50151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50152/">CVE-2022-50152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50152">CVE-2022-50152 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50153/">CVE-2022-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50153">CVE-2022-50153 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50154/">CVE-2022-50154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50154">CVE-2022-50154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50155/">CVE-2022-50155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50155">CVE-2022-50155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50156/">CVE-2022-50156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50156">CVE-2022-50156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50157/">CVE-2022-50157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50157">CVE-2022-50157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50158/">CVE-2022-50158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50158">CVE-2022-50158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50160/">CVE-2022-50160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50160">CVE-2022-50160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50161/">CVE-2022-50161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50161">CVE-2022-50161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50162/">CVE-2022-50162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50162">CVE-2022-50162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50164/">CVE-2022-50164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50164">CVE-2022-50164 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50165/">CVE-2022-50165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50165">CVE-2022-50165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50169/">CVE-2022-50169 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50169">CVE-2022-50169 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50171/">CVE-2022-50171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50171">CVE-2022-50171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50172/">CVE-2022-50172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50172">CVE-2022-50172 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50173/">CVE-2022-50173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50173">CVE-2022-50173 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50175/">CVE-2022-50175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50175">CVE-2022-50175 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50176/">CVE-2022-50176 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50176">CVE-2022-50176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50178/">CVE-2022-50178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50178">CVE-2022-50178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50179/">CVE-2022-50179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50179">CVE-2022-50179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50181/">CVE-2022-50181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50181">CVE-2022-50181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50185/">CVE-2022-50185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50185">CVE-2022-50185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50187/">CVE-2022-50187 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50187">CVE-2022-50187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50190/">CVE-2022-50190 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50190">CVE-2022-50190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50191/">CVE-2022-50191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50191">CVE-2022-50191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50192/">CVE-2022-50192 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50192">CVE-2022-50192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50194/">CVE-2022-50194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50194">CVE-2022-50194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50196/">CVE-2022-50196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50196">CVE-2022-50196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50197/">CVE-2022-50197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50197">CVE-2022-50197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50198/">CVE-2022-50198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50198">CVE-2022-50198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50199/">CVE-2022-50199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50199">CVE-2022-50199 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50200/">CVE-2022-50200 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50200">CVE-2022-50200 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50201/">CVE-2022-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50201">CVE-2022-50201 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50202/">CVE-2022-50202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50202">CVE-2022-50202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50203/">CVE-2022-50203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50203">CVE-2022-50203 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50204/">CVE-2022-50204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50204">CVE-2022-50204 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50206/">CVE-2022-50206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50206">CVE-2022-50206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50207/">CVE-2022-50207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50207">CVE-2022-50207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50208/">CVE-2022-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50208">CVE-2022-50208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50209/">CVE-2022-50209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50209">CVE-2022-50209 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50211/">CVE-2022-50211 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50211">CVE-2022-50211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50212/">CVE-2022-50212 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50212">CVE-2022-50212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50213/">CVE-2022-50213 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50213">CVE-2022-50213 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50215/">CVE-2022-50215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50215">CVE-2022-50215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50218/">CVE-2022-50218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50218">CVE-2022-50218 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50220/">CVE-2022-50220 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50220">CVE-2022-50220 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50222/">CVE-2022-50222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50222">CVE-2022-50222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50226/">CVE-2022-50226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50226">CVE-2022-50226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50228/">CVE-2022-50228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50228">CVE-2022-50228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50229/">CVE-2022-50229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50229">CVE-2022-50229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50231/">CVE-2022-50231 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50231">CVE-2022-50231 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3111/">CVE-2023-3111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52924/">CVE-2023-52924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52924">CVE-2023-52924 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52925/">CVE-2023-52925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52925">CVE-2023-52925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53048/">CVE-2023-53048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53048">CVE-2023-53048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53076/">CVE-2023-53076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53076">CVE-2023-53076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53097/">CVE-2023-53097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53097">CVE-2023-53097 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26808/">CVE-2024-26808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26924/">CVE-2024-26924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26924">CVE-2024-26924 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27397/">CVE-2024-27397 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27397">CVE-2024-27397 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35840/">CVE-2024-35840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35840">CVE-2024-35840 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46800/">CVE-2024-46800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53057/">CVE-2024-53057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53057">CVE-2024-53057 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53125/">CVE-2024-53125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53125">CVE-2024-53125 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53141/">CVE-2024-53141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53141">CVE-2024-53141 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56770/">CVE-2024-56770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57947/">CVE-2024-57947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57947">CVE-2024-57947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57999/">CVE-2024-57999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57999">CVE-2024-57999 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21700/">CVE-2025-21700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21700">CVE-2025-21700 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21702/">CVE-2025-21702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21702">CVE-2025-21702 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21703/">CVE-2025-21703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21703">CVE-2025-21703 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21756/">CVE-2025-21756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23141/">CVE-2025-23141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23141">CVE-2025-23141 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23145/">CVE-2025-23145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23145">CVE-2025-23145 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37752/">CVE-2025-37752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37752">CVE-2025-37752 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37797/">CVE-2025-37797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37798/">CVE-2025-37798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37798">CVE-2025-37798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37823/">CVE-2025-37823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37890/">CVE-2025-37890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37932/">CVE-2025-37932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37932">CVE-2025-37932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37953/">CVE-2025-37953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37953">CVE-2025-37953 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37997/">CVE-2025-37997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37997">CVE-2025-37997 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38000/">CVE-2025-38000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38001/">CVE-2025-38001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38001">CVE-2025-38001 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38014/">CVE-2025-38014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38014">CVE-2025-38014 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38083/">CVE-2025-38083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38083">CVE-2025-38083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011159" comment="kernel-default-5.14.21-150400.24.170.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011098" comment="kernel-default-base-5.14.21-150400.24.170.2.150400.24.86.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206345" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246232" ref_url="https://bugzilla.suse.com/1246232" source="BUGZILLA"/>
		<reference ref_id="1246233" ref_url="https://bugzilla.suse.com/1246233" source="BUGZILLA"/>
		<reference ref_id="1246267" ref_url="https://bugzilla.suse.com/1246267" source="BUGZILLA"/>
		<reference ref_id="1246299" ref_url="https://bugzilla.suse.com/1246299" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-32988" ref_url="https://www.suse.com/security/cve/CVE-2025-32988/" source="CVE"/>
		<reference ref_id="CVE-2025-32989" ref_url="https://www.suse.com/security/cve/CVE-2025-32989/" source="CVE"/>
		<reference ref_id="CVE-2025-32990" ref_url="https://www.suse.com/security/cve/CVE-2025-32990/" source="CVE"/>
		<reference ref_id="CVE-2025-6395" ref_url="https://www.suse.com/security/cve/CVE-2025-6395/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02589-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041003.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2025-6395: Fix NULL pointer dereference when 2nd Client Hello omits PSK (bsc#1246299)
- CVE-2025-32988: Fix double-free due to incorrect ownership handling in the export logic of SAN entries containing an otherName (bsc#1246232)
- CVE-2025-32989: Fix heap buffer overread when handling the CT SCT extension during X.509 certificate parsing (bsc#1246233)
- CVE-2025-32990: Fix 1-byte heap buffer overflow when parsing templates with certtool (bsc#1246267)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-01"/>
	<updated date="2025-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246232">SUSE bug 1246232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246233">SUSE bug 1246233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246267">SUSE bug 1246267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246299">SUSE bug 1246299</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32988/">CVE-2025-32988 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32988">CVE-2025-32988 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32989/">CVE-2025-32989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32989">CVE-2025-32989 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32990/">CVE-2025-32990 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32990">CVE-2025-32990 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6395/">CVE-2025-6395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6395">CVE-2025-6395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011819" comment="gnutls-3.7.3-150400.4.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011820" comment="libgnutls30-3.7.3-150400.4.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011821" comment="libgnutls30-hmac-3.7.3-150400.4.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206346" version="1" class="patch">
	<metadata>
		<title>Security update for nvidia-open-driver-G06-signed (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234675" ref_url="https://bugzilla.suse.com/1234675" source="BUGZILLA"/>
		<reference ref_id="1235461" ref_url="https://bugzilla.suse.com/1235461" source="BUGZILLA"/>
		<reference ref_id="1235871" ref_url="https://bugzilla.suse.com/1235871" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0131" ref_url="https://www.suse.com/security/cve/CVE-2024-0131/" source="CVE"/>
		<reference ref_id="CVE-2024-0147" ref_url="https://www.suse.com/security/cve/CVE-2024-0147/" source="CVE"/>
		<reference ref_id="CVE-2024-0149" ref_url="https://www.suse.com/security/cve/CVE-2024-0149/" source="CVE"/>
		<reference ref_id="CVE-2024-0150" ref_url="https://www.suse.com/security/cve/CVE-2024-0150/" source="CVE"/>
		<reference ref_id="CVE-2024-53869" ref_url="https://www.suse.com/security/cve/CVE-2024-53869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041050.html" source="SUSE-SU"/>
		<description>
This update for nvidia-open-driver-G06-signed fixes the following issues:

- Update to 550.144.03 (bsc#1235461, bsc#1235871)
  * fixes CVE-2024-0131, CVE-2024-0147, CVE-2024-0149,
    CVE-2024-0150, CVE-2024-53869
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-01"/>
	<updated date="2025-08-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234675">SUSE bug 1234675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235461">SUSE bug 1235461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235871">SUSE bug 1235871</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0131/">CVE-2024-0131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0131">CVE-2024-0131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0147/">CVE-2024-0147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0147">CVE-2024-0147 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0149/">CVE-2024-0149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0149">CVE-2024-0149 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0150/">CVE-2024-0150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0150">CVE-2024-0150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53869/">CVE-2024-53869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53869">CVE-2024-53869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011685" comment="kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011686" comment="nv-prefer-signed-open-driver-565.57.01-150400.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011691" comment="nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.24.170-150400.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011694" comment="nvidia-open-driver-G06-signed-kmp-default-550.144.03_k5.14.21_150400.24.170-150400.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206347" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246296" ref_url="https://bugzilla.suse.com/1246296" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-7425" ref_url="https://www.suse.com/security/cve/CVE-2025-7425/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041011.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2025-7425: Fixed heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr (bsc#1246296)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-04"/>
	<updated date="2025-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246296">SUSE bug 1246296</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-7425/">CVE-2025-7425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7425">CVE-2025-7425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012309" comment="libxml2-2-2.9.14-150400.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012310" comment="libxml2-tools-2.9.14-150400.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012311" comment="python3-libxml2-2.9.14-150400.5.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206348" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214612" ref_url="https://bugzilla.suse.com/1214612" source="BUGZILLA"/>
		<reference ref_id="1215807" ref_url="https://bugzilla.suse.com/1215807" source="BUGZILLA"/>
		<reference ref_id="1215926" ref_url="https://bugzilla.suse.com/1215926" source="BUGZILLA"/>
		<reference ref_id="1217828" ref_url="https://bugzilla.suse.com/1217828" source="BUGZILLA"/>
		<reference ref_id="1221677" ref_url="https://bugzilla.suse.com/1221677" source="BUGZILLA"/>
		<reference ref_id="1231208" ref_url="https://bugzilla.suse.com/1231208" source="BUGZILLA"/>
		<reference ref_id="1231230" ref_url="https://bugzilla.suse.com/1231230" source="BUGZILLA"/>
		<reference ref_id="1231499" ref_url="https://bugzilla.suse.com/1231499" source="BUGZILLA"/>
		<reference ref_id="1231698" ref_url="https://bugzilla.suse.com/1231698" source="BUGZILLA"/>
		<reference ref_id="1236270" ref_url="https://bugzilla.suse.com/1236270" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11218" ref_url="https://www.suse.com/security/cve/CVE-2024-11218/" source="CVE"/>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
		<description>

This update for podman fixes the following issues:

- CVE-2024-9676: github.com/containers/storage: Fixed symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) (bsc#1231698) 

- Load ip_tables and ip6_tables kernel module (bsc#1214612)
  * Required for rootless mode as a regular user has no permission
    to load kernel modules

- CVE-2024-9675: Fixed cache arbitrary directory mount in buildah (bsc#1231499)
- CVE-2024-9407: Fixed Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction in buildah (bsc#1231208)
- CVE-2024-9341: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (bsc#1231230)
- CVE-2024-1753: Fixed full container escape at build time in buildah (bsc#1221677)
- CVE-2024-11218: Fixed a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. (bsc#1236270)

- Refactor network backend dependencies:
  * podman requires either netavark or cni-plugins. On ALP, require
    netavark, otherwise prefer netavark but don't force it.
  * This fixes missing cni-plugins in some scenarios
  * Default to netavark everywhere where it's available
		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214612">SUSE bug 1214612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215807">SUSE bug 1215807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215926">SUSE bug 1215926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217828">SUSE bug 1217828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221677">SUSE bug 1221677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231208">SUSE bug 1231208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231230">SUSE bug 1231230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231499">SUSE bug 1231499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231698">SUSE bug 1231698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236270">SUSE bug 1236270</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-11218/">CVE-2024-11218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961642" comment="podman-4.9.5-150400.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961643" comment="podman-remote-4.9.5-150400.4.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206349" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246597" ref_url="https://bugzilla.suse.com/1246597" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-6965" ref_url="https://www.suse.com/security/cve/CVE-2025-6965/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041082.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- Update to version 3.50.2
- CVE-2025-6965: Fixed an integer truncation to avoid assertion faults. (bsc#1246597)
    		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-04"/>
	<updated date="2025-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246597">SUSE bug 1246597</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-6965/">CVE-2025-6965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965">CVE-2025-6965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012307" comment="libsqlite3-0-3.50.2-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012312" comment="sqlite3-tcl-3.50.2-150000.3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206350" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243935" ref_url="https://bugzilla.suse.com/1243935" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-4598" ref_url="https://www.suse.com/security/cve/CVE-2025-4598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041078.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2025-4598: Fixed race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump (bsc#1243935).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-04"/>
	<updated date="2025-08-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1243935">SUSE bug 1243935</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-4598/">CVE-2025-4598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4598">CVE-2025-4598 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012313" comment="libsystemd0-249.17-150400.8.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012314" comment="libudev1-249.17-150400.8.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012315" comment="systemd-249.17-150400.8.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012316" comment="systemd-container-249.17-150400.8.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012317" comment="systemd-journal-remote-249.17-150400.8.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012318" comment="systemd-sysvinit-249.17-150400.8.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012319" comment="udev-249.17-150400.8.49.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206351" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1122338" ref_url="https://bugzilla.suse.com/1122338" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6461" ref_url="https://www.suse.com/security/cve/CVE-2019-6461/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041077.html" source="SUSE-SU"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2019-6461: avoid assert when drawing arcs with NaN angles (bsc#1122338).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-04"/>
	<updated date="2025-08-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122338">SUSE bug 1122338</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6461/">CVE-2019-6461 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6461">CVE-2019-6461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012320" comment="libcairo-gobject2-1.16.0-150400.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012321" comment="libcairo2-1.16.0-150400.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206352" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1244270" ref_url="https://bugzilla.suse.com/1244270" source="BUGZILLA"/>
		<reference ref_id="1244272" ref_url="https://bugzilla.suse.com/1244272" source="BUGZILLA"/>
		<reference ref_id="1244273" ref_url="https://bugzilla.suse.com/1244273" source="BUGZILLA"/>
		<reference ref_id="1244279" ref_url="https://bugzilla.suse.com/1244279" source="BUGZILLA"/>
		<reference ref_id="1244336" ref_url="https://bugzilla.suse.com/1244336" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-5914" ref_url="https://www.suse.com/security/cve/CVE-2025-5914/" source="CVE"/>
		<reference ref_id="CVE-2025-5915" ref_url="https://www.suse.com/security/cve/CVE-2025-5915/" source="CVE"/>
		<reference ref_id="CVE-2025-5916" ref_url="https://www.suse.com/security/cve/CVE-2025-5916/" source="CVE"/>
		<reference ref_id="CVE-2025-5917" ref_url="https://www.suse.com/security/cve/CVE-2025-5917/" source="CVE"/>
		<reference ref_id="CVE-2025-5918" ref_url="https://www.suse.com/security/cve/CVE-2025-5918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041132.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2025-5914: Fixed double free due to an integer overflow in the archive_read_format_rar_seek_data() function (bsc#1244272)
- CVE-2025-5915: Fixed heap buffer over read in copy_from_lzss_window() at archive_read_support_format_rar.c (bsc#1244273)
- CVE-2025-5916: Fixed integer overflow while reading warc files at archive_read_support_format_warc.c (bsc#1244270)
- CVE-2025-5917: Fixed off by one error in build_ustar_entry_name() at archive_write_set_format_pax.c (bsc#1244336)
- CVE-2025-5918: Fixed reading past EOF may be triggered for piped file streams (bsc#1244279)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1244270">SUSE bug 1244270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244272">SUSE bug 1244272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244273">SUSE bug 1244273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244279">SUSE bug 1244279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244336">SUSE bug 1244336</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5914/">CVE-2025-5914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5914">CVE-2025-5914 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5915/">CVE-2025-5915 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5915">CVE-2025-5915 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5916/">CVE-2025-5916 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5916">CVE-2025-5916 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5917/">CVE-2025-5917 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5917">CVE-2025-5917 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5918/">CVE-2025-5918 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5918">CVE-2025-5918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013032" comment="libarchive13-3.5.1-150400.3.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206353" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234959" ref_url="https://bugzilla.suse.com/1234959" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-56738" ref_url="https://www.suse.com/security/cve/CVE-2024-56738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041140.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2024-56738: Fixed side-channel attack due to not constant-time algorithm in grub_crypto_memcmp (bsc#1234959)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-07"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1234959">SUSE bug 1234959</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56738/">CVE-2024-56738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56738">CVE-2024-56738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013152" comment="grub2-2.06-150400.11.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013153" comment="grub2-arm64-efi-2.06-150400.11.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013124" comment="grub2-i386-pc-2.06-150400.11.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013154" comment="grub2-s390x-emu-2.06-150400.11.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013125" comment="grub2-snapper-plugin-2.06-150400.11.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013127" comment="grub2-x86_64-efi-2.06-150400.11.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013128" comment="grub2-x86_64-xen-2.06-150400.11.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206354" version="1" class="patch">
	<metadata>
		<title>Security update for dpkg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1245573" ref_url="https://bugzilla.suse.com/1245573" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-6297" ref_url="https://www.suse.com/security/cve/CVE-2025-6297/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041153.html" source="SUSE-SU"/>
		<description>
This update for dpkg fixes the following issues:

- CVE-2025-6297: Fixed an improper sanitization of directory permissions that could lead to DoS. (bsc#1245573)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-08"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1245573">SUSE bug 1245573</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6297/">CVE-2025-6297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6297">CVE-2025-6297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013203" comment="update-alternatives-1.19.0.4-150000.4.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206355" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1233012" ref_url="https://bugzilla.suse.com/1233012" source="BUGZILLA"/>
		<reference ref_id="1243273" ref_url="https://bugzilla.suse.com/1243273" source="BUGZILLA"/>
		<reference ref_id="1244032" ref_url="https://bugzilla.suse.com/1244032" source="BUGZILLA"/>
		<reference ref_id="1244056" ref_url="https://bugzilla.suse.com/1244056" source="BUGZILLA"/>
		<reference ref_id="1244059" ref_url="https://bugzilla.suse.com/1244059" source="BUGZILLA"/>
		<reference ref_id="1244060" ref_url="https://bugzilla.suse.com/1244060" source="BUGZILLA"/>
		<reference ref_id="1244061" ref_url="https://bugzilla.suse.com/1244061" source="BUGZILLA"/>
		<reference ref_id="1244401" ref_url="https://bugzilla.suse.com/1244401" source="BUGZILLA"/>
		<reference ref_id="1244705" ref_url="https://bugzilla.suse.com/1244705" source="BUGZILLA"/>
		<reference ref_id="1247249" ref_url="https://bugzilla.suse.com/1247249" source="BUGZILLA"/>
		<reference ref_id="831629" ref_url="https://bugzilla.suse.com/831629" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4138" ref_url="https://www.suse.com/security/cve/CVE-2025-4138/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435/" source="CVE"/>
		<reference ref_id="CVE-2025-4516" ref_url="https://www.suse.com/security/cve/CVE-2025-4516/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2025-4516: use-after-free in the unicode-escape decoder when using the error handler (bsc#1243273).
- CVE-2024-12718: Fixed extraction filter bypass that allowed file metadata modification outside extraction directory (bsc#1244056)
- CVE-2025-4138: Fixed issue that might allow symlink targets to point outside the destination directory, and the modification of some file metadata (bsc#1244059)
- CVE-2025-4330: Fixed extraction filter bypass that allowed linking outside extraction directory (bsc#1244060)
- CVE-2025-4435: Fixed Tarfile extracts filtered members when errorlevel=0 (bsc#1244061)
- CVE-2025-4517: Fixed arbitrary filesystem writes outside the extraction directory during extraction with filter='data' (bsc#1244032)
- CVE-2025-6069: Fixed worst case quadratic complexity when processing certain crafted malformed inputs with HTMLParser (bsc#1244705)
- CVE-2025-8194: Fixed denial of service caused by tar archives with negative offsets (bsc#1247249)
    
Other fixes:
- Limit buffer size for IPv6 address parsing (bsc#1244401).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-13"/>
	<updated date="2025-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233012">SUSE bug 1233012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243273">SUSE bug 1243273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244032">SUSE bug 1244032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244056">SUSE bug 1244056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244059">SUSE bug 1244059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244060">SUSE bug 1244060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244061">SUSE bug 1244061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244401">SUSE bug 1244401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244705">SUSE bug 1244705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247249">SUSE bug 1247249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831629">SUSE bug 831629</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-4138/">CVE-2025-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4138">CVE-2025-4138 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-4516/">CVE-2025-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4516">CVE-2025-4516 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013874" comment="libpython3_6m1_0-3.6.15-150300.10.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013875" comment="python3-3.6.15-150300.10.97.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013876" comment="python3-base-3.6.15-150300.10.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206356" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1245320" ref_url="https://bugzilla.suse.com/1245320" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-6032" ref_url="https://www.suse.com/security/cve/CVE-2025-6032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041232.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2025-6032: Fixed machine init command failing to verify TLS certificate (bsc#1245320)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1245320">SUSE bug 1245320</bugzilla>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6032/">CVE-2025-6032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6032">CVE-2025-6032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014126" comment="podman-4.9.5-150400.4.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014127" comment="podman-remote-4.9.5-150400.4.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206357" version="1" class="patch">
	<metadata>
		<title>Security update for rust-keylime (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1210344" ref_url="https://bugzilla.suse.com/1210344" source="BUGZILLA"/>
		<reference ref_id="1223234" ref_url="https://bugzilla.suse.com/1223234" source="BUGZILLA"/>
		<reference ref_id="1229952" ref_url="https://bugzilla.suse.com/1229952" source="BUGZILLA"/>
		<reference ref_id="1230029" ref_url="https://bugzilla.suse.com/1230029" source="BUGZILLA"/>
		<reference ref_id="1242623" ref_url="https://bugzilla.suse.com/1242623" source="BUGZILLA"/>
		<reference ref_id="1243861" ref_url="https://bugzilla.suse.com/1243861" source="BUGZILLA"/>
		<reference ref_id="1247193" ref_url="https://bugzilla.suse.com/1247193" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<reference ref_id="CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806/" source="CVE"/>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<reference ref_id="CVE-2025-58266" ref_url="https://www.suse.com/security/cve/CVE-2025-58266/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041229.html" source="SUSE-SU"/>
		<description>
This update for rust-keylime fixes the following issues:

- Update to version 0.2.7+141:
  * CVE-2025-58266: shlex: Fixed command injection (bsc#1247193)
    
- Update to version 0.2.7+117:
  * CVE-2023-26964: rust-keylime: hyper,h2: stream stacking when H2 processing HTTP2 RST_STREAM frames (bsc#1210344).
  * CVE-2024-12224: rust-keylime: idna: idna accepts Punycode labels that do not produce any non-ASCII when decoded (bsc#1243861).
  * CVE-2024-32650: rust-keylime: rust-rustls: Infinite loop in rustls::conn::ConnectionCommon:complete_io() with proper client input (bsc#1223234).
  * CVE-2024-43806: rust-keylime: rustix: rustix::fs::Dir iterator with the linux_raw backend can cause memory explosion (bsc#1229952).
  * CVE-2025-3416: rust-keylime: openssl: Use-After-Free in Md::fetch and Cipher::fetch in rust-openssl crate (bsc#1242623).
  * rust-shlex: Multiple issues involving quote API ( RUSTSEC-2024-0006, GHSA-r7qv-8r2h-pg27, bsc#1230029)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210344">SUSE bug 1210344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223234">SUSE bug 1223234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229952">SUSE bug 1229952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230029">SUSE bug 1230029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242623">SUSE bug 1242623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243861">SUSE bug 1243861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247193">SUSE bug 1247193</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58266/">CVE-2025-58266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58266">CVE-2025-58266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014129" comment="rust-keylime-0.2.7+141-150400.3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206358" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1247106" ref_url="https://bugzilla.suse.com/1247106" source="BUGZILLA"/>
		<reference ref_id="1247108" ref_url="https://bugzilla.suse.com/1247108" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-8176" ref_url="https://www.suse.com/security/cve/CVE-2025-8176/" source="CVE"/>
		<reference ref_id="CVE-2025-8177" ref_url="https://www.suse.com/security/cve/CVE-2025-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041224.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:
  
- CVE-2025-8176: Fixed heap use-after-free in tools/tiffmedian.c (bsc#1247108)
- CVE-2025-8177: Fixed possible buffer overflow in tools/thumbnail.c:setrow() 
  when processing malformed TIFF files (bsc#1247106)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1247106">SUSE bug 1247106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247108">SUSE bug 1247108</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8176/">CVE-2025-8176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8176">CVE-2025-8176 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8177/">CVE-2025-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8177">CVE-2025-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014125" comment="libtiff5-4.0.9-150000.45.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206359" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1206051" ref_url="https://bugzilla.suse.com/1206051" source="BUGZILLA"/>
		<reference ref_id="1221829" ref_url="https://bugzilla.suse.com/1221829" source="BUGZILLA"/>
		<reference ref_id="1229334" ref_url="https://bugzilla.suse.com/1229334" source="BUGZILLA"/>
		<reference ref_id="1234863" ref_url="https://bugzilla.suse.com/1234863" source="BUGZILLA"/>
		<reference ref_id="1236104" ref_url="https://bugzilla.suse.com/1236104" source="BUGZILLA"/>
		<reference ref_id="1236333" ref_url="https://bugzilla.suse.com/1236333" source="BUGZILLA"/>
		<reference ref_id="1238160" ref_url="https://bugzilla.suse.com/1238160" source="BUGZILLA"/>
		<reference ref_id="1239644" ref_url="https://bugzilla.suse.com/1239644" source="BUGZILLA"/>
		<reference ref_id="1240185" ref_url="https://bugzilla.suse.com/1240185" source="BUGZILLA"/>
		<reference ref_id="1240799" ref_url="https://bugzilla.suse.com/1240799" source="BUGZILLA"/>
		<reference ref_id="1242414" ref_url="https://bugzilla.suse.com/1242414" source="BUGZILLA"/>
		<reference ref_id="1242780" ref_url="https://bugzilla.suse.com/1242780" source="BUGZILLA"/>
		<reference ref_id="1244309" ref_url="https://bugzilla.suse.com/1244309" source="BUGZILLA"/>
		<reference ref_id="1245217" ref_url="https://bugzilla.suse.com/1245217" source="BUGZILLA"/>
		<reference ref_id="1245431" ref_url="https://bugzilla.suse.com/1245431" source="BUGZILLA"/>
		<reference ref_id="1245506" ref_url="https://bugzilla.suse.com/1245506" source="BUGZILLA"/>
		<reference ref_id="1245711" ref_url="https://bugzilla.suse.com/1245711" source="BUGZILLA"/>
		<reference ref_id="1245986" ref_url="https://bugzilla.suse.com/1245986" source="BUGZILLA"/>
		<reference ref_id="1246000" ref_url="https://bugzilla.suse.com/1246000" source="BUGZILLA"/>
		<reference ref_id="1246029" ref_url="https://bugzilla.suse.com/1246029" source="BUGZILLA"/>
		<reference ref_id="1246037" ref_url="https://bugzilla.suse.com/1246037" source="BUGZILLA"/>
		<reference ref_id="1246045" ref_url="https://bugzilla.suse.com/1246045" source="BUGZILLA"/>
		<reference ref_id="1246073" ref_url="https://bugzilla.suse.com/1246073" source="BUGZILLA"/>
		<reference ref_id="1246186" ref_url="https://bugzilla.suse.com/1246186" source="BUGZILLA"/>
		<reference ref_id="1246781" ref_url="https://bugzilla.suse.com/1246781" source="BUGZILLA"/>
		<reference ref_id="1247314" ref_url="https://bugzilla.suse.com/1247314" source="BUGZILLA"/>
		<reference ref_id="1247347" ref_url="https://bugzilla.suse.com/1247347" source="BUGZILLA"/>
		<reference ref_id="1247348" ref_url="https://bugzilla.suse.com/1247348" source="BUGZILLA"/>
		<reference ref_id="1247349" ref_url="https://bugzilla.suse.com/1247349" source="BUGZILLA"/>
		<reference ref_id="1247437" ref_url="https://bugzilla.suse.com/1247437" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-49138" ref_url="https://www.suse.com/security/cve/CVE-2022-49138/" source="CVE"/>
		<reference ref_id="CVE-2022-49770" ref_url="https://www.suse.com/security/cve/CVE-2022-49770/" source="CVE"/>
		<reference ref_id="CVE-2023-52923" ref_url="https://www.suse.com/security/cve/CVE-2023-52923/" source="CVE"/>
		<reference ref_id="CVE-2023-52927" ref_url="https://www.suse.com/security/cve/CVE-2023-52927/" source="CVE"/>
		<reference ref_id="CVE-2023-53117" ref_url="https://www.suse.com/security/cve/CVE-2023-53117/" source="CVE"/>
		<reference ref_id="CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643/" source="CVE"/>
		<reference ref_id="CVE-2024-42265" ref_url="https://www.suse.com/security/cve/CVE-2024-42265/" source="CVE"/>
		<reference ref_id="CVE-2024-53164" ref_url="https://www.suse.com/security/cve/CVE-2024-53164/" source="CVE"/>
		<reference ref_id="CVE-2024-57947" ref_url="https://www.suse.com/security/cve/CVE-2024-57947/" source="CVE"/>
		<reference ref_id="CVE-2025-21881" ref_url="https://www.suse.com/security/cve/CVE-2025-21881/" source="CVE"/>
		<reference ref_id="CVE-2025-21971" ref_url="https://www.suse.com/security/cve/CVE-2025-21971/" source="CVE"/>
		<reference ref_id="CVE-2025-37798" ref_url="https://www.suse.com/security/cve/CVE-2025-37798/" source="CVE"/>
		<reference ref_id="CVE-2025-38079" ref_url="https://www.suse.com/security/cve/CVE-2025-38079/" source="CVE"/>
		<reference ref_id="CVE-2025-38088" ref_url="https://www.suse.com/security/cve/CVE-2025-38088/" source="CVE"/>
		<reference ref_id="CVE-2025-38120" ref_url="https://www.suse.com/security/cve/CVE-2025-38120/" source="CVE"/>
		<reference ref_id="CVE-2025-38177" ref_url="https://www.suse.com/security/cve/CVE-2025-38177/" source="CVE"/>
		<reference ref_id="CVE-2025-38181" ref_url="https://www.suse.com/security/cve/CVE-2025-38181/" source="CVE"/>
		<reference ref_id="CVE-2025-38200" ref_url="https://www.suse.com/security/cve/CVE-2025-38200/" source="CVE"/>
		<reference ref_id="CVE-2025-38206" ref_url="https://www.suse.com/security/cve/CVE-2025-38206/" source="CVE"/>
		<reference ref_id="CVE-2025-38212" ref_url="https://www.suse.com/security/cve/CVE-2025-38212/" source="CVE"/>
		<reference ref_id="CVE-2025-38213" ref_url="https://www.suse.com/security/cve/CVE-2025-38213/" source="CVE"/>
		<reference ref_id="CVE-2025-38257" ref_url="https://www.suse.com/security/cve/CVE-2025-38257/" source="CVE"/>
		<reference ref_id="CVE-2025-38350" ref_url="https://www.suse.com/security/cve/CVE-2025-38350/" source="CVE"/>
		<reference ref_id="CVE-2025-38468" ref_url="https://www.suse.com/security/cve/CVE-2025-38468/" source="CVE"/>
		<reference ref_id="CVE-2025-38477" ref_url="https://www.suse.com/security/cve/CVE-2025-38477/" source="CVE"/>
		<reference ref_id="CVE-2025-38494" ref_url="https://www.suse.com/security/cve/CVE-2025-38494/" source="CVE"/>
		<reference ref_id="CVE-2025-38495" ref_url="https://www.suse.com/security/cve/CVE-2025-38495/" source="CVE"/>
		<reference ref_id="CVE-2025-38497" ref_url="https://www.suse.com/security/cve/CVE-2025-38497/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).
- CVE-2023-52923: netfilter: nf_tables: split async and sync catchall in two functions (bsc#1236104).
- CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644).
- CVE-2023-53117: fs: prevent out-of-bounds array speculation when closing a file descriptor (bsc#1242780).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous  set with timeout (bsc#1221829).
- CVE-2024-42265: protect the fetch of -&gt;fd[fd] in do_dup2() from mispredictions (bsc#1229334).
- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
- CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185).
- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1240799).
- CVE-2025-38079: crypto: algif_hash - fix double free in hash_accept (bsc#1245217).
- CVE-2025-38181: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246000).
- CVE-2025-38200: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (bsc#1246045).
- CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246073).
- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246029).
- CVE-2025-38213: vgacon: Add check for vc_origin address range in vgacon_scroll() (bsc#1246037).
- CVE-2025-38257: s390/pkey: Prevent overflow in size calculation for memdup_user() (bsc#1246186).
- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).
- CVE-2025-38468: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (bsc#1247437).
- CVE-2025-38477: net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (bsc#1247314).
- CVE-2025-38494: HID: core: do not bypass hid_hw_raw_request (bsc#1247349).
- CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247348).
- CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347).

The following non-security bugs were fixed:

- Revert 'hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).'
- Revert 'mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race'
- Revert 'mm/hugetlb: unshare page tables during VMA split, not before'
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-18"/>
	<updated date="2025-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206051">SUSE bug 1206051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221829">SUSE bug 1221829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229334">SUSE bug 1229334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234863">SUSE bug 1234863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236104">SUSE bug 1236104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236333">SUSE bug 1236333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238160">SUSE bug 1238160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239644">SUSE bug 1239644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240185">SUSE bug 1240185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240799">SUSE bug 1240799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242414">SUSE bug 1242414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242780">SUSE bug 1242780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244309">SUSE bug 1244309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245217">SUSE bug 1245217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245431">SUSE bug 1245431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245506">SUSE bug 1245506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245711">SUSE bug 1245711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245986">SUSE bug 1245986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246000">SUSE bug 1246000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246029">SUSE bug 1246029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246037">SUSE bug 1246037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246045">SUSE bug 1246045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246073">SUSE bug 1246073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246186">SUSE bug 1246186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246781">SUSE bug 1246781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247314">SUSE bug 1247314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247347">SUSE bug 1247347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247348">SUSE bug 1247348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247349">SUSE bug 1247349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247437">SUSE bug 1247437</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49138/">CVE-2022-49138 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49138">CVE-2022-49138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49770/">CVE-2022-49770 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49770">CVE-2022-49770 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52923/">CVE-2023-52923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52923">CVE-2023-52923 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52927/">CVE-2023-52927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52927">CVE-2023-52927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53117/">CVE-2023-53117 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53117">CVE-2023-53117 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42265/">CVE-2024-42265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53164/">CVE-2024-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57947/">CVE-2024-57947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57947">CVE-2024-57947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21881/">CVE-2025-21881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21881">CVE-2025-21881 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21971/">CVE-2025-21971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21971">CVE-2025-21971 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37798/">CVE-2025-37798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37798">CVE-2025-37798 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38079/">CVE-2025-38079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38088/">CVE-2025-38088 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38088">CVE-2025-38088 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38120/">CVE-2025-38120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38120">CVE-2025-38120 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38177/">CVE-2025-38177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38177">CVE-2025-38177 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38181/">CVE-2025-38181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38181">CVE-2025-38181 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38200/">CVE-2025-38200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38206/">CVE-2025-38206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38206">CVE-2025-38206 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38212/">CVE-2025-38212 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38212">CVE-2025-38212 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38213/">CVE-2025-38213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38257/">CVE-2025-38257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38257">CVE-2025-38257 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38350/">CVE-2025-38350 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38468/">CVE-2025-38468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38468">CVE-2025-38468 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38477/">CVE-2025-38477 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38477">CVE-2025-38477 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38494/">CVE-2025-38494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38494">CVE-2025-38494 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38495/">CVE-2025-38495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38495">CVE-2025-38495 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38497/">CVE-2025-38497 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38497">CVE-2025-38497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014433" comment="kernel-default-5.14.21-150400.24.173.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014419" comment="kernel-default-base-5.14.21-150400.24.173.1.150400.24.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206360" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1206051" ref_url="https://bugzilla.suse.com/1206051" source="BUGZILLA"/>
		<reference ref_id="1221829" ref_url="https://bugzilla.suse.com/1221829" source="BUGZILLA"/>
		<reference ref_id="1229334" ref_url="https://bugzilla.suse.com/1229334" source="BUGZILLA"/>
		<reference ref_id="1234863" ref_url="https://bugzilla.suse.com/1234863" source="BUGZILLA"/>
		<reference ref_id="1236104" ref_url="https://bugzilla.suse.com/1236104" source="BUGZILLA"/>
		<reference ref_id="1236333" ref_url="https://bugzilla.suse.com/1236333" source="BUGZILLA"/>
		<reference ref_id="1238160" ref_url="https://bugzilla.suse.com/1238160" source="BUGZILLA"/>
		<reference ref_id="1239644" ref_url="https://bugzilla.suse.com/1239644" source="BUGZILLA"/>
		<reference ref_id="1240185" ref_url="https://bugzilla.suse.com/1240185" source="BUGZILLA"/>
		<reference ref_id="1240799" ref_url="https://bugzilla.suse.com/1240799" source="BUGZILLA"/>
		<reference ref_id="1242414" ref_url="https://bugzilla.suse.com/1242414" source="BUGZILLA"/>
		<reference ref_id="1242780" ref_url="https://bugzilla.suse.com/1242780" source="BUGZILLA"/>
		<reference ref_id="1244309" ref_url="https://bugzilla.suse.com/1244309" source="BUGZILLA"/>
		<reference ref_id="1245217" ref_url="https://bugzilla.suse.com/1245217" source="BUGZILLA"/>
		<reference ref_id="1245431" ref_url="https://bugzilla.suse.com/1245431" source="BUGZILLA"/>
		<reference ref_id="1245506" ref_url="https://bugzilla.suse.com/1245506" source="BUGZILLA"/>
		<reference ref_id="1245711" ref_url="https://bugzilla.suse.com/1245711" source="BUGZILLA"/>
		<reference ref_id="1245986" ref_url="https://bugzilla.suse.com/1245986" source="BUGZILLA"/>
		<reference ref_id="1246000" ref_url="https://bugzilla.suse.com/1246000" source="BUGZILLA"/>
		<reference ref_id="1246029" ref_url="https://bugzilla.suse.com/1246029" source="BUGZILLA"/>
		<reference ref_id="1246037" ref_url="https://bugzilla.suse.com/1246037" source="BUGZILLA"/>
		<reference ref_id="1246045" ref_url="https://bugzilla.suse.com/1246045" source="BUGZILLA"/>
		<reference ref_id="1246073" ref_url="https://bugzilla.suse.com/1246073" source="BUGZILLA"/>
		<reference ref_id="1246186" ref_url="https://bugzilla.suse.com/1246186" source="BUGZILLA"/>
		<reference ref_id="1246781" ref_url="https://bugzilla.suse.com/1246781" source="BUGZILLA"/>
		<reference ref_id="1247314" ref_url="https://bugzilla.suse.com/1247314" source="BUGZILLA"/>
		<reference ref_id="1247347" ref_url="https://bugzilla.suse.com/1247347" source="BUGZILLA"/>
		<reference ref_id="1247348" ref_url="https://bugzilla.suse.com/1247348" source="BUGZILLA"/>
		<reference ref_id="1247349" ref_url="https://bugzilla.suse.com/1247349" source="BUGZILLA"/>
		<reference ref_id="1247437" ref_url="https://bugzilla.suse.com/1247437" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-49138" ref_url="https://www.suse.com/security/cve/CVE-2022-49138/" source="CVE"/>
		<reference ref_id="CVE-2022-49770" ref_url="https://www.suse.com/security/cve/CVE-2022-49770/" source="CVE"/>
		<reference ref_id="CVE-2023-52923" ref_url="https://www.suse.com/security/cve/CVE-2023-52923/" source="CVE"/>
		<reference ref_id="CVE-2023-52927" ref_url="https://www.suse.com/security/cve/CVE-2023-52927/" source="CVE"/>
		<reference ref_id="CVE-2023-53117" ref_url="https://www.suse.com/security/cve/CVE-2023-53117/" source="CVE"/>
		<reference ref_id="CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643/" source="CVE"/>
		<reference ref_id="CVE-2024-42265" ref_url="https://www.suse.com/security/cve/CVE-2024-42265/" source="CVE"/>
		<reference ref_id="CVE-2024-53164" ref_url="https://www.suse.com/security/cve/CVE-2024-53164/" source="CVE"/>
		<reference ref_id="CVE-2024-57947" ref_url="https://www.suse.com/security/cve/CVE-2024-57947/" source="CVE"/>
		<reference ref_id="CVE-2025-21881" ref_url="https://www.suse.com/security/cve/CVE-2025-21881/" source="CVE"/>
		<reference ref_id="CVE-2025-21971" ref_url="https://www.suse.com/security/cve/CVE-2025-21971/" source="CVE"/>
		<reference ref_id="CVE-2025-37798" ref_url="https://www.suse.com/security/cve/CVE-2025-37798/" source="CVE"/>
		<reference ref_id="CVE-2025-38079" ref_url="https://www.suse.com/security/cve/CVE-2025-38079/" source="CVE"/>
		<reference ref_id="CVE-2025-38088" ref_url="https://www.suse.com/security/cve/CVE-2025-38088/" source="CVE"/>
		<reference ref_id="CVE-2025-38120" ref_url="https://www.suse.com/security/cve/CVE-2025-38120/" source="CVE"/>
		<reference ref_id="CVE-2025-38177" ref_url="https://www.suse.com/security/cve/CVE-2025-38177/" source="CVE"/>
		<reference ref_id="CVE-2025-38181" ref_url="https://www.suse.com/security/cve/CVE-2025-38181/" source="CVE"/>
		<reference ref_id="CVE-2025-38200" ref_url="https://www.suse.com/security/cve/CVE-2025-38200/" source="CVE"/>
		<reference ref_id="CVE-2025-38206" ref_url="https://www.suse.com/security/cve/CVE-2025-38206/" source="CVE"/>
		<reference ref_id="CVE-2025-38212" ref_url="https://www.suse.com/security/cve/CVE-2025-38212/" source="CVE"/>
		<reference ref_id="CVE-2025-38213" ref_url="https://www.suse.com/security/cve/CVE-2025-38213/" source="CVE"/>
		<reference ref_id="CVE-2025-38257" ref_url="https://www.suse.com/security/cve/CVE-2025-38257/" source="CVE"/>
		<reference ref_id="CVE-2025-38350" ref_url="https://www.suse.com/security/cve/CVE-2025-38350/" source="CVE"/>
		<reference ref_id="CVE-2025-38468" ref_url="https://www.suse.com/security/cve/CVE-2025-38468/" source="CVE"/>
		<reference ref_id="CVE-2025-38477" ref_url="https://www.suse.com/security/cve/CVE-2025-38477/" source="CVE"/>
		<reference ref_id="CVE-2025-38494" ref_url="https://www.suse.com/security/cve/CVE-2025-38494/" source="CVE"/>
		<reference ref_id="CVE-2025-38495" ref_url="https://www.suse.com/security/cve/CVE-2025-38495/" source="CVE"/>
		<reference ref_id="CVE-2025-38497" ref_url="https://www.suse.com/security/cve/CVE-2025-38497/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).
- CVE-2023-52923: netfilter: nf_tables: split async and sync catchall in two functions (bsc#1236104).
- CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644).
- CVE-2023-53117: fs: prevent out-of-bounds array speculation when closing a file descriptor (bsc#1242780).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous  set with timeout (bsc#1221829).
- CVE-2024-42265: protect the fetch of -&gt;fd[fd] in do_dup2() from mispredictions (bsc#1229334).
- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
- CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185).
- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1240799).
- CVE-2025-38079: crypto: algif_hash - fix double free in hash_accept (bsc#1245217).
- CVE-2025-38181: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246000).
- CVE-2025-38200: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (bsc#1246045).
- CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246073).
- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246029).
- CVE-2025-38213: vgacon: Add check for vc_origin address range in vgacon_scroll() (bsc#1246037).
- CVE-2025-38257: s390/pkey: Prevent overflow in size calculation for memdup_user() (bsc#1246186).
- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).
- CVE-2025-38468: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (bsc#1247437).
- CVE-2025-38477: net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (bsc#1247314).
- CVE-2025-38494: HID: core: do not bypass hid_hw_raw_request (bsc#1247349).
- CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247348).
- CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347).

The following non-security bugs were fixed:

- Revert 'hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).' 
- Revert 'mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race' 
- Revert 'mm/hugetlb: unshare page tables during VMA split, not before'
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-18"/>
	<updated date="2025-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206051">SUSE bug 1206051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221829">SUSE bug 1221829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229334">SUSE bug 1229334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234863">SUSE bug 1234863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236104">SUSE bug 1236104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236333">SUSE bug 1236333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238160">SUSE bug 1238160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239644">SUSE bug 1239644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240185">SUSE bug 1240185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240799">SUSE bug 1240799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242414">SUSE bug 1242414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242780">SUSE bug 1242780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244309">SUSE bug 1244309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245217">SUSE bug 1245217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245431">SUSE bug 1245431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245506">SUSE bug 1245506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245711">SUSE bug 1245711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245986">SUSE bug 1245986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246000">SUSE bug 1246000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246029">SUSE bug 1246029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246037">SUSE bug 1246037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246045">SUSE bug 1246045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246073">SUSE bug 1246073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246186">SUSE bug 1246186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246781">SUSE bug 1246781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247314">SUSE bug 1247314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247347">SUSE bug 1247347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247348">SUSE bug 1247348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247349">SUSE bug 1247349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247437">SUSE bug 1247437</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49138/">CVE-2022-49138 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49138">CVE-2022-49138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49770/">CVE-2022-49770 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49770">CVE-2022-49770 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52923/">CVE-2023-52923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52923">CVE-2023-52923 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52927/">CVE-2023-52927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52927">CVE-2023-52927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53117/">CVE-2023-53117 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53117">CVE-2023-53117 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42265/">CVE-2024-42265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53164/">CVE-2024-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57947/">CVE-2024-57947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57947">CVE-2024-57947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21881/">CVE-2025-21881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21881">CVE-2025-21881 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21971/">CVE-2025-21971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21971">CVE-2025-21971 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37798/">CVE-2025-37798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37798">CVE-2025-37798 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38079/">CVE-2025-38079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38088/">CVE-2025-38088 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38088">CVE-2025-38088 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38120/">CVE-2025-38120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38120">CVE-2025-38120 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38177/">CVE-2025-38177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38177">CVE-2025-38177 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38181/">CVE-2025-38181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38181">CVE-2025-38181 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38200/">CVE-2025-38200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38206/">CVE-2025-38206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38206">CVE-2025-38206 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38212/">CVE-2025-38212 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38212">CVE-2025-38212 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38213/">CVE-2025-38213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38257/">CVE-2025-38257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38257">CVE-2025-38257 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38350/">CVE-2025-38350 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38468/">CVE-2025-38468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38468">CVE-2025-38468 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38477/">CVE-2025-38477 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38477">CVE-2025-38477 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38494/">CVE-2025-38494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38494">CVE-2025-38494 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38495/">CVE-2025-38495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38495">CVE-2025-38495 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38497/">CVE-2025-38497 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38497">CVE-2025-38497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014434" comment="kernel-rt-5.14.21-150400.15.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014435" comment="kernel-source-rt-5.14.21-150400.15.127.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206361" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234809" ref_url="https://bugzilla.suse.com/1234809" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-56326" ref_url="https://www.suse.com/security/cve/CVE-2024-56326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020066.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

  - CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809)

		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234809">SUSE bug 1234809</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56326/">CVE-2024-56326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56326">CVE-2024-56326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959155" comment="python3-Jinja2-2.10.1-150000.3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206362" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246556" ref_url="https://bugzilla.suse.com/1246556" source="BUGZILLA"/>
		<reference ref_id="1247367" ref_url="https://bugzilla.suse.com/1247367" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-54388" ref_url="https://www.suse.com/security/cve/CVE-2025-54388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02914-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041292.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

- Update to Docker 28.3.3-ce.
- CVE-2025-54388: Fixed a bug where firewalld when reloaded can make published container ports accessible from remote hosts. (bsc#1247367)
  		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-19"/>
	<updated date="2025-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1246556">SUSE bug 1246556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247367">SUSE bug 1247367</bugzilla>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54388/">CVE-2025-54388 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54388">CVE-2025-54388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014633" comment="docker-28.3.3_ce-150000.230.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206363" version="1" class="patch">
	<metadata>
		<title>Security update for jq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1244116" ref_url="https://bugzilla.suse.com/1244116" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-48060" ref_url="https://www.suse.com/security/cve/CVE-2025-48060/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02915-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041291.html" source="SUSE-SU"/>
		<description>
This update for jq fixes the following issues:

- CVE-2025-48060: Fixed stack-buffer-overflow in jq_fuzz_execute (bsc#1244116)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-19"/>
	<updated date="2025-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1244116">SUSE bug 1244116</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48060/">CVE-2025-48060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48060">CVE-2025-48060 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014634" comment="jq-1.6-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014635" comment="libjq1-1.6-150000.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206364" version="1" class="patch">
	<metadata>
		<title>Security update for rust-keylime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1248006" ref_url="https://bugzilla.suse.com/1248006" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041335.html" source="SUSE-SU"/>
		<description>
This update for rust-keylime fixes the following issues:

- Update slab to version 0.4.11:
  * CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function (bsc#1248006)

- Update to version 0.2.8+12:
  * build(deps): bump actions/checkout from 4 to 5
  * build(deps): bump cfg-if from 1.0.0 to 1.0.1
  * build(deps): bump openssl from 0.10.72 to 0.10.73
  * build(deps): bump clap from 4.5.39 to 4.5.45
  * build(deps): bump pest from 2.8.0 to 2.8.1
  * Fix clippy warnings
  * Use verifier-provided interval for continuous attestation timing
  * Add meta object with seconds_to_next_attestation to evidence response
  * Fix boot time retrieval
  * Fix IMA log format (it must be ['text/plain']) (#1073)
  * Remove unnecessary configuration fields
  * cargo: Bump retry-policies to version 0.4.0
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-22"/>
	<updated date="2025-08-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1248006">SUSE bug 1248006</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015411" comment="rust-keylime-0.2.8+12-150400.3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206365" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1245227" ref_url="https://bugzilla.suse.com/1245227" source="BUGZILLA"/>
		<reference ref_id="1246114" ref_url="https://bugzilla.suse.com/1246114" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-6199" ref_url="https://www.suse.com/security/cve/CVE-2025-6199/" source="CVE"/>
		<reference ref_id="CVE-2025-7345" ref_url="https://www.suse.com/security/cve/CVE-2025-7345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041341.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

- CVE-2025-6199: Fixed uninitialized memory leading to arbitrary memory contents leak (bsc#1245227)
- CVE-2025-7345: Fixed heap buffer overflow within the gdk_pixbuf__jpeg_image_load_increment function (bsc#1246114)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-22"/>
	<updated date="2025-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1245227">SUSE bug 1245227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246114">SUSE bug 1246114</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6199/">CVE-2025-6199 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6199">CVE-2025-6199 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7345/">CVE-2025-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7345">CVE-2025-7345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015408" comment="gdk-pixbuf-query-loaders-2.42.12-150400.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015409" comment="libgdk_pixbuf-2_0-0-2.42.12-150400.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015410" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206366" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1232234" ref_url="https://bugzilla.suse.com/1232234" source="BUGZILLA"/>
		<reference ref_id="1246221" ref_url="https://bugzilla.suse.com/1246221" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10041" ref_url="https://www.suse.com/security/cve/CVE-2024-10041/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02970-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041350.html" source="SUSE-SU"/>
		<description>
This update for pam fixes the following issues:

- Improve previous CVE-2024-10041 fix which led to CPU performance issues (bsc#1232234)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-25"/>
	<updated date="2025-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232234">SUSE bug 1232234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246221">SUSE bug 1246221</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10041/">CVE-2024-10041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10041">CVE-2024-10041 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015406" comment="pam-1.3.0-150000.6.86.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206367" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1244925" ref_url="https://bugzilla.suse.com/1244925" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-50181" ref_url="https://www.suse.com/security/cve/CVE-2025-50181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:02985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041351.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2025-50181: Pool managers now properly control redirects when retries is passed. (bsc#1244925)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-25"/>
	<updated date="2025-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1244925">SUSE bug 1244925</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50181/">CVE-2025-50181 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-50181">CVE-2025-50181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015173" comment="python3-urllib3-1.25.10-150300.4.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206368" version="1" class="patch">
	<metadata>
		<title>Security update for udisks2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1248502" ref_url="https://bugzilla.suse.com/1248502" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-8067" ref_url="https://www.suse.com/security/cve/CVE-2025-8067/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03017-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041422.html" source="SUSE-SU"/>
		<description>
This update for udisks2 fixes the following issues:

- CVE-2025-8067: Fixed missing bounds check can lead to out-of-bounds read in udisks daemon (bsc#1248502)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-08-29"/>
	<updated date="2025-08-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1248502">SUSE bug 1248502</bugzilla>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-8067/">CVE-2025-8067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8067">CVE-2025-8067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016639" comment="libudisks2-0-2.9.2-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016640" comment="libudisks2-0_btrfs-2.9.2-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016641" comment="libudisks2-0_lvm2-2.9.2-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016642" comment="udisks2-2.9.2-150400.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206369" version="1" class="patch">
	<metadata>
		<title>Security update for python-future (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1248124" ref_url="https://bugzilla.suse.com/1248124" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-50817" ref_url="https://www.suse.com/security/cve/CVE-2025-50817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03049-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041491.html" source="SUSE-SU"/>
		<description>
This update for python-future fixes the following issues:

- CVE-2025-50817: Fixed arbitrary code execution via the automatic import of file test.py (bsc#1248124)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-02"/>
	<updated date="2025-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1248124">SUSE bug 1248124</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50817/">CVE-2025-50817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50817">CVE-2025-50817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016870" comment="python3-future-0.18.2-150300.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206370" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1248438" ref_url="https://bugzilla.suse.com/1248438" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-20053" ref_url="https://www.suse.com/security/cve/CVE-2025-20053/" source="CVE"/>
		<reference ref_id="CVE-2025-20109" ref_url="https://www.suse.com/security/cve/CVE-2025-20109/" source="CVE"/>
		<reference ref_id="CVE-2025-22839" ref_url="https://www.suse.com/security/cve/CVE-2025-22839/" source="CVE"/>
		<reference ref_id="CVE-2025-22840" ref_url="https://www.suse.com/security/cve/CVE-2025-22840/" source="CVE"/>
		<reference ref_id="CVE-2025-22889" ref_url="https://www.suse.com/security/cve/CVE-2025-22889/" source="CVE"/>
		<reference ref_id="CVE-2025-26403" ref_url="https://www.suse.com/security/cve/CVE-2025-26403/" source="CVE"/>
		<reference ref_id="CVE-2025-32086" ref_url="https://www.suse.com/security/cve/CVE-2025-32086/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041494.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode was updated to the 20250812 release (bsc#1248438)
     - CVE-2025-20109: Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
     - CVE-2025-22840: Sequence of processor instructions leads to unexpected behavior for some Intel Xeon 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access
     - CVE-2025-22839: Insufficient granularity of access control in the OOB-MSM for some Intel Xeon 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access.
     - CVE-2025-22889: Improper handling of overlap between protected memory ranges for some Intel Xeon 6 processor with Intel TDX may allow a privileged user to potentially enable escalation of privilege via local access.
     - CVE-2025-20053: Improper buffer restrictions for some Intel Xeon Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access.
     - CVE-2025-26403: Out-of-bounds write in the memory subsystem for some Intel Xeon 6 processors when using Intel SGX or Intel TDX may allow a privileged user to potentially enable escalation of privilege via local access.
     - CVE-2025-32086: Improperly implemented security check for standard in the DDRIO configuration for some Intel Xeon 6 Processors when using Intel SGX or Intel TDX may allow a privileged user to potentially enable escalation of privilege via local access.
     - Update for functional issues.
     - Updated Platforms:

       | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
       |:---------------|:---------|:------------|:---------|:---------|:---------
       | ARL-H          | A1       | 06-c5-02/82 | 00000118 | 00000119 | Core Ultra Processor (Series 2)
       | ARL-S/HX (8P)  | B0       | 06-c6-02/82 | 00000118 | 00000119 | Core Ultra Processor (Series 2)
       | EMR-SP         | A1       | 06-cf-02/87 | 210002a9 | 210002b3 | Xeon Scalable Gen5
       | GNR-AP/SP      | B0       | 06-ad-01/95 | 010003a2 | 010003d0 | Xeon Scalable Gen6
       | GNR-AP/SP      | H0       | 06-ad-01/20 | 0a0000d1 | 0a000100 | Xeon Scalable Gen6
       | ICL-D          | B0       | 06-6c-01/10 | 010002d0 | 010002e0 | Xeon D-17xx, D-27xx
       | ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d000404 | 0d000410 | Xeon Scalable Gen3
       | LNL            | B0       | 06-bd-01/80 | 0000011f | 00000123 | Core Ultra 200 V Series Processor
       | MTL            | C0       | 06-aa-04/e6 | 00000024 | 00000025 | Core™ Ultra Processor
       | RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004128 | 00004129 | Core Gen13
       | RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004128 | 00004129 | Core Gen13
       | SPR-HBM        | Bx       | 06-8f-08/10 | 2c0003f7 | 2c000401 | Xeon Max
       | SPR-SP         | E4/S2    | 06-8f-07/87 | 2b000639 | 2b000643 | Xeon Scalable Gen4
       | SPR-SP         | E5/S3    | 06-8f-08/87 | 2b000639 | 2b000643 | Xeon Scalable Gen4
       | SRF-SP         | C0       | 06-af-03/01 | 03000341 | 03000362 | Xeon 6700-Series Processors with E-Cores
  
  New Disclosures Updated in Prior Releases:
  All ADL, RPL, SPR, EMR, MTL, ARL Microcode patches previously released in May 2025.
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-02"/>
	<updated date="2025-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1248438">SUSE bug 1248438</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20053/">CVE-2025-20053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20053">CVE-2025-20053 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20109/">CVE-2025-20109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20109">CVE-2025-20109 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22839/">CVE-2025-22839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22839">CVE-2025-22839 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22840/">CVE-2025-22840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22840">CVE-2025-22840 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-22889/">CVE-2025-22889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22889">CVE-2025-22889 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-26403/">CVE-2025-26403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26403">CVE-2025-26403 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-32086/">CVE-2025-32086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32086">CVE-2025-32086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016871" comment="ucode-intel-20250812-150200.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206371" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243314" ref_url="https://bugzilla.suse.com/1243314" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-4945" ref_url="https://www.suse.com/security/cve/CVE-2025-4945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041533.html" source="SUSE-SU"/>
		<description>
This update for libsoup2 fixes the following issues:

- CVE-2025-4945: Fixed Integer Overflow in Cookie Expiration Date Handling in libsoup (bsc#1243314).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-09-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1243314">SUSE bug 1243314</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4945/">CVE-2025-4945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4945">CVE-2025-4945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017187" comment="libsoup-2_4-1-2.74.2-150400.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206372" version="1" class="patch">
	<metadata>
		<title>Security update for regionServiceClientConfigAzure (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243419" ref_url="https://bugzilla.suse.com/1243419" source="BUGZILLA"/>
		<reference ref_id="1246995" ref_url="https://bugzilla.suse.com/1246995" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2025:03117-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041555.html" source="SUSE-SU"/>
		<description>
This update for regionServiceClientConfigAzure contains the following fixes:

- Update to version 3.0.0.(bsc#1246995)
  + SLE 16 python-requests requires SSL v3 certificates. Update 2
    region server certs to support SLE 16 when it gets released.

- Update dependency name for metadata package, name change in
  SLE 16. (bsc#1243419)

  + Replacing certificate for rgnsrv-azure-southeastasia to get
    rid of weird chain cert
  		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-09"/>
	<updated date="2025-09-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1243419">SUSE bug 1243419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246995">SUSE bug 1246995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017364" comment="regionServiceClientConfigAzure-3.0.0-150000.3.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206373" version="1" class="patch">
	<metadata>
		<title>Security update for regionServiceClientConfigEC2 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243419" ref_url="https://bugzilla.suse.com/1243419" source="BUGZILLA"/>
		<reference ref_id="1246995" ref_url="https://bugzilla.suse.com/1246995" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2025:03118-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041556.html" source="SUSE-SU"/>
		<description>
This update for regionServiceClientConfigEC2 contains the following fixes:

- Update to version 5.0.0. (bsc#1246995)
  + SLE 16 python-requests requires SSL v3 certificates. Update 2
    region server certs to support SLE 16 when it gets released.

- Update dependency to accomodate metadata binary package name change
  in SLE 16. (bsc#1243419)

  + New 4096 certificate for rgnsrv-ec2-us-east1
  		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-09"/>
	<updated date="2025-09-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1243419">SUSE bug 1243419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246995">SUSE bug 1246995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017365" comment="regionServiceClientConfigEC2-5.0.0-150000.3.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206374" version="1" class="patch">
	<metadata>
		<title>Security update for regionServiceClientConfigGCE (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1242063" ref_url="https://bugzilla.suse.com/1242063" source="BUGZILLA"/>
		<reference ref_id="1246995" ref_url="https://bugzilla.suse.com/1246995" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2025:03119-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041554.html" source="SUSE-SU"/>
		<description>
This update for regionServiceClientConfigGCE contains the following fixes:

- Update to version 5.0.0 (bsc#1246995)
  + SLE 16 python-requests requires SSL v3 certificates. Update 2
    region server certs to support SLE 16 when it gets released.

- Update conditional to handle name change of metadata package
  in SLE 16. (bsc#1242063)

  + Add noipv6 patch
  		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-09"/>
	<updated date="2025-09-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1242063">SUSE bug 1242063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246995">SUSE bug 1246995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017366" comment="regionServiceClientConfigGCE-5.0.0-150000.4.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206375" version="1" class="patch">
	<metadata>
		<title>Security update for ignition (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236518" ref_url="https://bugzilla.suse.com/1236518" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020255.html" source="SUSE-SU"/>
		<description>
This update for ignition fixes the following issues:

CVE-2023-45288: Fixed unclosed connections when receiving too many headers in golang.org/x/net/http2 (bsc#1236518)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-01"/>
	<updated date="2025-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1236518">SUSE bug 1236518</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962301" comment="ignition-2.15.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962302" comment="ignition-dracut-grub2-2.15.0-150400.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206376" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246602" ref_url="https://bugzilla.suse.com/1246602" source="BUGZILLA"/>
		<reference ref_id="1246604" ref_url="https://bugzilla.suse.com/1246604" source="BUGZILLA"/>
		<reference ref_id="1247938" ref_url="https://bugzilla.suse.com/1247938" source="BUGZILLA"/>
		<reference ref_id="1247939" ref_url="https://bugzilla.suse.com/1247939" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-53905" ref_url="https://www.suse.com/security/cve/CVE-2025-53905/" source="CVE"/>
		<reference ref_id="CVE-2025-53906" ref_url="https://www.suse.com/security/cve/CVE-2025-53906/" source="CVE"/>
		<reference ref_id="CVE-2025-55157" ref_url="https://www.suse.com/security/cve/CVE-2025-55157/" source="CVE"/>
		<reference ref_id="CVE-2025-55158" ref_url="https://www.suse.com/security/cve/CVE-2025-55158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03240-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041716.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Update to version 9.1.1629.
    
- CVE-2025-53905: Fixed a path traversal issue in tar.vim plugin that may allow for file overwriting when opening
  specially crafted tar files (bsc#1246604).
- CVE-2025-53906: Fixed a path traversal issue in zip.vim plugin that may allow for file overwriting when opening
  specially crafted zip files (bsc#1246602).
- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938).
- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-16"/>
	<updated date="2025-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1246602">SUSE bug 1246602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246604">SUSE bug 1246604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247938">SUSE bug 1247938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247939">SUSE bug 1247939</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53905/">CVE-2025-53905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53905">CVE-2025-53905 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-53906/">CVE-2025-53906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55157/">CVE-2025-55157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55157">CVE-2025-55157 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-55158/">CVE-2025-55158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55158">CVE-2025-55158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018299" comment="vim-data-common-9.1.1629-150000.5.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018310" comment="vim-small-9.1.1629-150000.5.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206377" version="1" class="patch">
	<metadata>
		<title>Security update for net-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243581" ref_url="https://bugzilla.suse.com/1243581" source="BUGZILLA"/>
		<reference ref_id="1246608" ref_url="https://bugzilla.suse.com/1246608" source="BUGZILLA"/>
		<reference ref_id="1248410" ref_url="https://bugzilla.suse.com/1248410" source="BUGZILLA"/>
		<reference ref_id="1248687" ref_url="https://bugzilla.suse.com/1248687" source="BUGZILLA"/>
		<reference ref_id="142461" ref_url="https://bugzilla.suse.com/142461" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-46836" ref_url="https://www.suse.com/security/cve/CVE-2025-46836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041766.html" source="SUSE-SU"/>
		<description>
This update for net-tools fixes the following issues:

Security issues fixed:

- CVE-2025-46836: missing bounds check in `get_name` may lead to a stack buffer overflow (bsc#1243581).
- Avoid unsafe use of `memcpy` in `ifconfig` (bsc#1248687).    
- Prevent overflow in `ax25` and `netrom` (bsc#1248687).   
- Fix stack buffer overflow in `parse_hex` (bsc#1248687).
- Fix stack buffer overflow in `proc_gen_fmt` (bsc#1248687).
    
Other issues fixed:

- Allow use of long interface names after CVE-2025-46836 fix, even if they are not accepted by the kernel (bsc#1248410).
- Fix netrom support.
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-18"/>
	<updated date="2025-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1243581">SUSE bug 1243581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246608">SUSE bug 1246608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248410">SUSE bug 1248410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248687">SUSE bug 1248687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/142461">SUSE bug 142461</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46836/">CVE-2025-46836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46836">CVE-2025-46836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018370" comment="net-tools-2.0+git20170221.479bb4a-150000.5.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206378" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230932" ref_url="https://bugzilla.suse.com/1230932" source="BUGZILLA"/>
		<reference ref_id="1246533" ref_url="https://bugzilla.suse.com/1246533" source="BUGZILLA"/>
		<reference ref_id="1249049" ref_url="https://bugzilla.suse.com/1249049" source="BUGZILLA"/>
		<reference ref_id="1249128" ref_url="https://bugzilla.suse.com/1249128" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-47175" ref_url="https://www.suse.com/security/cve/CVE-2024-47175/" source="CVE"/>
		<reference ref_id="CVE-2025-58060" ref_url="https://www.suse.com/security/cve/CVE-2025-58060/" source="CVE"/>
		<reference ref_id="CVE-2025-58364" ref_url="https://www.suse.com/security/cve/CVE-2025-58364/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041765.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2024-47175: no validation of IPP attributes in `ppdCreatePPDFromIPP2` when writing to a temporary PPD file allows
  for the injection of attacker-controlled data to the resulting PPD (bsc#1230932).
- CVE-2025-58060: no password check when `AuthType` is set to anything but `Basic` and a request is made with an
  `Authorization: Basic` header (bsc#1249049).
- CVE-2025-58364: unsafe deserialization and validation of printer attributes leads to NULL pointer dereference
  (bsc#1249128).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-18"/>
	<updated date="2025-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230932">SUSE bug 1230932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246533">SUSE bug 1246533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249049">SUSE bug 1249049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249128">SUSE bug 1249128</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47175/">CVE-2024-47175 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47175">CVE-2024-47175 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58060/">CVE-2025-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58060">CVE-2025-58060 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-58364/">CVE-2025-58364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58364">CVE-2025-58364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018624" comment="cups-config-2.2.7-150000.3.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018625" comment="libcups2-2.2.7-150000.3.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206379" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246197" ref_url="https://bugzilla.suse.com/1246197" source="BUGZILLA"/>
		<reference ref_id="1249191" ref_url="https://bugzilla.suse.com/1249191" source="BUGZILLA"/>
		<reference ref_id="1249348" ref_url="https://bugzilla.suse.com/1249348" source="BUGZILLA"/>
		<reference ref_id="1249367" ref_url="https://bugzilla.suse.com/1249367" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10148" ref_url="https://www.suse.com/security/cve/CVE-2025-10148/" source="CVE"/>
		<reference ref_id="CVE-2025-9086" ref_url="https://www.suse.com/security/cve/CVE-2025-9086/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03267-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041770.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2025-9086: bug in patch comparison logic when processing cookies can lead to out-of-bounds read in heap buffer
  (bsc#1249191).
- CVE-2025-10148: predictable websocket mask can lead to proxy cache poisoning by malicious server (bsc#1249348).
    
Other issues fixed:
    
- Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).
  * tool_getparam: fix --ftp-pasv [5f805ee]

- Update to version 8.14.1 (jsc#PED-13055, jsc#PED-13056).
  * TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs.
  * websocket: add option to disable auto-pong reply.
  * huge number of bugfixes.

  Please see https://curl.se/ch/ for full changelogs.
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-18"/>
	<updated date="2025-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246197">SUSE bug 1246197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249191">SUSE bug 1249191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249348">SUSE bug 1249348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249367">SUSE bug 1249367</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10148/">CVE-2025-10148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10148">CVE-2025-10148 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9086/">CVE-2025-9086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9086">CVE-2025-9086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018630" comment="curl-8.14.1-150400.5.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018631" comment="libcurl4-8.14.1-150400.5.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206380" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246197" ref_url="https://bugzilla.suse.com/1246197" source="BUGZILLA"/>
		<reference ref_id="1249191" ref_url="https://bugzilla.suse.com/1249191" source="BUGZILLA"/>
		<reference ref_id="1249348" ref_url="https://bugzilla.suse.com/1249348" source="BUGZILLA"/>
		<reference ref_id="1249367" ref_url="https://bugzilla.suse.com/1249367" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10148" ref_url="https://www.suse.com/security/cve/CVE-2025-10148/" source="CVE"/>
		<reference ref_id="CVE-2025-9086" ref_url="https://www.suse.com/security/cve/CVE-2025-9086/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041769.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2025-9086: bug in patch comparison logic when processing cookies can lead to out-of-bounds read in heap buffer
  (bsc#1249191).
- CVE-2025-10148: predictable websocket mask can lead to proxy cache poisoning by malicious server (bsc#1249348).
    
Other issues fixed:
    
- Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).
  * tool_getparam: fix --ftp-pasv [5f805ee]

- Update to version 8.14.1 (jsc#PED-13055, jsc#PED-13056).
  * TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs.
  * websocket: add option to disable auto-pong reply.
  * huge number of bugfixes.

  Please see https://curl.se/ch/ for full changelogs.

		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-18"/>
	<updated date="2025-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246197">SUSE bug 1246197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249191">SUSE bug 1249191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249348">SUSE bug 1249348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249367">SUSE bug 1249367</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10148/">CVE-2025-10148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10148">CVE-2025-10148 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9086/">CVE-2025-9086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9086">CVE-2025-9086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018621" comment="libbrotlicommon1-1.0.7-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018622" comment="libbrotlidec1-1.0.7-150200.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206381" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1217877" ref_url="https://bugzilla.suse.com/1217877" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45866" ref_url="https://www.suse.com/security/cve/CVE-2023-45866/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03277-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041780.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2023-45866: keystroke injection and arbitrary command execution via HID device connections (bsc#1217877).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-19"/>
	<updated date="2025-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217877">SUSE bug 1217877</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45866/">CVE-2023-45866 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45866">CVE-2023-45866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018721" comment="libbluetooth3-5.62-150400.4.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206382" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1247589" ref_url="https://bugzilla.suse.com/1247589" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-50422" ref_url="https://www.suse.com/security/cve/CVE-2025-50422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041787.html" source="SUSE-SU"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2025-50422: NULL pointer access in `active_edges_to_traps()` can lead to crash in Poppler (bsc#1247589).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-19"/>
	<updated date="2025-09-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1247589">SUSE bug 1247589</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-50422/">CVE-2025-50422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50422">CVE-2025-50422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018722" comment="libcairo-gobject2-1.16.0-150400.11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018723" comment="libcairo2-1.16.0-150400.11.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206383" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234896" ref_url="https://bugzilla.suse.com/1234896" source="BUGZILLA"/>
		<reference ref_id="1244824" ref_url="https://bugzilla.suse.com/1244824" source="BUGZILLA"/>
		<reference ref_id="1245970" ref_url="https://bugzilla.suse.com/1245970" source="BUGZILLA"/>
		<reference ref_id="1246473" ref_url="https://bugzilla.suse.com/1246473" source="BUGZILLA"/>
		<reference ref_id="1246911" ref_url="https://bugzilla.suse.com/1246911" source="BUGZILLA"/>
		<reference ref_id="1247143" ref_url="https://bugzilla.suse.com/1247143" source="BUGZILLA"/>
		<reference ref_id="1247374" ref_url="https://bugzilla.suse.com/1247374" source="BUGZILLA"/>
		<reference ref_id="1247518" ref_url="https://bugzilla.suse.com/1247518" source="BUGZILLA"/>
		<reference ref_id="1247976" ref_url="https://bugzilla.suse.com/1247976" source="BUGZILLA"/>
		<reference ref_id="1248223" ref_url="https://bugzilla.suse.com/1248223" source="BUGZILLA"/>
		<reference ref_id="1248297" ref_url="https://bugzilla.suse.com/1248297" source="BUGZILLA"/>
		<reference ref_id="1248306" ref_url="https://bugzilla.suse.com/1248306" source="BUGZILLA"/>
		<reference ref_id="1248312" ref_url="https://bugzilla.suse.com/1248312" source="BUGZILLA"/>
		<reference ref_id="1248338" ref_url="https://bugzilla.suse.com/1248338" source="BUGZILLA"/>
		<reference ref_id="1248511" ref_url="https://bugzilla.suse.com/1248511" source="BUGZILLA"/>
		<reference ref_id="1248614" ref_url="https://bugzilla.suse.com/1248614" source="BUGZILLA"/>
		<reference ref_id="1248621" ref_url="https://bugzilla.suse.com/1248621" source="BUGZILLA"/>
		<reference ref_id="1248748" ref_url="https://bugzilla.suse.com/1248748" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-50116" ref_url="https://www.suse.com/security/cve/CVE-2022-50116/" source="CVE"/>
		<reference ref_id="CVE-2024-53177" ref_url="https://www.suse.com/security/cve/CVE-2024-53177/" source="CVE"/>
		<reference ref_id="CVE-2024-58239" ref_url="https://www.suse.com/security/cve/CVE-2024-58239/" source="CVE"/>
		<reference ref_id="CVE-2025-38180" ref_url="https://www.suse.com/security/cve/CVE-2025-38180/" source="CVE"/>
		<reference ref_id="CVE-2025-38323" ref_url="https://www.suse.com/security/cve/CVE-2025-38323/" source="CVE"/>
		<reference ref_id="CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352/" source="CVE"/>
		<reference ref_id="CVE-2025-38460" ref_url="https://www.suse.com/security/cve/CVE-2025-38460/" source="CVE"/>
		<reference ref_id="CVE-2025-38498" ref_url="https://www.suse.com/security/cve/CVE-2025-38498/" source="CVE"/>
		<reference ref_id="CVE-2025-38499" ref_url="https://www.suse.com/security/cve/CVE-2025-38499/" source="CVE"/>
		<reference ref_id="CVE-2025-38546" ref_url="https://www.suse.com/security/cve/CVE-2025-38546/" source="CVE"/>
		<reference ref_id="CVE-2025-38555" ref_url="https://www.suse.com/security/cve/CVE-2025-38555/" source="CVE"/>
		<reference ref_id="CVE-2025-38560" ref_url="https://www.suse.com/security/cve/CVE-2025-38560/" source="CVE"/>
		<reference ref_id="CVE-2025-38563" ref_url="https://www.suse.com/security/cve/CVE-2025-38563/" source="CVE"/>
		<reference ref_id="CVE-2025-38608" ref_url="https://www.suse.com/security/cve/CVE-2025-38608/" source="CVE"/>
		<reference ref_id="CVE-2025-38617" ref_url="https://www.suse.com/security/cve/CVE-2025-38617/" source="CVE"/>
		<reference ref_id="CVE-2025-38618" ref_url="https://www.suse.com/security/cve/CVE-2025-38618/" source="CVE"/>
		<reference ref_id="CVE-2025-38644" ref_url="https://www.suse.com/security/cve/CVE-2025-38644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-50116: kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path (bsc#1244824).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248614).
- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248297).
- CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312).
- CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).

The following non-security bugs were fixed:

- NFSv4.1: fix backchannel max_resp_sz verification check (bsc#1247518).
- Disable N_GSM (jsc#PED-8240).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-23"/>
	<updated date="2025-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234896">SUSE bug 1234896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244824">SUSE bug 1244824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245970">SUSE bug 1245970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246473">SUSE bug 1246473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246911">SUSE bug 1246911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247143">SUSE bug 1247143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247518">SUSE bug 1247518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247976">SUSE bug 1247976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248223">SUSE bug 1248223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248297">SUSE bug 1248297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248306">SUSE bug 1248306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248312">SUSE bug 1248312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248338">SUSE bug 1248338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248511">SUSE bug 1248511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248614">SUSE bug 1248614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248621">SUSE bug 1248621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248748">SUSE bug 1248748</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50116/">CVE-2022-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50116">CVE-2022-50116 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53177/">CVE-2024-53177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53177">CVE-2024-53177 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58239/">CVE-2024-58239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58239">CVE-2024-58239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38180/">CVE-2025-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38323/">CVE-2025-38323 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38323">CVE-2025-38323 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38460/">CVE-2025-38460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38460">CVE-2025-38460 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38498/">CVE-2025-38498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38498">CVE-2025-38498 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H" cvss4="6.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38499/">CVE-2025-38499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38499">CVE-2025-38499 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38546/">CVE-2025-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38546">CVE-2025-38546 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38555/">CVE-2025-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38555">CVE-2025-38555 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cvss4="5/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38560/">CVE-2025-38560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38560">CVE-2025-38560 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38563/">CVE-2025-38563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38608/">CVE-2025-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38617/">CVE-2025-38617 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38618/">CVE-2025-38618 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38644/">CVE-2025-38644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38644">CVE-2025-38644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018996" comment="kernel-default-5.14.21-150400.24.176.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018986" comment="kernel-default-base-5.14.21-150400.24.176.1.150400.24.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206384" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1233421" ref_url="https://bugzilla.suse.com/1233421" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52615" ref_url="https://www.suse.com/security/cve/CVE-2024-52615/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03331-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041826.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2024-52615: wide-area DNS uses constant source port for queries and can expose the Avahi-daemon to DNS spoofing
  attacks (bsc#1233421).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-24"/>
	<updated date="2025-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233421">SUSE bug 1233421</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52615/">CVE-2024-52615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52615">CVE-2024-52615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019379" comment="avahi-0.8-150400.7.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019380" comment="libavahi-client3-0.8-150400.7.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019381" comment="libavahi-common3-0.8-150400.7.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019382" comment="libavahi-core7-0.8-150400.7.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206385" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1247582" ref_url="https://bugzilla.suse.com/1247582" source="BUGZILLA"/>
		<reference ref_id="1248117" ref_url="https://bugzilla.suse.com/1248117" source="BUGZILLA"/>
		<reference ref_id="1248330" ref_url="https://bugzilla.suse.com/1248330" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-8534" ref_url="https://www.suse.com/security/cve/CVE-2025-8534/" source="CVE"/>
		<reference ref_id="CVE-2025-8961" ref_url="https://www.suse.com/security/cve/CVE-2025-8961/" source="CVE"/>
		<reference ref_id="CVE-2025-9165" ref_url="https://www.suse.com/security/cve/CVE-2025-9165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041837.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2025-9165: local execution manipulation leading to memory leak (bsc#1248330).
- CVE-2025-8534: null pointer dereference in function PS_Lvl2page (bsc#1247582).
- CVE-2025-8961: segmentation fault via main function of tiffcrop utility (bsc#1248117).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-24"/>
	<updated date="2025-09-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1247582">SUSE bug 1247582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248117">SUSE bug 1248117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248330">SUSE bug 1248330</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8534/">CVE-2025-8534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8534">CVE-2025-8534 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8961/">CVE-2025-8961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8961">CVE-2025-8961 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9165/">CVE-2025-9165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9165">CVE-2025-9165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019378" comment="libtiff5-4.0.9-150000.45.55.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206386" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234896" ref_url="https://bugzilla.suse.com/1234896" source="BUGZILLA"/>
		<reference ref_id="1244824" ref_url="https://bugzilla.suse.com/1244824" source="BUGZILLA"/>
		<reference ref_id="1245970" ref_url="https://bugzilla.suse.com/1245970" source="BUGZILLA"/>
		<reference ref_id="1246473" ref_url="https://bugzilla.suse.com/1246473" source="BUGZILLA"/>
		<reference ref_id="1246911" ref_url="https://bugzilla.suse.com/1246911" source="BUGZILLA"/>
		<reference ref_id="1247143" ref_url="https://bugzilla.suse.com/1247143" source="BUGZILLA"/>
		<reference ref_id="1247374" ref_url="https://bugzilla.suse.com/1247374" source="BUGZILLA"/>
		<reference ref_id="1247518" ref_url="https://bugzilla.suse.com/1247518" source="BUGZILLA"/>
		<reference ref_id="1247976" ref_url="https://bugzilla.suse.com/1247976" source="BUGZILLA"/>
		<reference ref_id="1248223" ref_url="https://bugzilla.suse.com/1248223" source="BUGZILLA"/>
		<reference ref_id="1248297" ref_url="https://bugzilla.suse.com/1248297" source="BUGZILLA"/>
		<reference ref_id="1248306" ref_url="https://bugzilla.suse.com/1248306" source="BUGZILLA"/>
		<reference ref_id="1248312" ref_url="https://bugzilla.suse.com/1248312" source="BUGZILLA"/>
		<reference ref_id="1248338" ref_url="https://bugzilla.suse.com/1248338" source="BUGZILLA"/>
		<reference ref_id="1248511" ref_url="https://bugzilla.suse.com/1248511" source="BUGZILLA"/>
		<reference ref_id="1248614" ref_url="https://bugzilla.suse.com/1248614" source="BUGZILLA"/>
		<reference ref_id="1248621" ref_url="https://bugzilla.suse.com/1248621" source="BUGZILLA"/>
		<reference ref_id="1248748" ref_url="https://bugzilla.suse.com/1248748" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-50116" ref_url="https://www.suse.com/security/cve/CVE-2022-50116/" source="CVE"/>
		<reference ref_id="CVE-2024-53177" ref_url="https://www.suse.com/security/cve/CVE-2024-53177/" source="CVE"/>
		<reference ref_id="CVE-2024-58239" ref_url="https://www.suse.com/security/cve/CVE-2024-58239/" source="CVE"/>
		<reference ref_id="CVE-2025-38180" ref_url="https://www.suse.com/security/cve/CVE-2025-38180/" source="CVE"/>
		<reference ref_id="CVE-2025-38323" ref_url="https://www.suse.com/security/cve/CVE-2025-38323/" source="CVE"/>
		<reference ref_id="CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352/" source="CVE"/>
		<reference ref_id="CVE-2025-38460" ref_url="https://www.suse.com/security/cve/CVE-2025-38460/" source="CVE"/>
		<reference ref_id="CVE-2025-38498" ref_url="https://www.suse.com/security/cve/CVE-2025-38498/" source="CVE"/>
		<reference ref_id="CVE-2025-38499" ref_url="https://www.suse.com/security/cve/CVE-2025-38499/" source="CVE"/>
		<reference ref_id="CVE-2025-38546" ref_url="https://www.suse.com/security/cve/CVE-2025-38546/" source="CVE"/>
		<reference ref_id="CVE-2025-38555" ref_url="https://www.suse.com/security/cve/CVE-2025-38555/" source="CVE"/>
		<reference ref_id="CVE-2025-38560" ref_url="https://www.suse.com/security/cve/CVE-2025-38560/" source="CVE"/>
		<reference ref_id="CVE-2025-38563" ref_url="https://www.suse.com/security/cve/CVE-2025-38563/" source="CVE"/>
		<reference ref_id="CVE-2025-38608" ref_url="https://www.suse.com/security/cve/CVE-2025-38608/" source="CVE"/>
		<reference ref_id="CVE-2025-38617" ref_url="https://www.suse.com/security/cve/CVE-2025-38617/" source="CVE"/>
		<reference ref_id="CVE-2025-38618" ref_url="https://www.suse.com/security/cve/CVE-2025-38618/" source="CVE"/>
		<reference ref_id="CVE-2025-38644" ref_url="https://www.suse.com/security/cve/CVE-2025-38644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-50116: kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path (bsc#1244824).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248614).
- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248297).
- CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312).
- CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).

The following non-security bugs were fixed:

- NFSv4.1: fix backchannel max_resp_sz verification check (bsc#1247518).
- Disable N_GSM (bsc#1244824 jsc#PED-8240).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-26"/>
	<updated date="2025-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234896">SUSE bug 1234896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244824">SUSE bug 1244824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245970">SUSE bug 1245970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246473">SUSE bug 1246473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246911">SUSE bug 1246911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247143">SUSE bug 1247143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247518">SUSE bug 1247518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247976">SUSE bug 1247976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248223">SUSE bug 1248223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248297">SUSE bug 1248297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248306">SUSE bug 1248306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248312">SUSE bug 1248312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248338">SUSE bug 1248338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248511">SUSE bug 1248511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248614">SUSE bug 1248614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248621">SUSE bug 1248621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248748">SUSE bug 1248748</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50116/">CVE-2022-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50116">CVE-2022-50116 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53177/">CVE-2024-53177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53177">CVE-2024-53177 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58239/">CVE-2024-58239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58239">CVE-2024-58239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38180/">CVE-2025-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38323/">CVE-2025-38323 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38323">CVE-2025-38323 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38460/">CVE-2025-38460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38460">CVE-2025-38460 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38498/">CVE-2025-38498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38498">CVE-2025-38498 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H" cvss4="6.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38499/">CVE-2025-38499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38499">CVE-2025-38499 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38546/">CVE-2025-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38546">CVE-2025-38546 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38555/">CVE-2025-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38555">CVE-2025-38555 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cvss4="5/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38560/">CVE-2025-38560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38560">CVE-2025-38560 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38563/">CVE-2025-38563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38608/">CVE-2025-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38617/">CVE-2025-38617 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38618/">CVE-2025-38618 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38644/">CVE-2025-38644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38644">CVE-2025-38644 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019611" comment="kernel-rt-5.14.21-150400.15.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019612" comment="kernel-source-rt-5.14.21-150400.15.130.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206387" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1233760" ref_url="https://bugzilla.suse.com/1233760" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2025:0340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020268.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes the following issues:

- Bump rsync protocol version to 32 to show server is patched against recent vulnerabilities. 
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-03"/>
	<updated date="2025-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233760">SUSE bug 1233760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962911" comment="rsync-3.2.3-150400.3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206388" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236460" ref_url="https://bugzilla.suse.com/1236460" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-49043" ref_url="https://www.suse.com/security/cve/CVE-2022-49043/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020267.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2022-49043: Fixed a use-after-free in xmlXIncludeAddNode. (bsc#1236460)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-03"/>
	<updated date="2025-02-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1236460">SUSE bug 1236460</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49043/">CVE-2022-49043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49043">CVE-2022-49043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962912" comment="libxml2-2-2.9.14-150400.5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962913" comment="libxml2-tools-2.9.14-150400.5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962914" comment="python3-libxml2-2.9.14-150400.5.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206389" version="1" class="patch">
	<metadata>
		<title>Security update for nvidia-open-driver-G06-signed (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236658" ref_url="https://bugzilla.suse.com/1236658" source="BUGZILLA"/>
		<reference ref_id="1236746" ref_url="https://bugzilla.suse.com/1236746" source="BUGZILLA"/>
		<reference ref_id="1237208" ref_url="https://bugzilla.suse.com/1237208" source="BUGZILLA"/>
		<reference ref_id="1237308" ref_url="https://bugzilla.suse.com/1237308" source="BUGZILLA"/>
		<reference ref_id="1237585" ref_url="https://bugzilla.suse.com/1237585" source="BUGZILLA"/>
		<reference ref_id="1239139" ref_url="https://bugzilla.suse.com/1239139" source="BUGZILLA"/>
		<reference ref_id="1239653" ref_url="https://bugzilla.suse.com/1239653" source="BUGZILLA"/>
		<reference ref_id="1241231" ref_url="https://bugzilla.suse.com/1241231" source="BUGZILLA"/>
		<reference ref_id="1242054" ref_url="https://bugzilla.suse.com/1242054" source="BUGZILLA"/>
		<reference ref_id="1243192" ref_url="https://bugzilla.suse.com/1243192" source="BUGZILLA"/>
		<reference ref_id="1244614" ref_url="https://bugzilla.suse.com/1244614" source="BUGZILLA"/>
		<reference ref_id="1246010" ref_url="https://bugzilla.suse.com/1246010" source="BUGZILLA"/>
		<reference ref_id="1246327" ref_url="https://bugzilla.suse.com/1246327" source="BUGZILLA"/>
		<reference ref_id="1247528" ref_url="https://bugzilla.suse.com/1247528" source="BUGZILLA"/>
		<reference ref_id="1247529" ref_url="https://bugzilla.suse.com/1247529" source="BUGZILLA"/>
		<reference ref_id="1247530" ref_url="https://bugzilla.suse.com/1247530" source="BUGZILLA"/>
		<reference ref_id="1247531" ref_url="https://bugzilla.suse.com/1247531" source="BUGZILLA"/>
		<reference ref_id="1247532" ref_url="https://bugzilla.suse.com/1247532" source="BUGZILLA"/>
		<reference ref_id="1247907" ref_url="https://bugzilla.suse.com/1247907" source="BUGZILLA"/>
		<reference ref_id="1247923" ref_url="https://bugzilla.suse.com/1247923" source="BUGZILLA"/>
		<reference ref_id="1249235" ref_url="https://bugzilla.suse.com/1249235" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-23277" ref_url="https://www.suse.com/security/cve/CVE-2025-23277/" source="CVE"/>
		<reference ref_id="CVE-2025-23278" ref_url="https://www.suse.com/security/cve/CVE-2025-23278/" source="CVE"/>
		<reference ref_id="CVE-2025-23279" ref_url="https://www.suse.com/security/cve/CVE-2025-23279/" source="CVE"/>
		<reference ref_id="CVE-2025-23283" ref_url="https://www.suse.com/security/cve/CVE-2025-23283/" source="CVE"/>
		<reference ref_id="CVE-2025-23286" ref_url="https://www.suse.com/security/cve/CVE-2025-23286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041970.html" source="SUSE-SU"/>
		<description>
This update for nvidia-open-driver-G06-signed fixes the following issues:

Updated CUDA variant to 580.82.07:
    
- CVE-2025-23277: Fixed access memory outside bounds permitted under normal 
  use cases in NVIDIA Display Driver (bsc#1247528).
- CVE-2025-23278: Fixed improper index validation by issuing a call with 
  crafted parameters in NVIDIA Display Driver (bsc#1247529).
- CVE-2025-23286: Fixed invalid memory read in NVIDIA GPU Display Driver (bsc#1247530).
- CVE-2025-23283: Fixed stack buffer overflow triggerable by a malicious guest
  in Virtual GPU Manager in NVIDIA vGPU software (bsc#1247531).
- CVE-2025-23279: Fixed race condition that lead to privileges escalations 
  in NVIDIA .run Installer (bsc#1247532).

Update non-CUDA variant to 580.82.07 (bsc#1249235).

Other fixes:

- Added Requires to be provided by special versions of nvidia-modprobe and
  nvidia-persitenced built against SP4 (bsc#1237208, jsc#PED-13295).
- Get rid of rule of older KMPs not to load nvidia_drm module, which
  are still installed in parallel and therefore still active (bsc#1247923).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-29"/>
	<updated date="2025-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1236658">SUSE bug 1236658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236746">SUSE bug 1236746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237208">SUSE bug 1237208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237308">SUSE bug 1237308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237585">SUSE bug 1237585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239139">SUSE bug 1239139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239653">SUSE bug 1239653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241231">SUSE bug 1241231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242054">SUSE bug 1242054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243192">SUSE bug 1243192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244614">SUSE bug 1244614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246010">SUSE bug 1246010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246327">SUSE bug 1246327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247528">SUSE bug 1247528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247529">SUSE bug 1247529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247530">SUSE bug 1247530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247531">SUSE bug 1247531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247532">SUSE bug 1247532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247907">SUSE bug 1247907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247923">SUSE bug 1247923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249235">SUSE bug 1249235</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23277/">CVE-2025-23277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23277">CVE-2025-23277 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23278/">CVE-2025-23278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23278">CVE-2025-23278 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23279/">CVE-2025-23279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23279">CVE-2025-23279 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-23283/">CVE-2025-23283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23283">CVE-2025-23283 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-23286/">CVE-2025-23286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23286">CVE-2025-23286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019843" comment="nv-prefer-signed-open-driver-580.82.07-150400.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019848" comment="nvidia-open-driver-G06-signed-cuda-kmp-default-580.82.07_k5.14.21_150400.24.173-150400.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019851" comment="nvidia-open-driver-G06-signed-kmp-default-580.82.07_k5.14.21_150400.24.173-150400.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206390" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236619" ref_url="https://bugzilla.suse.com/1236619" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-24528" ref_url="https://www.suse.com/security/cve/CVE-2025-24528/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020265.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2025-24528: Fixed out-of-bounds write caused by overflow when calculating ulog block size can lead to process crash (bsc#1236619).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-03"/>
	<updated date="2025-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1236619">SUSE bug 1236619</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24528/">CVE-2025-24528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962917" comment="krb5-1.19.2-150400.3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206391" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1250373" ref_url="https://bugzilla.suse.com/1250373" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-41244" ref_url="https://www.suse.com/security/cve/CVE-2025-41244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041980.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

- CVE-2025-41244: local privilege escalation via the Service Discovery Plugin (bsc#1250373).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-30"/>
	<updated date="2025-09-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250373">SUSE bug 1250373</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-41244/">CVE-2025-41244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41244">CVE-2025-41244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019920" comment="libvmtools0-13.0.0-150300.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019921" comment="open-vm-tools-13.0.0-150300.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206392" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1250232" ref_url="https://bugzilla.suse.com/1250232" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041984.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2025-9230: incorrect check of key size can lead to out-of-bounds read and write in RFC 3211 KEK unwrap
  (bsc#1250232).
  		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-30"/>
	<updated date="2025-09-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250232">SUSE bug 1250232</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020017" comment="libopenssl-1_1-devel-1.1.1l-150400.7.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020018" comment="libopenssl1_1-1.1.1l-150400.7.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020019" comment="libopenssl1_1-hmac-1.1.1l-150400.7.84.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020020" comment="openssl-1_1-1.1.1l-150400.7.84.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206393" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1250232" ref_url="https://bugzilla.suse.com/1250232" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041976.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2025-9230: incorrect check of key size can lead to out-of-bounds read and write in RFC 3211 KEK unwrap
  (bsc#1250232).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-09-30"/>
	<updated date="2025-09-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250232">SUSE bug 1250232</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020021" comment="libopenssl3-3.0.8-150400.4.75.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206394" version="1" class="patch">
	<metadata>
		<title>Security update for orc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1228184" ref_url="https://bugzilla.suse.com/1228184" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-40897" ref_url="https://www.suse.com/security/cve/CVE-2024-40897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020264.html" source="SUSE-SU"/>
		<description>
This update for orc fixes the following issues:

- CVE-2024-40897: Fixed stack-based buffer overflow in the Orc compiler when
  formatting error messages for certain input files (bsc#1228184)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-03"/>
	<updated date="2025-02-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228184">SUSE bug 1228184</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40897/">CVE-2024-40897 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40897">CVE-2024-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962910" comment="liborc-0_4-0-0.4.28-150000.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206395" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236136" ref_url="https://bugzilla.suse.com/1236136" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-13176" ref_url="https://www.suse.com/security/cve/CVE-2024-13176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020286.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2024-13176: Fixed timing side-channel in the ECDSA signature computation (bsc#1236136) 
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-04"/>
	<updated date="2025-02-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1236136">SUSE bug 1236136</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-13176/">CVE-2024-13176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176">CVE-2024-13176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962918" comment="libopenssl-1_1-devel-1.1.1l-150400.7.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962919" comment="libopenssl1_1-1.1.1l-150400.7.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962920" comment="libopenssl1_1-hmac-1.1.1l-150400.7.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962921" comment="openssl-1_1-1.1.1l-150400.7.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206396" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1249154" ref_url="https://bugzilla.suse.com/1249154" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-9566" ref_url="https://www.suse.com/security/cve/CVE-2025-9566/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042085.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2025-9566: fixed an issue in kube play command that could cause overwriting host files (bsc#1249154)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-13"/>
	<updated date="2025-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249154">SUSE bug 1249154</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9566/">CVE-2025-9566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9566">CVE-2025-9566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020815" comment="podman-4.9.5-150400.4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020816" comment="podman-remote-4.9.5-150400.4.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206397" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1250983" ref_url="https://bugzilla.suse.com/1250983" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11230" ref_url="https://www.suse.com/security/cve/CVE-2025-11230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03589-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042081.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2025-11230: Fixed issue in the mjson JSON decoder, that could have let to excessive
  resource consumption when processing numbers with large exponents (bsc#1250983).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-13"/>
	<updated date="2025-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1250983">SUSE bug 1250983</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11230/">CVE-2025-11230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11230">CVE-2025-11230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020817" comment="haproxy-2.4.22+git0.f8e3218e2-150400.3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206398" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1251279" ref_url="https://bugzilla.suse.com/1251279" source="BUGZILLA"/>
		<reference ref_id="1251280" ref_url="https://bugzilla.suse.com/1251280" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10230" ref_url="https://www.suse.com/security/cve/CVE-2025-10230/" source="CVE"/>
		<reference ref_id="CVE-2025-9640" ref_url="https://www.suse.com/security/cve/CVE-2025-9640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03618-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042178.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2025-9640: Fixed uninitialized memory disclosure via vfs_streams_xattr (bsc#1251279).
- CVE-2025-10230: Fixed command Injection in WINS server hook script (bsc#1251280).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-16"/>
	<updated date="2025-10-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1251279">SUSE bug 1251279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251280">SUSE bug 1251280</bugzilla>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-10230/">CVE-2025-10230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10230">CVE-2025-10230 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-9640/">CVE-2025-9640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9640">CVE-2025-9640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022495" comment="samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022496" comment="samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206399" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1249584" ref_url="https://bugzilla.suse.com/1249584" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042190.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2025-59375: memory amplification vulnerability allows attackers to trigger excessive dynamic memory allocations
  by submitting crafted XML input (bsc#1249584).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-16"/>
	<updated date="2025-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249584">SUSE bug 1249584</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022497" comment="libexpat1-2.7.1-150400.3.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206400" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1164051" ref_url="https://bugzilla.suse.com/1164051" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1202700" ref_url="https://bugzilla.suse.com/1202700" source="BUGZILLA"/>
		<reference ref_id="1203063" ref_url="https://bugzilla.suse.com/1203063" source="BUGZILLA"/>
		<reference ref_id="1203332" ref_url="https://bugzilla.suse.com/1203332" source="BUGZILLA"/>
		<reference ref_id="1204228" ref_url="https://bugzilla.suse.com/1204228" source="BUGZILLA"/>
		<reference ref_id="1205128" ref_url="https://bugzilla.suse.com/1205128" source="BUGZILLA"/>
		<reference ref_id="1206456" ref_url="https://bugzilla.suse.com/1206456" source="BUGZILLA"/>
		<reference ref_id="1206468" ref_url="https://bugzilla.suse.com/1206468" source="BUGZILLA"/>
		<reference ref_id="1206883" ref_url="https://bugzilla.suse.com/1206883" source="BUGZILLA"/>
		<reference ref_id="1206884" ref_url="https://bugzilla.suse.com/1206884" source="BUGZILLA"/>
		<reference ref_id="1207158" ref_url="https://bugzilla.suse.com/1207158" source="BUGZILLA"/>
		<reference ref_id="1207621" ref_url="https://bugzilla.suse.com/1207621" source="BUGZILLA"/>
		<reference ref_id="1207624" ref_url="https://bugzilla.suse.com/1207624" source="BUGZILLA"/>
		<reference ref_id="1207625" ref_url="https://bugzilla.suse.com/1207625" source="BUGZILLA"/>
		<reference ref_id="1207628" ref_url="https://bugzilla.suse.com/1207628" source="BUGZILLA"/>
		<reference ref_id="1207629" ref_url="https://bugzilla.suse.com/1207629" source="BUGZILLA"/>
		<reference ref_id="1207631" ref_url="https://bugzilla.suse.com/1207631" source="BUGZILLA"/>
		<reference ref_id="1207645" ref_url="https://bugzilla.suse.com/1207645" source="BUGZILLA"/>
		<reference ref_id="1207651" ref_url="https://bugzilla.suse.com/1207651" source="BUGZILLA"/>
		<reference ref_id="1208607" ref_url="https://bugzilla.suse.com/1208607" source="BUGZILLA"/>
		<reference ref_id="1209287" ref_url="https://bugzilla.suse.com/1209287" source="BUGZILLA"/>
		<reference ref_id="1209291" ref_url="https://bugzilla.suse.com/1209291" source="BUGZILLA"/>
		<reference ref_id="1210584" ref_url="https://bugzilla.suse.com/1210584" source="BUGZILLA"/>
		<reference ref_id="1211960" ref_url="https://bugzilla.suse.com/1211960" source="BUGZILLA"/>
		<reference ref_id="1212603" ref_url="https://bugzilla.suse.com/1212603" source="BUGZILLA"/>
		<reference ref_id="1213015" ref_url="https://bugzilla.suse.com/1213015" source="BUGZILLA"/>
		<reference ref_id="1213016" ref_url="https://bugzilla.suse.com/1213016" source="BUGZILLA"/>
		<reference ref_id="1213040" ref_url="https://bugzilla.suse.com/1213040" source="BUGZILLA"/>
		<reference ref_id="1213041" ref_url="https://bugzilla.suse.com/1213041" source="BUGZILLA"/>
		<reference ref_id="1213061" ref_url="https://bugzilla.suse.com/1213061" source="BUGZILLA"/>
		<reference ref_id="1213099" ref_url="https://bugzilla.suse.com/1213099" source="BUGZILLA"/>
		<reference ref_id="1213104" ref_url="https://bugzilla.suse.com/1213104" source="BUGZILLA"/>
		<reference ref_id="1213666" ref_url="https://bugzilla.suse.com/1213666" source="BUGZILLA"/>
		<reference ref_id="1213747" ref_url="https://bugzilla.suse.com/1213747" source="BUGZILLA"/>
		<reference ref_id="1214953" ref_url="https://bugzilla.suse.com/1214953" source="BUGZILLA"/>
		<reference ref_id="1214967" ref_url="https://bugzilla.suse.com/1214967" source="BUGZILLA"/>
		<reference ref_id="1215150" ref_url="https://bugzilla.suse.com/1215150" source="BUGZILLA"/>
		<reference ref_id="1215696" ref_url="https://bugzilla.suse.com/1215696" source="BUGZILLA"/>
		<reference ref_id="1215911" ref_url="https://bugzilla.suse.com/1215911" source="BUGZILLA"/>
		<reference ref_id="1216976" ref_url="https://bugzilla.suse.com/1216976" source="BUGZILLA"/>
		<reference ref_id="1217790" ref_url="https://bugzilla.suse.com/1217790" source="BUGZILLA"/>
		<reference ref_id="1220185" ref_url="https://bugzilla.suse.com/1220185" source="BUGZILLA"/>
		<reference ref_id="1220186" ref_url="https://bugzilla.suse.com/1220186" source="BUGZILLA"/>
		<reference ref_id="1236104" ref_url="https://bugzilla.suse.com/1236104" source="BUGZILLA"/>
		<reference ref_id="1238160" ref_url="https://bugzilla.suse.com/1238160" source="BUGZILLA"/>
		<reference ref_id="1241353" ref_url="https://bugzilla.suse.com/1241353" source="BUGZILLA"/>
		<reference ref_id="1242573" ref_url="https://bugzilla.suse.com/1242573" source="BUGZILLA"/>
		<reference ref_id="1242846" ref_url="https://bugzilla.suse.com/1242846" source="BUGZILLA"/>
		<reference ref_id="1242960" ref_url="https://bugzilla.suse.com/1242960" source="BUGZILLA"/>
		<reference ref_id="1243539" ref_url="https://bugzilla.suse.com/1243539" source="BUGZILLA"/>
		<reference ref_id="1244337" ref_url="https://bugzilla.suse.com/1244337" source="BUGZILLA"/>
		<reference ref_id="1244732" ref_url="https://bugzilla.suse.com/1244732" source="BUGZILLA"/>
		<reference ref_id="1245110" ref_url="https://bugzilla.suse.com/1245110" source="BUGZILLA"/>
		<reference ref_id="1245498" ref_url="https://bugzilla.suse.com/1245498" source="BUGZILLA"/>
		<reference ref_id="1245499" ref_url="https://bugzilla.suse.com/1245499" source="BUGZILLA"/>
		<reference ref_id="1245666" ref_url="https://bugzilla.suse.com/1245666" source="BUGZILLA"/>
		<reference ref_id="1245956" ref_url="https://bugzilla.suse.com/1245956" source="BUGZILLA"/>
		<reference ref_id="1246879" ref_url="https://bugzilla.suse.com/1246879" source="BUGZILLA"/>
		<reference ref_id="1246968" ref_url="https://bugzilla.suse.com/1246968" source="BUGZILLA"/>
		<reference ref_id="1247028" ref_url="https://bugzilla.suse.com/1247028" source="BUGZILLA"/>
		<reference ref_id="1247172" ref_url="https://bugzilla.suse.com/1247172" source="BUGZILLA"/>
		<reference ref_id="1247239" ref_url="https://bugzilla.suse.com/1247239" source="BUGZILLA"/>
		<reference ref_id="1247288" ref_url="https://bugzilla.suse.com/1247288" source="BUGZILLA"/>
		<reference ref_id="1247317" ref_url="https://bugzilla.suse.com/1247317" source="BUGZILLA"/>
		<reference ref_id="1248108" ref_url="https://bugzilla.suse.com/1248108" source="BUGZILLA"/>
		<reference ref_id="1248255" ref_url="https://bugzilla.suse.com/1248255" source="BUGZILLA"/>
		<reference ref_id="1248399" ref_url="https://bugzilla.suse.com/1248399" source="BUGZILLA"/>
		<reference ref_id="1248628" ref_url="https://bugzilla.suse.com/1248628" source="BUGZILLA"/>
		<reference ref_id="1248639" ref_url="https://bugzilla.suse.com/1248639" source="BUGZILLA"/>
		<reference ref_id="1248847" ref_url="https://bugzilla.suse.com/1248847" source="BUGZILLA"/>
		<reference ref_id="1249126" ref_url="https://bugzilla.suse.com/1249126" source="BUGZILLA"/>
		<reference ref_id="1249158" ref_url="https://bugzilla.suse.com/1249158" source="BUGZILLA"/>
		<reference ref_id="1249186" ref_url="https://bugzilla.suse.com/1249186" source="BUGZILLA"/>
		<reference ref_id="1249195" ref_url="https://bugzilla.suse.com/1249195" source="BUGZILLA"/>
		<reference ref_id="1249200" ref_url="https://bugzilla.suse.com/1249200" source="BUGZILLA"/>
		<reference ref_id="1249220" ref_url="https://bugzilla.suse.com/1249220" source="BUGZILLA"/>
		<reference ref_id="1249266" ref_url="https://bugzilla.suse.com/1249266" source="BUGZILLA"/>
		<reference ref_id="1249315" ref_url="https://bugzilla.suse.com/1249315" source="BUGZILLA"/>
		<reference ref_id="1249324" ref_url="https://bugzilla.suse.com/1249324" source="BUGZILLA"/>
		<reference ref_id="1249346" ref_url="https://bugzilla.suse.com/1249346" source="BUGZILLA"/>
		<reference ref_id="1249374" ref_url="https://bugzilla.suse.com/1249374" source="BUGZILLA"/>
		<reference ref_id="1249516" ref_url="https://bugzilla.suse.com/1249516" source="BUGZILLA"/>
		<reference ref_id="1249538" ref_url="https://bugzilla.suse.com/1249538" source="BUGZILLA"/>
		<reference ref_id="1249548" ref_url="https://bugzilla.suse.com/1249548" source="BUGZILLA"/>
		<reference ref_id="1249604" ref_url="https://bugzilla.suse.com/1249604" source="BUGZILLA"/>
		<reference ref_id="1249608" ref_url="https://bugzilla.suse.com/1249608" source="BUGZILLA"/>
		<reference ref_id="1249638" ref_url="https://bugzilla.suse.com/1249638" source="BUGZILLA"/>
		<reference ref_id="1249639" ref_url="https://bugzilla.suse.com/1249639" source="BUGZILLA"/>
		<reference ref_id="1249641" ref_url="https://bugzilla.suse.com/1249641" source="BUGZILLA"/>
		<reference ref_id="1249642" ref_url="https://bugzilla.suse.com/1249642" source="BUGZILLA"/>
		<reference ref_id="1249650" ref_url="https://bugzilla.suse.com/1249650" source="BUGZILLA"/>
		<reference ref_id="1249651" ref_url="https://bugzilla.suse.com/1249651" source="BUGZILLA"/>
		<reference ref_id="1249658" ref_url="https://bugzilla.suse.com/1249658" source="BUGZILLA"/>
		<reference ref_id="1249661" ref_url="https://bugzilla.suse.com/1249661" source="BUGZILLA"/>
		<reference ref_id="1249664" ref_url="https://bugzilla.suse.com/1249664" source="BUGZILLA"/>
		<reference ref_id="1249667" ref_url="https://bugzilla.suse.com/1249667" source="BUGZILLA"/>
		<reference ref_id="1249669" ref_url="https://bugzilla.suse.com/1249669" source="BUGZILLA"/>
		<reference ref_id="1249677" ref_url="https://bugzilla.suse.com/1249677" source="BUGZILLA"/>
		<reference ref_id="1249681" ref_url="https://bugzilla.suse.com/1249681" source="BUGZILLA"/>
		<reference ref_id="1249683" ref_url="https://bugzilla.suse.com/1249683" source="BUGZILLA"/>
		<reference ref_id="1249685" ref_url="https://bugzilla.suse.com/1249685" source="BUGZILLA"/>
		<reference ref_id="1249687" ref_url="https://bugzilla.suse.com/1249687" source="BUGZILLA"/>
		<reference ref_id="1249691" ref_url="https://bugzilla.suse.com/1249691" source="BUGZILLA"/>
		<reference ref_id="1249695" ref_url="https://bugzilla.suse.com/1249695" source="BUGZILLA"/>
		<reference ref_id="1249699" ref_url="https://bugzilla.suse.com/1249699" source="BUGZILLA"/>
		<reference ref_id="1249700" ref_url="https://bugzilla.suse.com/1249700" source="BUGZILLA"/>
		<reference ref_id="1249701" ref_url="https://bugzilla.suse.com/1249701" source="BUGZILLA"/>
		<reference ref_id="1249705" ref_url="https://bugzilla.suse.com/1249705" source="BUGZILLA"/>
		<reference ref_id="1249706" ref_url="https://bugzilla.suse.com/1249706" source="BUGZILLA"/>
		<reference ref_id="1249707" ref_url="https://bugzilla.suse.com/1249707" source="BUGZILLA"/>
		<reference ref_id="1249709" ref_url="https://bugzilla.suse.com/1249709" source="BUGZILLA"/>
		<reference ref_id="1249712" ref_url="https://bugzilla.suse.com/1249712" source="BUGZILLA"/>
		<reference ref_id="1249713" ref_url="https://bugzilla.suse.com/1249713" source="BUGZILLA"/>
		<reference ref_id="1249715" ref_url="https://bugzilla.suse.com/1249715" source="BUGZILLA"/>
		<reference ref_id="1249716" ref_url="https://bugzilla.suse.com/1249716" source="BUGZILLA"/>
		<reference ref_id="1249718" ref_url="https://bugzilla.suse.com/1249718" source="BUGZILLA"/>
		<reference ref_id="1249722" ref_url="https://bugzilla.suse.com/1249722" source="BUGZILLA"/>
		<reference ref_id="1249727" ref_url="https://bugzilla.suse.com/1249727" source="BUGZILLA"/>
		<reference ref_id="1249730" ref_url="https://bugzilla.suse.com/1249730" source="BUGZILLA"/>
		<reference ref_id="1249733" ref_url="https://bugzilla.suse.com/1249733" source="BUGZILLA"/>
		<reference ref_id="1249734" ref_url="https://bugzilla.suse.com/1249734" source="BUGZILLA"/>
		<reference ref_id="1249739" ref_url="https://bugzilla.suse.com/1249739" source="BUGZILLA"/>
		<reference ref_id="1249740" ref_url="https://bugzilla.suse.com/1249740" source="BUGZILLA"/>
		<reference ref_id="1249741" ref_url="https://bugzilla.suse.com/1249741" source="BUGZILLA"/>
		<reference ref_id="1249742" ref_url="https://bugzilla.suse.com/1249742" source="BUGZILLA"/>
		<reference ref_id="1249743" ref_url="https://bugzilla.suse.com/1249743" source="BUGZILLA"/>
		<reference ref_id="1249745" ref_url="https://bugzilla.suse.com/1249745" source="BUGZILLA"/>
		<reference ref_id="1249746" ref_url="https://bugzilla.suse.com/1249746" source="BUGZILLA"/>
		<reference ref_id="1249747" ref_url="https://bugzilla.suse.com/1249747" source="BUGZILLA"/>
		<reference ref_id="1249749" ref_url="https://bugzilla.suse.com/1249749" source="BUGZILLA"/>
		<reference ref_id="1249750" ref_url="https://bugzilla.suse.com/1249750" source="BUGZILLA"/>
		<reference ref_id="1249751" ref_url="https://bugzilla.suse.com/1249751" source="BUGZILLA"/>
		<reference ref_id="1249753" ref_url="https://bugzilla.suse.com/1249753" source="BUGZILLA"/>
		<reference ref_id="1249758" ref_url="https://bugzilla.suse.com/1249758" source="BUGZILLA"/>
		<reference ref_id="1249762" ref_url="https://bugzilla.suse.com/1249762" source="BUGZILLA"/>
		<reference ref_id="1249767" ref_url="https://bugzilla.suse.com/1249767" source="BUGZILLA"/>
		<reference ref_id="1249777" ref_url="https://bugzilla.suse.com/1249777" source="BUGZILLA"/>
		<reference ref_id="1249781" ref_url="https://bugzilla.suse.com/1249781" source="BUGZILLA"/>
		<reference ref_id="1249784" ref_url="https://bugzilla.suse.com/1249784" source="BUGZILLA"/>
		<reference ref_id="1249791" ref_url="https://bugzilla.suse.com/1249791" source="BUGZILLA"/>
		<reference ref_id="1249799" ref_url="https://bugzilla.suse.com/1249799" source="BUGZILLA"/>
		<reference ref_id="1249808" ref_url="https://bugzilla.suse.com/1249808" source="BUGZILLA"/>
		<reference ref_id="1249810" ref_url="https://bugzilla.suse.com/1249810" source="BUGZILLA"/>
		<reference ref_id="1249820" ref_url="https://bugzilla.suse.com/1249820" source="BUGZILLA"/>
		<reference ref_id="1249825" ref_url="https://bugzilla.suse.com/1249825" source="BUGZILLA"/>
		<reference ref_id="1249827" ref_url="https://bugzilla.suse.com/1249827" source="BUGZILLA"/>
		<reference ref_id="1249836" ref_url="https://bugzilla.suse.com/1249836" source="BUGZILLA"/>
		<reference ref_id="1249840" ref_url="https://bugzilla.suse.com/1249840" source="BUGZILLA"/>
		<reference ref_id="1249844" ref_url="https://bugzilla.suse.com/1249844" source="BUGZILLA"/>
		<reference ref_id="1249846" ref_url="https://bugzilla.suse.com/1249846" source="BUGZILLA"/>
		<reference ref_id="1249853" ref_url="https://bugzilla.suse.com/1249853" source="BUGZILLA"/>
		<reference ref_id="1249858" ref_url="https://bugzilla.suse.com/1249858" source="BUGZILLA"/>
		<reference ref_id="1249860" ref_url="https://bugzilla.suse.com/1249860" source="BUGZILLA"/>
		<reference ref_id="1249864" ref_url="https://bugzilla.suse.com/1249864" source="BUGZILLA"/>
		<reference ref_id="1249865" ref_url="https://bugzilla.suse.com/1249865" source="BUGZILLA"/>
		<reference ref_id="1249866" ref_url="https://bugzilla.suse.com/1249866" source="BUGZILLA"/>
		<reference ref_id="1249867" ref_url="https://bugzilla.suse.com/1249867" source="BUGZILLA"/>
		<reference ref_id="1249868" ref_url="https://bugzilla.suse.com/1249868" source="BUGZILLA"/>
		<reference ref_id="1249872" ref_url="https://bugzilla.suse.com/1249872" source="BUGZILLA"/>
		<reference ref_id="1249877" ref_url="https://bugzilla.suse.com/1249877" source="BUGZILLA"/>
		<reference ref_id="1249880" ref_url="https://bugzilla.suse.com/1249880" source="BUGZILLA"/>
		<reference ref_id="1249882" ref_url="https://bugzilla.suse.com/1249882" source="BUGZILLA"/>
		<reference ref_id="1249885" ref_url="https://bugzilla.suse.com/1249885" source="BUGZILLA"/>
		<reference ref_id="1249890" ref_url="https://bugzilla.suse.com/1249890" source="BUGZILLA"/>
		<reference ref_id="1249892" ref_url="https://bugzilla.suse.com/1249892" source="BUGZILLA"/>
		<reference ref_id="1249908" ref_url="https://bugzilla.suse.com/1249908" source="BUGZILLA"/>
		<reference ref_id="1249910" ref_url="https://bugzilla.suse.com/1249910" source="BUGZILLA"/>
		<reference ref_id="1249911" ref_url="https://bugzilla.suse.com/1249911" source="BUGZILLA"/>
		<reference ref_id="1249914" ref_url="https://bugzilla.suse.com/1249914" source="BUGZILLA"/>
		<reference ref_id="1249917" ref_url="https://bugzilla.suse.com/1249917" source="BUGZILLA"/>
		<reference ref_id="1249918" ref_url="https://bugzilla.suse.com/1249918" source="BUGZILLA"/>
		<reference ref_id="1249920" ref_url="https://bugzilla.suse.com/1249920" source="BUGZILLA"/>
		<reference ref_id="1249923" ref_url="https://bugzilla.suse.com/1249923" source="BUGZILLA"/>
		<reference ref_id="1249924" ref_url="https://bugzilla.suse.com/1249924" source="BUGZILLA"/>
		<reference ref_id="1249925" ref_url="https://bugzilla.suse.com/1249925" source="BUGZILLA"/>
		<reference ref_id="1249927" ref_url="https://bugzilla.suse.com/1249927" source="BUGZILLA"/>
		<reference ref_id="1249928" ref_url="https://bugzilla.suse.com/1249928" source="BUGZILLA"/>
		<reference ref_id="1249930" ref_url="https://bugzilla.suse.com/1249930" source="BUGZILLA"/>
		<reference ref_id="1249933" ref_url="https://bugzilla.suse.com/1249933" source="BUGZILLA"/>
		<reference ref_id="1249934" ref_url="https://bugzilla.suse.com/1249934" source="BUGZILLA"/>
		<reference ref_id="1249936" ref_url="https://bugzilla.suse.com/1249936" source="BUGZILLA"/>
		<reference ref_id="1249938" ref_url="https://bugzilla.suse.com/1249938" source="BUGZILLA"/>
		<reference ref_id="1249939" ref_url="https://bugzilla.suse.com/1249939" source="BUGZILLA"/>
		<reference ref_id="1249944" ref_url="https://bugzilla.suse.com/1249944" source="BUGZILLA"/>
		<reference ref_id="1249947" ref_url="https://bugzilla.suse.com/1249947" source="BUGZILLA"/>
		<reference ref_id="1249949" ref_url="https://bugzilla.suse.com/1249949" source="BUGZILLA"/>
		<reference ref_id="1249950" ref_url="https://bugzilla.suse.com/1249950" source="BUGZILLA"/>
		<reference ref_id="1249954" ref_url="https://bugzilla.suse.com/1249954" source="BUGZILLA"/>
		<reference ref_id="1249958" ref_url="https://bugzilla.suse.com/1249958" source="BUGZILLA"/>
		<reference ref_id="1249979" ref_url="https://bugzilla.suse.com/1249979" source="BUGZILLA"/>
		<reference ref_id="1249981" ref_url="https://bugzilla.suse.com/1249981" source="BUGZILLA"/>
		<reference ref_id="1249991" ref_url="https://bugzilla.suse.com/1249991" source="BUGZILLA"/>
		<reference ref_id="1249997" ref_url="https://bugzilla.suse.com/1249997" source="BUGZILLA"/>
		<reference ref_id="1250002" ref_url="https://bugzilla.suse.com/1250002" source="BUGZILLA"/>
		<reference ref_id="1250006" ref_url="https://bugzilla.suse.com/1250006" source="BUGZILLA"/>
		<reference ref_id="1250007" ref_url="https://bugzilla.suse.com/1250007" source="BUGZILLA"/>
		<reference ref_id="1250009" ref_url="https://bugzilla.suse.com/1250009" source="BUGZILLA"/>
		<reference ref_id="1250010" ref_url="https://bugzilla.suse.com/1250010" source="BUGZILLA"/>
		<reference ref_id="1250011" ref_url="https://bugzilla.suse.com/1250011" source="BUGZILLA"/>
		<reference ref_id="1250014" ref_url="https://bugzilla.suse.com/1250014" source="BUGZILLA"/>
		<reference ref_id="1250015" ref_url="https://bugzilla.suse.com/1250015" source="BUGZILLA"/>
		<reference ref_id="1250023" ref_url="https://bugzilla.suse.com/1250023" source="BUGZILLA"/>
		<reference ref_id="1250024" ref_url="https://bugzilla.suse.com/1250024" source="BUGZILLA"/>
		<reference ref_id="1250026" ref_url="https://bugzilla.suse.com/1250026" source="BUGZILLA"/>
		<reference ref_id="1250039" ref_url="https://bugzilla.suse.com/1250039" source="BUGZILLA"/>
		<reference ref_id="1250041" ref_url="https://bugzilla.suse.com/1250041" source="BUGZILLA"/>
		<reference ref_id="1250043" ref_url="https://bugzilla.suse.com/1250043" source="BUGZILLA"/>
		<reference ref_id="1250044" ref_url="https://bugzilla.suse.com/1250044" source="BUGZILLA"/>
		<reference ref_id="1250047" ref_url="https://bugzilla.suse.com/1250047" source="BUGZILLA"/>
		<reference ref_id="1250049" ref_url="https://bugzilla.suse.com/1250049" source="BUGZILLA"/>
		<reference ref_id="1250052" ref_url="https://bugzilla.suse.com/1250052" source="BUGZILLA"/>
		<reference ref_id="1250055" ref_url="https://bugzilla.suse.com/1250055" source="BUGZILLA"/>
		<reference ref_id="1250058" ref_url="https://bugzilla.suse.com/1250058" source="BUGZILLA"/>
		<reference ref_id="1250060" ref_url="https://bugzilla.suse.com/1250060" source="BUGZILLA"/>
		<reference ref_id="1250062" ref_url="https://bugzilla.suse.com/1250062" source="BUGZILLA"/>
		<reference ref_id="1250065" ref_url="https://bugzilla.suse.com/1250065" source="BUGZILLA"/>
		<reference ref_id="1250066" ref_url="https://bugzilla.suse.com/1250066" source="BUGZILLA"/>
		<reference ref_id="1250070" ref_url="https://bugzilla.suse.com/1250070" source="BUGZILLA"/>
		<reference ref_id="1250071" ref_url="https://bugzilla.suse.com/1250071" source="BUGZILLA"/>
		<reference ref_id="1250072" ref_url="https://bugzilla.suse.com/1250072" source="BUGZILLA"/>
		<reference ref_id="1250077" ref_url="https://bugzilla.suse.com/1250077" source="BUGZILLA"/>
		<reference ref_id="1250080" ref_url="https://bugzilla.suse.com/1250080" source="BUGZILLA"/>
		<reference ref_id="1250081" ref_url="https://bugzilla.suse.com/1250081" source="BUGZILLA"/>
		<reference ref_id="1250083" ref_url="https://bugzilla.suse.com/1250083" source="BUGZILLA"/>
		<reference ref_id="1250105" ref_url="https://bugzilla.suse.com/1250105" source="BUGZILLA"/>
		<reference ref_id="1250106" ref_url="https://bugzilla.suse.com/1250106" source="BUGZILLA"/>
		<reference ref_id="1250107" ref_url="https://bugzilla.suse.com/1250107" source="BUGZILLA"/>
		<reference ref_id="1250108" ref_url="https://bugzilla.suse.com/1250108" source="BUGZILLA"/>
		<reference ref_id="1250114" ref_url="https://bugzilla.suse.com/1250114" source="BUGZILLA"/>
		<reference ref_id="1250118" ref_url="https://bugzilla.suse.com/1250118" source="BUGZILLA"/>
		<reference ref_id="1250121" ref_url="https://bugzilla.suse.com/1250121" source="BUGZILLA"/>
		<reference ref_id="1250127" ref_url="https://bugzilla.suse.com/1250127" source="BUGZILLA"/>
		<reference ref_id="1250128" ref_url="https://bugzilla.suse.com/1250128" source="BUGZILLA"/>
		<reference ref_id="1250131" ref_url="https://bugzilla.suse.com/1250131" source="BUGZILLA"/>
		<reference ref_id="1250132" ref_url="https://bugzilla.suse.com/1250132" source="BUGZILLA"/>
		<reference ref_id="1250137" ref_url="https://bugzilla.suse.com/1250137" source="BUGZILLA"/>
		<reference ref_id="1250138" ref_url="https://bugzilla.suse.com/1250138" source="BUGZILLA"/>
		<reference ref_id="1250140" ref_url="https://bugzilla.suse.com/1250140" source="BUGZILLA"/>
		<reference ref_id="1250145" ref_url="https://bugzilla.suse.com/1250145" source="BUGZILLA"/>
		<reference ref_id="1250151" ref_url="https://bugzilla.suse.com/1250151" source="BUGZILLA"/>
		<reference ref_id="1250153" ref_url="https://bugzilla.suse.com/1250153" source="BUGZILLA"/>
		<reference ref_id="1250156" ref_url="https://bugzilla.suse.com/1250156" source="BUGZILLA"/>
		<reference ref_id="1250159" ref_url="https://bugzilla.suse.com/1250159" source="BUGZILLA"/>
		<reference ref_id="1250161" ref_url="https://bugzilla.suse.com/1250161" source="BUGZILLA"/>
		<reference ref_id="1250168" ref_url="https://bugzilla.suse.com/1250168" source="BUGZILLA"/>
		<reference ref_id="1250178" ref_url="https://bugzilla.suse.com/1250178" source="BUGZILLA"/>
		<reference ref_id="1250180" ref_url="https://bugzilla.suse.com/1250180" source="BUGZILLA"/>
		<reference ref_id="1250181" ref_url="https://bugzilla.suse.com/1250181" source="BUGZILLA"/>
		<reference ref_id="1250182" ref_url="https://bugzilla.suse.com/1250182" source="BUGZILLA"/>
		<reference ref_id="1250183" ref_url="https://bugzilla.suse.com/1250183" source="BUGZILLA"/>
		<reference ref_id="1250184" ref_url="https://bugzilla.suse.com/1250184" source="BUGZILLA"/>
		<reference ref_id="1250187" ref_url="https://bugzilla.suse.com/1250187" source="BUGZILLA"/>
		<reference ref_id="1250191" ref_url="https://bugzilla.suse.com/1250191" source="BUGZILLA"/>
		<reference ref_id="1250197" ref_url="https://bugzilla.suse.com/1250197" source="BUGZILLA"/>
		<reference ref_id="1250198" ref_url="https://bugzilla.suse.com/1250198" source="BUGZILLA"/>
		<reference ref_id="1250200" ref_url="https://bugzilla.suse.com/1250200" source="BUGZILLA"/>
		<reference ref_id="1250209" ref_url="https://bugzilla.suse.com/1250209" source="BUGZILLA"/>
		<reference ref_id="1250211" ref_url="https://bugzilla.suse.com/1250211" source="BUGZILLA"/>
		<reference ref_id="1250237" ref_url="https://bugzilla.suse.com/1250237" source="BUGZILLA"/>
		<reference ref_id="1250245" ref_url="https://bugzilla.suse.com/1250245" source="BUGZILLA"/>
		<reference ref_id="1250247" ref_url="https://bugzilla.suse.com/1250247" source="BUGZILLA"/>
		<reference ref_id="1250250" ref_url="https://bugzilla.suse.com/1250250" source="BUGZILLA"/>
		<reference ref_id="1250257" ref_url="https://bugzilla.suse.com/1250257" source="BUGZILLA"/>
		<reference ref_id="1250264" ref_url="https://bugzilla.suse.com/1250264" source="BUGZILLA"/>
		<reference ref_id="1250269" ref_url="https://bugzilla.suse.com/1250269" source="BUGZILLA"/>
		<reference ref_id="1250277" ref_url="https://bugzilla.suse.com/1250277" source="BUGZILLA"/>
		<reference ref_id="1250287" ref_url="https://bugzilla.suse.com/1250287" source="BUGZILLA"/>
		<reference ref_id="1250293" ref_url="https://bugzilla.suse.com/1250293" source="BUGZILLA"/>
		<reference ref_id="1250301" ref_url="https://bugzilla.suse.com/1250301" source="BUGZILLA"/>
		<reference ref_id="1250303" ref_url="https://bugzilla.suse.com/1250303" source="BUGZILLA"/>
		<reference ref_id="1250309" ref_url="https://bugzilla.suse.com/1250309" source="BUGZILLA"/>
		<reference ref_id="1250311" ref_url="https://bugzilla.suse.com/1250311" source="BUGZILLA"/>
		<reference ref_id="1250313" ref_url="https://bugzilla.suse.com/1250313" source="BUGZILLA"/>
		<reference ref_id="1250315" ref_url="https://bugzilla.suse.com/1250315" source="BUGZILLA"/>
		<reference ref_id="1250316" ref_url="https://bugzilla.suse.com/1250316" source="BUGZILLA"/>
		<reference ref_id="1250322" ref_url="https://bugzilla.suse.com/1250322" source="BUGZILLA"/>
		<reference ref_id="1250323" ref_url="https://bugzilla.suse.com/1250323" source="BUGZILLA"/>
		<reference ref_id="1250324" ref_url="https://bugzilla.suse.com/1250324" source="BUGZILLA"/>
		<reference ref_id="1250325" ref_url="https://bugzilla.suse.com/1250325" source="BUGZILLA"/>
		<reference ref_id="1250328" ref_url="https://bugzilla.suse.com/1250328" source="BUGZILLA"/>
		<reference ref_id="1250331" ref_url="https://bugzilla.suse.com/1250331" source="BUGZILLA"/>
		<reference ref_id="1250358" ref_url="https://bugzilla.suse.com/1250358" source="BUGZILLA"/>
		<reference ref_id="1250362" ref_url="https://bugzilla.suse.com/1250362" source="BUGZILLA"/>
		<reference ref_id="1250363" ref_url="https://bugzilla.suse.com/1250363" source="BUGZILLA"/>
		<reference ref_id="1250370" ref_url="https://bugzilla.suse.com/1250370" source="BUGZILLA"/>
		<reference ref_id="1250374" ref_url="https://bugzilla.suse.com/1250374" source="BUGZILLA"/>
		<reference ref_id="1250391" ref_url="https://bugzilla.suse.com/1250391" source="BUGZILLA"/>
		<reference ref_id="1250392" ref_url="https://bugzilla.suse.com/1250392" source="BUGZILLA"/>
		<reference ref_id="1250393" ref_url="https://bugzilla.suse.com/1250393" source="BUGZILLA"/>
		<reference ref_id="1250394" ref_url="https://bugzilla.suse.com/1250394" source="BUGZILLA"/>
		<reference ref_id="1250395" ref_url="https://bugzilla.suse.com/1250395" source="BUGZILLA"/>
		<reference ref_id="1250406" ref_url="https://bugzilla.suse.com/1250406" source="BUGZILLA"/>
		<reference ref_id="1250412" ref_url="https://bugzilla.suse.com/1250412" source="BUGZILLA"/>
		<reference ref_id="1250418" ref_url="https://bugzilla.suse.com/1250418" source="BUGZILLA"/>
		<reference ref_id="1250425" ref_url="https://bugzilla.suse.com/1250425" source="BUGZILLA"/>
		<reference ref_id="1250428" ref_url="https://bugzilla.suse.com/1250428" source="BUGZILLA"/>
		<reference ref_id="1250453" ref_url="https://bugzilla.suse.com/1250453" source="BUGZILLA"/>
		<reference ref_id="1250454" ref_url="https://bugzilla.suse.com/1250454" source="BUGZILLA"/>
		<reference ref_id="1250457" ref_url="https://bugzilla.suse.com/1250457" source="BUGZILLA"/>
		<reference ref_id="1250459" ref_url="https://bugzilla.suse.com/1250459" source="BUGZILLA"/>
		<reference ref_id="1250522" ref_url="https://bugzilla.suse.com/1250522" source="BUGZILLA"/>
		<reference ref_id="1250759" ref_url="https://bugzilla.suse.com/1250759" source="BUGZILLA"/>
		<reference ref_id="1250761" ref_url="https://bugzilla.suse.com/1250761" source="BUGZILLA"/>
		<reference ref_id="1250762" ref_url="https://bugzilla.suse.com/1250762" source="BUGZILLA"/>
		<reference ref_id="1250763" ref_url="https://bugzilla.suse.com/1250763" source="BUGZILLA"/>
		<reference ref_id="1250767" ref_url="https://bugzilla.suse.com/1250767" source="BUGZILLA"/>
		<reference ref_id="1250768" ref_url="https://bugzilla.suse.com/1250768" source="BUGZILLA"/>
		<reference ref_id="1250774" ref_url="https://bugzilla.suse.com/1250774" source="BUGZILLA"/>
		<reference ref_id="1250781" ref_url="https://bugzilla.suse.com/1250781" source="BUGZILLA"/>
		<reference ref_id="1250784" ref_url="https://bugzilla.suse.com/1250784" source="BUGZILLA"/>
		<reference ref_id="1250786" ref_url="https://bugzilla.suse.com/1250786" source="BUGZILLA"/>
		<reference ref_id="1250787" ref_url="https://bugzilla.suse.com/1250787" source="BUGZILLA"/>
		<reference ref_id="1250790" ref_url="https://bugzilla.suse.com/1250790" source="BUGZILLA"/>
		<reference ref_id="1250791" ref_url="https://bugzilla.suse.com/1250791" source="BUGZILLA"/>
		<reference ref_id="1250792" ref_url="https://bugzilla.suse.com/1250792" source="BUGZILLA"/>
		<reference ref_id="1250797" ref_url="https://bugzilla.suse.com/1250797" source="BUGZILLA"/>
		<reference ref_id="1250799" ref_url="https://bugzilla.suse.com/1250799" source="BUGZILLA"/>
		<reference ref_id="1250807" ref_url="https://bugzilla.suse.com/1250807" source="BUGZILLA"/>
		<reference ref_id="1250810" ref_url="https://bugzilla.suse.com/1250810" source="BUGZILLA"/>
		<reference ref_id="1250811" ref_url="https://bugzilla.suse.com/1250811" source="BUGZILLA"/>
		<reference ref_id="1250818" ref_url="https://bugzilla.suse.com/1250818" source="BUGZILLA"/>
		<reference ref_id="1250819" ref_url="https://bugzilla.suse.com/1250819" source="BUGZILLA"/>
		<reference ref_id="1250822" ref_url="https://bugzilla.suse.com/1250822" source="BUGZILLA"/>
		<reference ref_id="1250823" ref_url="https://bugzilla.suse.com/1250823" source="BUGZILLA"/>
		<reference ref_id="1250824" ref_url="https://bugzilla.suse.com/1250824" source="BUGZILLA"/>
		<reference ref_id="1250825" ref_url="https://bugzilla.suse.com/1250825" source="BUGZILLA"/>
		<reference ref_id="1250830" ref_url="https://bugzilla.suse.com/1250830" source="BUGZILLA"/>
		<reference ref_id="1250831" ref_url="https://bugzilla.suse.com/1250831" source="BUGZILLA"/>
		<reference ref_id="1250839" ref_url="https://bugzilla.suse.com/1250839" source="BUGZILLA"/>
		<reference ref_id="1250841" ref_url="https://bugzilla.suse.com/1250841" source="BUGZILLA"/>
		<reference ref_id="1250842" ref_url="https://bugzilla.suse.com/1250842" source="BUGZILLA"/>
		<reference ref_id="1250843" ref_url="https://bugzilla.suse.com/1250843" source="BUGZILLA"/>
		<reference ref_id="1250846" ref_url="https://bugzilla.suse.com/1250846" source="BUGZILLA"/>
		<reference ref_id="1250847" ref_url="https://bugzilla.suse.com/1250847" source="BUGZILLA"/>
		<reference ref_id="1250848" ref_url="https://bugzilla.suse.com/1250848" source="BUGZILLA"/>
		<reference ref_id="1250850" ref_url="https://bugzilla.suse.com/1250850" source="BUGZILLA"/>
		<reference ref_id="1250851" ref_url="https://bugzilla.suse.com/1250851" source="BUGZILLA"/>
		<reference ref_id="1250853" ref_url="https://bugzilla.suse.com/1250853" source="BUGZILLA"/>
		<reference ref_id="1250856" ref_url="https://bugzilla.suse.com/1250856" source="BUGZILLA"/>
		<reference ref_id="1250863" ref_url="https://bugzilla.suse.com/1250863" source="BUGZILLA"/>
		<reference ref_id="1250864" ref_url="https://bugzilla.suse.com/1250864" source="BUGZILLA"/>
		<reference ref_id="1250866" ref_url="https://bugzilla.suse.com/1250866" source="BUGZILLA"/>
		<reference ref_id="1250867" ref_url="https://bugzilla.suse.com/1250867" source="BUGZILLA"/>
		<reference ref_id="1250868" ref_url="https://bugzilla.suse.com/1250868" source="BUGZILLA"/>
		<reference ref_id="1250872" ref_url="https://bugzilla.suse.com/1250872" source="BUGZILLA"/>
		<reference ref_id="1250874" ref_url="https://bugzilla.suse.com/1250874" source="BUGZILLA"/>
		<reference ref_id="1250875" ref_url="https://bugzilla.suse.com/1250875" source="BUGZILLA"/>
		<reference ref_id="1250877" ref_url="https://bugzilla.suse.com/1250877" source="BUGZILLA"/>
		<reference ref_id="1250879" ref_url="https://bugzilla.suse.com/1250879" source="BUGZILLA"/>
		<reference ref_id="1250883" ref_url="https://bugzilla.suse.com/1250883" source="BUGZILLA"/>
		<reference ref_id="1250887" ref_url="https://bugzilla.suse.com/1250887" source="BUGZILLA"/>
		<reference ref_id="1250888" ref_url="https://bugzilla.suse.com/1250888" source="BUGZILLA"/>
		<reference ref_id="1250889" ref_url="https://bugzilla.suse.com/1250889" source="BUGZILLA"/>
		<reference ref_id="1250890" ref_url="https://bugzilla.suse.com/1250890" source="BUGZILLA"/>
		<reference ref_id="1250891" ref_url="https://bugzilla.suse.com/1250891" source="BUGZILLA"/>
		<reference ref_id="1250905" ref_url="https://bugzilla.suse.com/1250905" source="BUGZILLA"/>
		<reference ref_id="1250915" ref_url="https://bugzilla.suse.com/1250915" source="BUGZILLA"/>
		<reference ref_id="1250917" ref_url="https://bugzilla.suse.com/1250917" source="BUGZILLA"/>
		<reference ref_id="1250923" ref_url="https://bugzilla.suse.com/1250923" source="BUGZILLA"/>
		<reference ref_id="1250927" ref_url="https://bugzilla.suse.com/1250927" source="BUGZILLA"/>
		<reference ref_id="1250928" ref_url="https://bugzilla.suse.com/1250928" source="BUGZILLA"/>
		<reference ref_id="1250948" ref_url="https://bugzilla.suse.com/1250948" source="BUGZILLA"/>
		<reference ref_id="1250949" ref_url="https://bugzilla.suse.com/1250949" source="BUGZILLA"/>
		<reference ref_id="1250953" ref_url="https://bugzilla.suse.com/1250953" source="BUGZILLA"/>
		<reference ref_id="1250955" ref_url="https://bugzilla.suse.com/1250955" source="BUGZILLA"/>
		<reference ref_id="1250963" ref_url="https://bugzilla.suse.com/1250963" source="BUGZILLA"/>
		<reference ref_id="1250964" ref_url="https://bugzilla.suse.com/1250964" source="BUGZILLA"/>
		<reference ref_id="1250965" ref_url="https://bugzilla.suse.com/1250965" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2602" ref_url="https://www.suse.com/security/cve/CVE-2022-2602/" source="CVE"/>
		<reference ref_id="CVE-2022-2978" ref_url="https://www.suse.com/security/cve/CVE-2022-2978/" source="CVE"/>
		<reference ref_id="CVE-2022-36280" ref_url="https://www.suse.com/security/cve/CVE-2022-36280/" source="CVE"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-49138" ref_url="https://www.suse.com/security/cve/CVE-2022-49138/" source="CVE"/>
		<reference ref_id="CVE-2022-49980" ref_url="https://www.suse.com/security/cve/CVE-2022-49980/" source="CVE"/>
		<reference ref_id="CVE-2022-50233" ref_url="https://www.suse.com/security/cve/CVE-2022-50233/" source="CVE"/>
		<reference ref_id="CVE-2022-50234" ref_url="https://www.suse.com/security/cve/CVE-2022-50234/" source="CVE"/>
		<reference ref_id="CVE-2022-50235" ref_url="https://www.suse.com/security/cve/CVE-2022-50235/" source="CVE"/>
		<reference ref_id="CVE-2022-50239" ref_url="https://www.suse.com/security/cve/CVE-2022-50239/" source="CVE"/>
		<reference ref_id="CVE-2022-50241" ref_url="https://www.suse.com/security/cve/CVE-2022-50241/" source="CVE"/>
		<reference ref_id="CVE-2022-50246" ref_url="https://www.suse.com/security/cve/CVE-2022-50246/" source="CVE"/>
		<reference ref_id="CVE-2022-50247" ref_url="https://www.suse.com/security/cve/CVE-2022-50247/" source="CVE"/>
		<reference ref_id="CVE-2022-50248" ref_url="https://www.suse.com/security/cve/CVE-2022-50248/" source="CVE"/>
		<reference ref_id="CVE-2022-50249" ref_url="https://www.suse.com/security/cve/CVE-2022-50249/" source="CVE"/>
		<reference ref_id="CVE-2022-50250" ref_url="https://www.suse.com/security/cve/CVE-2022-50250/" source="CVE"/>
		<reference ref_id="CVE-2022-50251" ref_url="https://www.suse.com/security/cve/CVE-2022-50251/" source="CVE"/>
		<reference ref_id="CVE-2022-50252" ref_url="https://www.suse.com/security/cve/CVE-2022-50252/" source="CVE"/>
		<reference ref_id="CVE-2022-50255" ref_url="https://www.suse.com/security/cve/CVE-2022-50255/" source="CVE"/>
		<reference ref_id="CVE-2022-50257" ref_url="https://www.suse.com/security/cve/CVE-2022-50257/" source="CVE"/>
		<reference ref_id="CVE-2022-50258" ref_url="https://www.suse.com/security/cve/CVE-2022-50258/" source="CVE"/>
		<reference ref_id="CVE-2022-50260" ref_url="https://www.suse.com/security/cve/CVE-2022-50260/" source="CVE"/>
		<reference ref_id="CVE-2022-50261" ref_url="https://www.suse.com/security/cve/CVE-2022-50261/" source="CVE"/>
		<reference ref_id="CVE-2022-50264" ref_url="https://www.suse.com/security/cve/CVE-2022-50264/" source="CVE"/>
		<reference ref_id="CVE-2022-50266" ref_url="https://www.suse.com/security/cve/CVE-2022-50266/" source="CVE"/>
		<reference ref_id="CVE-2022-50267" ref_url="https://www.suse.com/security/cve/CVE-2022-50267/" source="CVE"/>
		<reference ref_id="CVE-2022-50268" ref_url="https://www.suse.com/security/cve/CVE-2022-50268/" source="CVE"/>
		<reference ref_id="CVE-2022-50269" ref_url="https://www.suse.com/security/cve/CVE-2022-50269/" source="CVE"/>
		<reference ref_id="CVE-2022-50271" ref_url="https://www.suse.com/security/cve/CVE-2022-50271/" source="CVE"/>
		<reference ref_id="CVE-2022-50272" ref_url="https://www.suse.com/security/cve/CVE-2022-50272/" source="CVE"/>
		<reference ref_id="CVE-2022-50275" ref_url="https://www.suse.com/security/cve/CVE-2022-50275/" source="CVE"/>
		<reference ref_id="CVE-2022-50276" ref_url="https://www.suse.com/security/cve/CVE-2022-50276/" source="CVE"/>
		<reference ref_id="CVE-2022-50277" ref_url="https://www.suse.com/security/cve/CVE-2022-50277/" source="CVE"/>
		<reference ref_id="CVE-2022-50278" ref_url="https://www.suse.com/security/cve/CVE-2022-50278/" source="CVE"/>
		<reference ref_id="CVE-2022-50279" ref_url="https://www.suse.com/security/cve/CVE-2022-50279/" source="CVE"/>
		<reference ref_id="CVE-2022-50282" ref_url="https://www.suse.com/security/cve/CVE-2022-50282/" source="CVE"/>
		<reference ref_id="CVE-2022-50286" ref_url="https://www.suse.com/security/cve/CVE-2022-50286/" source="CVE"/>
		<reference ref_id="CVE-2022-50289" ref_url="https://www.suse.com/security/cve/CVE-2022-50289/" source="CVE"/>
		<reference ref_id="CVE-2022-50294" ref_url="https://www.suse.com/security/cve/CVE-2022-50294/" source="CVE"/>
		<reference ref_id="CVE-2022-50297" ref_url="https://www.suse.com/security/cve/CVE-2022-50297/" source="CVE"/>
		<reference ref_id="CVE-2022-50298" ref_url="https://www.suse.com/security/cve/CVE-2022-50298/" source="CVE"/>
		<reference ref_id="CVE-2022-50299" ref_url="https://www.suse.com/security/cve/CVE-2022-50299/" source="CVE"/>
		<reference ref_id="CVE-2022-50301" ref_url="https://www.suse.com/security/cve/CVE-2022-50301/" source="CVE"/>
		<reference ref_id="CVE-2022-50308" ref_url="https://www.suse.com/security/cve/CVE-2022-50308/" source="CVE"/>
		<reference ref_id="CVE-2022-50309" ref_url="https://www.suse.com/security/cve/CVE-2022-50309/" source="CVE"/>
		<reference ref_id="CVE-2022-50312" ref_url="https://www.suse.com/security/cve/CVE-2022-50312/" source="CVE"/>
		<reference ref_id="CVE-2022-50317" ref_url="https://www.suse.com/security/cve/CVE-2022-50317/" source="CVE"/>
		<reference ref_id="CVE-2022-50318" ref_url="https://www.suse.com/security/cve/CVE-2022-50318/" source="CVE"/>
		<reference ref_id="CVE-2022-50320" ref_url="https://www.suse.com/security/cve/CVE-2022-50320/" source="CVE"/>
		<reference ref_id="CVE-2022-50321" ref_url="https://www.suse.com/security/cve/CVE-2022-50321/" source="CVE"/>
		<reference ref_id="CVE-2022-50324" ref_url="https://www.suse.com/security/cve/CVE-2022-50324/" source="CVE"/>
		<reference ref_id="CVE-2022-50328" ref_url="https://www.suse.com/security/cve/CVE-2022-50328/" source="CVE"/>
		<reference ref_id="CVE-2022-50329" ref_url="https://www.suse.com/security/cve/CVE-2022-50329/" source="CVE"/>
		<reference ref_id="CVE-2022-50330" ref_url="https://www.suse.com/security/cve/CVE-2022-50330/" source="CVE"/>
		<reference ref_id="CVE-2022-50331" ref_url="https://www.suse.com/security/cve/CVE-2022-50331/" source="CVE"/>
		<reference ref_id="CVE-2022-50333" ref_url="https://www.suse.com/security/cve/CVE-2022-50333/" source="CVE"/>
		<reference ref_id="CVE-2022-50340" ref_url="https://www.suse.com/security/cve/CVE-2022-50340/" source="CVE"/>
		<reference ref_id="CVE-2022-50342" ref_url="https://www.suse.com/security/cve/CVE-2022-50342/" source="CVE"/>
		<reference ref_id="CVE-2022-50344" ref_url="https://www.suse.com/security/cve/CVE-2022-50344/" source="CVE"/>
		<reference ref_id="CVE-2022-50346" ref_url="https://www.suse.com/security/cve/CVE-2022-50346/" source="CVE"/>
		<reference ref_id="CVE-2022-50347" ref_url="https://www.suse.com/security/cve/CVE-2022-50347/" source="CVE"/>
		<reference ref_id="CVE-2022-50348" ref_url="https://www.suse.com/security/cve/CVE-2022-50348/" source="CVE"/>
		<reference ref_id="CVE-2022-50349" ref_url="https://www.suse.com/security/cve/CVE-2022-50349/" source="CVE"/>
		<reference ref_id="CVE-2022-50351" ref_url="https://www.suse.com/security/cve/CVE-2022-50351/" source="CVE"/>
		<reference ref_id="CVE-2022-50353" ref_url="https://www.suse.com/security/cve/CVE-2022-50353/" source="CVE"/>
		<reference ref_id="CVE-2022-50355" ref_url="https://www.suse.com/security/cve/CVE-2022-50355/" source="CVE"/>
		<reference ref_id="CVE-2022-50358" ref_url="https://www.suse.com/security/cve/CVE-2022-50358/" source="CVE"/>
		<reference ref_id="CVE-2022-50359" ref_url="https://www.suse.com/security/cve/CVE-2022-50359/" source="CVE"/>
		<reference ref_id="CVE-2022-50362" ref_url="https://www.suse.com/security/cve/CVE-2022-50362/" source="CVE"/>
		<reference ref_id="CVE-2022-50364" ref_url="https://www.suse.com/security/cve/CVE-2022-50364/" source="CVE"/>
		<reference ref_id="CVE-2022-50367" ref_url="https://www.suse.com/security/cve/CVE-2022-50367/" source="CVE"/>
		<reference ref_id="CVE-2022-50368" ref_url="https://www.suse.com/security/cve/CVE-2022-50368/" source="CVE"/>
		<reference ref_id="CVE-2022-50369" ref_url="https://www.suse.com/security/cve/CVE-2022-50369/" source="CVE"/>
		<reference ref_id="CVE-2022-50370" ref_url="https://www.suse.com/security/cve/CVE-2022-50370/" source="CVE"/>
		<reference ref_id="CVE-2022-50372" ref_url="https://www.suse.com/security/cve/CVE-2022-50372/" source="CVE"/>
		<reference ref_id="CVE-2022-50373" ref_url="https://www.suse.com/security/cve/CVE-2022-50373/" source="CVE"/>
		<reference ref_id="CVE-2022-50374" ref_url="https://www.suse.com/security/cve/CVE-2022-50374/" source="CVE"/>
		<reference ref_id="CVE-2022-50375" ref_url="https://www.suse.com/security/cve/CVE-2022-50375/" source="CVE"/>
		<reference ref_id="CVE-2022-50376" ref_url="https://www.suse.com/security/cve/CVE-2022-50376/" source="CVE"/>
		<reference ref_id="CVE-2022-50379" ref_url="https://www.suse.com/security/cve/CVE-2022-50379/" source="CVE"/>
		<reference ref_id="CVE-2022-50381" ref_url="https://www.suse.com/security/cve/CVE-2022-50381/" source="CVE"/>
		<reference ref_id="CVE-2022-50385" ref_url="https://www.suse.com/security/cve/CVE-2022-50385/" source="CVE"/>
		<reference ref_id="CVE-2022-50386" ref_url="https://www.suse.com/security/cve/CVE-2022-50386/" source="CVE"/>
		<reference ref_id="CVE-2022-50388" ref_url="https://www.suse.com/security/cve/CVE-2022-50388/" source="CVE"/>
		<reference ref_id="CVE-2022-50389" ref_url="https://www.suse.com/security/cve/CVE-2022-50389/" source="CVE"/>
		<reference ref_id="CVE-2022-50391" ref_url="https://www.suse.com/security/cve/CVE-2022-50391/" source="CVE"/>
		<reference ref_id="CVE-2022-50392" ref_url="https://www.suse.com/security/cve/CVE-2022-50392/" source="CVE"/>
		<reference ref_id="CVE-2022-50394" ref_url="https://www.suse.com/security/cve/CVE-2022-50394/" source="CVE"/>
		<reference ref_id="CVE-2022-50395" ref_url="https://www.suse.com/security/cve/CVE-2022-50395/" source="CVE"/>
		<reference ref_id="CVE-2022-50399" ref_url="https://www.suse.com/security/cve/CVE-2022-50399/" source="CVE"/>
		<reference ref_id="CVE-2022-50401" ref_url="https://www.suse.com/security/cve/CVE-2022-50401/" source="CVE"/>
		<reference ref_id="CVE-2022-50402" ref_url="https://www.suse.com/security/cve/CVE-2022-50402/" source="CVE"/>
		<reference ref_id="CVE-2022-50404" ref_url="https://www.suse.com/security/cve/CVE-2022-50404/" source="CVE"/>
		<reference ref_id="CVE-2022-50408" ref_url="https://www.suse.com/security/cve/CVE-2022-50408/" source="CVE"/>
		<reference ref_id="CVE-2022-50409" ref_url="https://www.suse.com/security/cve/CVE-2022-50409/" source="CVE"/>
		<reference ref_id="CVE-2022-50410" ref_url="https://www.suse.com/security/cve/CVE-2022-50410/" source="CVE"/>
		<reference ref_id="CVE-2022-50411" ref_url="https://www.suse.com/security/cve/CVE-2022-50411/" source="CVE"/>
		<reference ref_id="CVE-2022-50414" ref_url="https://www.suse.com/security/cve/CVE-2022-50414/" source="CVE"/>
		<reference ref_id="CVE-2022-50417" ref_url="https://www.suse.com/security/cve/CVE-2022-50417/" source="CVE"/>
		<reference ref_id="CVE-2022-50419" ref_url="https://www.suse.com/security/cve/CVE-2022-50419/" source="CVE"/>
		<reference ref_id="CVE-2022-50422" ref_url="https://www.suse.com/security/cve/CVE-2022-50422/" source="CVE"/>
		<reference ref_id="CVE-2022-50423" ref_url="https://www.suse.com/security/cve/CVE-2022-50423/" source="CVE"/>
		<reference ref_id="CVE-2022-50425" ref_url="https://www.suse.com/security/cve/CVE-2022-50425/" source="CVE"/>
		<reference ref_id="CVE-2022-50427" ref_url="https://www.suse.com/security/cve/CVE-2022-50427/" source="CVE"/>
		<reference ref_id="CVE-2022-50428" ref_url="https://www.suse.com/security/cve/CVE-2022-50428/" source="CVE"/>
		<reference ref_id="CVE-2022-50429" ref_url="https://www.suse.com/security/cve/CVE-2022-50429/" source="CVE"/>
		<reference ref_id="CVE-2022-50430" ref_url="https://www.suse.com/security/cve/CVE-2022-50430/" source="CVE"/>
		<reference ref_id="CVE-2022-50431" ref_url="https://www.suse.com/security/cve/CVE-2022-50431/" source="CVE"/>
		<reference ref_id="CVE-2022-50432" ref_url="https://www.suse.com/security/cve/CVE-2022-50432/" source="CVE"/>
		<reference ref_id="CVE-2022-50434" ref_url="https://www.suse.com/security/cve/CVE-2022-50434/" source="CVE"/>
		<reference ref_id="CVE-2022-50435" ref_url="https://www.suse.com/security/cve/CVE-2022-50435/" source="CVE"/>
		<reference ref_id="CVE-2022-50436" ref_url="https://www.suse.com/security/cve/CVE-2022-50436/" source="CVE"/>
		<reference ref_id="CVE-2022-50437" ref_url="https://www.suse.com/security/cve/CVE-2022-50437/" source="CVE"/>
		<reference ref_id="CVE-2022-50439" ref_url="https://www.suse.com/security/cve/CVE-2022-50439/" source="CVE"/>
		<reference ref_id="CVE-2022-50440" ref_url="https://www.suse.com/security/cve/CVE-2022-50440/" source="CVE"/>
		<reference ref_id="CVE-2022-50443" ref_url="https://www.suse.com/security/cve/CVE-2022-50443/" source="CVE"/>
		<reference ref_id="CVE-2022-50444" ref_url="https://www.suse.com/security/cve/CVE-2022-50444/" source="CVE"/>
		<reference ref_id="CVE-2022-50449" ref_url="https://www.suse.com/security/cve/CVE-2022-50449/" source="CVE"/>
		<reference ref_id="CVE-2022-50453" ref_url="https://www.suse.com/security/cve/CVE-2022-50453/" source="CVE"/>
		<reference ref_id="CVE-2022-50454" ref_url="https://www.suse.com/security/cve/CVE-2022-50454/" source="CVE"/>
		<reference ref_id="CVE-2022-50456" ref_url="https://www.suse.com/security/cve/CVE-2022-50456/" source="CVE"/>
		<reference ref_id="CVE-2022-50458" ref_url="https://www.suse.com/security/cve/CVE-2022-50458/" source="CVE"/>
		<reference ref_id="CVE-2022-50459" ref_url="https://www.suse.com/security/cve/CVE-2022-50459/" source="CVE"/>
		<reference ref_id="CVE-2022-50460" ref_url="https://www.suse.com/security/cve/CVE-2022-50460/" source="CVE"/>
		<reference ref_id="CVE-2022-50465" ref_url="https://www.suse.com/security/cve/CVE-2022-50465/" source="CVE"/>
		<reference ref_id="CVE-2022-50466" ref_url="https://www.suse.com/security/cve/CVE-2022-50466/" source="CVE"/>
		<reference ref_id="CVE-2022-50467" ref_url="https://www.suse.com/security/cve/CVE-2022-50467/" source="CVE"/>
		<reference ref_id="CVE-2022-50468" ref_url="https://www.suse.com/security/cve/CVE-2022-50468/" source="CVE"/>
		<reference ref_id="CVE-2022-50469" ref_url="https://www.suse.com/security/cve/CVE-2022-50469/" source="CVE"/>
		<reference ref_id="CVE-2023-1380" ref_url="https://www.suse.com/security/cve/CVE-2023-1380/" source="CVE"/>
		<reference ref_id="CVE-2023-28328" ref_url="https://www.suse.com/security/cve/CVE-2023-28328/" source="CVE"/>
		<reference ref_id="CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-52923" ref_url="https://www.suse.com/security/cve/CVE-2023-52923/" source="CVE"/>
		<reference ref_id="CVE-2023-53147" ref_url="https://www.suse.com/security/cve/CVE-2023-53147/" source="CVE"/>
		<reference ref_id="CVE-2023-53149" ref_url="https://www.suse.com/security/cve/CVE-2023-53149/" source="CVE"/>
		<reference ref_id="CVE-2023-53150" ref_url="https://www.suse.com/security/cve/CVE-2023-53150/" source="CVE"/>
		<reference ref_id="CVE-2023-53151" ref_url="https://www.suse.com/security/cve/CVE-2023-53151/" source="CVE"/>
		<reference ref_id="CVE-2023-53153" ref_url="https://www.suse.com/security/cve/CVE-2023-53153/" source="CVE"/>
		<reference ref_id="CVE-2023-53165" ref_url="https://www.suse.com/security/cve/CVE-2023-53165/" source="CVE"/>
		<reference ref_id="CVE-2023-53167" ref_url="https://www.suse.com/security/cve/CVE-2023-53167/" source="CVE"/>
		<reference ref_id="CVE-2023-53171" ref_url="https://www.suse.com/security/cve/CVE-2023-53171/" source="CVE"/>
		<reference ref_id="CVE-2023-53174" ref_url="https://www.suse.com/security/cve/CVE-2023-53174/" source="CVE"/>
		<reference ref_id="CVE-2023-53176" ref_url="https://www.suse.com/security/cve/CVE-2023-53176/" source="CVE"/>
		<reference ref_id="CVE-2023-53178" ref_url="https://www.suse.com/security/cve/CVE-2023-53178/" source="CVE"/>
		<reference ref_id="CVE-2023-53179" ref_url="https://www.suse.com/security/cve/CVE-2023-53179/" source="CVE"/>
		<reference ref_id="CVE-2023-53182" ref_url="https://www.suse.com/security/cve/CVE-2023-53182/" source="CVE"/>
		<reference ref_id="CVE-2023-53185" ref_url="https://www.suse.com/security/cve/CVE-2023-53185/" source="CVE"/>
		<reference ref_id="CVE-2023-53196" ref_url="https://www.suse.com/security/cve/CVE-2023-53196/" source="CVE"/>
		<reference ref_id="CVE-2023-53197" ref_url="https://www.suse.com/security/cve/CVE-2023-53197/" source="CVE"/>
		<reference ref_id="CVE-2023-53199" ref_url="https://www.suse.com/security/cve/CVE-2023-53199/" source="CVE"/>
		<reference ref_id="CVE-2023-53201" ref_url="https://www.suse.com/security/cve/CVE-2023-53201/" source="CVE"/>
		<reference ref_id="CVE-2023-53205" ref_url="https://www.suse.com/security/cve/CVE-2023-53205/" source="CVE"/>
		<reference ref_id="CVE-2023-53213" ref_url="https://www.suse.com/security/cve/CVE-2023-53213/" source="CVE"/>
		<reference ref_id="CVE-2023-53216" ref_url="https://www.suse.com/security/cve/CVE-2023-53216/" source="CVE"/>
		<reference ref_id="CVE-2023-53219" ref_url="https://www.suse.com/security/cve/CVE-2023-53219/" source="CVE"/>
		<reference ref_id="CVE-2023-53222" ref_url="https://www.suse.com/security/cve/CVE-2023-53222/" source="CVE"/>
		<reference ref_id="CVE-2023-53223" ref_url="https://www.suse.com/security/cve/CVE-2023-53223/" source="CVE"/>
		<reference ref_id="CVE-2023-53226" ref_url="https://www.suse.com/security/cve/CVE-2023-53226/" source="CVE"/>
		<reference ref_id="CVE-2023-53229" ref_url="https://www.suse.com/security/cve/CVE-2023-53229/" source="CVE"/>
		<reference ref_id="CVE-2023-53230" ref_url="https://www.suse.com/security/cve/CVE-2023-53230/" source="CVE"/>
		<reference ref_id="CVE-2023-53234" ref_url="https://www.suse.com/security/cve/CVE-2023-53234/" source="CVE"/>
		<reference ref_id="CVE-2023-53238" ref_url="https://www.suse.com/security/cve/CVE-2023-53238/" source="CVE"/>
		<reference ref_id="CVE-2023-53239" ref_url="https://www.suse.com/security/cve/CVE-2023-53239/" source="CVE"/>
		<reference ref_id="CVE-2023-53241" ref_url="https://www.suse.com/security/cve/CVE-2023-53241/" source="CVE"/>
		<reference ref_id="CVE-2023-53242" ref_url="https://www.suse.com/security/cve/CVE-2023-53242/" source="CVE"/>
		<reference ref_id="CVE-2023-53244" ref_url="https://www.suse.com/security/cve/CVE-2023-53244/" source="CVE"/>
		<reference ref_id="CVE-2023-53245" ref_url="https://www.suse.com/security/cve/CVE-2023-53245/" source="CVE"/>
		<reference ref_id="CVE-2023-53246" ref_url="https://www.suse.com/security/cve/CVE-2023-53246/" source="CVE"/>
		<reference ref_id="CVE-2023-53249" ref_url="https://www.suse.com/security/cve/CVE-2023-53249/" source="CVE"/>
		<reference ref_id="CVE-2023-53250" ref_url="https://www.suse.com/security/cve/CVE-2023-53250/" source="CVE"/>
		<reference ref_id="CVE-2023-53251" ref_url="https://www.suse.com/security/cve/CVE-2023-53251/" source="CVE"/>
		<reference ref_id="CVE-2023-53255" ref_url="https://www.suse.com/security/cve/CVE-2023-53255/" source="CVE"/>
		<reference ref_id="CVE-2023-53259" ref_url="https://www.suse.com/security/cve/CVE-2023-53259/" source="CVE"/>
		<reference ref_id="CVE-2023-53265" ref_url="https://www.suse.com/security/cve/CVE-2023-53265/" source="CVE"/>
		<reference ref_id="CVE-2023-53268" ref_url="https://www.suse.com/security/cve/CVE-2023-53268/" source="CVE"/>
		<reference ref_id="CVE-2023-53270" ref_url="https://www.suse.com/security/cve/CVE-2023-53270/" source="CVE"/>
		<reference ref_id="CVE-2023-53272" ref_url="https://www.suse.com/security/cve/CVE-2023-53272/" source="CVE"/>
		<reference ref_id="CVE-2023-53273" ref_url="https://www.suse.com/security/cve/CVE-2023-53273/" source="CVE"/>
		<reference ref_id="CVE-2023-53275" ref_url="https://www.suse.com/security/cve/CVE-2023-53275/" source="CVE"/>
		<reference ref_id="CVE-2023-53276" ref_url="https://www.suse.com/security/cve/CVE-2023-53276/" source="CVE"/>
		<reference ref_id="CVE-2023-53277" ref_url="https://www.suse.com/security/cve/CVE-2023-53277/" source="CVE"/>
		<reference ref_id="CVE-2023-53280" ref_url="https://www.suse.com/security/cve/CVE-2023-53280/" source="CVE"/>
		<reference ref_id="CVE-2023-53281" ref_url="https://www.suse.com/security/cve/CVE-2023-53281/" source="CVE"/>
		<reference ref_id="CVE-2023-53282" ref_url="https://www.suse.com/security/cve/CVE-2023-53282/" source="CVE"/>
		<reference ref_id="CVE-2023-53286" ref_url="https://www.suse.com/security/cve/CVE-2023-53286/" source="CVE"/>
		<reference ref_id="CVE-2023-53288" ref_url="https://www.suse.com/security/cve/CVE-2023-53288/" source="CVE"/>
		<reference ref_id="CVE-2023-53295" ref_url="https://www.suse.com/security/cve/CVE-2023-53295/" source="CVE"/>
		<reference ref_id="CVE-2023-53297" ref_url="https://www.suse.com/security/cve/CVE-2023-53297/" source="CVE"/>
		<reference ref_id="CVE-2023-53298" ref_url="https://www.suse.com/security/cve/CVE-2023-53298/" source="CVE"/>
		<reference ref_id="CVE-2023-53299" ref_url="https://www.suse.com/security/cve/CVE-2023-53299/" source="CVE"/>
		<reference ref_id="CVE-2023-53302" ref_url="https://www.suse.com/security/cve/CVE-2023-53302/" source="CVE"/>
		<reference ref_id="CVE-2023-53304" ref_url="https://www.suse.com/security/cve/CVE-2023-53304/" source="CVE"/>
		<reference ref_id="CVE-2023-53305" ref_url="https://www.suse.com/security/cve/CVE-2023-53305/" source="CVE"/>
		<reference ref_id="CVE-2023-53307" ref_url="https://www.suse.com/security/cve/CVE-2023-53307/" source="CVE"/>
		<reference ref_id="CVE-2023-53309" ref_url="https://www.suse.com/security/cve/CVE-2023-53309/" source="CVE"/>
		<reference ref_id="CVE-2023-53311" ref_url="https://www.suse.com/security/cve/CVE-2023-53311/" source="CVE"/>
		<reference ref_id="CVE-2023-53313" ref_url="https://www.suse.com/security/cve/CVE-2023-53313/" source="CVE"/>
		<reference ref_id="CVE-2023-53314" ref_url="https://www.suse.com/security/cve/CVE-2023-53314/" source="CVE"/>
		<reference ref_id="CVE-2023-53315" ref_url="https://www.suse.com/security/cve/CVE-2023-53315/" source="CVE"/>
		<reference ref_id="CVE-2023-53316" ref_url="https://www.suse.com/security/cve/CVE-2023-53316/" source="CVE"/>
		<reference ref_id="CVE-2023-53317" ref_url="https://www.suse.com/security/cve/CVE-2023-53317/" source="CVE"/>
		<reference ref_id="CVE-2023-53321" ref_url="https://www.suse.com/security/cve/CVE-2023-53321/" source="CVE"/>
		<reference ref_id="CVE-2023-53322" ref_url="https://www.suse.com/security/cve/CVE-2023-53322/" source="CVE"/>
		<reference ref_id="CVE-2023-53324" ref_url="https://www.suse.com/security/cve/CVE-2023-53324/" source="CVE"/>
		<reference ref_id="CVE-2023-53326" ref_url="https://www.suse.com/security/cve/CVE-2023-53326/" source="CVE"/>
		<reference ref_id="CVE-2023-53330" ref_url="https://www.suse.com/security/cve/CVE-2023-53330/" source="CVE"/>
		<reference ref_id="CVE-2023-53331" ref_url="https://www.suse.com/security/cve/CVE-2023-53331/" source="CVE"/>
		<reference ref_id="CVE-2023-53333" ref_url="https://www.suse.com/security/cve/CVE-2023-53333/" source="CVE"/>
		<reference ref_id="CVE-2023-53334" ref_url="https://www.suse.com/security/cve/CVE-2023-53334/" source="CVE"/>
		<reference ref_id="CVE-2023-53335" ref_url="https://www.suse.com/security/cve/CVE-2023-53335/" source="CVE"/>
		<reference ref_id="CVE-2023-53337" ref_url="https://www.suse.com/security/cve/CVE-2023-53337/" source="CVE"/>
		<reference ref_id="CVE-2023-53344" ref_url="https://www.suse.com/security/cve/CVE-2023-53344/" source="CVE"/>
		<reference ref_id="CVE-2023-53349" ref_url="https://www.suse.com/security/cve/CVE-2023-53349/" source="CVE"/>
		<reference ref_id="CVE-2023-53352" ref_url="https://www.suse.com/security/cve/CVE-2023-53352/" source="CVE"/>
		<reference ref_id="CVE-2023-53356" ref_url="https://www.suse.com/security/cve/CVE-2023-53356/" source="CVE"/>
		<reference ref_id="CVE-2023-53359" ref_url="https://www.suse.com/security/cve/CVE-2023-53359/" source="CVE"/>
		<reference ref_id="CVE-2023-53368" ref_url="https://www.suse.com/security/cve/CVE-2023-53368/" source="CVE"/>
		<reference ref_id="CVE-2023-53373" ref_url="https://www.suse.com/security/cve/CVE-2023-53373/" source="CVE"/>
		<reference ref_id="CVE-2023-53375" ref_url="https://www.suse.com/security/cve/CVE-2023-53375/" source="CVE"/>
		<reference ref_id="CVE-2023-53377" ref_url="https://www.suse.com/security/cve/CVE-2023-53377/" source="CVE"/>
		<reference ref_id="CVE-2023-53379" ref_url="https://www.suse.com/security/cve/CVE-2023-53379/" source="CVE"/>
		<reference ref_id="CVE-2023-53380" ref_url="https://www.suse.com/security/cve/CVE-2023-53380/" source="CVE"/>
		<reference ref_id="CVE-2023-53381" ref_url="https://www.suse.com/security/cve/CVE-2023-53381/" source="CVE"/>
		<reference ref_id="CVE-2023-53384" ref_url="https://www.suse.com/security/cve/CVE-2023-53384/" source="CVE"/>
		<reference ref_id="CVE-2023-53386" ref_url="https://www.suse.com/security/cve/CVE-2023-53386/" source="CVE"/>
		<reference ref_id="CVE-2023-53388" ref_url="https://www.suse.com/security/cve/CVE-2023-53388/" source="CVE"/>
		<reference ref_id="CVE-2023-53390" ref_url="https://www.suse.com/security/cve/CVE-2023-53390/" source="CVE"/>
		<reference ref_id="CVE-2023-53393" ref_url="https://www.suse.com/security/cve/CVE-2023-53393/" source="CVE"/>
		<reference ref_id="CVE-2023-53395" ref_url="https://www.suse.com/security/cve/CVE-2023-53395/" source="CVE"/>
		<reference ref_id="CVE-2023-53396" ref_url="https://www.suse.com/security/cve/CVE-2023-53396/" source="CVE"/>
		<reference ref_id="CVE-2023-53400" ref_url="https://www.suse.com/security/cve/CVE-2023-53400/" source="CVE"/>
		<reference ref_id="CVE-2023-53404" ref_url="https://www.suse.com/security/cve/CVE-2023-53404/" source="CVE"/>
		<reference ref_id="CVE-2023-53405" ref_url="https://www.suse.com/security/cve/CVE-2023-53405/" source="CVE"/>
		<reference ref_id="CVE-2023-53406" ref_url="https://www.suse.com/security/cve/CVE-2023-53406/" source="CVE"/>
		<reference ref_id="CVE-2023-53409" ref_url="https://www.suse.com/security/cve/CVE-2023-53409/" source="CVE"/>
		<reference ref_id="CVE-2023-53413" ref_url="https://www.suse.com/security/cve/CVE-2023-53413/" source="CVE"/>
		<reference ref_id="CVE-2023-53414" ref_url="https://www.suse.com/security/cve/CVE-2023-53414/" source="CVE"/>
		<reference ref_id="CVE-2023-53415" ref_url="https://www.suse.com/security/cve/CVE-2023-53415/" source="CVE"/>
		<reference ref_id="CVE-2023-53416" ref_url="https://www.suse.com/security/cve/CVE-2023-53416/" source="CVE"/>
		<reference ref_id="CVE-2023-53422" ref_url="https://www.suse.com/security/cve/CVE-2023-53422/" source="CVE"/>
		<reference ref_id="CVE-2023-53427" ref_url="https://www.suse.com/security/cve/CVE-2023-53427/" source="CVE"/>
		<reference ref_id="CVE-2023-53431" ref_url="https://www.suse.com/security/cve/CVE-2023-53431/" source="CVE"/>
		<reference ref_id="CVE-2023-53435" ref_url="https://www.suse.com/security/cve/CVE-2023-53435/" source="CVE"/>
		<reference ref_id="CVE-2023-53436" ref_url="https://www.suse.com/security/cve/CVE-2023-53436/" source="CVE"/>
		<reference ref_id="CVE-2023-53437" ref_url="https://www.suse.com/security/cve/CVE-2023-53437/" source="CVE"/>
		<reference ref_id="CVE-2023-53438" ref_url="https://www.suse.com/security/cve/CVE-2023-53438/" source="CVE"/>
		<reference ref_id="CVE-2023-53440" ref_url="https://www.suse.com/security/cve/CVE-2023-53440/" source="CVE"/>
		<reference ref_id="CVE-2023-53443" ref_url="https://www.suse.com/security/cve/CVE-2023-53443/" source="CVE"/>
		<reference ref_id="CVE-2023-53446" ref_url="https://www.suse.com/security/cve/CVE-2023-53446/" source="CVE"/>
		<reference ref_id="CVE-2023-53449" ref_url="https://www.suse.com/security/cve/CVE-2023-53449/" source="CVE"/>
		<reference ref_id="CVE-2023-53451" ref_url="https://www.suse.com/security/cve/CVE-2023-53451/" source="CVE"/>
		<reference ref_id="CVE-2023-53452" ref_url="https://www.suse.com/security/cve/CVE-2023-53452/" source="CVE"/>
		<reference ref_id="CVE-2023-53453" ref_url="https://www.suse.com/security/cve/CVE-2023-53453/" source="CVE"/>
		<reference ref_id="CVE-2023-53454" ref_url="https://www.suse.com/security/cve/CVE-2023-53454/" source="CVE"/>
		<reference ref_id="CVE-2023-53457" ref_url="https://www.suse.com/security/cve/CVE-2023-53457/" source="CVE"/>
		<reference ref_id="CVE-2023-53458" ref_url="https://www.suse.com/security/cve/CVE-2023-53458/" source="CVE"/>
		<reference ref_id="CVE-2023-53463" ref_url="https://www.suse.com/security/cve/CVE-2023-53463/" source="CVE"/>
		<reference ref_id="CVE-2023-53464" ref_url="https://www.suse.com/security/cve/CVE-2023-53464/" source="CVE"/>
		<reference ref_id="CVE-2023-53465" ref_url="https://www.suse.com/security/cve/CVE-2023-53465/" source="CVE"/>
		<reference ref_id="CVE-2023-53468" ref_url="https://www.suse.com/security/cve/CVE-2023-53468/" source="CVE"/>
		<reference ref_id="CVE-2023-53471" ref_url="https://www.suse.com/security/cve/CVE-2023-53471/" source="CVE"/>
		<reference ref_id="CVE-2023-53472" ref_url="https://www.suse.com/security/cve/CVE-2023-53472/" source="CVE"/>
		<reference ref_id="CVE-2023-53473" ref_url="https://www.suse.com/security/cve/CVE-2023-53473/" source="CVE"/>
		<reference ref_id="CVE-2023-53474" ref_url="https://www.suse.com/security/cve/CVE-2023-53474/" source="CVE"/>
		<reference ref_id="CVE-2023-53475" ref_url="https://www.suse.com/security/cve/CVE-2023-53475/" source="CVE"/>
		<reference ref_id="CVE-2023-53476" ref_url="https://www.suse.com/security/cve/CVE-2023-53476/" source="CVE"/>
		<reference ref_id="CVE-2023-53485" ref_url="https://www.suse.com/security/cve/CVE-2023-53485/" source="CVE"/>
		<reference ref_id="CVE-2023-53487" ref_url="https://www.suse.com/security/cve/CVE-2023-53487/" source="CVE"/>
		<reference ref_id="CVE-2023-53488" ref_url="https://www.suse.com/security/cve/CVE-2023-53488/" source="CVE"/>
		<reference ref_id="CVE-2023-53492" ref_url="https://www.suse.com/security/cve/CVE-2023-53492/" source="CVE"/>
		<reference ref_id="CVE-2023-53494" ref_url="https://www.suse.com/security/cve/CVE-2023-53494/" source="CVE"/>
		<reference ref_id="CVE-2023-53496" ref_url="https://www.suse.com/security/cve/CVE-2023-53496/" source="CVE"/>
		<reference ref_id="CVE-2023-53498" ref_url="https://www.suse.com/security/cve/CVE-2023-53498/" source="CVE"/>
		<reference ref_id="CVE-2023-53499" ref_url="https://www.suse.com/security/cve/CVE-2023-53499/" source="CVE"/>
		<reference ref_id="CVE-2023-53505" ref_url="https://www.suse.com/security/cve/CVE-2023-53505/" source="CVE"/>
		<reference ref_id="CVE-2023-53506" ref_url="https://www.suse.com/security/cve/CVE-2023-53506/" source="CVE"/>
		<reference ref_id="CVE-2023-53509" ref_url="https://www.suse.com/security/cve/CVE-2023-53509/" source="CVE"/>
		<reference ref_id="CVE-2023-53512" ref_url="https://www.suse.com/security/cve/CVE-2023-53512/" source="CVE"/>
		<reference ref_id="CVE-2023-53513" ref_url="https://www.suse.com/security/cve/CVE-2023-53513/" source="CVE"/>
		<reference ref_id="CVE-2023-53515" ref_url="https://www.suse.com/security/cve/CVE-2023-53515/" source="CVE"/>
		<reference ref_id="CVE-2023-53518" ref_url="https://www.suse.com/security/cve/CVE-2023-53518/" source="CVE"/>
		<reference ref_id="CVE-2023-53519" ref_url="https://www.suse.com/security/cve/CVE-2023-53519/" source="CVE"/>
		<reference ref_id="CVE-2023-53521" ref_url="https://www.suse.com/security/cve/CVE-2023-53521/" source="CVE"/>
		<reference ref_id="CVE-2023-53524" ref_url="https://www.suse.com/security/cve/CVE-2023-53524/" source="CVE"/>
		<reference ref_id="CVE-2023-53525" ref_url="https://www.suse.com/security/cve/CVE-2023-53525/" source="CVE"/>
		<reference ref_id="CVE-2023-53526" ref_url="https://www.suse.com/security/cve/CVE-2023-53526/" source="CVE"/>
		<reference ref_id="CVE-2023-53530" ref_url="https://www.suse.com/security/cve/CVE-2023-53530/" source="CVE"/>
		<reference ref_id="CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583/" source="CVE"/>
		<reference ref_id="CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584/" source="CVE"/>
		<reference ref_id="CVE-2024-58240" ref_url="https://www.suse.com/security/cve/CVE-2024-58240/" source="CVE"/>
		<reference ref_id="CVE-2025-23155" ref_url="https://www.suse.com/security/cve/CVE-2025-23155/" source="CVE"/>
		<reference ref_id="CVE-2025-37738" ref_url="https://www.suse.com/security/cve/CVE-2025-37738/" source="CVE"/>
		<reference ref_id="CVE-2025-37885" ref_url="https://www.suse.com/security/cve/CVE-2025-37885/" source="CVE"/>
		<reference ref_id="CVE-2025-37958" ref_url="https://www.suse.com/security/cve/CVE-2025-37958/" source="CVE"/>
		<reference ref_id="CVE-2025-38014" ref_url="https://www.suse.com/security/cve/CVE-2025-38014/" source="CVE"/>
		<reference ref_id="CVE-2025-38084" ref_url="https://www.suse.com/security/cve/CVE-2025-38084/" source="CVE"/>
		<reference ref_id="CVE-2025-38085" ref_url="https://www.suse.com/security/cve/CVE-2025-38085/" source="CVE"/>
		<reference ref_id="CVE-2025-38111" ref_url="https://www.suse.com/security/cve/CVE-2025-38111/" source="CVE"/>
		<reference ref_id="CVE-2025-38184" ref_url="https://www.suse.com/security/cve/CVE-2025-38184/" source="CVE"/>
		<reference ref_id="CVE-2025-38380" ref_url="https://www.suse.com/security/cve/CVE-2025-38380/" source="CVE"/>
		<reference ref_id="CVE-2025-38470" ref_url="https://www.suse.com/security/cve/CVE-2025-38470/" source="CVE"/>
		<reference ref_id="CVE-2025-38476" ref_url="https://www.suse.com/security/cve/CVE-2025-38476/" source="CVE"/>
		<reference ref_id="CVE-2025-38488" ref_url="https://www.suse.com/security/cve/CVE-2025-38488/" source="CVE"/>
		<reference ref_id="CVE-2025-38553" ref_url="https://www.suse.com/security/cve/CVE-2025-38553/" source="CVE"/>
		<reference ref_id="CVE-2025-38572" ref_url="https://www.suse.com/security/cve/CVE-2025-38572/" source="CVE"/>
		<reference ref_id="CVE-2025-38659" ref_url="https://www.suse.com/security/cve/CVE-2025-38659/" source="CVE"/>
		<reference ref_id="CVE-2025-38664" ref_url="https://www.suse.com/security/cve/CVE-2025-38664/" source="CVE"/>
		<reference ref_id="CVE-2025-38678" ref_url="https://www.suse.com/security/cve/CVE-2025-38678/" source="CVE"/>
		<reference ref_id="CVE-2025-38685" ref_url="https://www.suse.com/security/cve/CVE-2025-38685/" source="CVE"/>
		<reference ref_id="CVE-2025-38706" ref_url="https://www.suse.com/security/cve/CVE-2025-38706/" source="CVE"/>
		<reference ref_id="CVE-2025-38713" ref_url="https://www.suse.com/security/cve/CVE-2025-38713/" source="CVE"/>
		<reference ref_id="CVE-2025-38734" ref_url="https://www.suse.com/security/cve/CVE-2025-38734/" source="CVE"/>
		<reference ref_id="CVE-2025-39691" ref_url="https://www.suse.com/security/cve/CVE-2025-39691/" source="CVE"/>
		<reference ref_id="CVE-2025-39703" ref_url="https://www.suse.com/security/cve/CVE-2025-39703/" source="CVE"/>
		<reference ref_id="CVE-2025-39726" ref_url="https://www.suse.com/security/cve/CVE-2025-39726/" source="CVE"/>
		<reference ref_id="CVE-2025-39746" ref_url="https://www.suse.com/security/cve/CVE-2025-39746/" source="CVE"/>
		<reference ref_id="CVE-2025-39751" ref_url="https://www.suse.com/security/cve/CVE-2025-39751/" source="CVE"/>
		<reference ref_id="CVE-2025-39790" ref_url="https://www.suse.com/security/cve/CVE-2025-39790/" source="CVE"/>
		<reference ref_id="CVE-2025-39797" ref_url="https://www.suse.com/security/cve/CVE-2025-39797/" source="CVE"/>
		<reference ref_id="CVE-2025-39823" ref_url="https://www.suse.com/security/cve/CVE-2025-39823/" source="CVE"/>
		<reference ref_id="CVE-2025-39824" ref_url="https://www.suse.com/security/cve/CVE-2025-39824/" source="CVE"/>
		<reference ref_id="CVE-2025-39860" ref_url="https://www.suse.com/security/cve/CVE-2025-39860/" source="CVE"/>
		<reference ref_id="CVE-2025-39869" ref_url="https://www.suse.com/security/cve/CVE-2025-39869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).
- CVE-2022-49980: USB: gadget: fix use-after-free read in usb_udc_uevent() (bsc#1245110).
- CVE-2022-50233: Bluetooth: eir: Fix using strlen with hdev-&gt;{dev_name,short_name} (bsc#1246968).
- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).
- CVE-2022-50409: net: If sock is dead do not access sock's sk_wq in sk_stream_wait_memory (bsc#1250392).
- CVE-2023-53178: mm: fix zswap writeback race condition (bsc#1249827).
- CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250313).
- CVE-2023-53438: x86/MCE: Always save CS register on AMD Zen IF Poison errors (bsc#1250180).
- CVE-2025-23155: net: stmmac: Fix accessing freed irq affinity_hint (bsc#1242573).
- CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846).
- CVE-2025-37885: KVM: x86: Reset IRTE to host control if *new* route isn't postable (bsc#1242960).
- CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245498).
- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245499).
- CVE-2025-38111: net/mdiobus: Fix potential out-of-bounds read/write access (bsc#1245666).
- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
- CVE-2025-38380: i2c/designware: Fix an initialization issue (bsc#1247028).
- CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (bsc#1247288).
- CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1247317).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
- CVE-2025-38553: net/sched: Restrict conditions for adding duplicating netems to qdisc tree (bsc#1248255).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399).
- CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628).
- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126).
- CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).
- CVE-2025-38706: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (bsc#1249195).
- CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).
- CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324).
- CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374).
- CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315).
- CVE-2025-39726: s390/ism: fix concurrency management in ism_cmd() (bsc#1249266).
- CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable (bsc#1249516).
- CVE-2025-39751: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (bsc#1249538).
- CVE-2025-39790: bus: mhi: host: Detect events pointing to unexpected TREs (bsc#1249548).
- CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608).
- CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002).
- CVE-2025-39824: HID: asus: fix UAF via HID_CLAIMED_INPUT validation (bsc#1250007).
- CVE-2025-39860: Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (bsc#1250247).
- CVE-2025-39869: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (bsc#1250406).

The following non-security bugs were fixed:

- Limit patch filenames to 100 characters (bsc#1249604).
- Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108).
- README.BRANCH: Add Lidong Zhong as a SLE15-SP4-LTSS co-maintainer.
- Revert backported patches for bsc#1238160 because the CVSS less than 7.0
- Update config files. (bsc#1249186) Enable where we define KABI refs + rely on Kconfig deps.
- btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1249158).
- build_bug.h: Add KABI assert (bsc#1249186).
- kabi/severities: ignore kABI for atheros helper modules The symbols are used only internally by atheros drivers.
- kernel-binary: Another installation ordering fix (bsc#1241353).
- kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522).
- kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346)
- kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).
- net/sched: ets: use old 'nbands' while purging unused classes (git-fixes).
- netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237).
- rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation (bsc#1246879).
- rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337).
- rpm: Configure KABI checkingness macro (bsc#1249186).
- rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186). 
- rpm: Link arch-symbols script from scripts directory.
- rpm: Link guards script from scripts directory.
- use uniform permission checks for all mount propagation changes (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2025-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164051">SUSE bug 1164051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202700">SUSE bug 1202700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203063">SUSE bug 1203063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203332">SUSE bug 1203332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204228">SUSE bug 1204228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205128">SUSE bug 1205128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206456">SUSE bug 1206456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206468">SUSE bug 1206468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206883">SUSE bug 1206883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206884">SUSE bug 1206884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207158">SUSE bug 1207158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207621">SUSE bug 1207621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207624">SUSE bug 1207624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207625">SUSE bug 1207625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207628">SUSE bug 1207628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207629">SUSE bug 1207629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207631">SUSE bug 1207631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207645">SUSE bug 1207645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207651">SUSE bug 1207651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208607">SUSE bug 1208607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209287">SUSE bug 1209287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209291">SUSE bug 1209291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210584">SUSE bug 1210584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211960">SUSE bug 1211960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212603">SUSE bug 1212603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213015">SUSE bug 1213015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213016">SUSE bug 1213016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213040">SUSE bug 1213040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213041">SUSE bug 1213041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213061">SUSE bug 1213061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213099">SUSE bug 1213099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213104">SUSE bug 1213104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213747">SUSE bug 1213747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214953">SUSE bug 1214953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214967">SUSE bug 1214967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215150">SUSE bug 1215150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215696">SUSE bug 1215696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215911">SUSE bug 1215911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216976">SUSE bug 1216976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217790">SUSE bug 1217790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220185">SUSE bug 1220185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220186">SUSE bug 1220186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236104">SUSE bug 1236104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238160">SUSE bug 1238160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241353">SUSE bug 1241353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242573">SUSE bug 1242573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242846">SUSE bug 1242846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242960">SUSE bug 1242960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243539">SUSE bug 1243539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244337">SUSE bug 1244337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244732">SUSE bug 1244732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245110">SUSE bug 1245110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245498">SUSE bug 1245498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245499">SUSE bug 1245499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245666">SUSE bug 1245666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245956">SUSE bug 1245956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246879">SUSE bug 1246879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246968">SUSE bug 1246968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247028">SUSE bug 1247028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247172">SUSE bug 1247172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247239">SUSE bug 1247239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247288">SUSE bug 1247288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247317">SUSE bug 1247317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248108">SUSE bug 1248108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248255">SUSE bug 1248255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248399">SUSE bug 1248399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248628">SUSE bug 1248628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248639">SUSE bug 1248639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248847">SUSE bug 1248847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249126">SUSE bug 1249126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249158">SUSE bug 1249158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249186">SUSE bug 1249186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249195">SUSE bug 1249195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249200">SUSE bug 1249200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249220">SUSE bug 1249220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249266">SUSE bug 1249266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249315">SUSE bug 1249315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249324">SUSE bug 1249324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249346">SUSE bug 1249346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249374">SUSE bug 1249374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249516">SUSE bug 1249516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249538">SUSE bug 1249538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249548">SUSE bug 1249548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249604">SUSE bug 1249604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249608">SUSE bug 1249608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249638">SUSE bug 1249638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249639">SUSE bug 1249639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249641">SUSE bug 1249641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249642">SUSE bug 1249642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249650">SUSE bug 1249650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249651">SUSE bug 1249651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249658">SUSE bug 1249658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249661">SUSE bug 1249661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249664">SUSE bug 1249664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249667">SUSE bug 1249667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249669">SUSE bug 1249669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249677">SUSE bug 1249677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249681">SUSE bug 1249681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249683">SUSE bug 1249683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249685">SUSE bug 1249685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249687">SUSE bug 1249687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249691">SUSE bug 1249691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249695">SUSE bug 1249695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249699">SUSE bug 1249699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249700">SUSE bug 1249700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249701">SUSE bug 1249701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249705">SUSE bug 1249705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249706">SUSE bug 1249706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249707">SUSE bug 1249707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249709">SUSE bug 1249709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249712">SUSE bug 1249712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249713">SUSE bug 1249713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249715">SUSE bug 1249715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249716">SUSE bug 1249716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249718">SUSE bug 1249718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249722">SUSE bug 1249722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249727">SUSE bug 1249727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249730">SUSE bug 1249730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249733">SUSE bug 1249733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249734">SUSE bug 1249734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249739">SUSE bug 1249739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249740">SUSE bug 1249740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249741">SUSE bug 1249741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249742">SUSE bug 1249742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249743">SUSE bug 1249743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249745">SUSE bug 1249745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249746">SUSE bug 1249746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249747">SUSE bug 1249747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249749">SUSE bug 1249749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249750">SUSE bug 1249750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249751">SUSE bug 1249751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249753">SUSE bug 1249753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249758">SUSE bug 1249758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249762">SUSE bug 1249762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249767">SUSE bug 1249767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249777">SUSE bug 1249777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249781">SUSE bug 1249781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249784">SUSE bug 1249784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249791">SUSE bug 1249791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249799">SUSE bug 1249799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249808">SUSE bug 1249808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249810">SUSE bug 1249810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249820">SUSE bug 1249820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249825">SUSE bug 1249825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249827">SUSE bug 1249827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249836">SUSE bug 1249836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249840">SUSE bug 1249840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249844">SUSE bug 1249844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249846">SUSE bug 1249846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249853">SUSE bug 1249853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249858">SUSE bug 1249858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249860">SUSE bug 1249860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249864">SUSE bug 1249864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249865">SUSE bug 1249865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249866">SUSE bug 1249866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249867">SUSE bug 1249867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249868">SUSE bug 1249868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249872">SUSE bug 1249872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249877">SUSE bug 1249877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249880">SUSE bug 1249880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249882">SUSE bug 1249882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249885">SUSE bug 1249885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249890">SUSE bug 1249890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249892">SUSE bug 1249892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249908">SUSE bug 1249908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249910">SUSE bug 1249910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249911">SUSE bug 1249911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249914">SUSE bug 1249914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249917">SUSE bug 1249917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249918">SUSE bug 1249918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249920">SUSE bug 1249920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249923">SUSE bug 1249923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249924">SUSE bug 1249924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249925">SUSE bug 1249925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249927">SUSE bug 1249927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249928">SUSE bug 1249928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249930">SUSE bug 1249930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249933">SUSE bug 1249933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249934">SUSE bug 1249934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249936">SUSE bug 1249936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249938">SUSE bug 1249938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249939">SUSE bug 1249939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249944">SUSE bug 1249944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249947">SUSE bug 1249947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249949">SUSE bug 1249949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249950">SUSE bug 1249950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249954">SUSE bug 1249954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249958">SUSE bug 1249958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249979">SUSE bug 1249979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249981">SUSE bug 1249981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249991">SUSE bug 1249991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249997">SUSE bug 1249997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250002">SUSE bug 1250002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250006">SUSE bug 1250006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250007">SUSE bug 1250007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250009">SUSE bug 1250009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250010">SUSE bug 1250010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250011">SUSE bug 1250011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250014">SUSE bug 1250014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250015">SUSE bug 1250015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250023">SUSE bug 1250023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250024">SUSE bug 1250024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250026">SUSE bug 1250026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250039">SUSE bug 1250039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250041">SUSE bug 1250041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250043">SUSE bug 1250043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250044">SUSE bug 1250044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250047">SUSE bug 1250047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250049">SUSE bug 1250049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250052">SUSE bug 1250052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250055">SUSE bug 1250055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250058">SUSE bug 1250058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250060">SUSE bug 1250060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250062">SUSE bug 1250062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250065">SUSE bug 1250065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250066">SUSE bug 1250066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250070">SUSE bug 1250070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250071">SUSE bug 1250071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250072">SUSE bug 1250072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250077">SUSE bug 1250077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250080">SUSE bug 1250080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250081">SUSE bug 1250081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250083">SUSE bug 1250083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250105">SUSE bug 1250105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250106">SUSE bug 1250106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250107">SUSE bug 1250107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250108">SUSE bug 1250108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250114">SUSE bug 1250114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250118">SUSE bug 1250118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250121">SUSE bug 1250121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250127">SUSE bug 1250127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250128">SUSE bug 1250128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250131">SUSE bug 1250131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250132">SUSE bug 1250132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250137">SUSE bug 1250137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250138">SUSE bug 1250138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250140">SUSE bug 1250140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250145">SUSE bug 1250145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250151">SUSE bug 1250151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250153">SUSE bug 1250153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250156">SUSE bug 1250156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250159">SUSE bug 1250159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250161">SUSE bug 1250161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250168">SUSE bug 1250168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250178">SUSE bug 1250178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250180">SUSE bug 1250180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250181">SUSE bug 1250181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250182">SUSE bug 1250182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250183">SUSE bug 1250183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250184">SUSE bug 1250184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250187">SUSE bug 1250187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250191">SUSE bug 1250191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250197">SUSE bug 1250197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250198">SUSE bug 1250198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250200">SUSE bug 1250200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250209">SUSE bug 1250209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250211">SUSE bug 1250211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250237">SUSE bug 1250237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250245">SUSE bug 1250245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250247">SUSE bug 1250247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250250">SUSE bug 1250250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250257">SUSE bug 1250257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250264">SUSE bug 1250264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250269">SUSE bug 1250269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250277">SUSE bug 1250277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250287">SUSE bug 1250287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250293">SUSE bug 1250293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250301">SUSE bug 1250301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250303">SUSE bug 1250303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250309">SUSE bug 1250309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250311">SUSE bug 1250311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250313">SUSE bug 1250313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250315">SUSE bug 1250315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250316">SUSE bug 1250316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250322">SUSE bug 1250322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250323">SUSE bug 1250323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250324">SUSE bug 1250324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250325">SUSE bug 1250325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250328">SUSE bug 1250328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250331">SUSE bug 1250331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250358">SUSE bug 1250358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250362">SUSE bug 1250362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250363">SUSE bug 1250363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250370">SUSE bug 1250370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250374">SUSE bug 1250374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250391">SUSE bug 1250391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250392">SUSE bug 1250392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250393">SUSE bug 1250393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250394">SUSE bug 1250394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250395">SUSE bug 1250395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250406">SUSE bug 1250406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250412">SUSE bug 1250412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250418">SUSE bug 1250418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250425">SUSE bug 1250425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250428">SUSE bug 1250428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250453">SUSE bug 1250453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250454">SUSE bug 1250454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250457">SUSE bug 1250457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250459">SUSE bug 1250459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250522">SUSE bug 1250522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250759">SUSE bug 1250759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250761">SUSE bug 1250761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250762">SUSE bug 1250762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250763">SUSE bug 1250763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250767">SUSE bug 1250767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250768">SUSE bug 1250768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250774">SUSE bug 1250774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250781">SUSE bug 1250781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250784">SUSE bug 1250784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250786">SUSE bug 1250786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250787">SUSE bug 1250787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250790">SUSE bug 1250790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250791">SUSE bug 1250791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250792">SUSE bug 1250792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250797">SUSE bug 1250797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250799">SUSE bug 1250799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250807">SUSE bug 1250807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250810">SUSE bug 1250810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250811">SUSE bug 1250811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250818">SUSE bug 1250818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250819">SUSE bug 1250819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250822">SUSE bug 1250822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250823">SUSE bug 1250823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250824">SUSE bug 1250824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250825">SUSE bug 1250825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250830">SUSE bug 1250830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250831">SUSE bug 1250831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250839">SUSE bug 1250839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250841">SUSE bug 1250841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250842">SUSE bug 1250842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250843">SUSE bug 1250843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250846">SUSE bug 1250846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250847">SUSE bug 1250847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250848">SUSE bug 1250848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250850">SUSE bug 1250850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250851">SUSE bug 1250851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250853">SUSE bug 1250853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250856">SUSE bug 1250856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250863">SUSE bug 1250863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250864">SUSE bug 1250864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250866">SUSE bug 1250866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250867">SUSE bug 1250867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250868">SUSE bug 1250868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250872">SUSE bug 1250872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250874">SUSE bug 1250874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250875">SUSE bug 1250875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250877">SUSE bug 1250877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250879">SUSE bug 1250879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250883">SUSE bug 1250883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250887">SUSE bug 1250887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250888">SUSE bug 1250888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250889">SUSE bug 1250889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250890">SUSE bug 1250890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250891">SUSE bug 1250891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250905">SUSE bug 1250905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250915">SUSE bug 1250915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250917">SUSE bug 1250917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250923">SUSE bug 1250923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250927">SUSE bug 1250927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250928">SUSE bug 1250928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250948">SUSE bug 1250948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250949">SUSE bug 1250949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250953">SUSE bug 1250953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250955">SUSE bug 1250955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250963">SUSE bug 1250963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250964">SUSE bug 1250964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250965">SUSE bug 1250965</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2602/">CVE-2022-2602 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2978/">CVE-2022-2978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2978">CVE-2022-2978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36280/">CVE-2022-36280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49138/">CVE-2022-49138 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49138">CVE-2022-49138 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49980/">CVE-2022-49980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49980">CVE-2022-49980 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50233/">CVE-2022-50233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50233">CVE-2022-50233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50234/">CVE-2022-50234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50234">CVE-2022-50234 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50235/">CVE-2022-50235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50235">CVE-2022-50235 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50239/">CVE-2022-50239 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50239">CVE-2022-50239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50241/">CVE-2022-50241 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50241">CVE-2022-50241 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50246/">CVE-2022-50246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50246">CVE-2022-50246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50247/">CVE-2022-50247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50247">CVE-2022-50247 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50248/">CVE-2022-50248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50248">CVE-2022-50248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50249/">CVE-2022-50249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50249">CVE-2022-50249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50250/">CVE-2022-50250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50250">CVE-2022-50250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50251/">CVE-2022-50251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50251">CVE-2022-50251 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50252/">CVE-2022-50252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50252">CVE-2022-50252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50255/">CVE-2022-50255 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50255">CVE-2022-50255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50257/">CVE-2022-50257 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50257">CVE-2022-50257 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50258/">CVE-2022-50258 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50258">CVE-2022-50258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50260/">CVE-2022-50260 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50260">CVE-2022-50260 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50261/">CVE-2022-50261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50261">CVE-2022-50261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50264/">CVE-2022-50264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50264">CVE-2022-50264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50266/">CVE-2022-50266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50266">CVE-2022-50266 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50267/">CVE-2022-50267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50267">CVE-2022-50267 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50268/">CVE-2022-50268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50268">CVE-2022-50268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50269/">CVE-2022-50269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50269">CVE-2022-50269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50271/">CVE-2022-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50271">CVE-2022-50271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50272/">CVE-2022-50272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50272">CVE-2022-50272 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50275/">CVE-2022-50275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50275">CVE-2022-50275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50276/">CVE-2022-50276 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50276">CVE-2022-50276 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50277/">CVE-2022-50277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50277">CVE-2022-50277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50278/">CVE-2022-50278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50278">CVE-2022-50278 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50279/">CVE-2022-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50279">CVE-2022-50279 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50282/">CVE-2022-50282 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50282">CVE-2022-50282 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50286/">CVE-2022-50286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50286">CVE-2022-50286 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50289/">CVE-2022-50289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50289">CVE-2022-50289 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50294/">CVE-2022-50294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50294">CVE-2022-50294 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50297/">CVE-2022-50297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50297">CVE-2022-50297 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50298/">CVE-2022-50298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50298">CVE-2022-50298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50299/">CVE-2022-50299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50299">CVE-2022-50299 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50301/">CVE-2022-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50301">CVE-2022-50301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50308/">CVE-2022-50308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50308">CVE-2022-50308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50309/">CVE-2022-50309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50309">CVE-2022-50309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50312/">CVE-2022-50312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50312">CVE-2022-50312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50317/">CVE-2022-50317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50317">CVE-2022-50317 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50318/">CVE-2022-50318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50318">CVE-2022-50318 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50320/">CVE-2022-50320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50320">CVE-2022-50320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50321/">CVE-2022-50321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50321">CVE-2022-50321 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50324/">CVE-2022-50324 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50324">CVE-2022-50324 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50328/">CVE-2022-50328 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50328">CVE-2022-50328 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50329/">CVE-2022-50329 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50329">CVE-2022-50329 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50330/">CVE-2022-50330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50330">CVE-2022-50330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50331/">CVE-2022-50331 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50331">CVE-2022-50331 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50333/">CVE-2022-50333 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50333">CVE-2022-50333 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50340/">CVE-2022-50340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50340">CVE-2022-50340 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50342/">CVE-2022-50342 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50342">CVE-2022-50342 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50344/">CVE-2022-50344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50344">CVE-2022-50344 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50346/">CVE-2022-50346 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50346">CVE-2022-50346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50347/">CVE-2022-50347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50347">CVE-2022-50347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50348/">CVE-2022-50348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50348">CVE-2022-50348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50349/">CVE-2022-50349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50349">CVE-2022-50349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50351/">CVE-2022-50351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50351">CVE-2022-50351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50353/">CVE-2022-50353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50353">CVE-2022-50353 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50355/">CVE-2022-50355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50355">CVE-2022-50355 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50358/">CVE-2022-50358 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50358">CVE-2022-50358 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50359/">CVE-2022-50359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50359">CVE-2022-50359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50362/">CVE-2022-50362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50362">CVE-2022-50362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50364/">CVE-2022-50364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50364">CVE-2022-50364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50367/">CVE-2022-50367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50367">CVE-2022-50367 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50368/">CVE-2022-50368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50368">CVE-2022-50368 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50369/">CVE-2022-50369 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50369">CVE-2022-50369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50370/">CVE-2022-50370 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50370">CVE-2022-50370 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50372/">CVE-2022-50372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50372">CVE-2022-50372 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50373/">CVE-2022-50373 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50373">CVE-2022-50373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50374/">CVE-2022-50374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50374">CVE-2022-50374 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50375/">CVE-2022-50375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50375">CVE-2022-50375 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-50376/">CVE-2022-50376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50376">CVE-2022-50376 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50379/">CVE-2022-50379 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50379">CVE-2022-50379 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50381/">CVE-2022-50381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50381">CVE-2022-50381 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50385/">CVE-2022-50385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50385">CVE-2022-50385 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50386/">CVE-2022-50386 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50386">CVE-2022-50386 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50388/">CVE-2022-50388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50388">CVE-2022-50388 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50389/">CVE-2022-50389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50389">CVE-2022-50389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50391/">CVE-2022-50391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50391">CVE-2022-50391 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50392/">CVE-2022-50392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50392">CVE-2022-50392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50394/">CVE-2022-50394 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50394">CVE-2022-50394 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50395/">CVE-2022-50395 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50395">CVE-2022-50395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50399/">CVE-2022-50399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50399">CVE-2022-50399 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50401/">CVE-2022-50401 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50401">CVE-2022-50401 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50402/">CVE-2022-50402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50402">CVE-2022-50402 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50404/">CVE-2022-50404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50404">CVE-2022-50404 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50408/">CVE-2022-50408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50408">CVE-2022-50408 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50409/">CVE-2022-50409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50409">CVE-2022-50409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50410/">CVE-2022-50410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50410">CVE-2022-50410 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50411/">CVE-2022-50411 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50411">CVE-2022-50411 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50414/">CVE-2022-50414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50414">CVE-2022-50414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50417/">CVE-2022-50417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50417">CVE-2022-50417 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50419/">CVE-2022-50419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50419">CVE-2022-50419 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50422/">CVE-2022-50422 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50422">CVE-2022-50422 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50423/">CVE-2022-50423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50423">CVE-2022-50423 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50425/">CVE-2022-50425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50425">CVE-2022-50425 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50427/">CVE-2022-50427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50427">CVE-2022-50427 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50428/">CVE-2022-50428 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50428">CVE-2022-50428 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50429/">CVE-2022-50429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50429">CVE-2022-50429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50430/">CVE-2022-50430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50430">CVE-2022-50430 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50431/">CVE-2022-50431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50431">CVE-2022-50431 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50432/">CVE-2022-50432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50432">CVE-2022-50432 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50434/">CVE-2022-50434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50434">CVE-2022-50434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50435/">CVE-2022-50435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50435">CVE-2022-50435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50436/">CVE-2022-50436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50436">CVE-2022-50436 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50437/">CVE-2022-50437 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50437">CVE-2022-50437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50439/">CVE-2022-50439 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50439">CVE-2022-50439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50440/">CVE-2022-50440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50440">CVE-2022-50440 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50443/">CVE-2022-50443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50443">CVE-2022-50443 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50444/">CVE-2022-50444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50444">CVE-2022-50444 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50449/">CVE-2022-50449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50449">CVE-2022-50449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50453/">CVE-2022-50453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50453">CVE-2022-50453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50454/">CVE-2022-50454 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50454">CVE-2022-50454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50456/">CVE-2022-50456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50456">CVE-2022-50456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50458/">CVE-2022-50458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50458">CVE-2022-50458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50459/">CVE-2022-50459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50459">CVE-2022-50459 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50460/">CVE-2022-50460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50460">CVE-2022-50460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50465/">CVE-2022-50465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50465">CVE-2022-50465 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50466/">CVE-2022-50466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50466">CVE-2022-50466 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50467/">CVE-2022-50467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50467">CVE-2022-50467 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50468/">CVE-2022-50468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50468">CVE-2022-50468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50469/">CVE-2022-50469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50469">CVE-2022-50469 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1380/">CVE-2023-1380 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28328/">CVE-2023-28328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28328">CVE-2023-28328 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52923/">CVE-2023-52923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52923">CVE-2023-52923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53147/">CVE-2023-53147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53147">CVE-2023-53147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53149/">CVE-2023-53149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53149">CVE-2023-53149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53150/">CVE-2023-53150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53150">CVE-2023-53150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53151/">CVE-2023-53151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53151">CVE-2023-53151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53153/">CVE-2023-53153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53153">CVE-2023-53153 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53165/">CVE-2023-53165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53165">CVE-2023-53165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53167/">CVE-2023-53167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53167">CVE-2023-53167 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53171/">CVE-2023-53171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53171">CVE-2023-53171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53174/">CVE-2023-53174 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53174">CVE-2023-53174 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53176/">CVE-2023-53176 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53176">CVE-2023-53176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53178/">CVE-2023-53178 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53178">CVE-2023-53178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53179/">CVE-2023-53179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53179">CVE-2023-53179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53182/">CVE-2023-53182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53182">CVE-2023-53182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53185/">CVE-2023-53185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53185">CVE-2023-53185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53196/">CVE-2023-53196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53196">CVE-2023-53196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53197/">CVE-2023-53197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53197">CVE-2023-53197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53199/">CVE-2023-53199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53199">CVE-2023-53199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53201/">CVE-2023-53201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53201">CVE-2023-53201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53205/">CVE-2023-53205 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53205">CVE-2023-53205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53213/">CVE-2023-53213 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53213">CVE-2023-53213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53216/">CVE-2023-53216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53216">CVE-2023-53216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53219/">CVE-2023-53219 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53219">CVE-2023-53219 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53222/">CVE-2023-53222 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53222">CVE-2023-53222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53223/">CVE-2023-53223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53223">CVE-2023-53223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53226/">CVE-2023-53226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53226">CVE-2023-53226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53229/">CVE-2023-53229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53229">CVE-2023-53229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53230/">CVE-2023-53230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53230">CVE-2023-53230 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53234/">CVE-2023-53234 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53234">CVE-2023-53234 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53238/">CVE-2023-53238 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53238">CVE-2023-53238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53239/">CVE-2023-53239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53239">CVE-2023-53239 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53241/">CVE-2023-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53241">CVE-2023-53241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53242/">CVE-2023-53242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53242">CVE-2023-53242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53244/">CVE-2023-53244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53244">CVE-2023-53244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53245/">CVE-2023-53245 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53245">CVE-2023-53245 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53246/">CVE-2023-53246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53246">CVE-2023-53246 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53249/">CVE-2023-53249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53249">CVE-2023-53249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53250/">CVE-2023-53250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53250">CVE-2023-53250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53251/">CVE-2023-53251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53251">CVE-2023-53251 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53255/">CVE-2023-53255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53255">CVE-2023-53255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53259/">CVE-2023-53259 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53259">CVE-2023-53259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53265/">CVE-2023-53265 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53265">CVE-2023-53265 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53268/">CVE-2023-53268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53268">CVE-2023-53268 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53270/">CVE-2023-53270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53270">CVE-2023-53270 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53272/">CVE-2023-53272 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53272">CVE-2023-53272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53273/">CVE-2023-53273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53273">CVE-2023-53273 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53275/">CVE-2023-53275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53275">CVE-2023-53275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53276/">CVE-2023-53276 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53276">CVE-2023-53276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53277/">CVE-2023-53277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53277">CVE-2023-53277 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53280/">CVE-2023-53280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53280">CVE-2023-53280 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53281/">CVE-2023-53281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53281">CVE-2023-53281 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53282/">CVE-2023-53282 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53282">CVE-2023-53282 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53286/">CVE-2023-53286 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53286">CVE-2023-53286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53288/">CVE-2023-53288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53288">CVE-2023-53288 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53295/">CVE-2023-53295 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53295">CVE-2023-53295 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53297/">CVE-2023-53297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53297">CVE-2023-53297 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53298/">CVE-2023-53298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53298">CVE-2023-53298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53299/">CVE-2023-53299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53299">CVE-2023-53299 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53302/">CVE-2023-53302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53302">CVE-2023-53302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53304/">CVE-2023-53304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53304">CVE-2023-53304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53305/">CVE-2023-53305 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53305">CVE-2023-53305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53307/">CVE-2023-53307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53307">CVE-2023-53307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53309/">CVE-2023-53309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53309">CVE-2023-53309 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53311/">CVE-2023-53311 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53311">CVE-2023-53311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53313/">CVE-2023-53313 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53313">CVE-2023-53313 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53314/">CVE-2023-53314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53314">CVE-2023-53314 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53315/">CVE-2023-53315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53315">CVE-2023-53315 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53316/">CVE-2023-53316 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53316">CVE-2023-53316 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53317/">CVE-2023-53317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53317">CVE-2023-53317 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53321/">CVE-2023-53321 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53321">CVE-2023-53321 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53322/">CVE-2023-53322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53322">CVE-2023-53322 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53324/">CVE-2023-53324 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53324">CVE-2023-53324 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53326/">CVE-2023-53326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53326">CVE-2023-53326 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53330/">CVE-2023-53330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53330">CVE-2023-53330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53331/">CVE-2023-53331 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53331">CVE-2023-53331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53333/">CVE-2023-53333 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53333">CVE-2023-53333 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53334/">CVE-2023-53334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53334">CVE-2023-53334 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53335/">CVE-2023-53335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53335">CVE-2023-53335 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53337/">CVE-2023-53337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53337">CVE-2023-53337 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53344/">CVE-2023-53344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53344">CVE-2023-53344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53349/">CVE-2023-53349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53349">CVE-2023-53349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53352/">CVE-2023-53352 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53352">CVE-2023-53352 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53356/">CVE-2023-53356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53356">CVE-2023-53356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53359/">CVE-2023-53359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53359">CVE-2023-53359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53368/">CVE-2023-53368 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53368">CVE-2023-53368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53373/">CVE-2023-53373 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53373">CVE-2023-53373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53375/">CVE-2023-53375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53375">CVE-2023-53375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53377/">CVE-2023-53377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53377">CVE-2023-53377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53379/">CVE-2023-53379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53379">CVE-2023-53379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53380/">CVE-2023-53380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53380">CVE-2023-53380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53381/">CVE-2023-53381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53381">CVE-2023-53381 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53384/">CVE-2023-53384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53384">CVE-2023-53384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53386/">CVE-2023-53386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53386">CVE-2023-53386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53388/">CVE-2023-53388 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53388">CVE-2023-53388 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53390/">CVE-2023-53390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53390">CVE-2023-53390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53393/">CVE-2023-53393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53393">CVE-2023-53393 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53395/">CVE-2023-53395 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53395">CVE-2023-53395 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53396/">CVE-2023-53396 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53396">CVE-2023-53396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53400/">CVE-2023-53400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53400">CVE-2023-53400 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53404/">CVE-2023-53404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53404">CVE-2023-53404 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53405/">CVE-2023-53405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53405">CVE-2023-53405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53406/">CVE-2023-53406 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53406">CVE-2023-53406 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53409/">CVE-2023-53409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53409">CVE-2023-53409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53413/">CVE-2023-53413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53413">CVE-2023-53413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53414/">CVE-2023-53414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53414">CVE-2023-53414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53415/">CVE-2023-53415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53415">CVE-2023-53415 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53416/">CVE-2023-53416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53416">CVE-2023-53416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53422/">CVE-2023-53422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53422">CVE-2023-53422 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53427/">CVE-2023-53427 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53427">CVE-2023-53427 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53431/">CVE-2023-53431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53431">CVE-2023-53431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53435/">CVE-2023-53435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53435">CVE-2023-53435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53436/">CVE-2023-53436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53436">CVE-2023-53436 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53437/">CVE-2023-53437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53437">CVE-2023-53437 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53438/">CVE-2023-53438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53438">CVE-2023-53438 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53440/">CVE-2023-53440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53440">CVE-2023-53440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53443/">CVE-2023-53443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53443">CVE-2023-53443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53446/">CVE-2023-53446 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53446">CVE-2023-53446 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53449/">CVE-2023-53449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53449">CVE-2023-53449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53451/">CVE-2023-53451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53451">CVE-2023-53451 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53452/">CVE-2023-53452 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53452">CVE-2023-53452 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53453/">CVE-2023-53453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53453">CVE-2023-53453 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53454/">CVE-2023-53454 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53454">CVE-2023-53454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53457/">CVE-2023-53457 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53457">CVE-2023-53457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53458/">CVE-2023-53458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53458">CVE-2023-53458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53463/">CVE-2023-53463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53463">CVE-2023-53463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53464/">CVE-2023-53464 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53464">CVE-2023-53464 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53465/">CVE-2023-53465 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53465">CVE-2023-53465 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53468/">CVE-2023-53468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53468">CVE-2023-53468 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53471/">CVE-2023-53471 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53471">CVE-2023-53471 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53472/">CVE-2023-53472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53472">CVE-2023-53472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53473/">CVE-2023-53473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53473">CVE-2023-53473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53474/">CVE-2023-53474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53474">CVE-2023-53474 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53475/">CVE-2023-53475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53475">CVE-2023-53475 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53476/">CVE-2023-53476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53476">CVE-2023-53476 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53485/">CVE-2023-53485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53485">CVE-2023-53485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53487/">CVE-2023-53487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53487">CVE-2023-53487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53488/">CVE-2023-53488 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53488">CVE-2023-53488 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53492/">CVE-2023-53492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53492">CVE-2023-53492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53494/">CVE-2023-53494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53494">CVE-2023-53494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53496/">CVE-2023-53496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53496">CVE-2023-53496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53498/">CVE-2023-53498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53498">CVE-2023-53498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53499/">CVE-2023-53499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53499">CVE-2023-53499 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53505/">CVE-2023-53505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53505">CVE-2023-53505 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53506/">CVE-2023-53506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53506">CVE-2023-53506 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53509/">CVE-2023-53509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53509">CVE-2023-53509 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53512/">CVE-2023-53512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53512">CVE-2023-53512 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53513/">CVE-2023-53513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53513">CVE-2023-53513 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53515/">CVE-2023-53515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53515">CVE-2023-53515 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53518/">CVE-2023-53518 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53518">CVE-2023-53518 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53519/">CVE-2023-53519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53519">CVE-2023-53519 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53521/">CVE-2023-53521 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53521">CVE-2023-53521 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53524/">CVE-2023-53524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53524">CVE-2023-53524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53525/">CVE-2023-53525 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53525">CVE-2023-53525 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53526/">CVE-2023-53526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53526">CVE-2023-53526 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53530/">CVE-2023-53530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53530">CVE-2023-53530 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58240/">CVE-2024-58240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58240">CVE-2024-58240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23155/">CVE-2025-23155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23155">CVE-2025-23155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37738/">CVE-2025-37738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37738">CVE-2025-37738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37885/">CVE-2025-37885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37885">CVE-2025-37885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37958/">CVE-2025-37958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37958">CVE-2025-37958 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38014/">CVE-2025-38014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38014">CVE-2025-38014 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38084/">CVE-2025-38084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38085/">CVE-2025-38085 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38111/">CVE-2025-38111 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38111">CVE-2025-38111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38184/">CVE-2025-38184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38184">CVE-2025-38184 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38380/">CVE-2025-38380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38470/">CVE-2025-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38470">CVE-2025-38470 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38476/">CVE-2025-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38476">CVE-2025-38476 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38488/">CVE-2025-38488 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38488">CVE-2025-38488 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38553/">CVE-2025-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38553">CVE-2025-38553 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38572/">CVE-2025-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38659/">CVE-2025-38659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38659">CVE-2025-38659 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38664/">CVE-2025-38664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38664">CVE-2025-38664 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38678/">CVE-2025-38678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38678">CVE-2025-38678 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38685/">CVE-2025-38685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38706/">CVE-2025-38706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38706">CVE-2025-38706 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38713/">CVE-2025-38713 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38713">CVE-2025-38713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38734/">CVE-2025-38734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38734">CVE-2025-38734 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39691/">CVE-2025-39691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39691">CVE-2025-39691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39703/">CVE-2025-39703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39703">CVE-2025-39703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39726/">CVE-2025-39726 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39726">CVE-2025-39726 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39746/">CVE-2025-39746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39746">CVE-2025-39746 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39751/">CVE-2025-39751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39790/">CVE-2025-39790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39790">CVE-2025-39790 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39797/">CVE-2025-39797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39823/">CVE-2025-39823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39823">CVE-2025-39823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39824/">CVE-2025-39824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39824">CVE-2025-39824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39860/">CVE-2025-39860 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39860">CVE-2025-39860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39869/">CVE-2025-39869 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39869">CVE-2025-39869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022498" comment="kernel-default-5.14.21-150400.24.179.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022243" comment="kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206401" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236588" ref_url="https://bugzilla.suse.com/1236588" source="BUGZILLA"/>
		<reference ref_id="1236590" ref_url="https://bugzilla.suse.com/1236590" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-0167" ref_url="https://www.suse.com/security/cve/CVE-2025-0167/" source="CVE"/>
		<reference ref_id="CVE-2025-0725" ref_url="https://www.suse.com/security/cve/CVE-2025-0725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ECCI3BAXLHLUGPYD4ZUE4JHXTHZWYAK/" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2025-0725: Fixed gzip integer overflow (bsc#1236590)
- CVE-2025-0167: Fixed netrc and default credential leak (bsc#1236588)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-05"/>
	<updated date="2025-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1236588">SUSE bug 1236588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236590">SUSE bug 1236590</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0167/">CVE-2025-0167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0167">CVE-2025-0167 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0725/">CVE-2025-0725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0725">CVE-2025-0725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962922" comment="curl-8.0.1-150400.5.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962923" comment="libcurl4-8.0.1-150400.5.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206402" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1164051" ref_url="https://bugzilla.suse.com/1164051" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1202700" ref_url="https://bugzilla.suse.com/1202700" source="BUGZILLA"/>
		<reference ref_id="1203063" ref_url="https://bugzilla.suse.com/1203063" source="BUGZILLA"/>
		<reference ref_id="1203332" ref_url="https://bugzilla.suse.com/1203332" source="BUGZILLA"/>
		<reference ref_id="1204228" ref_url="https://bugzilla.suse.com/1204228" source="BUGZILLA"/>
		<reference ref_id="1205128" ref_url="https://bugzilla.suse.com/1205128" source="BUGZILLA"/>
		<reference ref_id="1206456" ref_url="https://bugzilla.suse.com/1206456" source="BUGZILLA"/>
		<reference ref_id="1206468" ref_url="https://bugzilla.suse.com/1206468" source="BUGZILLA"/>
		<reference ref_id="1206883" ref_url="https://bugzilla.suse.com/1206883" source="BUGZILLA"/>
		<reference ref_id="1206884" ref_url="https://bugzilla.suse.com/1206884" source="BUGZILLA"/>
		<reference ref_id="1207158" ref_url="https://bugzilla.suse.com/1207158" source="BUGZILLA"/>
		<reference ref_id="1207621" ref_url="https://bugzilla.suse.com/1207621" source="BUGZILLA"/>
		<reference ref_id="1207624" ref_url="https://bugzilla.suse.com/1207624" source="BUGZILLA"/>
		<reference ref_id="1207625" ref_url="https://bugzilla.suse.com/1207625" source="BUGZILLA"/>
		<reference ref_id="1207628" ref_url="https://bugzilla.suse.com/1207628" source="BUGZILLA"/>
		<reference ref_id="1207629" ref_url="https://bugzilla.suse.com/1207629" source="BUGZILLA"/>
		<reference ref_id="1207631" ref_url="https://bugzilla.suse.com/1207631" source="BUGZILLA"/>
		<reference ref_id="1207645" ref_url="https://bugzilla.suse.com/1207645" source="BUGZILLA"/>
		<reference ref_id="1207651" ref_url="https://bugzilla.suse.com/1207651" source="BUGZILLA"/>
		<reference ref_id="1208607" ref_url="https://bugzilla.suse.com/1208607" source="BUGZILLA"/>
		<reference ref_id="1209287" ref_url="https://bugzilla.suse.com/1209287" source="BUGZILLA"/>
		<reference ref_id="1209291" ref_url="https://bugzilla.suse.com/1209291" source="BUGZILLA"/>
		<reference ref_id="1210584" ref_url="https://bugzilla.suse.com/1210584" source="BUGZILLA"/>
		<reference ref_id="1211960" ref_url="https://bugzilla.suse.com/1211960" source="BUGZILLA"/>
		<reference ref_id="1212603" ref_url="https://bugzilla.suse.com/1212603" source="BUGZILLA"/>
		<reference ref_id="1213015" ref_url="https://bugzilla.suse.com/1213015" source="BUGZILLA"/>
		<reference ref_id="1213016" ref_url="https://bugzilla.suse.com/1213016" source="BUGZILLA"/>
		<reference ref_id="1213040" ref_url="https://bugzilla.suse.com/1213040" source="BUGZILLA"/>
		<reference ref_id="1213041" ref_url="https://bugzilla.suse.com/1213041" source="BUGZILLA"/>
		<reference ref_id="1213061" ref_url="https://bugzilla.suse.com/1213061" source="BUGZILLA"/>
		<reference ref_id="1213099" ref_url="https://bugzilla.suse.com/1213099" source="BUGZILLA"/>
		<reference ref_id="1213104" ref_url="https://bugzilla.suse.com/1213104" source="BUGZILLA"/>
		<reference ref_id="1213666" ref_url="https://bugzilla.suse.com/1213666" source="BUGZILLA"/>
		<reference ref_id="1213747" ref_url="https://bugzilla.suse.com/1213747" source="BUGZILLA"/>
		<reference ref_id="1214953" ref_url="https://bugzilla.suse.com/1214953" source="BUGZILLA"/>
		<reference ref_id="1214967" ref_url="https://bugzilla.suse.com/1214967" source="BUGZILLA"/>
		<reference ref_id="1215150" ref_url="https://bugzilla.suse.com/1215150" source="BUGZILLA"/>
		<reference ref_id="1215696" ref_url="https://bugzilla.suse.com/1215696" source="BUGZILLA"/>
		<reference ref_id="1215911" ref_url="https://bugzilla.suse.com/1215911" source="BUGZILLA"/>
		<reference ref_id="1216976" ref_url="https://bugzilla.suse.com/1216976" source="BUGZILLA"/>
		<reference ref_id="1217790" ref_url="https://bugzilla.suse.com/1217790" source="BUGZILLA"/>
		<reference ref_id="1220185" ref_url="https://bugzilla.suse.com/1220185" source="BUGZILLA"/>
		<reference ref_id="1220186" ref_url="https://bugzilla.suse.com/1220186" source="BUGZILLA"/>
		<reference ref_id="1236104" ref_url="https://bugzilla.suse.com/1236104" source="BUGZILLA"/>
		<reference ref_id="1238160" ref_url="https://bugzilla.suse.com/1238160" source="BUGZILLA"/>
		<reference ref_id="1241353" ref_url="https://bugzilla.suse.com/1241353" source="BUGZILLA"/>
		<reference ref_id="1242573" ref_url="https://bugzilla.suse.com/1242573" source="BUGZILLA"/>
		<reference ref_id="1242846" ref_url="https://bugzilla.suse.com/1242846" source="BUGZILLA"/>
		<reference ref_id="1242960" ref_url="https://bugzilla.suse.com/1242960" source="BUGZILLA"/>
		<reference ref_id="1243539" ref_url="https://bugzilla.suse.com/1243539" source="BUGZILLA"/>
		<reference ref_id="1244337" ref_url="https://bugzilla.suse.com/1244337" source="BUGZILLA"/>
		<reference ref_id="1245110" ref_url="https://bugzilla.suse.com/1245110" source="BUGZILLA"/>
		<reference ref_id="1245498" ref_url="https://bugzilla.suse.com/1245498" source="BUGZILLA"/>
		<reference ref_id="1245499" ref_url="https://bugzilla.suse.com/1245499" source="BUGZILLA"/>
		<reference ref_id="1245666" ref_url="https://bugzilla.suse.com/1245666" source="BUGZILLA"/>
		<reference ref_id="1245956" ref_url="https://bugzilla.suse.com/1245956" source="BUGZILLA"/>
		<reference ref_id="1246879" ref_url="https://bugzilla.suse.com/1246879" source="BUGZILLA"/>
		<reference ref_id="1246968" ref_url="https://bugzilla.suse.com/1246968" source="BUGZILLA"/>
		<reference ref_id="1247028" ref_url="https://bugzilla.suse.com/1247028" source="BUGZILLA"/>
		<reference ref_id="1247172" ref_url="https://bugzilla.suse.com/1247172" source="BUGZILLA"/>
		<reference ref_id="1247239" ref_url="https://bugzilla.suse.com/1247239" source="BUGZILLA"/>
		<reference ref_id="1247288" ref_url="https://bugzilla.suse.com/1247288" source="BUGZILLA"/>
		<reference ref_id="1247317" ref_url="https://bugzilla.suse.com/1247317" source="BUGZILLA"/>
		<reference ref_id="1248108" ref_url="https://bugzilla.suse.com/1248108" source="BUGZILLA"/>
		<reference ref_id="1248255" ref_url="https://bugzilla.suse.com/1248255" source="BUGZILLA"/>
		<reference ref_id="1248399" ref_url="https://bugzilla.suse.com/1248399" source="BUGZILLA"/>
		<reference ref_id="1248628" ref_url="https://bugzilla.suse.com/1248628" source="BUGZILLA"/>
		<reference ref_id="1248639" ref_url="https://bugzilla.suse.com/1248639" source="BUGZILLA"/>
		<reference ref_id="1248847" ref_url="https://bugzilla.suse.com/1248847" source="BUGZILLA"/>
		<reference ref_id="1249126" ref_url="https://bugzilla.suse.com/1249126" source="BUGZILLA"/>
		<reference ref_id="1249158" ref_url="https://bugzilla.suse.com/1249158" source="BUGZILLA"/>
		<reference ref_id="1249186" ref_url="https://bugzilla.suse.com/1249186" source="BUGZILLA"/>
		<reference ref_id="1249195" ref_url="https://bugzilla.suse.com/1249195" source="BUGZILLA"/>
		<reference ref_id="1249200" ref_url="https://bugzilla.suse.com/1249200" source="BUGZILLA"/>
		<reference ref_id="1249220" ref_url="https://bugzilla.suse.com/1249220" source="BUGZILLA"/>
		<reference ref_id="1249266" ref_url="https://bugzilla.suse.com/1249266" source="BUGZILLA"/>
		<reference ref_id="1249315" ref_url="https://bugzilla.suse.com/1249315" source="BUGZILLA"/>
		<reference ref_id="1249324" ref_url="https://bugzilla.suse.com/1249324" source="BUGZILLA"/>
		<reference ref_id="1249346" ref_url="https://bugzilla.suse.com/1249346" source="BUGZILLA"/>
		<reference ref_id="1249374" ref_url="https://bugzilla.suse.com/1249374" source="BUGZILLA"/>
		<reference ref_id="1249516" ref_url="https://bugzilla.suse.com/1249516" source="BUGZILLA"/>
		<reference ref_id="1249538" ref_url="https://bugzilla.suse.com/1249538" source="BUGZILLA"/>
		<reference ref_id="1249548" ref_url="https://bugzilla.suse.com/1249548" source="BUGZILLA"/>
		<reference ref_id="1249604" ref_url="https://bugzilla.suse.com/1249604" source="BUGZILLA"/>
		<reference ref_id="1249608" ref_url="https://bugzilla.suse.com/1249608" source="BUGZILLA"/>
		<reference ref_id="1249638" ref_url="https://bugzilla.suse.com/1249638" source="BUGZILLA"/>
		<reference ref_id="1249639" ref_url="https://bugzilla.suse.com/1249639" source="BUGZILLA"/>
		<reference ref_id="1249641" ref_url="https://bugzilla.suse.com/1249641" source="BUGZILLA"/>
		<reference ref_id="1249642" ref_url="https://bugzilla.suse.com/1249642" source="BUGZILLA"/>
		<reference ref_id="1249650" ref_url="https://bugzilla.suse.com/1249650" source="BUGZILLA"/>
		<reference ref_id="1249651" ref_url="https://bugzilla.suse.com/1249651" source="BUGZILLA"/>
		<reference ref_id="1249658" ref_url="https://bugzilla.suse.com/1249658" source="BUGZILLA"/>
		<reference ref_id="1249661" ref_url="https://bugzilla.suse.com/1249661" source="BUGZILLA"/>
		<reference ref_id="1249664" ref_url="https://bugzilla.suse.com/1249664" source="BUGZILLA"/>
		<reference ref_id="1249667" ref_url="https://bugzilla.suse.com/1249667" source="BUGZILLA"/>
		<reference ref_id="1249669" ref_url="https://bugzilla.suse.com/1249669" source="BUGZILLA"/>
		<reference ref_id="1249677" ref_url="https://bugzilla.suse.com/1249677" source="BUGZILLA"/>
		<reference ref_id="1249681" ref_url="https://bugzilla.suse.com/1249681" source="BUGZILLA"/>
		<reference ref_id="1249683" ref_url="https://bugzilla.suse.com/1249683" source="BUGZILLA"/>
		<reference ref_id="1249685" ref_url="https://bugzilla.suse.com/1249685" source="BUGZILLA"/>
		<reference ref_id="1249687" ref_url="https://bugzilla.suse.com/1249687" source="BUGZILLA"/>
		<reference ref_id="1249695" ref_url="https://bugzilla.suse.com/1249695" source="BUGZILLA"/>
		<reference ref_id="1249699" ref_url="https://bugzilla.suse.com/1249699" source="BUGZILLA"/>
		<reference ref_id="1249700" ref_url="https://bugzilla.suse.com/1249700" source="BUGZILLA"/>
		<reference ref_id="1249701" ref_url="https://bugzilla.suse.com/1249701" source="BUGZILLA"/>
		<reference ref_id="1249705" ref_url="https://bugzilla.suse.com/1249705" source="BUGZILLA"/>
		<reference ref_id="1249706" ref_url="https://bugzilla.suse.com/1249706" source="BUGZILLA"/>
		<reference ref_id="1249707" ref_url="https://bugzilla.suse.com/1249707" source="BUGZILLA"/>
		<reference ref_id="1249709" ref_url="https://bugzilla.suse.com/1249709" source="BUGZILLA"/>
		<reference ref_id="1249712" ref_url="https://bugzilla.suse.com/1249712" source="BUGZILLA"/>
		<reference ref_id="1249713" ref_url="https://bugzilla.suse.com/1249713" source="BUGZILLA"/>
		<reference ref_id="1249715" ref_url="https://bugzilla.suse.com/1249715" source="BUGZILLA"/>
		<reference ref_id="1249716" ref_url="https://bugzilla.suse.com/1249716" source="BUGZILLA"/>
		<reference ref_id="1249718" ref_url="https://bugzilla.suse.com/1249718" source="BUGZILLA"/>
		<reference ref_id="1249722" ref_url="https://bugzilla.suse.com/1249722" source="BUGZILLA"/>
		<reference ref_id="1249727" ref_url="https://bugzilla.suse.com/1249727" source="BUGZILLA"/>
		<reference ref_id="1249730" ref_url="https://bugzilla.suse.com/1249730" source="BUGZILLA"/>
		<reference ref_id="1249733" ref_url="https://bugzilla.suse.com/1249733" source="BUGZILLA"/>
		<reference ref_id="1249734" ref_url="https://bugzilla.suse.com/1249734" source="BUGZILLA"/>
		<reference ref_id="1249739" ref_url="https://bugzilla.suse.com/1249739" source="BUGZILLA"/>
		<reference ref_id="1249740" ref_url="https://bugzilla.suse.com/1249740" source="BUGZILLA"/>
		<reference ref_id="1249741" ref_url="https://bugzilla.suse.com/1249741" source="BUGZILLA"/>
		<reference ref_id="1249742" ref_url="https://bugzilla.suse.com/1249742" source="BUGZILLA"/>
		<reference ref_id="1249743" ref_url="https://bugzilla.suse.com/1249743" source="BUGZILLA"/>
		<reference ref_id="1249745" ref_url="https://bugzilla.suse.com/1249745" source="BUGZILLA"/>
		<reference ref_id="1249746" ref_url="https://bugzilla.suse.com/1249746" source="BUGZILLA"/>
		<reference ref_id="1249747" ref_url="https://bugzilla.suse.com/1249747" source="BUGZILLA"/>
		<reference ref_id="1249749" ref_url="https://bugzilla.suse.com/1249749" source="BUGZILLA"/>
		<reference ref_id="1249750" ref_url="https://bugzilla.suse.com/1249750" source="BUGZILLA"/>
		<reference ref_id="1249751" ref_url="https://bugzilla.suse.com/1249751" source="BUGZILLA"/>
		<reference ref_id="1249753" ref_url="https://bugzilla.suse.com/1249753" source="BUGZILLA"/>
		<reference ref_id="1249758" ref_url="https://bugzilla.suse.com/1249758" source="BUGZILLA"/>
		<reference ref_id="1249762" ref_url="https://bugzilla.suse.com/1249762" source="BUGZILLA"/>
		<reference ref_id="1249767" ref_url="https://bugzilla.suse.com/1249767" source="BUGZILLA"/>
		<reference ref_id="1249777" ref_url="https://bugzilla.suse.com/1249777" source="BUGZILLA"/>
		<reference ref_id="1249781" ref_url="https://bugzilla.suse.com/1249781" source="BUGZILLA"/>
		<reference ref_id="1249784" ref_url="https://bugzilla.suse.com/1249784" source="BUGZILLA"/>
		<reference ref_id="1249791" ref_url="https://bugzilla.suse.com/1249791" source="BUGZILLA"/>
		<reference ref_id="1249799" ref_url="https://bugzilla.suse.com/1249799" source="BUGZILLA"/>
		<reference ref_id="1249808" ref_url="https://bugzilla.suse.com/1249808" source="BUGZILLA"/>
		<reference ref_id="1249810" ref_url="https://bugzilla.suse.com/1249810" source="BUGZILLA"/>
		<reference ref_id="1249820" ref_url="https://bugzilla.suse.com/1249820" source="BUGZILLA"/>
		<reference ref_id="1249825" ref_url="https://bugzilla.suse.com/1249825" source="BUGZILLA"/>
		<reference ref_id="1249827" ref_url="https://bugzilla.suse.com/1249827" source="BUGZILLA"/>
		<reference ref_id="1249836" ref_url="https://bugzilla.suse.com/1249836" source="BUGZILLA"/>
		<reference ref_id="1249840" ref_url="https://bugzilla.suse.com/1249840" source="BUGZILLA"/>
		<reference ref_id="1249844" ref_url="https://bugzilla.suse.com/1249844" source="BUGZILLA"/>
		<reference ref_id="1249846" ref_url="https://bugzilla.suse.com/1249846" source="BUGZILLA"/>
		<reference ref_id="1249853" ref_url="https://bugzilla.suse.com/1249853" source="BUGZILLA"/>
		<reference ref_id="1249858" ref_url="https://bugzilla.suse.com/1249858" source="BUGZILLA"/>
		<reference ref_id="1249860" ref_url="https://bugzilla.suse.com/1249860" source="BUGZILLA"/>
		<reference ref_id="1249864" ref_url="https://bugzilla.suse.com/1249864" source="BUGZILLA"/>
		<reference ref_id="1249865" ref_url="https://bugzilla.suse.com/1249865" source="BUGZILLA"/>
		<reference ref_id="1249866" ref_url="https://bugzilla.suse.com/1249866" source="BUGZILLA"/>
		<reference ref_id="1249867" ref_url="https://bugzilla.suse.com/1249867" source="BUGZILLA"/>
		<reference ref_id="1249868" ref_url="https://bugzilla.suse.com/1249868" source="BUGZILLA"/>
		<reference ref_id="1249872" ref_url="https://bugzilla.suse.com/1249872" source="BUGZILLA"/>
		<reference ref_id="1249877" ref_url="https://bugzilla.suse.com/1249877" source="BUGZILLA"/>
		<reference ref_id="1249880" ref_url="https://bugzilla.suse.com/1249880" source="BUGZILLA"/>
		<reference ref_id="1249882" ref_url="https://bugzilla.suse.com/1249882" source="BUGZILLA"/>
		<reference ref_id="1249885" ref_url="https://bugzilla.suse.com/1249885" source="BUGZILLA"/>
		<reference ref_id="1249890" ref_url="https://bugzilla.suse.com/1249890" source="BUGZILLA"/>
		<reference ref_id="1249892" ref_url="https://bugzilla.suse.com/1249892" source="BUGZILLA"/>
		<reference ref_id="1249908" ref_url="https://bugzilla.suse.com/1249908" source="BUGZILLA"/>
		<reference ref_id="1249910" ref_url="https://bugzilla.suse.com/1249910" source="BUGZILLA"/>
		<reference ref_id="1249911" ref_url="https://bugzilla.suse.com/1249911" source="BUGZILLA"/>
		<reference ref_id="1249914" ref_url="https://bugzilla.suse.com/1249914" source="BUGZILLA"/>
		<reference ref_id="1249917" ref_url="https://bugzilla.suse.com/1249917" source="BUGZILLA"/>
		<reference ref_id="1249918" ref_url="https://bugzilla.suse.com/1249918" source="BUGZILLA"/>
		<reference ref_id="1249920" ref_url="https://bugzilla.suse.com/1249920" source="BUGZILLA"/>
		<reference ref_id="1249923" ref_url="https://bugzilla.suse.com/1249923" source="BUGZILLA"/>
		<reference ref_id="1249924" ref_url="https://bugzilla.suse.com/1249924" source="BUGZILLA"/>
		<reference ref_id="1249925" ref_url="https://bugzilla.suse.com/1249925" source="BUGZILLA"/>
		<reference ref_id="1249927" ref_url="https://bugzilla.suse.com/1249927" source="BUGZILLA"/>
		<reference ref_id="1249928" ref_url="https://bugzilla.suse.com/1249928" source="BUGZILLA"/>
		<reference ref_id="1249930" ref_url="https://bugzilla.suse.com/1249930" source="BUGZILLA"/>
		<reference ref_id="1249933" ref_url="https://bugzilla.suse.com/1249933" source="BUGZILLA"/>
		<reference ref_id="1249934" ref_url="https://bugzilla.suse.com/1249934" source="BUGZILLA"/>
		<reference ref_id="1249936" ref_url="https://bugzilla.suse.com/1249936" source="BUGZILLA"/>
		<reference ref_id="1249938" ref_url="https://bugzilla.suse.com/1249938" source="BUGZILLA"/>
		<reference ref_id="1249939" ref_url="https://bugzilla.suse.com/1249939" source="BUGZILLA"/>
		<reference ref_id="1249944" ref_url="https://bugzilla.suse.com/1249944" source="BUGZILLA"/>
		<reference ref_id="1249947" ref_url="https://bugzilla.suse.com/1249947" source="BUGZILLA"/>
		<reference ref_id="1249949" ref_url="https://bugzilla.suse.com/1249949" source="BUGZILLA"/>
		<reference ref_id="1249950" ref_url="https://bugzilla.suse.com/1249950" source="BUGZILLA"/>
		<reference ref_id="1249954" ref_url="https://bugzilla.suse.com/1249954" source="BUGZILLA"/>
		<reference ref_id="1249958" ref_url="https://bugzilla.suse.com/1249958" source="BUGZILLA"/>
		<reference ref_id="1249979" ref_url="https://bugzilla.suse.com/1249979" source="BUGZILLA"/>
		<reference ref_id="1249981" ref_url="https://bugzilla.suse.com/1249981" source="BUGZILLA"/>
		<reference ref_id="1249991" ref_url="https://bugzilla.suse.com/1249991" source="BUGZILLA"/>
		<reference ref_id="1249997" ref_url="https://bugzilla.suse.com/1249997" source="BUGZILLA"/>
		<reference ref_id="1250002" ref_url="https://bugzilla.suse.com/1250002" source="BUGZILLA"/>
		<reference ref_id="1250006" ref_url="https://bugzilla.suse.com/1250006" source="BUGZILLA"/>
		<reference ref_id="1250007" ref_url="https://bugzilla.suse.com/1250007" source="BUGZILLA"/>
		<reference ref_id="1250009" ref_url="https://bugzilla.suse.com/1250009" source="BUGZILLA"/>
		<reference ref_id="1250010" ref_url="https://bugzilla.suse.com/1250010" source="BUGZILLA"/>
		<reference ref_id="1250011" ref_url="https://bugzilla.suse.com/1250011" source="BUGZILLA"/>
		<reference ref_id="1250014" ref_url="https://bugzilla.suse.com/1250014" source="BUGZILLA"/>
		<reference ref_id="1250015" ref_url="https://bugzilla.suse.com/1250015" source="BUGZILLA"/>
		<reference ref_id="1250023" ref_url="https://bugzilla.suse.com/1250023" source="BUGZILLA"/>
		<reference ref_id="1250024" ref_url="https://bugzilla.suse.com/1250024" source="BUGZILLA"/>
		<reference ref_id="1250026" ref_url="https://bugzilla.suse.com/1250026" source="BUGZILLA"/>
		<reference ref_id="1250039" ref_url="https://bugzilla.suse.com/1250039" source="BUGZILLA"/>
		<reference ref_id="1250041" ref_url="https://bugzilla.suse.com/1250041" source="BUGZILLA"/>
		<reference ref_id="1250043" ref_url="https://bugzilla.suse.com/1250043" source="BUGZILLA"/>
		<reference ref_id="1250044" ref_url="https://bugzilla.suse.com/1250044" source="BUGZILLA"/>
		<reference ref_id="1250047" ref_url="https://bugzilla.suse.com/1250047" source="BUGZILLA"/>
		<reference ref_id="1250049" ref_url="https://bugzilla.suse.com/1250049" source="BUGZILLA"/>
		<reference ref_id="1250052" ref_url="https://bugzilla.suse.com/1250052" source="BUGZILLA"/>
		<reference ref_id="1250055" ref_url="https://bugzilla.suse.com/1250055" source="BUGZILLA"/>
		<reference ref_id="1250058" ref_url="https://bugzilla.suse.com/1250058" source="BUGZILLA"/>
		<reference ref_id="1250060" ref_url="https://bugzilla.suse.com/1250060" source="BUGZILLA"/>
		<reference ref_id="1250062" ref_url="https://bugzilla.suse.com/1250062" source="BUGZILLA"/>
		<reference ref_id="1250065" ref_url="https://bugzilla.suse.com/1250065" source="BUGZILLA"/>
		<reference ref_id="1250066" ref_url="https://bugzilla.suse.com/1250066" source="BUGZILLA"/>
		<reference ref_id="1250070" ref_url="https://bugzilla.suse.com/1250070" source="BUGZILLA"/>
		<reference ref_id="1250071" ref_url="https://bugzilla.suse.com/1250071" source="BUGZILLA"/>
		<reference ref_id="1250072" ref_url="https://bugzilla.suse.com/1250072" source="BUGZILLA"/>
		<reference ref_id="1250077" ref_url="https://bugzilla.suse.com/1250077" source="BUGZILLA"/>
		<reference ref_id="1250080" ref_url="https://bugzilla.suse.com/1250080" source="BUGZILLA"/>
		<reference ref_id="1250081" ref_url="https://bugzilla.suse.com/1250081" source="BUGZILLA"/>
		<reference ref_id="1250083" ref_url="https://bugzilla.suse.com/1250083" source="BUGZILLA"/>
		<reference ref_id="1250105" ref_url="https://bugzilla.suse.com/1250105" source="BUGZILLA"/>
		<reference ref_id="1250106" ref_url="https://bugzilla.suse.com/1250106" source="BUGZILLA"/>
		<reference ref_id="1250107" ref_url="https://bugzilla.suse.com/1250107" source="BUGZILLA"/>
		<reference ref_id="1250108" ref_url="https://bugzilla.suse.com/1250108" source="BUGZILLA"/>
		<reference ref_id="1250114" ref_url="https://bugzilla.suse.com/1250114" source="BUGZILLA"/>
		<reference ref_id="1250118" ref_url="https://bugzilla.suse.com/1250118" source="BUGZILLA"/>
		<reference ref_id="1250121" ref_url="https://bugzilla.suse.com/1250121" source="BUGZILLA"/>
		<reference ref_id="1250127" ref_url="https://bugzilla.suse.com/1250127" source="BUGZILLA"/>
		<reference ref_id="1250128" ref_url="https://bugzilla.suse.com/1250128" source="BUGZILLA"/>
		<reference ref_id="1250131" ref_url="https://bugzilla.suse.com/1250131" source="BUGZILLA"/>
		<reference ref_id="1250132" ref_url="https://bugzilla.suse.com/1250132" source="BUGZILLA"/>
		<reference ref_id="1250137" ref_url="https://bugzilla.suse.com/1250137" source="BUGZILLA"/>
		<reference ref_id="1250138" ref_url="https://bugzilla.suse.com/1250138" source="BUGZILLA"/>
		<reference ref_id="1250140" ref_url="https://bugzilla.suse.com/1250140" source="BUGZILLA"/>
		<reference ref_id="1250145" ref_url="https://bugzilla.suse.com/1250145" source="BUGZILLA"/>
		<reference ref_id="1250151" ref_url="https://bugzilla.suse.com/1250151" source="BUGZILLA"/>
		<reference ref_id="1250153" ref_url="https://bugzilla.suse.com/1250153" source="BUGZILLA"/>
		<reference ref_id="1250156" ref_url="https://bugzilla.suse.com/1250156" source="BUGZILLA"/>
		<reference ref_id="1250159" ref_url="https://bugzilla.suse.com/1250159" source="BUGZILLA"/>
		<reference ref_id="1250161" ref_url="https://bugzilla.suse.com/1250161" source="BUGZILLA"/>
		<reference ref_id="1250168" ref_url="https://bugzilla.suse.com/1250168" source="BUGZILLA"/>
		<reference ref_id="1250178" ref_url="https://bugzilla.suse.com/1250178" source="BUGZILLA"/>
		<reference ref_id="1250180" ref_url="https://bugzilla.suse.com/1250180" source="BUGZILLA"/>
		<reference ref_id="1250181" ref_url="https://bugzilla.suse.com/1250181" source="BUGZILLA"/>
		<reference ref_id="1250182" ref_url="https://bugzilla.suse.com/1250182" source="BUGZILLA"/>
		<reference ref_id="1250183" ref_url="https://bugzilla.suse.com/1250183" source="BUGZILLA"/>
		<reference ref_id="1250184" ref_url="https://bugzilla.suse.com/1250184" source="BUGZILLA"/>
		<reference ref_id="1250187" ref_url="https://bugzilla.suse.com/1250187" source="BUGZILLA"/>
		<reference ref_id="1250191" ref_url="https://bugzilla.suse.com/1250191" source="BUGZILLA"/>
		<reference ref_id="1250197" ref_url="https://bugzilla.suse.com/1250197" source="BUGZILLA"/>
		<reference ref_id="1250198" ref_url="https://bugzilla.suse.com/1250198" source="BUGZILLA"/>
		<reference ref_id="1250200" ref_url="https://bugzilla.suse.com/1250200" source="BUGZILLA"/>
		<reference ref_id="1250209" ref_url="https://bugzilla.suse.com/1250209" source="BUGZILLA"/>
		<reference ref_id="1250211" ref_url="https://bugzilla.suse.com/1250211" source="BUGZILLA"/>
		<reference ref_id="1250237" ref_url="https://bugzilla.suse.com/1250237" source="BUGZILLA"/>
		<reference ref_id="1250245" ref_url="https://bugzilla.suse.com/1250245" source="BUGZILLA"/>
		<reference ref_id="1250247" ref_url="https://bugzilla.suse.com/1250247" source="BUGZILLA"/>
		<reference ref_id="1250250" ref_url="https://bugzilla.suse.com/1250250" source="BUGZILLA"/>
		<reference ref_id="1250257" ref_url="https://bugzilla.suse.com/1250257" source="BUGZILLA"/>
		<reference ref_id="1250264" ref_url="https://bugzilla.suse.com/1250264" source="BUGZILLA"/>
		<reference ref_id="1250269" ref_url="https://bugzilla.suse.com/1250269" source="BUGZILLA"/>
		<reference ref_id="1250277" ref_url="https://bugzilla.suse.com/1250277" source="BUGZILLA"/>
		<reference ref_id="1250287" ref_url="https://bugzilla.suse.com/1250287" source="BUGZILLA"/>
		<reference ref_id="1250293" ref_url="https://bugzilla.suse.com/1250293" source="BUGZILLA"/>
		<reference ref_id="1250301" ref_url="https://bugzilla.suse.com/1250301" source="BUGZILLA"/>
		<reference ref_id="1250303" ref_url="https://bugzilla.suse.com/1250303" source="BUGZILLA"/>
		<reference ref_id="1250309" ref_url="https://bugzilla.suse.com/1250309" source="BUGZILLA"/>
		<reference ref_id="1250311" ref_url="https://bugzilla.suse.com/1250311" source="BUGZILLA"/>
		<reference ref_id="1250313" ref_url="https://bugzilla.suse.com/1250313" source="BUGZILLA"/>
		<reference ref_id="1250315" ref_url="https://bugzilla.suse.com/1250315" source="BUGZILLA"/>
		<reference ref_id="1250316" ref_url="https://bugzilla.suse.com/1250316" source="BUGZILLA"/>
		<reference ref_id="1250322" ref_url="https://bugzilla.suse.com/1250322" source="BUGZILLA"/>
		<reference ref_id="1250323" ref_url="https://bugzilla.suse.com/1250323" source="BUGZILLA"/>
		<reference ref_id="1250324" ref_url="https://bugzilla.suse.com/1250324" source="BUGZILLA"/>
		<reference ref_id="1250325" ref_url="https://bugzilla.suse.com/1250325" source="BUGZILLA"/>
		<reference ref_id="1250328" ref_url="https://bugzilla.suse.com/1250328" source="BUGZILLA"/>
		<reference ref_id="1250331" ref_url="https://bugzilla.suse.com/1250331" source="BUGZILLA"/>
		<reference ref_id="1250358" ref_url="https://bugzilla.suse.com/1250358" source="BUGZILLA"/>
		<reference ref_id="1250362" ref_url="https://bugzilla.suse.com/1250362" source="BUGZILLA"/>
		<reference ref_id="1250363" ref_url="https://bugzilla.suse.com/1250363" source="BUGZILLA"/>
		<reference ref_id="1250370" ref_url="https://bugzilla.suse.com/1250370" source="BUGZILLA"/>
		<reference ref_id="1250374" ref_url="https://bugzilla.suse.com/1250374" source="BUGZILLA"/>
		<reference ref_id="1250391" ref_url="https://bugzilla.suse.com/1250391" source="BUGZILLA"/>
		<reference ref_id="1250392" ref_url="https://bugzilla.suse.com/1250392" source="BUGZILLA"/>
		<reference ref_id="1250393" ref_url="https://bugzilla.suse.com/1250393" source="BUGZILLA"/>
		<reference ref_id="1250394" ref_url="https://bugzilla.suse.com/1250394" source="BUGZILLA"/>
		<reference ref_id="1250395" ref_url="https://bugzilla.suse.com/1250395" source="BUGZILLA"/>
		<reference ref_id="1250406" ref_url="https://bugzilla.suse.com/1250406" source="BUGZILLA"/>
		<reference ref_id="1250412" ref_url="https://bugzilla.suse.com/1250412" source="BUGZILLA"/>
		<reference ref_id="1250418" ref_url="https://bugzilla.suse.com/1250418" source="BUGZILLA"/>
		<reference ref_id="1250425" ref_url="https://bugzilla.suse.com/1250425" source="BUGZILLA"/>
		<reference ref_id="1250428" ref_url="https://bugzilla.suse.com/1250428" source="BUGZILLA"/>
		<reference ref_id="1250453" ref_url="https://bugzilla.suse.com/1250453" source="BUGZILLA"/>
		<reference ref_id="1250454" ref_url="https://bugzilla.suse.com/1250454" source="BUGZILLA"/>
		<reference ref_id="1250457" ref_url="https://bugzilla.suse.com/1250457" source="BUGZILLA"/>
		<reference ref_id="1250459" ref_url="https://bugzilla.suse.com/1250459" source="BUGZILLA"/>
		<reference ref_id="1250522" ref_url="https://bugzilla.suse.com/1250522" source="BUGZILLA"/>
		<reference ref_id="1250759" ref_url="https://bugzilla.suse.com/1250759" source="BUGZILLA"/>
		<reference ref_id="1250761" ref_url="https://bugzilla.suse.com/1250761" source="BUGZILLA"/>
		<reference ref_id="1250762" ref_url="https://bugzilla.suse.com/1250762" source="BUGZILLA"/>
		<reference ref_id="1250763" ref_url="https://bugzilla.suse.com/1250763" source="BUGZILLA"/>
		<reference ref_id="1250767" ref_url="https://bugzilla.suse.com/1250767" source="BUGZILLA"/>
		<reference ref_id="1250768" ref_url="https://bugzilla.suse.com/1250768" source="BUGZILLA"/>
		<reference ref_id="1250774" ref_url="https://bugzilla.suse.com/1250774" source="BUGZILLA"/>
		<reference ref_id="1250781" ref_url="https://bugzilla.suse.com/1250781" source="BUGZILLA"/>
		<reference ref_id="1250784" ref_url="https://bugzilla.suse.com/1250784" source="BUGZILLA"/>
		<reference ref_id="1250786" ref_url="https://bugzilla.suse.com/1250786" source="BUGZILLA"/>
		<reference ref_id="1250787" ref_url="https://bugzilla.suse.com/1250787" source="BUGZILLA"/>
		<reference ref_id="1250790" ref_url="https://bugzilla.suse.com/1250790" source="BUGZILLA"/>
		<reference ref_id="1250791" ref_url="https://bugzilla.suse.com/1250791" source="BUGZILLA"/>
		<reference ref_id="1250792" ref_url="https://bugzilla.suse.com/1250792" source="BUGZILLA"/>
		<reference ref_id="1250797" ref_url="https://bugzilla.suse.com/1250797" source="BUGZILLA"/>
		<reference ref_id="1250799" ref_url="https://bugzilla.suse.com/1250799" source="BUGZILLA"/>
		<reference ref_id="1250807" ref_url="https://bugzilla.suse.com/1250807" source="BUGZILLA"/>
		<reference ref_id="1250810" ref_url="https://bugzilla.suse.com/1250810" source="BUGZILLA"/>
		<reference ref_id="1250811" ref_url="https://bugzilla.suse.com/1250811" source="BUGZILLA"/>
		<reference ref_id="1250818" ref_url="https://bugzilla.suse.com/1250818" source="BUGZILLA"/>
		<reference ref_id="1250819" ref_url="https://bugzilla.suse.com/1250819" source="BUGZILLA"/>
		<reference ref_id="1250822" ref_url="https://bugzilla.suse.com/1250822" source="BUGZILLA"/>
		<reference ref_id="1250823" ref_url="https://bugzilla.suse.com/1250823" source="BUGZILLA"/>
		<reference ref_id="1250824" ref_url="https://bugzilla.suse.com/1250824" source="BUGZILLA"/>
		<reference ref_id="1250825" ref_url="https://bugzilla.suse.com/1250825" source="BUGZILLA"/>
		<reference ref_id="1250830" ref_url="https://bugzilla.suse.com/1250830" source="BUGZILLA"/>
		<reference ref_id="1250831" ref_url="https://bugzilla.suse.com/1250831" source="BUGZILLA"/>
		<reference ref_id="1250839" ref_url="https://bugzilla.suse.com/1250839" source="BUGZILLA"/>
		<reference ref_id="1250841" ref_url="https://bugzilla.suse.com/1250841" source="BUGZILLA"/>
		<reference ref_id="1250842" ref_url="https://bugzilla.suse.com/1250842" source="BUGZILLA"/>
		<reference ref_id="1250843" ref_url="https://bugzilla.suse.com/1250843" source="BUGZILLA"/>
		<reference ref_id="1250846" ref_url="https://bugzilla.suse.com/1250846" source="BUGZILLA"/>
		<reference ref_id="1250847" ref_url="https://bugzilla.suse.com/1250847" source="BUGZILLA"/>
		<reference ref_id="1250848" ref_url="https://bugzilla.suse.com/1250848" source="BUGZILLA"/>
		<reference ref_id="1250850" ref_url="https://bugzilla.suse.com/1250850" source="BUGZILLA"/>
		<reference ref_id="1250851" ref_url="https://bugzilla.suse.com/1250851" source="BUGZILLA"/>
		<reference ref_id="1250853" ref_url="https://bugzilla.suse.com/1250853" source="BUGZILLA"/>
		<reference ref_id="1250856" ref_url="https://bugzilla.suse.com/1250856" source="BUGZILLA"/>
		<reference ref_id="1250863" ref_url="https://bugzilla.suse.com/1250863" source="BUGZILLA"/>
		<reference ref_id="1250864" ref_url="https://bugzilla.suse.com/1250864" source="BUGZILLA"/>
		<reference ref_id="1250866" ref_url="https://bugzilla.suse.com/1250866" source="BUGZILLA"/>
		<reference ref_id="1250867" ref_url="https://bugzilla.suse.com/1250867" source="BUGZILLA"/>
		<reference ref_id="1250868" ref_url="https://bugzilla.suse.com/1250868" source="BUGZILLA"/>
		<reference ref_id="1250872" ref_url="https://bugzilla.suse.com/1250872" source="BUGZILLA"/>
		<reference ref_id="1250874" ref_url="https://bugzilla.suse.com/1250874" source="BUGZILLA"/>
		<reference ref_id="1250875" ref_url="https://bugzilla.suse.com/1250875" source="BUGZILLA"/>
		<reference ref_id="1250877" ref_url="https://bugzilla.suse.com/1250877" source="BUGZILLA"/>
		<reference ref_id="1250879" ref_url="https://bugzilla.suse.com/1250879" source="BUGZILLA"/>
		<reference ref_id="1250883" ref_url="https://bugzilla.suse.com/1250883" source="BUGZILLA"/>
		<reference ref_id="1250887" ref_url="https://bugzilla.suse.com/1250887" source="BUGZILLA"/>
		<reference ref_id="1250888" ref_url="https://bugzilla.suse.com/1250888" source="BUGZILLA"/>
		<reference ref_id="1250889" ref_url="https://bugzilla.suse.com/1250889" source="BUGZILLA"/>
		<reference ref_id="1250890" ref_url="https://bugzilla.suse.com/1250890" source="BUGZILLA"/>
		<reference ref_id="1250891" ref_url="https://bugzilla.suse.com/1250891" source="BUGZILLA"/>
		<reference ref_id="1250905" ref_url="https://bugzilla.suse.com/1250905" source="BUGZILLA"/>
		<reference ref_id="1250915" ref_url="https://bugzilla.suse.com/1250915" source="BUGZILLA"/>
		<reference ref_id="1250917" ref_url="https://bugzilla.suse.com/1250917" source="BUGZILLA"/>
		<reference ref_id="1250923" ref_url="https://bugzilla.suse.com/1250923" source="BUGZILLA"/>
		<reference ref_id="1250927" ref_url="https://bugzilla.suse.com/1250927" source="BUGZILLA"/>
		<reference ref_id="1250928" ref_url="https://bugzilla.suse.com/1250928" source="BUGZILLA"/>
		<reference ref_id="1250948" ref_url="https://bugzilla.suse.com/1250948" source="BUGZILLA"/>
		<reference ref_id="1250949" ref_url="https://bugzilla.suse.com/1250949" source="BUGZILLA"/>
		<reference ref_id="1250953" ref_url="https://bugzilla.suse.com/1250953" source="BUGZILLA"/>
		<reference ref_id="1250955" ref_url="https://bugzilla.suse.com/1250955" source="BUGZILLA"/>
		<reference ref_id="1250963" ref_url="https://bugzilla.suse.com/1250963" source="BUGZILLA"/>
		<reference ref_id="1250964" ref_url="https://bugzilla.suse.com/1250964" source="BUGZILLA"/>
		<reference ref_id="1250965" ref_url="https://bugzilla.suse.com/1250965" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2602" ref_url="https://www.suse.com/security/cve/CVE-2022-2602/" source="CVE"/>
		<reference ref_id="CVE-2022-2978" ref_url="https://www.suse.com/security/cve/CVE-2022-2978/" source="CVE"/>
		<reference ref_id="CVE-2022-36280" ref_url="https://www.suse.com/security/cve/CVE-2022-36280/" source="CVE"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-49980" ref_url="https://www.suse.com/security/cve/CVE-2022-49980/" source="CVE"/>
		<reference ref_id="CVE-2022-50233" ref_url="https://www.suse.com/security/cve/CVE-2022-50233/" source="CVE"/>
		<reference ref_id="CVE-2022-50234" ref_url="https://www.suse.com/security/cve/CVE-2022-50234/" source="CVE"/>
		<reference ref_id="CVE-2022-50235" ref_url="https://www.suse.com/security/cve/CVE-2022-50235/" source="CVE"/>
		<reference ref_id="CVE-2022-50239" ref_url="https://www.suse.com/security/cve/CVE-2022-50239/" source="CVE"/>
		<reference ref_id="CVE-2022-50241" ref_url="https://www.suse.com/security/cve/CVE-2022-50241/" source="CVE"/>
		<reference ref_id="CVE-2022-50246" ref_url="https://www.suse.com/security/cve/CVE-2022-50246/" source="CVE"/>
		<reference ref_id="CVE-2022-50247" ref_url="https://www.suse.com/security/cve/CVE-2022-50247/" source="CVE"/>
		<reference ref_id="CVE-2022-50248" ref_url="https://www.suse.com/security/cve/CVE-2022-50248/" source="CVE"/>
		<reference ref_id="CVE-2022-50249" ref_url="https://www.suse.com/security/cve/CVE-2022-50249/" source="CVE"/>
		<reference ref_id="CVE-2022-50250" ref_url="https://www.suse.com/security/cve/CVE-2022-50250/" source="CVE"/>
		<reference ref_id="CVE-2022-50251" ref_url="https://www.suse.com/security/cve/CVE-2022-50251/" source="CVE"/>
		<reference ref_id="CVE-2022-50252" ref_url="https://www.suse.com/security/cve/CVE-2022-50252/" source="CVE"/>
		<reference ref_id="CVE-2022-50255" ref_url="https://www.suse.com/security/cve/CVE-2022-50255/" source="CVE"/>
		<reference ref_id="CVE-2022-50257" ref_url="https://www.suse.com/security/cve/CVE-2022-50257/" source="CVE"/>
		<reference ref_id="CVE-2022-50258" ref_url="https://www.suse.com/security/cve/CVE-2022-50258/" source="CVE"/>
		<reference ref_id="CVE-2022-50260" ref_url="https://www.suse.com/security/cve/CVE-2022-50260/" source="CVE"/>
		<reference ref_id="CVE-2022-50261" ref_url="https://www.suse.com/security/cve/CVE-2022-50261/" source="CVE"/>
		<reference ref_id="CVE-2022-50264" ref_url="https://www.suse.com/security/cve/CVE-2022-50264/" source="CVE"/>
		<reference ref_id="CVE-2022-50266" ref_url="https://www.suse.com/security/cve/CVE-2022-50266/" source="CVE"/>
		<reference ref_id="CVE-2022-50267" ref_url="https://www.suse.com/security/cve/CVE-2022-50267/" source="CVE"/>
		<reference ref_id="CVE-2022-50268" ref_url="https://www.suse.com/security/cve/CVE-2022-50268/" source="CVE"/>
		<reference ref_id="CVE-2022-50269" ref_url="https://www.suse.com/security/cve/CVE-2022-50269/" source="CVE"/>
		<reference ref_id="CVE-2022-50271" ref_url="https://www.suse.com/security/cve/CVE-2022-50271/" source="CVE"/>
		<reference ref_id="CVE-2022-50272" ref_url="https://www.suse.com/security/cve/CVE-2022-50272/" source="CVE"/>
		<reference ref_id="CVE-2022-50275" ref_url="https://www.suse.com/security/cve/CVE-2022-50275/" source="CVE"/>
		<reference ref_id="CVE-2022-50276" ref_url="https://www.suse.com/security/cve/CVE-2022-50276/" source="CVE"/>
		<reference ref_id="CVE-2022-50277" ref_url="https://www.suse.com/security/cve/CVE-2022-50277/" source="CVE"/>
		<reference ref_id="CVE-2022-50278" ref_url="https://www.suse.com/security/cve/CVE-2022-50278/" source="CVE"/>
		<reference ref_id="CVE-2022-50279" ref_url="https://www.suse.com/security/cve/CVE-2022-50279/" source="CVE"/>
		<reference ref_id="CVE-2022-50282" ref_url="https://www.suse.com/security/cve/CVE-2022-50282/" source="CVE"/>
		<reference ref_id="CVE-2022-50286" ref_url="https://www.suse.com/security/cve/CVE-2022-50286/" source="CVE"/>
		<reference ref_id="CVE-2022-50289" ref_url="https://www.suse.com/security/cve/CVE-2022-50289/" source="CVE"/>
		<reference ref_id="CVE-2022-50294" ref_url="https://www.suse.com/security/cve/CVE-2022-50294/" source="CVE"/>
		<reference ref_id="CVE-2022-50297" ref_url="https://www.suse.com/security/cve/CVE-2022-50297/" source="CVE"/>
		<reference ref_id="CVE-2022-50298" ref_url="https://www.suse.com/security/cve/CVE-2022-50298/" source="CVE"/>
		<reference ref_id="CVE-2022-50299" ref_url="https://www.suse.com/security/cve/CVE-2022-50299/" source="CVE"/>
		<reference ref_id="CVE-2022-50301" ref_url="https://www.suse.com/security/cve/CVE-2022-50301/" source="CVE"/>
		<reference ref_id="CVE-2022-50308" ref_url="https://www.suse.com/security/cve/CVE-2022-50308/" source="CVE"/>
		<reference ref_id="CVE-2022-50309" ref_url="https://www.suse.com/security/cve/CVE-2022-50309/" source="CVE"/>
		<reference ref_id="CVE-2022-50312" ref_url="https://www.suse.com/security/cve/CVE-2022-50312/" source="CVE"/>
		<reference ref_id="CVE-2022-50317" ref_url="https://www.suse.com/security/cve/CVE-2022-50317/" source="CVE"/>
		<reference ref_id="CVE-2022-50318" ref_url="https://www.suse.com/security/cve/CVE-2022-50318/" source="CVE"/>
		<reference ref_id="CVE-2022-50320" ref_url="https://www.suse.com/security/cve/CVE-2022-50320/" source="CVE"/>
		<reference ref_id="CVE-2022-50321" ref_url="https://www.suse.com/security/cve/CVE-2022-50321/" source="CVE"/>
		<reference ref_id="CVE-2022-50324" ref_url="https://www.suse.com/security/cve/CVE-2022-50324/" source="CVE"/>
		<reference ref_id="CVE-2022-50328" ref_url="https://www.suse.com/security/cve/CVE-2022-50328/" source="CVE"/>
		<reference ref_id="CVE-2022-50329" ref_url="https://www.suse.com/security/cve/CVE-2022-50329/" source="CVE"/>
		<reference ref_id="CVE-2022-50330" ref_url="https://www.suse.com/security/cve/CVE-2022-50330/" source="CVE"/>
		<reference ref_id="CVE-2022-50331" ref_url="https://www.suse.com/security/cve/CVE-2022-50331/" source="CVE"/>
		<reference ref_id="CVE-2022-50333" ref_url="https://www.suse.com/security/cve/CVE-2022-50333/" source="CVE"/>
		<reference ref_id="CVE-2022-50340" ref_url="https://www.suse.com/security/cve/CVE-2022-50340/" source="CVE"/>
		<reference ref_id="CVE-2022-50342" ref_url="https://www.suse.com/security/cve/CVE-2022-50342/" source="CVE"/>
		<reference ref_id="CVE-2022-50344" ref_url="https://www.suse.com/security/cve/CVE-2022-50344/" source="CVE"/>
		<reference ref_id="CVE-2022-50346" ref_url="https://www.suse.com/security/cve/CVE-2022-50346/" source="CVE"/>
		<reference ref_id="CVE-2022-50347" ref_url="https://www.suse.com/security/cve/CVE-2022-50347/" source="CVE"/>
		<reference ref_id="CVE-2022-50348" ref_url="https://www.suse.com/security/cve/CVE-2022-50348/" source="CVE"/>
		<reference ref_id="CVE-2022-50349" ref_url="https://www.suse.com/security/cve/CVE-2022-50349/" source="CVE"/>
		<reference ref_id="CVE-2022-50351" ref_url="https://www.suse.com/security/cve/CVE-2022-50351/" source="CVE"/>
		<reference ref_id="CVE-2022-50353" ref_url="https://www.suse.com/security/cve/CVE-2022-50353/" source="CVE"/>
		<reference ref_id="CVE-2022-50355" ref_url="https://www.suse.com/security/cve/CVE-2022-50355/" source="CVE"/>
		<reference ref_id="CVE-2022-50358" ref_url="https://www.suse.com/security/cve/CVE-2022-50358/" source="CVE"/>
		<reference ref_id="CVE-2022-50359" ref_url="https://www.suse.com/security/cve/CVE-2022-50359/" source="CVE"/>
		<reference ref_id="CVE-2022-50362" ref_url="https://www.suse.com/security/cve/CVE-2022-50362/" source="CVE"/>
		<reference ref_id="CVE-2022-50364" ref_url="https://www.suse.com/security/cve/CVE-2022-50364/" source="CVE"/>
		<reference ref_id="CVE-2022-50367" ref_url="https://www.suse.com/security/cve/CVE-2022-50367/" source="CVE"/>
		<reference ref_id="CVE-2022-50368" ref_url="https://www.suse.com/security/cve/CVE-2022-50368/" source="CVE"/>
		<reference ref_id="CVE-2022-50369" ref_url="https://www.suse.com/security/cve/CVE-2022-50369/" source="CVE"/>
		<reference ref_id="CVE-2022-50370" ref_url="https://www.suse.com/security/cve/CVE-2022-50370/" source="CVE"/>
		<reference ref_id="CVE-2022-50372" ref_url="https://www.suse.com/security/cve/CVE-2022-50372/" source="CVE"/>
		<reference ref_id="CVE-2022-50373" ref_url="https://www.suse.com/security/cve/CVE-2022-50373/" source="CVE"/>
		<reference ref_id="CVE-2022-50374" ref_url="https://www.suse.com/security/cve/CVE-2022-50374/" source="CVE"/>
		<reference ref_id="CVE-2022-50375" ref_url="https://www.suse.com/security/cve/CVE-2022-50375/" source="CVE"/>
		<reference ref_id="CVE-2022-50376" ref_url="https://www.suse.com/security/cve/CVE-2022-50376/" source="CVE"/>
		<reference ref_id="CVE-2022-50379" ref_url="https://www.suse.com/security/cve/CVE-2022-50379/" source="CVE"/>
		<reference ref_id="CVE-2022-50381" ref_url="https://www.suse.com/security/cve/CVE-2022-50381/" source="CVE"/>
		<reference ref_id="CVE-2022-50385" ref_url="https://www.suse.com/security/cve/CVE-2022-50385/" source="CVE"/>
		<reference ref_id="CVE-2022-50386" ref_url="https://www.suse.com/security/cve/CVE-2022-50386/" source="CVE"/>
		<reference ref_id="CVE-2022-50388" ref_url="https://www.suse.com/security/cve/CVE-2022-50388/" source="CVE"/>
		<reference ref_id="CVE-2022-50389" ref_url="https://www.suse.com/security/cve/CVE-2022-50389/" source="CVE"/>
		<reference ref_id="CVE-2022-50391" ref_url="https://www.suse.com/security/cve/CVE-2022-50391/" source="CVE"/>
		<reference ref_id="CVE-2022-50392" ref_url="https://www.suse.com/security/cve/CVE-2022-50392/" source="CVE"/>
		<reference ref_id="CVE-2022-50394" ref_url="https://www.suse.com/security/cve/CVE-2022-50394/" source="CVE"/>
		<reference ref_id="CVE-2022-50395" ref_url="https://www.suse.com/security/cve/CVE-2022-50395/" source="CVE"/>
		<reference ref_id="CVE-2022-50399" ref_url="https://www.suse.com/security/cve/CVE-2022-50399/" source="CVE"/>
		<reference ref_id="CVE-2022-50401" ref_url="https://www.suse.com/security/cve/CVE-2022-50401/" source="CVE"/>
		<reference ref_id="CVE-2022-50402" ref_url="https://www.suse.com/security/cve/CVE-2022-50402/" source="CVE"/>
		<reference ref_id="CVE-2022-50404" ref_url="https://www.suse.com/security/cve/CVE-2022-50404/" source="CVE"/>
		<reference ref_id="CVE-2022-50408" ref_url="https://www.suse.com/security/cve/CVE-2022-50408/" source="CVE"/>
		<reference ref_id="CVE-2022-50409" ref_url="https://www.suse.com/security/cve/CVE-2022-50409/" source="CVE"/>
		<reference ref_id="CVE-2022-50410" ref_url="https://www.suse.com/security/cve/CVE-2022-50410/" source="CVE"/>
		<reference ref_id="CVE-2022-50411" ref_url="https://www.suse.com/security/cve/CVE-2022-50411/" source="CVE"/>
		<reference ref_id="CVE-2022-50414" ref_url="https://www.suse.com/security/cve/CVE-2022-50414/" source="CVE"/>
		<reference ref_id="CVE-2022-50417" ref_url="https://www.suse.com/security/cve/CVE-2022-50417/" source="CVE"/>
		<reference ref_id="CVE-2022-50419" ref_url="https://www.suse.com/security/cve/CVE-2022-50419/" source="CVE"/>
		<reference ref_id="CVE-2022-50422" ref_url="https://www.suse.com/security/cve/CVE-2022-50422/" source="CVE"/>
		<reference ref_id="CVE-2022-50423" ref_url="https://www.suse.com/security/cve/CVE-2022-50423/" source="CVE"/>
		<reference ref_id="CVE-2022-50425" ref_url="https://www.suse.com/security/cve/CVE-2022-50425/" source="CVE"/>
		<reference ref_id="CVE-2022-50427" ref_url="https://www.suse.com/security/cve/CVE-2022-50427/" source="CVE"/>
		<reference ref_id="CVE-2022-50428" ref_url="https://www.suse.com/security/cve/CVE-2022-50428/" source="CVE"/>
		<reference ref_id="CVE-2022-50429" ref_url="https://www.suse.com/security/cve/CVE-2022-50429/" source="CVE"/>
		<reference ref_id="CVE-2022-50430" ref_url="https://www.suse.com/security/cve/CVE-2022-50430/" source="CVE"/>
		<reference ref_id="CVE-2022-50431" ref_url="https://www.suse.com/security/cve/CVE-2022-50431/" source="CVE"/>
		<reference ref_id="CVE-2022-50432" ref_url="https://www.suse.com/security/cve/CVE-2022-50432/" source="CVE"/>
		<reference ref_id="CVE-2022-50434" ref_url="https://www.suse.com/security/cve/CVE-2022-50434/" source="CVE"/>
		<reference ref_id="CVE-2022-50435" ref_url="https://www.suse.com/security/cve/CVE-2022-50435/" source="CVE"/>
		<reference ref_id="CVE-2022-50436" ref_url="https://www.suse.com/security/cve/CVE-2022-50436/" source="CVE"/>
		<reference ref_id="CVE-2022-50437" ref_url="https://www.suse.com/security/cve/CVE-2022-50437/" source="CVE"/>
		<reference ref_id="CVE-2022-50439" ref_url="https://www.suse.com/security/cve/CVE-2022-50439/" source="CVE"/>
		<reference ref_id="CVE-2022-50440" ref_url="https://www.suse.com/security/cve/CVE-2022-50440/" source="CVE"/>
		<reference ref_id="CVE-2022-50443" ref_url="https://www.suse.com/security/cve/CVE-2022-50443/" source="CVE"/>
		<reference ref_id="CVE-2022-50444" ref_url="https://www.suse.com/security/cve/CVE-2022-50444/" source="CVE"/>
		<reference ref_id="CVE-2022-50449" ref_url="https://www.suse.com/security/cve/CVE-2022-50449/" source="CVE"/>
		<reference ref_id="CVE-2022-50453" ref_url="https://www.suse.com/security/cve/CVE-2022-50453/" source="CVE"/>
		<reference ref_id="CVE-2022-50454" ref_url="https://www.suse.com/security/cve/CVE-2022-50454/" source="CVE"/>
		<reference ref_id="CVE-2022-50456" ref_url="https://www.suse.com/security/cve/CVE-2022-50456/" source="CVE"/>
		<reference ref_id="CVE-2022-50458" ref_url="https://www.suse.com/security/cve/CVE-2022-50458/" source="CVE"/>
		<reference ref_id="CVE-2022-50459" ref_url="https://www.suse.com/security/cve/CVE-2022-50459/" source="CVE"/>
		<reference ref_id="CVE-2022-50460" ref_url="https://www.suse.com/security/cve/CVE-2022-50460/" source="CVE"/>
		<reference ref_id="CVE-2022-50465" ref_url="https://www.suse.com/security/cve/CVE-2022-50465/" source="CVE"/>
		<reference ref_id="CVE-2022-50466" ref_url="https://www.suse.com/security/cve/CVE-2022-50466/" source="CVE"/>
		<reference ref_id="CVE-2022-50467" ref_url="https://www.suse.com/security/cve/CVE-2022-50467/" source="CVE"/>
		<reference ref_id="CVE-2022-50468" ref_url="https://www.suse.com/security/cve/CVE-2022-50468/" source="CVE"/>
		<reference ref_id="CVE-2022-50469" ref_url="https://www.suse.com/security/cve/CVE-2022-50469/" source="CVE"/>
		<reference ref_id="CVE-2023-1380" ref_url="https://www.suse.com/security/cve/CVE-2023-1380/" source="CVE"/>
		<reference ref_id="CVE-2023-28328" ref_url="https://www.suse.com/security/cve/CVE-2023-28328/" source="CVE"/>
		<reference ref_id="CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-52923" ref_url="https://www.suse.com/security/cve/CVE-2023-52923/" source="CVE"/>
		<reference ref_id="CVE-2023-53147" ref_url="https://www.suse.com/security/cve/CVE-2023-53147/" source="CVE"/>
		<reference ref_id="CVE-2023-53149" ref_url="https://www.suse.com/security/cve/CVE-2023-53149/" source="CVE"/>
		<reference ref_id="CVE-2023-53150" ref_url="https://www.suse.com/security/cve/CVE-2023-53150/" source="CVE"/>
		<reference ref_id="CVE-2023-53151" ref_url="https://www.suse.com/security/cve/CVE-2023-53151/" source="CVE"/>
		<reference ref_id="CVE-2023-53153" ref_url="https://www.suse.com/security/cve/CVE-2023-53153/" source="CVE"/>
		<reference ref_id="CVE-2023-53165" ref_url="https://www.suse.com/security/cve/CVE-2023-53165/" source="CVE"/>
		<reference ref_id="CVE-2023-53167" ref_url="https://www.suse.com/security/cve/CVE-2023-53167/" source="CVE"/>
		<reference ref_id="CVE-2023-53171" ref_url="https://www.suse.com/security/cve/CVE-2023-53171/" source="CVE"/>
		<reference ref_id="CVE-2023-53174" ref_url="https://www.suse.com/security/cve/CVE-2023-53174/" source="CVE"/>
		<reference ref_id="CVE-2023-53176" ref_url="https://www.suse.com/security/cve/CVE-2023-53176/" source="CVE"/>
		<reference ref_id="CVE-2023-53178" ref_url="https://www.suse.com/security/cve/CVE-2023-53178/" source="CVE"/>
		<reference ref_id="CVE-2023-53179" ref_url="https://www.suse.com/security/cve/CVE-2023-53179/" source="CVE"/>
		<reference ref_id="CVE-2023-53182" ref_url="https://www.suse.com/security/cve/CVE-2023-53182/" source="CVE"/>
		<reference ref_id="CVE-2023-53185" ref_url="https://www.suse.com/security/cve/CVE-2023-53185/" source="CVE"/>
		<reference ref_id="CVE-2023-53196" ref_url="https://www.suse.com/security/cve/CVE-2023-53196/" source="CVE"/>
		<reference ref_id="CVE-2023-53197" ref_url="https://www.suse.com/security/cve/CVE-2023-53197/" source="CVE"/>
		<reference ref_id="CVE-2023-53199" ref_url="https://www.suse.com/security/cve/CVE-2023-53199/" source="CVE"/>
		<reference ref_id="CVE-2023-53201" ref_url="https://www.suse.com/security/cve/CVE-2023-53201/" source="CVE"/>
		<reference ref_id="CVE-2023-53205" ref_url="https://www.suse.com/security/cve/CVE-2023-53205/" source="CVE"/>
		<reference ref_id="CVE-2023-53213" ref_url="https://www.suse.com/security/cve/CVE-2023-53213/" source="CVE"/>
		<reference ref_id="CVE-2023-53216" ref_url="https://www.suse.com/security/cve/CVE-2023-53216/" source="CVE"/>
		<reference ref_id="CVE-2023-53219" ref_url="https://www.suse.com/security/cve/CVE-2023-53219/" source="CVE"/>
		<reference ref_id="CVE-2023-53222" ref_url="https://www.suse.com/security/cve/CVE-2023-53222/" source="CVE"/>
		<reference ref_id="CVE-2023-53223" ref_url="https://www.suse.com/security/cve/CVE-2023-53223/" source="CVE"/>
		<reference ref_id="CVE-2023-53226" ref_url="https://www.suse.com/security/cve/CVE-2023-53226/" source="CVE"/>
		<reference ref_id="CVE-2023-53229" ref_url="https://www.suse.com/security/cve/CVE-2023-53229/" source="CVE"/>
		<reference ref_id="CVE-2023-53230" ref_url="https://www.suse.com/security/cve/CVE-2023-53230/" source="CVE"/>
		<reference ref_id="CVE-2023-53234" ref_url="https://www.suse.com/security/cve/CVE-2023-53234/" source="CVE"/>
		<reference ref_id="CVE-2023-53238" ref_url="https://www.suse.com/security/cve/CVE-2023-53238/" source="CVE"/>
		<reference ref_id="CVE-2023-53239" ref_url="https://www.suse.com/security/cve/CVE-2023-53239/" source="CVE"/>
		<reference ref_id="CVE-2023-53241" ref_url="https://www.suse.com/security/cve/CVE-2023-53241/" source="CVE"/>
		<reference ref_id="CVE-2023-53242" ref_url="https://www.suse.com/security/cve/CVE-2023-53242/" source="CVE"/>
		<reference ref_id="CVE-2023-53244" ref_url="https://www.suse.com/security/cve/CVE-2023-53244/" source="CVE"/>
		<reference ref_id="CVE-2023-53245" ref_url="https://www.suse.com/security/cve/CVE-2023-53245/" source="CVE"/>
		<reference ref_id="CVE-2023-53246" ref_url="https://www.suse.com/security/cve/CVE-2023-53246/" source="CVE"/>
		<reference ref_id="CVE-2023-53249" ref_url="https://www.suse.com/security/cve/CVE-2023-53249/" source="CVE"/>
		<reference ref_id="CVE-2023-53250" ref_url="https://www.suse.com/security/cve/CVE-2023-53250/" source="CVE"/>
		<reference ref_id="CVE-2023-53251" ref_url="https://www.suse.com/security/cve/CVE-2023-53251/" source="CVE"/>
		<reference ref_id="CVE-2023-53255" ref_url="https://www.suse.com/security/cve/CVE-2023-53255/" source="CVE"/>
		<reference ref_id="CVE-2023-53259" ref_url="https://www.suse.com/security/cve/CVE-2023-53259/" source="CVE"/>
		<reference ref_id="CVE-2023-53265" ref_url="https://www.suse.com/security/cve/CVE-2023-53265/" source="CVE"/>
		<reference ref_id="CVE-2023-53268" ref_url="https://www.suse.com/security/cve/CVE-2023-53268/" source="CVE"/>
		<reference ref_id="CVE-2023-53270" ref_url="https://www.suse.com/security/cve/CVE-2023-53270/" source="CVE"/>
		<reference ref_id="CVE-2023-53272" ref_url="https://www.suse.com/security/cve/CVE-2023-53272/" source="CVE"/>
		<reference ref_id="CVE-2023-53273" ref_url="https://www.suse.com/security/cve/CVE-2023-53273/" source="CVE"/>
		<reference ref_id="CVE-2023-53275" ref_url="https://www.suse.com/security/cve/CVE-2023-53275/" source="CVE"/>
		<reference ref_id="CVE-2023-53276" ref_url="https://www.suse.com/security/cve/CVE-2023-53276/" source="CVE"/>
		<reference ref_id="CVE-2023-53277" ref_url="https://www.suse.com/security/cve/CVE-2023-53277/" source="CVE"/>
		<reference ref_id="CVE-2023-53280" ref_url="https://www.suse.com/security/cve/CVE-2023-53280/" source="CVE"/>
		<reference ref_id="CVE-2023-53281" ref_url="https://www.suse.com/security/cve/CVE-2023-53281/" source="CVE"/>
		<reference ref_id="CVE-2023-53282" ref_url="https://www.suse.com/security/cve/CVE-2023-53282/" source="CVE"/>
		<reference ref_id="CVE-2023-53286" ref_url="https://www.suse.com/security/cve/CVE-2023-53286/" source="CVE"/>
		<reference ref_id="CVE-2023-53288" ref_url="https://www.suse.com/security/cve/CVE-2023-53288/" source="CVE"/>
		<reference ref_id="CVE-2023-53295" ref_url="https://www.suse.com/security/cve/CVE-2023-53295/" source="CVE"/>
		<reference ref_id="CVE-2023-53297" ref_url="https://www.suse.com/security/cve/CVE-2023-53297/" source="CVE"/>
		<reference ref_id="CVE-2023-53298" ref_url="https://www.suse.com/security/cve/CVE-2023-53298/" source="CVE"/>
		<reference ref_id="CVE-2023-53299" ref_url="https://www.suse.com/security/cve/CVE-2023-53299/" source="CVE"/>
		<reference ref_id="CVE-2023-53302" ref_url="https://www.suse.com/security/cve/CVE-2023-53302/" source="CVE"/>
		<reference ref_id="CVE-2023-53304" ref_url="https://www.suse.com/security/cve/CVE-2023-53304/" source="CVE"/>
		<reference ref_id="CVE-2023-53305" ref_url="https://www.suse.com/security/cve/CVE-2023-53305/" source="CVE"/>
		<reference ref_id="CVE-2023-53307" ref_url="https://www.suse.com/security/cve/CVE-2023-53307/" source="CVE"/>
		<reference ref_id="CVE-2023-53309" ref_url="https://www.suse.com/security/cve/CVE-2023-53309/" source="CVE"/>
		<reference ref_id="CVE-2023-53311" ref_url="https://www.suse.com/security/cve/CVE-2023-53311/" source="CVE"/>
		<reference ref_id="CVE-2023-53313" ref_url="https://www.suse.com/security/cve/CVE-2023-53313/" source="CVE"/>
		<reference ref_id="CVE-2023-53314" ref_url="https://www.suse.com/security/cve/CVE-2023-53314/" source="CVE"/>
		<reference ref_id="CVE-2023-53315" ref_url="https://www.suse.com/security/cve/CVE-2023-53315/" source="CVE"/>
		<reference ref_id="CVE-2023-53316" ref_url="https://www.suse.com/security/cve/CVE-2023-53316/" source="CVE"/>
		<reference ref_id="CVE-2023-53317" ref_url="https://www.suse.com/security/cve/CVE-2023-53317/" source="CVE"/>
		<reference ref_id="CVE-2023-53321" ref_url="https://www.suse.com/security/cve/CVE-2023-53321/" source="CVE"/>
		<reference ref_id="CVE-2023-53322" ref_url="https://www.suse.com/security/cve/CVE-2023-53322/" source="CVE"/>
		<reference ref_id="CVE-2023-53324" ref_url="https://www.suse.com/security/cve/CVE-2023-53324/" source="CVE"/>
		<reference ref_id="CVE-2023-53326" ref_url="https://www.suse.com/security/cve/CVE-2023-53326/" source="CVE"/>
		<reference ref_id="CVE-2023-53330" ref_url="https://www.suse.com/security/cve/CVE-2023-53330/" source="CVE"/>
		<reference ref_id="CVE-2023-53331" ref_url="https://www.suse.com/security/cve/CVE-2023-53331/" source="CVE"/>
		<reference ref_id="CVE-2023-53333" ref_url="https://www.suse.com/security/cve/CVE-2023-53333/" source="CVE"/>
		<reference ref_id="CVE-2023-53334" ref_url="https://www.suse.com/security/cve/CVE-2023-53334/" source="CVE"/>
		<reference ref_id="CVE-2023-53335" ref_url="https://www.suse.com/security/cve/CVE-2023-53335/" source="CVE"/>
		<reference ref_id="CVE-2023-53337" ref_url="https://www.suse.com/security/cve/CVE-2023-53337/" source="CVE"/>
		<reference ref_id="CVE-2023-53344" ref_url="https://www.suse.com/security/cve/CVE-2023-53344/" source="CVE"/>
		<reference ref_id="CVE-2023-53349" ref_url="https://www.suse.com/security/cve/CVE-2023-53349/" source="CVE"/>
		<reference ref_id="CVE-2023-53352" ref_url="https://www.suse.com/security/cve/CVE-2023-53352/" source="CVE"/>
		<reference ref_id="CVE-2023-53356" ref_url="https://www.suse.com/security/cve/CVE-2023-53356/" source="CVE"/>
		<reference ref_id="CVE-2023-53359" ref_url="https://www.suse.com/security/cve/CVE-2023-53359/" source="CVE"/>
		<reference ref_id="CVE-2023-53368" ref_url="https://www.suse.com/security/cve/CVE-2023-53368/" source="CVE"/>
		<reference ref_id="CVE-2023-53373" ref_url="https://www.suse.com/security/cve/CVE-2023-53373/" source="CVE"/>
		<reference ref_id="CVE-2023-53375" ref_url="https://www.suse.com/security/cve/CVE-2023-53375/" source="CVE"/>
		<reference ref_id="CVE-2023-53377" ref_url="https://www.suse.com/security/cve/CVE-2023-53377/" source="CVE"/>
		<reference ref_id="CVE-2023-53379" ref_url="https://www.suse.com/security/cve/CVE-2023-53379/" source="CVE"/>
		<reference ref_id="CVE-2023-53380" ref_url="https://www.suse.com/security/cve/CVE-2023-53380/" source="CVE"/>
		<reference ref_id="CVE-2023-53381" ref_url="https://www.suse.com/security/cve/CVE-2023-53381/" source="CVE"/>
		<reference ref_id="CVE-2023-53384" ref_url="https://www.suse.com/security/cve/CVE-2023-53384/" source="CVE"/>
		<reference ref_id="CVE-2023-53386" ref_url="https://www.suse.com/security/cve/CVE-2023-53386/" source="CVE"/>
		<reference ref_id="CVE-2023-53388" ref_url="https://www.suse.com/security/cve/CVE-2023-53388/" source="CVE"/>
		<reference ref_id="CVE-2023-53390" ref_url="https://www.suse.com/security/cve/CVE-2023-53390/" source="CVE"/>
		<reference ref_id="CVE-2023-53393" ref_url="https://www.suse.com/security/cve/CVE-2023-53393/" source="CVE"/>
		<reference ref_id="CVE-2023-53395" ref_url="https://www.suse.com/security/cve/CVE-2023-53395/" source="CVE"/>
		<reference ref_id="CVE-2023-53396" ref_url="https://www.suse.com/security/cve/CVE-2023-53396/" source="CVE"/>
		<reference ref_id="CVE-2023-53400" ref_url="https://www.suse.com/security/cve/CVE-2023-53400/" source="CVE"/>
		<reference ref_id="CVE-2023-53404" ref_url="https://www.suse.com/security/cve/CVE-2023-53404/" source="CVE"/>
		<reference ref_id="CVE-2023-53405" ref_url="https://www.suse.com/security/cve/CVE-2023-53405/" source="CVE"/>
		<reference ref_id="CVE-2023-53406" ref_url="https://www.suse.com/security/cve/CVE-2023-53406/" source="CVE"/>
		<reference ref_id="CVE-2023-53409" ref_url="https://www.suse.com/security/cve/CVE-2023-53409/" source="CVE"/>
		<reference ref_id="CVE-2023-53413" ref_url="https://www.suse.com/security/cve/CVE-2023-53413/" source="CVE"/>
		<reference ref_id="CVE-2023-53414" ref_url="https://www.suse.com/security/cve/CVE-2023-53414/" source="CVE"/>
		<reference ref_id="CVE-2023-53415" ref_url="https://www.suse.com/security/cve/CVE-2023-53415/" source="CVE"/>
		<reference ref_id="CVE-2023-53416" ref_url="https://www.suse.com/security/cve/CVE-2023-53416/" source="CVE"/>
		<reference ref_id="CVE-2023-53422" ref_url="https://www.suse.com/security/cve/CVE-2023-53422/" source="CVE"/>
		<reference ref_id="CVE-2023-53427" ref_url="https://www.suse.com/security/cve/CVE-2023-53427/" source="CVE"/>
		<reference ref_id="CVE-2023-53431" ref_url="https://www.suse.com/security/cve/CVE-2023-53431/" source="CVE"/>
		<reference ref_id="CVE-2023-53435" ref_url="https://www.suse.com/security/cve/CVE-2023-53435/" source="CVE"/>
		<reference ref_id="CVE-2023-53436" ref_url="https://www.suse.com/security/cve/CVE-2023-53436/" source="CVE"/>
		<reference ref_id="CVE-2023-53437" ref_url="https://www.suse.com/security/cve/CVE-2023-53437/" source="CVE"/>
		<reference ref_id="CVE-2023-53438" ref_url="https://www.suse.com/security/cve/CVE-2023-53438/" source="CVE"/>
		<reference ref_id="CVE-2023-53440" ref_url="https://www.suse.com/security/cve/CVE-2023-53440/" source="CVE"/>
		<reference ref_id="CVE-2023-53443" ref_url="https://www.suse.com/security/cve/CVE-2023-53443/" source="CVE"/>
		<reference ref_id="CVE-2023-53446" ref_url="https://www.suse.com/security/cve/CVE-2023-53446/" source="CVE"/>
		<reference ref_id="CVE-2023-53449" ref_url="https://www.suse.com/security/cve/CVE-2023-53449/" source="CVE"/>
		<reference ref_id="CVE-2023-53451" ref_url="https://www.suse.com/security/cve/CVE-2023-53451/" source="CVE"/>
		<reference ref_id="CVE-2023-53452" ref_url="https://www.suse.com/security/cve/CVE-2023-53452/" source="CVE"/>
		<reference ref_id="CVE-2023-53453" ref_url="https://www.suse.com/security/cve/CVE-2023-53453/" source="CVE"/>
		<reference ref_id="CVE-2023-53454" ref_url="https://www.suse.com/security/cve/CVE-2023-53454/" source="CVE"/>
		<reference ref_id="CVE-2023-53457" ref_url="https://www.suse.com/security/cve/CVE-2023-53457/" source="CVE"/>
		<reference ref_id="CVE-2023-53458" ref_url="https://www.suse.com/security/cve/CVE-2023-53458/" source="CVE"/>
		<reference ref_id="CVE-2023-53463" ref_url="https://www.suse.com/security/cve/CVE-2023-53463/" source="CVE"/>
		<reference ref_id="CVE-2023-53464" ref_url="https://www.suse.com/security/cve/CVE-2023-53464/" source="CVE"/>
		<reference ref_id="CVE-2023-53465" ref_url="https://www.suse.com/security/cve/CVE-2023-53465/" source="CVE"/>
		<reference ref_id="CVE-2023-53468" ref_url="https://www.suse.com/security/cve/CVE-2023-53468/" source="CVE"/>
		<reference ref_id="CVE-2023-53471" ref_url="https://www.suse.com/security/cve/CVE-2023-53471/" source="CVE"/>
		<reference ref_id="CVE-2023-53472" ref_url="https://www.suse.com/security/cve/CVE-2023-53472/" source="CVE"/>
		<reference ref_id="CVE-2023-53473" ref_url="https://www.suse.com/security/cve/CVE-2023-53473/" source="CVE"/>
		<reference ref_id="CVE-2023-53474" ref_url="https://www.suse.com/security/cve/CVE-2023-53474/" source="CVE"/>
		<reference ref_id="CVE-2023-53475" ref_url="https://www.suse.com/security/cve/CVE-2023-53475/" source="CVE"/>
		<reference ref_id="CVE-2023-53476" ref_url="https://www.suse.com/security/cve/CVE-2023-53476/" source="CVE"/>
		<reference ref_id="CVE-2023-53485" ref_url="https://www.suse.com/security/cve/CVE-2023-53485/" source="CVE"/>
		<reference ref_id="CVE-2023-53487" ref_url="https://www.suse.com/security/cve/CVE-2023-53487/" source="CVE"/>
		<reference ref_id="CVE-2023-53488" ref_url="https://www.suse.com/security/cve/CVE-2023-53488/" source="CVE"/>
		<reference ref_id="CVE-2023-53492" ref_url="https://www.suse.com/security/cve/CVE-2023-53492/" source="CVE"/>
		<reference ref_id="CVE-2023-53494" ref_url="https://www.suse.com/security/cve/CVE-2023-53494/" source="CVE"/>
		<reference ref_id="CVE-2023-53496" ref_url="https://www.suse.com/security/cve/CVE-2023-53496/" source="CVE"/>
		<reference ref_id="CVE-2023-53498" ref_url="https://www.suse.com/security/cve/CVE-2023-53498/" source="CVE"/>
		<reference ref_id="CVE-2023-53499" ref_url="https://www.suse.com/security/cve/CVE-2023-53499/" source="CVE"/>
		<reference ref_id="CVE-2023-53505" ref_url="https://www.suse.com/security/cve/CVE-2023-53505/" source="CVE"/>
		<reference ref_id="CVE-2023-53506" ref_url="https://www.suse.com/security/cve/CVE-2023-53506/" source="CVE"/>
		<reference ref_id="CVE-2023-53509" ref_url="https://www.suse.com/security/cve/CVE-2023-53509/" source="CVE"/>
		<reference ref_id="CVE-2023-53512" ref_url="https://www.suse.com/security/cve/CVE-2023-53512/" source="CVE"/>
		<reference ref_id="CVE-2023-53513" ref_url="https://www.suse.com/security/cve/CVE-2023-53513/" source="CVE"/>
		<reference ref_id="CVE-2023-53515" ref_url="https://www.suse.com/security/cve/CVE-2023-53515/" source="CVE"/>
		<reference ref_id="CVE-2023-53518" ref_url="https://www.suse.com/security/cve/CVE-2023-53518/" source="CVE"/>
		<reference ref_id="CVE-2023-53519" ref_url="https://www.suse.com/security/cve/CVE-2023-53519/" source="CVE"/>
		<reference ref_id="CVE-2023-53521" ref_url="https://www.suse.com/security/cve/CVE-2023-53521/" source="CVE"/>
		<reference ref_id="CVE-2023-53524" ref_url="https://www.suse.com/security/cve/CVE-2023-53524/" source="CVE"/>
		<reference ref_id="CVE-2023-53525" ref_url="https://www.suse.com/security/cve/CVE-2023-53525/" source="CVE"/>
		<reference ref_id="CVE-2023-53526" ref_url="https://www.suse.com/security/cve/CVE-2023-53526/" source="CVE"/>
		<reference ref_id="CVE-2023-53530" ref_url="https://www.suse.com/security/cve/CVE-2023-53530/" source="CVE"/>
		<reference ref_id="CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583/" source="CVE"/>
		<reference ref_id="CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584/" source="CVE"/>
		<reference ref_id="CVE-2024-58240" ref_url="https://www.suse.com/security/cve/CVE-2024-58240/" source="CVE"/>
		<reference ref_id="CVE-2025-23155" ref_url="https://www.suse.com/security/cve/CVE-2025-23155/" source="CVE"/>
		<reference ref_id="CVE-2025-37738" ref_url="https://www.suse.com/security/cve/CVE-2025-37738/" source="CVE"/>
		<reference ref_id="CVE-2025-37885" ref_url="https://www.suse.com/security/cve/CVE-2025-37885/" source="CVE"/>
		<reference ref_id="CVE-2025-37958" ref_url="https://www.suse.com/security/cve/CVE-2025-37958/" source="CVE"/>
		<reference ref_id="CVE-2025-38084" ref_url="https://www.suse.com/security/cve/CVE-2025-38084/" source="CVE"/>
		<reference ref_id="CVE-2025-38085" ref_url="https://www.suse.com/security/cve/CVE-2025-38085/" source="CVE"/>
		<reference ref_id="CVE-2025-38111" ref_url="https://www.suse.com/security/cve/CVE-2025-38111/" source="CVE"/>
		<reference ref_id="CVE-2025-38184" ref_url="https://www.suse.com/security/cve/CVE-2025-38184/" source="CVE"/>
		<reference ref_id="CVE-2025-38380" ref_url="https://www.suse.com/security/cve/CVE-2025-38380/" source="CVE"/>
		<reference ref_id="CVE-2025-38470" ref_url="https://www.suse.com/security/cve/CVE-2025-38470/" source="CVE"/>
		<reference ref_id="CVE-2025-38476" ref_url="https://www.suse.com/security/cve/CVE-2025-38476/" source="CVE"/>
		<reference ref_id="CVE-2025-38488" ref_url="https://www.suse.com/security/cve/CVE-2025-38488/" source="CVE"/>
		<reference ref_id="CVE-2025-38553" ref_url="https://www.suse.com/security/cve/CVE-2025-38553/" source="CVE"/>
		<reference ref_id="CVE-2025-38572" ref_url="https://www.suse.com/security/cve/CVE-2025-38572/" source="CVE"/>
		<reference ref_id="CVE-2025-38659" ref_url="https://www.suse.com/security/cve/CVE-2025-38659/" source="CVE"/>
		<reference ref_id="CVE-2025-38664" ref_url="https://www.suse.com/security/cve/CVE-2025-38664/" source="CVE"/>
		<reference ref_id="CVE-2025-38678" ref_url="https://www.suse.com/security/cve/CVE-2025-38678/" source="CVE"/>
		<reference ref_id="CVE-2025-38685" ref_url="https://www.suse.com/security/cve/CVE-2025-38685/" source="CVE"/>
		<reference ref_id="CVE-2025-38706" ref_url="https://www.suse.com/security/cve/CVE-2025-38706/" source="CVE"/>
		<reference ref_id="CVE-2025-38713" ref_url="https://www.suse.com/security/cve/CVE-2025-38713/" source="CVE"/>
		<reference ref_id="CVE-2025-38734" ref_url="https://www.suse.com/security/cve/CVE-2025-38734/" source="CVE"/>
		<reference ref_id="CVE-2025-39691" ref_url="https://www.suse.com/security/cve/CVE-2025-39691/" source="CVE"/>
		<reference ref_id="CVE-2025-39703" ref_url="https://www.suse.com/security/cve/CVE-2025-39703/" source="CVE"/>
		<reference ref_id="CVE-2025-39726" ref_url="https://www.suse.com/security/cve/CVE-2025-39726/" source="CVE"/>
		<reference ref_id="CVE-2025-39746" ref_url="https://www.suse.com/security/cve/CVE-2025-39746/" source="CVE"/>
		<reference ref_id="CVE-2025-39751" ref_url="https://www.suse.com/security/cve/CVE-2025-39751/" source="CVE"/>
		<reference ref_id="CVE-2025-39790" ref_url="https://www.suse.com/security/cve/CVE-2025-39790/" source="CVE"/>
		<reference ref_id="CVE-2025-39797" ref_url="https://www.suse.com/security/cve/CVE-2025-39797/" source="CVE"/>
		<reference ref_id="CVE-2025-39823" ref_url="https://www.suse.com/security/cve/CVE-2025-39823/" source="CVE"/>
		<reference ref_id="CVE-2025-39824" ref_url="https://www.suse.com/security/cve/CVE-2025-39824/" source="CVE"/>
		<reference ref_id="CVE-2025-39860" ref_url="https://www.suse.com/security/cve/CVE-2025-39860/" source="CVE"/>
		<reference ref_id="CVE-2025-39869" ref_url="https://www.suse.com/security/cve/CVE-2025-39869/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49980: USB: gadget: fix use-after-free read in usb_udc_uevent() (bsc#1245110).
- CVE-2022-50233: Bluetooth: eir: Fix using strlen with hdev-&gt;{dev_name,short_name} (bsc#1246968).
- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).
- CVE-2022-50409: net: If sock is dead do not access sock's sk_wq in sk_stream_wait_memory (bsc#1250392).
- CVE-2023-53178: mm: fix zswap writeback race condition (bsc#1249827).
- CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250313).
- CVE-2023-53438: x86/MCE: Always save CS register on AMD Zen IF Poison errors (bsc#1250180).
- CVE-2025-23155: net: stmmac: Fix accessing freed irq affinity_hint (bsc#1242573).
- CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846).
- CVE-2025-37885: KVM: x86: Reset IRTE to host control if *new* route isn't postable (bsc#1242960).
- CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539).
- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245498).
- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245499).
- CVE-2025-38111: net/mdiobus: Fix potential out-of-bounds read/write access (bsc#1245666).
- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
- CVE-2025-38380: i2c/designware: Fix an initialization issue (bsc#1247028).
- CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (bsc#1247288).
- CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1247317).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
- CVE-2025-38553: net/sched: Restrict conditions for adding duplicating netems to qdisc tree (bsc#1248255).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399).
- CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628).
- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126).
- CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).
- CVE-2025-38706: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (bsc#1249195).
- CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).
- CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324).
- CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374).
- CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315).
- CVE-2025-39726: s390/ism: fix concurrency management in ism_cmd() (bsc#1249266).
- CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable (bsc#1249516).
- CVE-2025-39751: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (bsc#1249538).
- CVE-2025-39790: bus: mhi: host: Detect events pointing to unexpected TREs (bsc#1249548).
- CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608).
- CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002).
- CVE-2025-39824: HID: asus: fix UAF via HID_CLAIMED_INPUT validation (bsc#1250007).
- CVE-2025-39860: Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (bsc#1250247).
- CVE-2025-39869: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (bsc#1250406).

The following non-security bugs were fixed:

- Kconfig.suse: Add KABI checkiness macro (config) (bsc#1249186).
- Limit patch filenames to 100 characters (bsc#1249604).
- Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108).
- Revert backported patches for bsc#1238160.
- btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1249158).
- build_bug.h: Add KABI assert (bsc#1249186).
- kernel-binary: Another installation ordering fix (bsc#1241353).
- kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522). 
- kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346)
- kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).
- net/sched: ets: use old 'nbands' while purging unused classes (git-fixes).
- netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237).
- rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation (bsc#1246879).
- rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337)
- rpm: Configure KABI checkingness macro (bsc#1249186).
- rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186).
- rpm: Link arch-symbols script from scripts directory.
- rpm: Link guards script from scripts directory.
- use uniform permission checks for all mount propagation changes (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-22"/>
	<updated date="2025-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164051">SUSE bug 1164051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202700">SUSE bug 1202700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203063">SUSE bug 1203063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203332">SUSE bug 1203332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204228">SUSE bug 1204228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205128">SUSE bug 1205128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206456">SUSE bug 1206456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206468">SUSE bug 1206468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206883">SUSE bug 1206883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206884">SUSE bug 1206884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207158">SUSE bug 1207158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207621">SUSE bug 1207621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207624">SUSE bug 1207624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207625">SUSE bug 1207625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207628">SUSE bug 1207628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207629">SUSE bug 1207629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207631">SUSE bug 1207631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207645">SUSE bug 1207645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207651">SUSE bug 1207651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208607">SUSE bug 1208607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209287">SUSE bug 1209287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209291">SUSE bug 1209291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210584">SUSE bug 1210584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211960">SUSE bug 1211960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212603">SUSE bug 1212603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213015">SUSE bug 1213015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213016">SUSE bug 1213016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213040">SUSE bug 1213040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213041">SUSE bug 1213041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213061">SUSE bug 1213061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213099">SUSE bug 1213099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213104">SUSE bug 1213104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213747">SUSE bug 1213747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214953">SUSE bug 1214953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214967">SUSE bug 1214967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215150">SUSE bug 1215150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215696">SUSE bug 1215696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215911">SUSE bug 1215911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216976">SUSE bug 1216976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217790">SUSE bug 1217790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220185">SUSE bug 1220185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220186">SUSE bug 1220186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236104">SUSE bug 1236104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238160">SUSE bug 1238160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241353">SUSE bug 1241353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242573">SUSE bug 1242573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242846">SUSE bug 1242846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242960">SUSE bug 1242960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243539">SUSE bug 1243539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244337">SUSE bug 1244337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245110">SUSE bug 1245110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245498">SUSE bug 1245498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245499">SUSE bug 1245499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245666">SUSE bug 1245666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245956">SUSE bug 1245956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246879">SUSE bug 1246879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246968">SUSE bug 1246968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247028">SUSE bug 1247028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247172">SUSE bug 1247172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247239">SUSE bug 1247239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247288">SUSE bug 1247288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247317">SUSE bug 1247317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248108">SUSE bug 1248108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248255">SUSE bug 1248255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248399">SUSE bug 1248399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248628">SUSE bug 1248628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248639">SUSE bug 1248639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248847">SUSE bug 1248847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249126">SUSE bug 1249126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249158">SUSE bug 1249158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249186">SUSE bug 1249186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249195">SUSE bug 1249195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249200">SUSE bug 1249200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249220">SUSE bug 1249220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249266">SUSE bug 1249266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249315">SUSE bug 1249315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249324">SUSE bug 1249324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249346">SUSE bug 1249346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249374">SUSE bug 1249374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249516">SUSE bug 1249516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249538">SUSE bug 1249538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249548">SUSE bug 1249548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249604">SUSE bug 1249604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249608">SUSE bug 1249608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249638">SUSE bug 1249638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249639">SUSE bug 1249639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249641">SUSE bug 1249641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249642">SUSE bug 1249642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249650">SUSE bug 1249650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249651">SUSE bug 1249651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249658">SUSE bug 1249658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249661">SUSE bug 1249661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249664">SUSE bug 1249664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249667">SUSE bug 1249667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249669">SUSE bug 1249669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249677">SUSE bug 1249677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249681">SUSE bug 1249681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249683">SUSE bug 1249683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249685">SUSE bug 1249685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249687">SUSE bug 1249687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249695">SUSE bug 1249695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249699">SUSE bug 1249699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249700">SUSE bug 1249700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249701">SUSE bug 1249701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249705">SUSE bug 1249705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249706">SUSE bug 1249706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249707">SUSE bug 1249707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249709">SUSE bug 1249709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249712">SUSE bug 1249712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249713">SUSE bug 1249713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249715">SUSE bug 1249715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249716">SUSE bug 1249716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249718">SUSE bug 1249718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249722">SUSE bug 1249722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249727">SUSE bug 1249727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249730">SUSE bug 1249730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249733">SUSE bug 1249733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249734">SUSE bug 1249734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249739">SUSE bug 1249739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249740">SUSE bug 1249740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249741">SUSE bug 1249741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249742">SUSE bug 1249742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249743">SUSE bug 1249743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249745">SUSE bug 1249745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249746">SUSE bug 1249746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249747">SUSE bug 1249747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249749">SUSE bug 1249749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249750">SUSE bug 1249750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249751">SUSE bug 1249751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249753">SUSE bug 1249753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249758">SUSE bug 1249758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249762">SUSE bug 1249762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249767">SUSE bug 1249767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249777">SUSE bug 1249777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249781">SUSE bug 1249781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249784">SUSE bug 1249784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249791">SUSE bug 1249791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249799">SUSE bug 1249799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249808">SUSE bug 1249808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249810">SUSE bug 1249810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249820">SUSE bug 1249820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249825">SUSE bug 1249825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249827">SUSE bug 1249827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249836">SUSE bug 1249836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249840">SUSE bug 1249840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249844">SUSE bug 1249844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249846">SUSE bug 1249846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249853">SUSE bug 1249853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249858">SUSE bug 1249858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249860">SUSE bug 1249860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249864">SUSE bug 1249864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249865">SUSE bug 1249865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249866">SUSE bug 1249866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249867">SUSE bug 1249867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249868">SUSE bug 1249868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249872">SUSE bug 1249872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249877">SUSE bug 1249877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249880">SUSE bug 1249880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249882">SUSE bug 1249882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249885">SUSE bug 1249885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249890">SUSE bug 1249890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249892">SUSE bug 1249892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249908">SUSE bug 1249908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249910">SUSE bug 1249910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249911">SUSE bug 1249911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249914">SUSE bug 1249914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249917">SUSE bug 1249917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249918">SUSE bug 1249918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249920">SUSE bug 1249920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249923">SUSE bug 1249923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249924">SUSE bug 1249924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249925">SUSE bug 1249925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249927">SUSE bug 1249927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249928">SUSE bug 1249928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249930">SUSE bug 1249930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249933">SUSE bug 1249933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249934">SUSE bug 1249934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249936">SUSE bug 1249936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249938">SUSE bug 1249938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249939">SUSE bug 1249939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249944">SUSE bug 1249944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249947">SUSE bug 1249947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249949">SUSE bug 1249949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249950">SUSE bug 1249950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249954">SUSE bug 1249954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249958">SUSE bug 1249958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249979">SUSE bug 1249979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249981">SUSE bug 1249981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249991">SUSE bug 1249991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249997">SUSE bug 1249997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250002">SUSE bug 1250002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250006">SUSE bug 1250006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250007">SUSE bug 1250007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250009">SUSE bug 1250009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250010">SUSE bug 1250010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250011">SUSE bug 1250011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250014">SUSE bug 1250014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250015">SUSE bug 1250015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250023">SUSE bug 1250023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250024">SUSE bug 1250024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250026">SUSE bug 1250026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250039">SUSE bug 1250039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250041">SUSE bug 1250041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250043">SUSE bug 1250043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250044">SUSE bug 1250044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250047">SUSE bug 1250047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250049">SUSE bug 1250049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250052">SUSE bug 1250052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250055">SUSE bug 1250055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250058">SUSE bug 1250058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250060">SUSE bug 1250060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250062">SUSE bug 1250062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250065">SUSE bug 1250065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250066">SUSE bug 1250066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250070">SUSE bug 1250070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250071">SUSE bug 1250071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250072">SUSE bug 1250072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250077">SUSE bug 1250077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250080">SUSE bug 1250080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250081">SUSE bug 1250081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250083">SUSE bug 1250083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250105">SUSE bug 1250105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250106">SUSE bug 1250106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250107">SUSE bug 1250107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250108">SUSE bug 1250108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250114">SUSE bug 1250114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250118">SUSE bug 1250118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250121">SUSE bug 1250121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250127">SUSE bug 1250127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250128">SUSE bug 1250128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250131">SUSE bug 1250131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250132">SUSE bug 1250132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250137">SUSE bug 1250137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250138">SUSE bug 1250138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250140">SUSE bug 1250140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250145">SUSE bug 1250145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250151">SUSE bug 1250151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250153">SUSE bug 1250153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250156">SUSE bug 1250156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250159">SUSE bug 1250159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250161">SUSE bug 1250161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250168">SUSE bug 1250168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250178">SUSE bug 1250178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250180">SUSE bug 1250180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250181">SUSE bug 1250181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250182">SUSE bug 1250182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250183">SUSE bug 1250183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250184">SUSE bug 1250184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250187">SUSE bug 1250187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250191">SUSE bug 1250191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250197">SUSE bug 1250197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250198">SUSE bug 1250198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250200">SUSE bug 1250200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250209">SUSE bug 1250209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250211">SUSE bug 1250211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250237">SUSE bug 1250237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250245">SUSE bug 1250245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250247">SUSE bug 1250247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250250">SUSE bug 1250250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250257">SUSE bug 1250257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250264">SUSE bug 1250264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250269">SUSE bug 1250269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250277">SUSE bug 1250277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250287">SUSE bug 1250287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250293">SUSE bug 1250293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250301">SUSE bug 1250301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250303">SUSE bug 1250303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250309">SUSE bug 1250309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250311">SUSE bug 1250311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250313">SUSE bug 1250313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250315">SUSE bug 1250315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250316">SUSE bug 1250316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250322">SUSE bug 1250322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250323">SUSE bug 1250323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250324">SUSE bug 1250324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250325">SUSE bug 1250325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250328">SUSE bug 1250328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250331">SUSE bug 1250331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250358">SUSE bug 1250358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250362">SUSE bug 1250362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250363">SUSE bug 1250363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250370">SUSE bug 1250370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250374">SUSE bug 1250374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250391">SUSE bug 1250391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250392">SUSE bug 1250392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250393">SUSE bug 1250393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250394">SUSE bug 1250394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250395">SUSE bug 1250395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250406">SUSE bug 1250406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250412">SUSE bug 1250412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250418">SUSE bug 1250418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250425">SUSE bug 1250425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250428">SUSE bug 1250428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250453">SUSE bug 1250453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250454">SUSE bug 1250454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250457">SUSE bug 1250457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250459">SUSE bug 1250459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250522">SUSE bug 1250522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250759">SUSE bug 1250759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250761">SUSE bug 1250761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250762">SUSE bug 1250762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250763">SUSE bug 1250763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250767">SUSE bug 1250767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250768">SUSE bug 1250768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250774">SUSE bug 1250774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250781">SUSE bug 1250781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250784">SUSE bug 1250784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250786">SUSE bug 1250786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250787">SUSE bug 1250787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250790">SUSE bug 1250790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250791">SUSE bug 1250791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250792">SUSE bug 1250792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250797">SUSE bug 1250797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250799">SUSE bug 1250799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250807">SUSE bug 1250807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250810">SUSE bug 1250810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250811">SUSE bug 1250811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250818">SUSE bug 1250818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250819">SUSE bug 1250819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250822">SUSE bug 1250822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250823">SUSE bug 1250823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250824">SUSE bug 1250824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250825">SUSE bug 1250825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250830">SUSE bug 1250830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250831">SUSE bug 1250831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250839">SUSE bug 1250839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250841">SUSE bug 1250841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250842">SUSE bug 1250842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250843">SUSE bug 1250843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250846">SUSE bug 1250846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250847">SUSE bug 1250847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250848">SUSE bug 1250848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250850">SUSE bug 1250850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250851">SUSE bug 1250851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250853">SUSE bug 1250853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250856">SUSE bug 1250856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250863">SUSE bug 1250863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250864">SUSE bug 1250864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250866">SUSE bug 1250866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250867">SUSE bug 1250867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250868">SUSE bug 1250868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250872">SUSE bug 1250872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250874">SUSE bug 1250874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250875">SUSE bug 1250875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250877">SUSE bug 1250877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250879">SUSE bug 1250879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250883">SUSE bug 1250883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250887">SUSE bug 1250887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250888">SUSE bug 1250888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250889">SUSE bug 1250889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250890">SUSE bug 1250890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250891">SUSE bug 1250891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250905">SUSE bug 1250905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250915">SUSE bug 1250915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250917">SUSE bug 1250917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250923">SUSE bug 1250923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250927">SUSE bug 1250927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250928">SUSE bug 1250928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250948">SUSE bug 1250948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250949">SUSE bug 1250949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250953">SUSE bug 1250953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250955">SUSE bug 1250955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250963">SUSE bug 1250963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250964">SUSE bug 1250964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250965">SUSE bug 1250965</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2602/">CVE-2022-2602 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2978/">CVE-2022-2978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2978">CVE-2022-2978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36280/">CVE-2022-36280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49980/">CVE-2022-49980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49980">CVE-2022-49980 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50233/">CVE-2022-50233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50233">CVE-2022-50233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50234/">CVE-2022-50234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50234">CVE-2022-50234 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50235/">CVE-2022-50235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50235">CVE-2022-50235 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50239/">CVE-2022-50239 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50239">CVE-2022-50239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50241/">CVE-2022-50241 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50241">CVE-2022-50241 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50246/">CVE-2022-50246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50246">CVE-2022-50246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50247/">CVE-2022-50247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50247">CVE-2022-50247 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50248/">CVE-2022-50248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50248">CVE-2022-50248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50249/">CVE-2022-50249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50249">CVE-2022-50249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50250/">CVE-2022-50250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50250">CVE-2022-50250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50251/">CVE-2022-50251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50251">CVE-2022-50251 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50252/">CVE-2022-50252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50252">CVE-2022-50252 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50255/">CVE-2022-50255 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50255">CVE-2022-50255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50257/">CVE-2022-50257 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50257">CVE-2022-50257 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50258/">CVE-2022-50258 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50258">CVE-2022-50258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50260/">CVE-2022-50260 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50260">CVE-2022-50260 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50261/">CVE-2022-50261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50261">CVE-2022-50261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50264/">CVE-2022-50264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50264">CVE-2022-50264 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50266/">CVE-2022-50266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50266">CVE-2022-50266 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50267/">CVE-2022-50267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50267">CVE-2022-50267 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50268/">CVE-2022-50268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50268">CVE-2022-50268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50269/">CVE-2022-50269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50269">CVE-2022-50269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50271/">CVE-2022-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50271">CVE-2022-50271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50272/">CVE-2022-50272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50272">CVE-2022-50272 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50275/">CVE-2022-50275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50275">CVE-2022-50275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50276/">CVE-2022-50276 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50276">CVE-2022-50276 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50277/">CVE-2022-50277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50277">CVE-2022-50277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50278/">CVE-2022-50278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50278">CVE-2022-50278 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50279/">CVE-2022-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50279">CVE-2022-50279 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50282/">CVE-2022-50282 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50282">CVE-2022-50282 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50286/">CVE-2022-50286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50286">CVE-2022-50286 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50289/">CVE-2022-50289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50289">CVE-2022-50289 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50294/">CVE-2022-50294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50294">CVE-2022-50294 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50297/">CVE-2022-50297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50297">CVE-2022-50297 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50298/">CVE-2022-50298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50298">CVE-2022-50298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50299/">CVE-2022-50299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50299">CVE-2022-50299 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50301/">CVE-2022-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50301">CVE-2022-50301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50308/">CVE-2022-50308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50308">CVE-2022-50308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50309/">CVE-2022-50309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50309">CVE-2022-50309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50312/">CVE-2022-50312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50312">CVE-2022-50312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50317/">CVE-2022-50317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50317">CVE-2022-50317 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50318/">CVE-2022-50318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50318">CVE-2022-50318 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50320/">CVE-2022-50320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50320">CVE-2022-50320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50321/">CVE-2022-50321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50321">CVE-2022-50321 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50324/">CVE-2022-50324 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50324">CVE-2022-50324 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50328/">CVE-2022-50328 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50328">CVE-2022-50328 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50329/">CVE-2022-50329 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50329">CVE-2022-50329 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50330/">CVE-2022-50330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50330">CVE-2022-50330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50331/">CVE-2022-50331 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50331">CVE-2022-50331 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50333/">CVE-2022-50333 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50333">CVE-2022-50333 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50340/">CVE-2022-50340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50340">CVE-2022-50340 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50342/">CVE-2022-50342 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50342">CVE-2022-50342 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50344/">CVE-2022-50344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50344">CVE-2022-50344 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50346/">CVE-2022-50346 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50346">CVE-2022-50346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50347/">CVE-2022-50347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50347">CVE-2022-50347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50348/">CVE-2022-50348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50348">CVE-2022-50348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50349/">CVE-2022-50349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50349">CVE-2022-50349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50351/">CVE-2022-50351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50351">CVE-2022-50351 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50353/">CVE-2022-50353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50353">CVE-2022-50353 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50355/">CVE-2022-50355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50355">CVE-2022-50355 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50358/">CVE-2022-50358 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50358">CVE-2022-50358 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50359/">CVE-2022-50359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50359">CVE-2022-50359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50362/">CVE-2022-50362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50362">CVE-2022-50362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50364/">CVE-2022-50364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50364">CVE-2022-50364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50367/">CVE-2022-50367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50367">CVE-2022-50367 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50368/">CVE-2022-50368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50368">CVE-2022-50368 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50369/">CVE-2022-50369 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50369">CVE-2022-50369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50370/">CVE-2022-50370 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50370">CVE-2022-50370 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50372/">CVE-2022-50372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50372">CVE-2022-50372 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50373/">CVE-2022-50373 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50373">CVE-2022-50373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50374/">CVE-2022-50374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50374">CVE-2022-50374 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50375/">CVE-2022-50375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50375">CVE-2022-50375 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-50376/">CVE-2022-50376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50376">CVE-2022-50376 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50379/">CVE-2022-50379 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50379">CVE-2022-50379 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50381/">CVE-2022-50381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50381">CVE-2022-50381 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50385/">CVE-2022-50385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50385">CVE-2022-50385 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50386/">CVE-2022-50386 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50386">CVE-2022-50386 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50388/">CVE-2022-50388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50388">CVE-2022-50388 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50389/">CVE-2022-50389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50389">CVE-2022-50389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50391/">CVE-2022-50391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50391">CVE-2022-50391 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50392/">CVE-2022-50392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50392">CVE-2022-50392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50394/">CVE-2022-50394 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50394">CVE-2022-50394 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50395/">CVE-2022-50395 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50395">CVE-2022-50395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50399/">CVE-2022-50399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50399">CVE-2022-50399 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50401/">CVE-2022-50401 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50401">CVE-2022-50401 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50402/">CVE-2022-50402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50402">CVE-2022-50402 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50404/">CVE-2022-50404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50404">CVE-2022-50404 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50408/">CVE-2022-50408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50408">CVE-2022-50408 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50409/">CVE-2022-50409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50409">CVE-2022-50409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50410/">CVE-2022-50410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50410">CVE-2022-50410 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50411/">CVE-2022-50411 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50411">CVE-2022-50411 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50414/">CVE-2022-50414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50414">CVE-2022-50414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50417/">CVE-2022-50417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50417">CVE-2022-50417 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50419/">CVE-2022-50419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50419">CVE-2022-50419 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50422/">CVE-2022-50422 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50422">CVE-2022-50422 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50423/">CVE-2022-50423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50423">CVE-2022-50423 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50425/">CVE-2022-50425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50425">CVE-2022-50425 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50427/">CVE-2022-50427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50427">CVE-2022-50427 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50428/">CVE-2022-50428 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50428">CVE-2022-50428 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50429/">CVE-2022-50429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50429">CVE-2022-50429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50430/">CVE-2022-50430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50430">CVE-2022-50430 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50431/">CVE-2022-50431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50431">CVE-2022-50431 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50432/">CVE-2022-50432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50432">CVE-2022-50432 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50434/">CVE-2022-50434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50434">CVE-2022-50434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50435/">CVE-2022-50435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50435">CVE-2022-50435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50436/">CVE-2022-50436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50436">CVE-2022-50436 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50437/">CVE-2022-50437 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50437">CVE-2022-50437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50439/">CVE-2022-50439 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50439">CVE-2022-50439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50440/">CVE-2022-50440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50440">CVE-2022-50440 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50443/">CVE-2022-50443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50443">CVE-2022-50443 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50444/">CVE-2022-50444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50444">CVE-2022-50444 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50449/">CVE-2022-50449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50449">CVE-2022-50449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50453/">CVE-2022-50453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50453">CVE-2022-50453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50454/">CVE-2022-50454 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50454">CVE-2022-50454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50456/">CVE-2022-50456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50456">CVE-2022-50456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50458/">CVE-2022-50458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50458">CVE-2022-50458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50459/">CVE-2022-50459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50459">CVE-2022-50459 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50460/">CVE-2022-50460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50460">CVE-2022-50460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50465/">CVE-2022-50465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50465">CVE-2022-50465 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50466/">CVE-2022-50466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50466">CVE-2022-50466 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50467/">CVE-2022-50467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50467">CVE-2022-50467 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50468/">CVE-2022-50468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50468">CVE-2022-50468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50469/">CVE-2022-50469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50469">CVE-2022-50469 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1380/">CVE-2023-1380 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28328/">CVE-2023-28328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28328">CVE-2023-28328 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52923/">CVE-2023-52923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52923">CVE-2023-52923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53147/">CVE-2023-53147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53147">CVE-2023-53147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53149/">CVE-2023-53149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53149">CVE-2023-53149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53150/">CVE-2023-53150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53150">CVE-2023-53150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53151/">CVE-2023-53151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53151">CVE-2023-53151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53153/">CVE-2023-53153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53153">CVE-2023-53153 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53165/">CVE-2023-53165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53165">CVE-2023-53165 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53167/">CVE-2023-53167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53167">CVE-2023-53167 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53171/">CVE-2023-53171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53171">CVE-2023-53171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53174/">CVE-2023-53174 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53174">CVE-2023-53174 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53176/">CVE-2023-53176 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53176">CVE-2023-53176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53178/">CVE-2023-53178 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53178">CVE-2023-53178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53179/">CVE-2023-53179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53179">CVE-2023-53179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53182/">CVE-2023-53182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53182">CVE-2023-53182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53185/">CVE-2023-53185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53185">CVE-2023-53185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53196/">CVE-2023-53196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53196">CVE-2023-53196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53197/">CVE-2023-53197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53197">CVE-2023-53197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53199/">CVE-2023-53199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53199">CVE-2023-53199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53201/">CVE-2023-53201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53201">CVE-2023-53201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53205/">CVE-2023-53205 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53205">CVE-2023-53205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53213/">CVE-2023-53213 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53213">CVE-2023-53213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53216/">CVE-2023-53216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53216">CVE-2023-53216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53219/">CVE-2023-53219 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53219">CVE-2023-53219 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53222/">CVE-2023-53222 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53222">CVE-2023-53222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53223/">CVE-2023-53223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53223">CVE-2023-53223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53226/">CVE-2023-53226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53226">CVE-2023-53226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53229/">CVE-2023-53229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53229">CVE-2023-53229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53230/">CVE-2023-53230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53230">CVE-2023-53230 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53234/">CVE-2023-53234 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53234">CVE-2023-53234 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53238/">CVE-2023-53238 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53238">CVE-2023-53238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53239/">CVE-2023-53239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53239">CVE-2023-53239 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53241/">CVE-2023-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53241">CVE-2023-53241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53242/">CVE-2023-53242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53242">CVE-2023-53242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53244/">CVE-2023-53244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53244">CVE-2023-53244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53245/">CVE-2023-53245 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53245">CVE-2023-53245 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53246/">CVE-2023-53246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53246">CVE-2023-53246 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53249/">CVE-2023-53249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53249">CVE-2023-53249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53250/">CVE-2023-53250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53250">CVE-2023-53250 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53251/">CVE-2023-53251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53251">CVE-2023-53251 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53255/">CVE-2023-53255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53255">CVE-2023-53255 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53259/">CVE-2023-53259 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53259">CVE-2023-53259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53265/">CVE-2023-53265 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53265">CVE-2023-53265 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53268/">CVE-2023-53268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53268">CVE-2023-53268 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53270/">CVE-2023-53270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53270">CVE-2023-53270 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53272/">CVE-2023-53272 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53272">CVE-2023-53272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53273/">CVE-2023-53273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53273">CVE-2023-53273 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53275/">CVE-2023-53275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53275">CVE-2023-53275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53276/">CVE-2023-53276 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53276">CVE-2023-53276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53277/">CVE-2023-53277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53277">CVE-2023-53277 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53280/">CVE-2023-53280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53280">CVE-2023-53280 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53281/">CVE-2023-53281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53281">CVE-2023-53281 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53282/">CVE-2023-53282 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53282">CVE-2023-53282 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53286/">CVE-2023-53286 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53286">CVE-2023-53286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53288/">CVE-2023-53288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53288">CVE-2023-53288 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53295/">CVE-2023-53295 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53295">CVE-2023-53295 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53297/">CVE-2023-53297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53297">CVE-2023-53297 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53298/">CVE-2023-53298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53298">CVE-2023-53298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53299/">CVE-2023-53299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53299">CVE-2023-53299 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53302/">CVE-2023-53302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53302">CVE-2023-53302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53304/">CVE-2023-53304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53304">CVE-2023-53304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53305/">CVE-2023-53305 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53305">CVE-2023-53305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53307/">CVE-2023-53307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53307">CVE-2023-53307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53309/">CVE-2023-53309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53309">CVE-2023-53309 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53311/">CVE-2023-53311 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53311">CVE-2023-53311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53313/">CVE-2023-53313 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53313">CVE-2023-53313 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53314/">CVE-2023-53314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53314">CVE-2023-53314 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53315/">CVE-2023-53315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53315">CVE-2023-53315 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53316/">CVE-2023-53316 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53316">CVE-2023-53316 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53317/">CVE-2023-53317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53317">CVE-2023-53317 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53321/">CVE-2023-53321 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53321">CVE-2023-53321 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53322/">CVE-2023-53322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53322">CVE-2023-53322 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53324/">CVE-2023-53324 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53324">CVE-2023-53324 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53326/">CVE-2023-53326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53326">CVE-2023-53326 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53330/">CVE-2023-53330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53330">CVE-2023-53330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53331/">CVE-2023-53331 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53331">CVE-2023-53331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53333/">CVE-2023-53333 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53333">CVE-2023-53333 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53334/">CVE-2023-53334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53334">CVE-2023-53334 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53335/">CVE-2023-53335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53335">CVE-2023-53335 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53337/">CVE-2023-53337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53337">CVE-2023-53337 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53344/">CVE-2023-53344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53344">CVE-2023-53344 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53349/">CVE-2023-53349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53349">CVE-2023-53349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53352/">CVE-2023-53352 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53352">CVE-2023-53352 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53356/">CVE-2023-53356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53356">CVE-2023-53356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53359/">CVE-2023-53359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53359">CVE-2023-53359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53368/">CVE-2023-53368 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53368">CVE-2023-53368 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53373/">CVE-2023-53373 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53373">CVE-2023-53373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53375/">CVE-2023-53375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53375">CVE-2023-53375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53377/">CVE-2023-53377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53377">CVE-2023-53377 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53379/">CVE-2023-53379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53379">CVE-2023-53379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53380/">CVE-2023-53380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53380">CVE-2023-53380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53381/">CVE-2023-53381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53381">CVE-2023-53381 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53384/">CVE-2023-53384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53384">CVE-2023-53384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53386/">CVE-2023-53386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53386">CVE-2023-53386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53388/">CVE-2023-53388 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53388">CVE-2023-53388 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53390/">CVE-2023-53390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53390">CVE-2023-53390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53393/">CVE-2023-53393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53393">CVE-2023-53393 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53395/">CVE-2023-53395 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53395">CVE-2023-53395 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53396/">CVE-2023-53396 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53396">CVE-2023-53396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53400/">CVE-2023-53400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53400">CVE-2023-53400 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53404/">CVE-2023-53404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53404">CVE-2023-53404 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53405/">CVE-2023-53405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53405">CVE-2023-53405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53406/">CVE-2023-53406 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53406">CVE-2023-53406 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53409/">CVE-2023-53409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53409">CVE-2023-53409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53413/">CVE-2023-53413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53413">CVE-2023-53413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53414/">CVE-2023-53414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53414">CVE-2023-53414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53415/">CVE-2023-53415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53415">CVE-2023-53415 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53416/">CVE-2023-53416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53416">CVE-2023-53416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53422/">CVE-2023-53422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53422">CVE-2023-53422 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53427/">CVE-2023-53427 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53427">CVE-2023-53427 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53431/">CVE-2023-53431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53431">CVE-2023-53431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53435/">CVE-2023-53435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53435">CVE-2023-53435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53436/">CVE-2023-53436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53436">CVE-2023-53436 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53437/">CVE-2023-53437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53437">CVE-2023-53437 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53438/">CVE-2023-53438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53438">CVE-2023-53438 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53440/">CVE-2023-53440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53440">CVE-2023-53440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53443/">CVE-2023-53443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53443">CVE-2023-53443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53446/">CVE-2023-53446 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53446">CVE-2023-53446 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53449/">CVE-2023-53449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53449">CVE-2023-53449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53451/">CVE-2023-53451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53451">CVE-2023-53451 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53452/">CVE-2023-53452 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53452">CVE-2023-53452 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53453/">CVE-2023-53453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53453">CVE-2023-53453 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53454/">CVE-2023-53454 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53454">CVE-2023-53454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53457/">CVE-2023-53457 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53457">CVE-2023-53457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53458/">CVE-2023-53458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53458">CVE-2023-53458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53463/">CVE-2023-53463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53463">CVE-2023-53463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53464/">CVE-2023-53464 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53464">CVE-2023-53464 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53465/">CVE-2023-53465 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53465">CVE-2023-53465 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53468/">CVE-2023-53468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53468">CVE-2023-53468 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53471/">CVE-2023-53471 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53471">CVE-2023-53471 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53472/">CVE-2023-53472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53472">CVE-2023-53472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53473/">CVE-2023-53473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53473">CVE-2023-53473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53474/">CVE-2023-53474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53474">CVE-2023-53474 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53475/">CVE-2023-53475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53475">CVE-2023-53475 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53476/">CVE-2023-53476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53476">CVE-2023-53476 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53485/">CVE-2023-53485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53485">CVE-2023-53485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53487/">CVE-2023-53487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53487">CVE-2023-53487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53488/">CVE-2023-53488 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53488">CVE-2023-53488 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53492/">CVE-2023-53492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53492">CVE-2023-53492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53494/">CVE-2023-53494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53494">CVE-2023-53494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53496/">CVE-2023-53496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53496">CVE-2023-53496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53498/">CVE-2023-53498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53498">CVE-2023-53498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53499/">CVE-2023-53499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53499">CVE-2023-53499 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53505/">CVE-2023-53505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53505">CVE-2023-53505 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53506/">CVE-2023-53506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53506">CVE-2023-53506 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53509/">CVE-2023-53509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53509">CVE-2023-53509 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53512/">CVE-2023-53512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53512">CVE-2023-53512 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53513/">CVE-2023-53513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53513">CVE-2023-53513 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53515/">CVE-2023-53515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53515">CVE-2023-53515 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53518/">CVE-2023-53518 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53518">CVE-2023-53518 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53519/">CVE-2023-53519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53519">CVE-2023-53519 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53521/">CVE-2023-53521 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53521">CVE-2023-53521 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53524/">CVE-2023-53524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53524">CVE-2023-53524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53525/">CVE-2023-53525 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53525">CVE-2023-53525 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53526/">CVE-2023-53526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53526">CVE-2023-53526 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53530/">CVE-2023-53530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53530">CVE-2023-53530 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58240/">CVE-2024-58240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58240">CVE-2024-58240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23155/">CVE-2025-23155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23155">CVE-2025-23155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37738/">CVE-2025-37738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37738">CVE-2025-37738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37885/">CVE-2025-37885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37885">CVE-2025-37885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37958/">CVE-2025-37958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37958">CVE-2025-37958 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38084/">CVE-2025-38084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38085/">CVE-2025-38085 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38111/">CVE-2025-38111 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38111">CVE-2025-38111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38184/">CVE-2025-38184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38184">CVE-2025-38184 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38380/">CVE-2025-38380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38470/">CVE-2025-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38470">CVE-2025-38470 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38476/">CVE-2025-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38476">CVE-2025-38476 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38488/">CVE-2025-38488 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38488">CVE-2025-38488 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38553/">CVE-2025-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38553">CVE-2025-38553 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38572/">CVE-2025-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38659/">CVE-2025-38659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38659">CVE-2025-38659 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38664/">CVE-2025-38664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38664">CVE-2025-38664 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38678/">CVE-2025-38678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38678">CVE-2025-38678 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38685/">CVE-2025-38685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38706/">CVE-2025-38706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38706">CVE-2025-38706 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38713/">CVE-2025-38713 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38713">CVE-2025-38713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38734/">CVE-2025-38734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38734">CVE-2025-38734 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39691/">CVE-2025-39691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39691">CVE-2025-39691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39703/">CVE-2025-39703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39703">CVE-2025-39703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39726/">CVE-2025-39726 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39726">CVE-2025-39726 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39746/">CVE-2025-39746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39746">CVE-2025-39746 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39751/">CVE-2025-39751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39790/">CVE-2025-39790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39790">CVE-2025-39790 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39797/">CVE-2025-39797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39823/">CVE-2025-39823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39823">CVE-2025-39823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39824/">CVE-2025-39824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39824">CVE-2025-39824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39860/">CVE-2025-39860 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39860">CVE-2025-39860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39869/">CVE-2025-39869 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39869">CVE-2025-39869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023011" comment="kernel-rt-5.14.21-150400.15.133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023012" comment="kernel-source-rt-5.14.21-150400.15.133.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206403" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1244663" ref_url="https://bugzilla.suse.com/1244663" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-4565" ref_url="https://www.suse.com/security/cve/CVE-2025-4565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022970.html" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:

- CVE-2025-4565: parsing of untrusted Protocol Buffers data containing an arbitrary number of recursive groups or
  messages can lead to crash due to a `RecursionError` (bsc#1244663).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-22"/>
	<updated date="2025-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1244663">SUSE bug 1244663</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4565/">CVE-2025-4565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4565">CVE-2025-4565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023010" comment="libprotobuf-lite20-3.9.2-150200.4.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206404" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1241219" ref_url="https://bugzilla.suse.com/1241219" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-3576" ref_url="https://www.suse.com/security/cve/CVE-2025-3576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042259.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2025-3576: weakness in the MD5 checksum design allows for spoofing of GSSAPI-protected messages that are using
  RC4-HMAC-MD5 (bsc#1241219).

Krb5 as very old protocol supported quite a number of ciphers
that are not longer up to current cryptographic standards.

To avoid problems with those, SUSE has by default now disabled
those alorithms.

The following algorithms have been removed from valid krb5 enctypes:

- des3-cbc-sha1
- arcfour-hmac-md5

To reenable those algorithms, you can use allow options in krb5.conf:

[libdefaults]
allow_des3 = true
allow_rc4 = true

to reenable them.
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-22"/>
	<updated date="2025-10-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1241219">SUSE bug 1241219</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3576/">CVE-2025-3576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3576">CVE-2025-3576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023013" comment="krb5-1.19.2-150400.3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206405" version="1" class="patch">
	<metadata>
		<title>Security update for afterburn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1196972" ref_url="https://bugzilla.suse.com/1196972" source="BUGZILLA"/>
		<reference ref_id="1242665" ref_url="https://bugzilla.suse.com/1242665" source="BUGZILLA"/>
		<reference ref_id="1243850" ref_url="https://bugzilla.suse.com/1243850" source="BUGZILLA"/>
		<reference ref_id="1244199" ref_url="https://bugzilla.suse.com/1244199" source="BUGZILLA"/>
		<reference ref_id="1244675" ref_url="https://bugzilla.suse.com/1244675" source="BUGZILLA"/>
		<reference ref_id="1250471" ref_url="https://bugzilla.suse.com/1250471" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<reference ref_id="CVE-2025-3416" ref_url="https://www.suse.com/security/cve/CVE-2025-3416/" source="CVE"/>
		<reference ref_id="CVE-2025-5791" ref_url="https://www.suse.com/security/cve/CVE-2025-5791/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042302.html" source="SUSE-SU"/>
		<description>
This update for afterburn fixes the following issues:

Update to version 5.9.0.git21.a73f509.

Security issues fixed:

- CVE-2022-24713: regex: no proper complexity limitation when parsing untrusted regular expressions with large
  repetitions on empty sub-expressions can lead to excessive resource consumption and denial of service (bsc#1196972).
- CVE-2024-12224: idna: acceptance of Punycode labels that do not produce any non-ASCII output may lead to incorrect
  hostname comparisons and incorrect URL parsing (bsc#1243850).
- CVE-2025-5791: users: `root` user being appended to group listings whenever listing does not have exactly 1024 groups
  can lead to privilege escalation when information is used for access control (bsc#1244199).
- CVE-2025-3416: openssl: passing of `Some(...)` value as `properties` argument to `Md::fetch` or `Cipher::fetch` can
  lead to use-after-free (bsc#1242665).

Other issues fixed:

- Fixed in version 5.9.0.git21.a73f509:
  * cargo: update dependencies
  * microsoft/azure: Add XML attribute alias for serde-xml-rs Fedora compat
  * microsoft/azure: Fix SharedConfig parsing of XML attributes
  * microsoft/azure: Mock goalstate.SharedConfig output in tests
  * providers/azure: switch SSH key retrieval from certs endpoint to IMDS as azure stopped providing keys in the old one (bsc#1250471).
  * upcloud: implement UpCloud provider
  * Update several build dependencies
    
- Fixed in version 5.9.0:
  * cargo: update dependencies
  * dracut: Return 255 in module-setup
  * oraclecloud: add release note and move base URL to constant
  * oraclecloud: implement oraclecloud provider
  * Update several build dependencies

- Fixed in version 5.8.2:
  * cargo: update dependencies
  * packit: add initial support

- Fixed in version 5.7.0.git103.bae893c:
  * proxmoxve: Add more context to log messages.
  * proxmoxve: Remove unneeded fields
  * proxmoxve: Add tests for static network configuration from cloud-init.
  * proxmoxve: Add support for static network configuration from cloud-init.
  * providers/openstack: ignore ec2 metadata if not present
  * proxmox: use noop provider if no configdrive
  * Update several build dependencies

- Fixed in version 5.7.0:
  * cargo: update dependencies
  * dhcp: replace dbus_proxy with proxy, and zbus traits
  * providers/hetzner: private ipv4 addresses in attributes
  * openstack: Document the two platforms
  * microsoft/azure: allow empty certificate chain in PKCS12 file
  * proxmoxve: implement proxmoxve provider
  * providers/hetzner: fix duplicate attribute prefix
  * lint: silence deadcode warnings
  * lint: address latest lint's from msrv update
  * cargo: update msrv to 1.75
  * providers: Add 'akamai' provider
  * providers/vmware: add missing public functions for non-amd64
  * providers/vmware: Process guestinfo.metadata netplan configuration
  * kubevirt: Run afterburn-hostname service
  * providers: add support for scaleway
  * Move away from deprecated `users` to `uzers`
  * providers/hetzner: add support for Hetzner Cloud
  * cargo: update MSRV to 1.71
  * cargo: specify required features for nix dependency
  * openstack: Add attribute OPENSTACK_INSTANCE_UUID
  * cargo: allow openssl 0.10.46
  * build-sys: Use new tier = 2 for cargo-vendor-filterer
  * cargo: fix minimum version of openssl crate
  * microsoft/crypto/mod: replace deprecated function `parse` with `parse2`
  * cli: switch to clap derive
  * cli: add descriptive value names for option arguments in --help
  * cli: have clap require exactly one of --cmdline/--provider
  * providers/`*`: move endpoint mocking into retry::Client
  * retry/client: move URL parsing into helper function
  * providers/microsoft: import crate::retry
  * providers/microsoft: use stored client for all fetches
  * providers/packet: use stored client for boot checkin
  * initrd: remember to write trailing newline to network kargs file
  * util: drop obsolete 'OEM' terminology
  * Inline variables into format strings
  * Update several build dependencies

- Fixed in version 5.4.1:
  * cargo: add configuration for cargo-vendor-filterer
  * util: support DHCP option lookup from NetworkManager
  * util: factor out retries of DHCP option lookup
  * util: refactor DHCP option query helper into an enum
  * util: move dns_lease_key_lookup() to a separate module
  * cargo: update MSRV to 1.66
  * cargo: update all packages to fix build error
  * cargo: continue to support openssh-keys 0.5
  * cargo: drop serde_derive crate in favor of serde derive feature
  * cargo: use consistent declaration syntax for slog dependency
  * cargo: drop unused dependencies
  * cargo: continue to support base64 0.13
  * cargo: continue to support mailparse 0.13.8
  * cargo: continue to support clap 3.1
  * cargo: stop enabling LTO in release builds
  * providers/ibmcloud: avoid error if an ssh key not found in metadata
  * systemd: add explicit ordering, after multi-user.target
  * network: fix clippy 1.63.0 lints
  * cargo: allow serde_yaml 0.8
  * cargo: update version ranges for post-1.x deps
  * providers: Use inline `format!` in a few places
  * *: bump MSRV to 1.58.0
  * cargo: update clap to 3.2.5
  * copr: mark git checkout as safe
  * providers/aws: expose instance availability-zone-id as AWS_AVAILABILITY_ZONE_ID
  * Update several build dependencies

- Fixed in version 5.3.0:
  * systemd: enable sshkeys on Power VS platform
  * network: Encode information for systemd-networkd-wait-online
  * cargo: update to clap 3.1
  * cargo: enable clap wrap_help feature
  * cli: run clap tests
  * cli: avoid deprecated clap constructs
  * cargo: update to clap 3.0
  * cli: use clap mechanism to require exp subcommand
  * cargo: declare MSRV in Cargo.toml
  * cargo: update to Rust 2021; bump MSRV to 1.56.0
  * copr: abort if specfile fetch fails
  * providers/aws: add AWS_IPV6 attribute
  * providers/aws: bump metadata version to 2021-01-03
  * kubevirt: Add KubeVirt platform support
  * *.service: add/update Documentation field
  * aws/mock_tests: explicitly drop mocks before resetting
  * aws/mock_tests: split out IMDS tests
  * aws/mock_tests: factor out map building
  * *: use `RemainAfterExit` on all oneshot services
  * Update several build dependencies
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2025-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196972">SUSE bug 1196972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242665">SUSE bug 1242665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243850">SUSE bug 1243850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244199">SUSE bug 1244199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244675">SUSE bug 1244675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250471">SUSE bug 1250471</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3416/">CVE-2025-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3416">CVE-2025-3416 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5791/">CVE-2025-5791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5791">CVE-2025-5791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023649" comment="afterburn-5.9.0.git21.a73f509-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023650" comment="afterburn-dracut-5.9.0.git21.a73f509-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206406" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246974" ref_url="https://bugzilla.suse.com/1246974" source="BUGZILLA"/>
		<reference ref_id="1249375" ref_url="https://bugzilla.suse.com/1249375" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-8114" ref_url="https://www.suse.com/security/cve/CVE-2025-8114/" source="CVE"/>
		<reference ref_id="CVE-2025-8277" ref_url="https://www.suse.com/security/cve/CVE-2025-8277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042299.html" source="SUSE-SU"/>
		<description>
This update for libssh fixes the following issues:

- CVE-2025-8277: memory exhaustion leading to client-side DoS due to improper memory management when KEX process is
  repeated with incorrect guesses (bsc#1249375).
- CVE-2025-8114: NULL pointer dereference when an allocation error happens during the calculation of the KEX session ID
  (bsc#1246974).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1246974">SUSE bug 1246974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249375">SUSE bug 1249375</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8114/">CVE-2025-8114 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8114">CVE-2025-8114 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-8277/">CVE-2025-8277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8277">CVE-2025-8277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023651" comment="libssh-config-0.9.8-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023652" comment="libssh4-0.9.8-150400.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206407" version="1" class="patch">
	<metadata>
		<title>Security update for chrony (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246544" ref_url="https://bugzilla.suse.com/1246544" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2025:3794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042294.html" source="SUSE-SU"/>
		<description>
This update for chrony fixes the following issues:

- Race condition during socket creation by chronyc allows privilege escalation from user chrony to root (bsc#1246544).

This update also ships chrony-pool-empty to SLE Micro 5.x (jsc#SMO-587)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1246544">SUSE bug 1246544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023653" comment="chrony-4.1-150400.21.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023479" comment="chrony-pool-empty-4.1-150400.21.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023480" comment="chrony-pool-suse-4.1-150400.21.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206408" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1251263" ref_url="https://bugzilla.suse.com/1251263" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-9187" ref_url="https://www.suse.com/security/cve/CVE-2025-9187/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023034.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

- Move NSS DB password hash away from SHA-1

Update to NSS 3.112.2:

  * Prevent leaks during pkcs12 decoding.
  * SEC_ASN1Decode* should ensure it has read as many bytes as each length field indicates

Update to NSS 3.112.1:

  * restore support for finding certificates by decoded serial number.

		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-27"/>
	<updated date="2025-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9187/">CVE-2025-9187 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9187">CVE-2025-9187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023860" comment="libfreebl3-3.112.2-150400.3.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023861" comment="libsoftokn3-3.112.2-150400.3.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023862" comment="mozilla-nss-3.112.2-150400.3.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023863" comment="mozilla-nss-certs-3.112.2-150400.3.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023864" comment="mozilla-nss-tools-3.112.2-150400.3.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206409" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1248807" ref_url="https://bugzilla.suse.com/1248807" source="BUGZILLA"/>
		<reference ref_id="1251271" ref_url="https://bugzilla.suse.com/1251271" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-27466" ref_url="https://www.suse.com/security/cve/CVE-2025-27466/" source="CVE"/>
		<reference ref_id="CVE-2025-58142" ref_url="https://www.suse.com/security/cve/CVE-2025-58142/" source="CVE"/>
		<reference ref_id="CVE-2025-58143" ref_url="https://www.suse.com/security/cve/CVE-2025-58143/" source="CVE"/>
		<reference ref_id="CVE-2025-58147" ref_url="https://www.suse.com/security/cve/CVE-2025-58147/" source="CVE"/>
		<reference ref_id="CVE-2025-58148" ref_url="https://www.suse.com/security/cve/CVE-2025-58148/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023077.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

  - CVE-2025-58147, CVE-2025-58148: Fixed incorrect input sanitisation in Viridian hypercalls (bsc#1251271, XSA-475)
  - CVE-2025-27466, CVE-2025-58142, CVE-2025-58143: Fixed mutiple vulnerabilities in the Viridian interface (bsc#1248807, XSA-472)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-28"/>
	<updated date="2025-10-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1248807">SUSE bug 1248807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251271">SUSE bug 1251271</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-27466/">CVE-2025-27466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27466">CVE-2025-27466 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-58142/">CVE-2025-58142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58142">CVE-2025-58142 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-58143/">CVE-2025-58143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58143">CVE-2025-58143 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-58147/">CVE-2025-58147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58147">CVE-2025-58147 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-58148/">CVE-2025-58148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58148">CVE-2025-58148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023963" comment="xen-libs-4.16.7_04-150400.4.75.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206410" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1250553" ref_url="https://bugzilla.suse.com/1250553" source="BUGZILLA"/>
		<reference ref_id="1251979" ref_url="https://bugzilla.suse.com/1251979" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10911" ref_url="https://www.suse.com/security/cve/CVE-2025-10911/" source="CVE"/>
		<reference ref_id="CVE-2025-11731" ref_url="https://www.suse.com/security/cve/CVE-2025-11731/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023084.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issues:

  - CVE-2025-11731: fixed a type confusion in exsltFuncResultComp function leading to denial of service (bsc#1251979)
  - CVE-2025-10911: last fix caused a regression, patch was temporary disabled (bsc#1250553)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-30"/>
	<updated date="2025-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250553">SUSE bug 1250553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251979">SUSE bug 1251979</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10911/">CVE-2025-10911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10911">CVE-2025-10911 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11731/">CVE-2025-11731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11731">CVE-2025-11731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024405" comment="libxslt1-1.1.34-150400.3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206411" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236136" ref_url="https://bugzilla.suse.com/1236136" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-13176" ref_url="https://www.suse.com/security/cve/CVE-2024-13176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020289.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-13176: Fixed timing side-channel in ECDSA signature computation (bsc#1236136).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-07"/>
	<updated date="2025-02-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1236136">SUSE bug 1236136</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-13176/">CVE-2024-13176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176">CVE-2024-13176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962924" comment="libopenssl3-3.0.8-150400.4.72.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206412" version="1" class="patch">
	<metadata>
		<title>Security update for colord (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1250750" ref_url="https://bugzilla.suse.com/1250750" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42523" ref_url="https://www.suse.com/security/cve/CVE-2021-42523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023130.html" source="SUSE-SU"/>
		<description>
This update for colord fixes the following issues:

- CVE-2021-42523: The original fix was wrong and did not properly free the error, resulting in a crash that has now been addressed (bsc#1250750).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-10-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1250750">SUSE bug 1250750</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42523/">CVE-2021-42523 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42523">CVE-2021-42523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024539" comment="libcolord2-1.4.5-150400.4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206413" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1250413" ref_url="https://bugzilla.suse.com/1250413" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-9900" ref_url="https://www.suse.com/security/cve/CVE-2025-9900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023150.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2025-9900: Fixed Write-What-Where in libtiff via TIFFReadRGBAImageOriented (bsc#1250413).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-05"/>
	<updated date="2025-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250413">SUSE bug 1250413</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9900/">CVE-2025-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9900">CVE-2025-9900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025061" comment="libtiff5-4.0.9-150000.45.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206414" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1252232" ref_url="https://bugzilla.suse.com/1252232" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023152.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

- CVE-2025-31133: Fixed container escape via 'masked path' abuse due to mount race conditions (bsc#1252232).
- CVE-2025-52565: Fixed container escape with malicious config due to /dev/console mount and related races (bsc#1252232).
- CVE-2025-52881: Fixed container escape and denial of service due to arbitrary write gadgets and procfs write redirects (bsc#1252232).

Update to runc v1.2.7. 

- Upstream changelog is available from &lt;https://github.com/opencontainers/runc/releases/tag/v1.2.7&gt;
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-05"/>
	<updated date="2025-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025062" comment="runc-1.2.7-150000.80.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206415" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1239119" ref_url="https://bugzilla.suse.com/1239119" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-30258" ref_url="https://www.suse.com/security/cve/CVE-2025-30258/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023174.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

  - CVE-2025-30258: fixed a verification denial of service due to a malicious subkey in the keyring (bsc#1239119) 
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2025-11-07"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1239119">SUSE bug 1239119</bugzilla>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30258/">CVE-2025-30258 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30258">CVE-2025-30258 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025192" comment="gpg2-2.2.27-150300.3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206416" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1252110" ref_url="https://bugzilla.suse.com/1252110" source="BUGZILLA"/>
		<reference ref_id="1252232" ref_url="https://bugzilla.suse.com/1252232" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023265.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

Update to runc v1.3.3. Upstream changelog is available from

  &lt;https://github.com/opencontainers/runc/releases/tag/v1.3.3&gt;. bsc#1252232

  * CVE-2025-31133
  * CVE-2025-52565
  * CVE-2025-52881

Update to runc v1.3.2. Upstream changelog is available from

&lt;https://github.com/opencontainers/runc/releases/tag/v1.3.2&gt; bsc#1252110

  - Includes an important fix for the CPUSet translation for cgroupv2.

Update to runc v1.3.1. Upstream changelog is available from

&lt;https://github.com/opencontainers/runc/releases/tag/v1.3.1&gt;

Update to runc v1.3.0. Upstream changelog is available from

&lt;https://github.com/opencontainers/runc/releases/tag/v1.3.0&gt;		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-12"/>
	<updated date="2025-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1252110">SUSE bug 1252110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025812" comment="runc-1.3.3-150000.85.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206417" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1252376" ref_url="https://bugzilla.suse.com/1252376" source="BUGZILLA"/>
		<reference ref_id="1252543" ref_url="https://bugzilla.suse.com/1252543" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023273.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2025-31133: Fixed container escape via 'masked path' abuse due to mount race conditions (bsc#1252376)
- CVE-2025-52565: Fixed container escape with malicious config due to /dev/console mount and related races (bsc#1252376)
- CVE-2025-52881: Fixed container escape and denial of service due to arbitrary write gadgets and procfs write redirects (bsc#1252376)
  
Other fixes:
- podman and buildah with runc 1.3.2 fail with lots of warnings as rootless (bsc#1252543)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-12"/>
	<updated date="2025-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1252376">SUSE bug 1252376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252543">SUSE bug 1252543</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025813" comment="podman-4.9.5-150400.4.59.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025814" comment="podman-remote-4.9.5-150400.4.59.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206418" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1237236" ref_url="https://bugzilla.suse.com/1237236" source="BUGZILLA"/>
		<reference ref_id="1237240" ref_url="https://bugzilla.suse.com/1237240" source="BUGZILLA"/>
		<reference ref_id="1237241" ref_url="https://bugzilla.suse.com/1237241" source="BUGZILLA"/>
		<reference ref_id="1237242" ref_url="https://bugzilla.suse.com/1237242" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-1352" ref_url="https://www.suse.com/security/cve/CVE-2025-1352/" source="CVE"/>
		<reference ref_id="CVE-2025-1372" ref_url="https://www.suse.com/security/cve/CVE-2025-1372/" source="CVE"/>
		<reference ref_id="CVE-2025-1376" ref_url="https://www.suse.com/security/cve/CVE-2025-1376/" source="CVE"/>
		<reference ref_id="CVE-2025-1377" ref_url="https://www.suse.com/security/cve/CVE-2025-1377/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023341.html" source="SUSE-SU"/>
		<description>
This update for elfutils fixes the following issues:

- Fixing build/testsuite for more recent glibc and kernels.

- Fixing denial of service and general buffer overflow errors
  (bsc#1237236, bsc#1237240, bsc#1237241, bsc#1237242):

  - CVE-2025-1376: Fixed denial of service in  function elf_strptr in the library /libelf/elf_strptr.c of the component eu-strip
  - CVE-2025-1377: Fixed denial of service in function gelf_getsymshndx of the file strip.c of the component eu-strip
  - CVE-2025-1372: Fixed buffer overflow in function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf
  - CVE-2025-1352: Fixed SEGV (illegal read access) in function __libdw_thread_tail in the library libdw_alloc.c of the component eu-readelf

- Fixing testsuite race conditions in run-debuginfod-find.sh.		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-24"/>
	<updated date="2025-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1237236">SUSE bug 1237236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237240">SUSE bug 1237240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237241">SUSE bug 1237241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237242">SUSE bug 1237242</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1352/">CVE-2025-1352 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1352">CVE-2025-1352 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1372/">CVE-2025-1372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1372">CVE-2025-1372 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1376/">CVE-2025-1376 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1376">CVE-2025-1376 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1377/">CVE-2025-1377 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1377">CVE-2025-1377 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031382" comment="elfutils-0.185-150400.5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031383" comment="libasm1-0.185-150400.5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031384" comment="libdw1-0.185-150400.5.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031385" comment="libelf1-0.185-150400.5.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206419" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1205128" ref_url="https://bugzilla.suse.com/1205128" source="BUGZILLA"/>
		<reference ref_id="1206893" ref_url="https://bugzilla.suse.com/1206893" source="BUGZILLA"/>
		<reference ref_id="1207612" ref_url="https://bugzilla.suse.com/1207612" source="BUGZILLA"/>
		<reference ref_id="1207619" ref_url="https://bugzilla.suse.com/1207619" source="BUGZILLA"/>
		<reference ref_id="1210763" ref_url="https://bugzilla.suse.com/1210763" source="BUGZILLA"/>
		<reference ref_id="1211162" ref_url="https://bugzilla.suse.com/1211162" source="BUGZILLA"/>
		<reference ref_id="1211692" ref_url="https://bugzilla.suse.com/1211692" source="BUGZILLA"/>
		<reference ref_id="1213098" ref_url="https://bugzilla.suse.com/1213098" source="BUGZILLA"/>
		<reference ref_id="1213114" ref_url="https://bugzilla.suse.com/1213114" source="BUGZILLA"/>
		<reference ref_id="1213747" ref_url="https://bugzilla.suse.com/1213747" source="BUGZILLA"/>
		<reference ref_id="1214954" ref_url="https://bugzilla.suse.com/1214954" source="BUGZILLA"/>
		<reference ref_id="1214992" ref_url="https://bugzilla.suse.com/1214992" source="BUGZILLA"/>
		<reference ref_id="1215148" ref_url="https://bugzilla.suse.com/1215148" source="BUGZILLA"/>
		<reference ref_id="1217366" ref_url="https://bugzilla.suse.com/1217366" source="BUGZILLA"/>
		<reference ref_id="1236104" ref_url="https://bugzilla.suse.com/1236104" source="BUGZILLA"/>
		<reference ref_id="1249479" ref_url="https://bugzilla.suse.com/1249479" source="BUGZILLA"/>
		<reference ref_id="1249608" ref_url="https://bugzilla.suse.com/1249608" source="BUGZILLA"/>
		<reference ref_id="1249857" ref_url="https://bugzilla.suse.com/1249857" source="BUGZILLA"/>
		<reference ref_id="1249859" ref_url="https://bugzilla.suse.com/1249859" source="BUGZILLA"/>
		<reference ref_id="1249988" ref_url="https://bugzilla.suse.com/1249988" source="BUGZILLA"/>
		<reference ref_id="1250742" ref_url="https://bugzilla.suse.com/1250742" source="BUGZILLA"/>
		<reference ref_id="1250816" ref_url="https://bugzilla.suse.com/1250816" source="BUGZILLA"/>
		<reference ref_id="1250946" ref_url="https://bugzilla.suse.com/1250946" source="BUGZILLA"/>
		<reference ref_id="1251027" ref_url="https://bugzilla.suse.com/1251027" source="BUGZILLA"/>
		<reference ref_id="1251032" ref_url="https://bugzilla.suse.com/1251032" source="BUGZILLA"/>
		<reference ref_id="1251034" ref_url="https://bugzilla.suse.com/1251034" source="BUGZILLA"/>
		<reference ref_id="1251035" ref_url="https://bugzilla.suse.com/1251035" source="BUGZILLA"/>
		<reference ref_id="1251040" ref_url="https://bugzilla.suse.com/1251040" source="BUGZILLA"/>
		<reference ref_id="1251043" ref_url="https://bugzilla.suse.com/1251043" source="BUGZILLA"/>
		<reference ref_id="1251045" ref_url="https://bugzilla.suse.com/1251045" source="BUGZILLA"/>
		<reference ref_id="1251047" ref_url="https://bugzilla.suse.com/1251047" source="BUGZILLA"/>
		<reference ref_id="1251052" ref_url="https://bugzilla.suse.com/1251052" source="BUGZILLA"/>
		<reference ref_id="1251057" ref_url="https://bugzilla.suse.com/1251057" source="BUGZILLA"/>
		<reference ref_id="1251059" ref_url="https://bugzilla.suse.com/1251059" source="BUGZILLA"/>
		<reference ref_id="1251061" ref_url="https://bugzilla.suse.com/1251061" source="BUGZILLA"/>
		<reference ref_id="1251063" ref_url="https://bugzilla.suse.com/1251063" source="BUGZILLA"/>
		<reference ref_id="1251064" ref_url="https://bugzilla.suse.com/1251064" source="BUGZILLA"/>
		<reference ref_id="1251065" ref_url="https://bugzilla.suse.com/1251065" source="BUGZILLA"/>
		<reference ref_id="1251066" ref_url="https://bugzilla.suse.com/1251066" source="BUGZILLA"/>
		<reference ref_id="1251068" ref_url="https://bugzilla.suse.com/1251068" source="BUGZILLA"/>
		<reference ref_id="1251072" ref_url="https://bugzilla.suse.com/1251072" source="BUGZILLA"/>
		<reference ref_id="1251080" ref_url="https://bugzilla.suse.com/1251080" source="BUGZILLA"/>
		<reference ref_id="1251082" ref_url="https://bugzilla.suse.com/1251082" source="BUGZILLA"/>
		<reference ref_id="1251086" ref_url="https://bugzilla.suse.com/1251086" source="BUGZILLA"/>
		<reference ref_id="1251087" ref_url="https://bugzilla.suse.com/1251087" source="BUGZILLA"/>
		<reference ref_id="1251088" ref_url="https://bugzilla.suse.com/1251088" source="BUGZILLA"/>
		<reference ref_id="1251091" ref_url="https://bugzilla.suse.com/1251091" source="BUGZILLA"/>
		<reference ref_id="1251092" ref_url="https://bugzilla.suse.com/1251092" source="BUGZILLA"/>
		<reference ref_id="1251093" ref_url="https://bugzilla.suse.com/1251093" source="BUGZILLA"/>
		<reference ref_id="1251097" ref_url="https://bugzilla.suse.com/1251097" source="BUGZILLA"/>
		<reference ref_id="1251099" ref_url="https://bugzilla.suse.com/1251099" source="BUGZILLA"/>
		<reference ref_id="1251101" ref_url="https://bugzilla.suse.com/1251101" source="BUGZILLA"/>
		<reference ref_id="1251104" ref_url="https://bugzilla.suse.com/1251104" source="BUGZILLA"/>
		<reference ref_id="1251110" ref_url="https://bugzilla.suse.com/1251110" source="BUGZILLA"/>
		<reference ref_id="1251113" ref_url="https://bugzilla.suse.com/1251113" source="BUGZILLA"/>
		<reference ref_id="1251115" ref_url="https://bugzilla.suse.com/1251115" source="BUGZILLA"/>
		<reference ref_id="1251123" ref_url="https://bugzilla.suse.com/1251123" source="BUGZILLA"/>
		<reference ref_id="1251128" ref_url="https://bugzilla.suse.com/1251128" source="BUGZILLA"/>
		<reference ref_id="1251129" ref_url="https://bugzilla.suse.com/1251129" source="BUGZILLA"/>
		<reference ref_id="1251133" ref_url="https://bugzilla.suse.com/1251133" source="BUGZILLA"/>
		<reference ref_id="1251136" ref_url="https://bugzilla.suse.com/1251136" source="BUGZILLA"/>
		<reference ref_id="1251147" ref_url="https://bugzilla.suse.com/1251147" source="BUGZILLA"/>
		<reference ref_id="1251149" ref_url="https://bugzilla.suse.com/1251149" source="BUGZILLA"/>
		<reference ref_id="1251154" ref_url="https://bugzilla.suse.com/1251154" source="BUGZILLA"/>
		<reference ref_id="1251159" ref_url="https://bugzilla.suse.com/1251159" source="BUGZILLA"/>
		<reference ref_id="1251164" ref_url="https://bugzilla.suse.com/1251164" source="BUGZILLA"/>
		<reference ref_id="1251166" ref_url="https://bugzilla.suse.com/1251166" source="BUGZILLA"/>
		<reference ref_id="1251169" ref_url="https://bugzilla.suse.com/1251169" source="BUGZILLA"/>
		<reference ref_id="1251170" ref_url="https://bugzilla.suse.com/1251170" source="BUGZILLA"/>
		<reference ref_id="1251173" ref_url="https://bugzilla.suse.com/1251173" source="BUGZILLA"/>
		<reference ref_id="1251178" ref_url="https://bugzilla.suse.com/1251178" source="BUGZILLA"/>
		<reference ref_id="1251180" ref_url="https://bugzilla.suse.com/1251180" source="BUGZILLA"/>
		<reference ref_id="1251182" ref_url="https://bugzilla.suse.com/1251182" source="BUGZILLA"/>
		<reference ref_id="1251197" ref_url="https://bugzilla.suse.com/1251197" source="BUGZILLA"/>
		<reference ref_id="1251200" ref_url="https://bugzilla.suse.com/1251200" source="BUGZILLA"/>
		<reference ref_id="1251201" ref_url="https://bugzilla.suse.com/1251201" source="BUGZILLA"/>
		<reference ref_id="1251202" ref_url="https://bugzilla.suse.com/1251202" source="BUGZILLA"/>
		<reference ref_id="1251208" ref_url="https://bugzilla.suse.com/1251208" source="BUGZILLA"/>
		<reference ref_id="1251210" ref_url="https://bugzilla.suse.com/1251210" source="BUGZILLA"/>
		<reference ref_id="1251215" ref_url="https://bugzilla.suse.com/1251215" source="BUGZILLA"/>
		<reference ref_id="1251218" ref_url="https://bugzilla.suse.com/1251218" source="BUGZILLA"/>
		<reference ref_id="1251222" ref_url="https://bugzilla.suse.com/1251222" source="BUGZILLA"/>
		<reference ref_id="1251223" ref_url="https://bugzilla.suse.com/1251223" source="BUGZILLA"/>
		<reference ref_id="1251230" ref_url="https://bugzilla.suse.com/1251230" source="BUGZILLA"/>
		<reference ref_id="1251247" ref_url="https://bugzilla.suse.com/1251247" source="BUGZILLA"/>
		<reference ref_id="1251268" ref_url="https://bugzilla.suse.com/1251268" source="BUGZILLA"/>
		<reference ref_id="1251281" ref_url="https://bugzilla.suse.com/1251281" source="BUGZILLA"/>
		<reference ref_id="1251282" ref_url="https://bugzilla.suse.com/1251282" source="BUGZILLA"/>
		<reference ref_id="1251283" ref_url="https://bugzilla.suse.com/1251283" source="BUGZILLA"/>
		<reference ref_id="1251285" ref_url="https://bugzilla.suse.com/1251285" source="BUGZILLA"/>
		<reference ref_id="1251286" ref_url="https://bugzilla.suse.com/1251286" source="BUGZILLA"/>
		<reference ref_id="1251292" ref_url="https://bugzilla.suse.com/1251292" source="BUGZILLA"/>
		<reference ref_id="1251294" ref_url="https://bugzilla.suse.com/1251294" source="BUGZILLA"/>
		<reference ref_id="1251295" ref_url="https://bugzilla.suse.com/1251295" source="BUGZILLA"/>
		<reference ref_id="1251296" ref_url="https://bugzilla.suse.com/1251296" source="BUGZILLA"/>
		<reference ref_id="1251298" ref_url="https://bugzilla.suse.com/1251298" source="BUGZILLA"/>
		<reference ref_id="1251299" ref_url="https://bugzilla.suse.com/1251299" source="BUGZILLA"/>
		<reference ref_id="1251300" ref_url="https://bugzilla.suse.com/1251300" source="BUGZILLA"/>
		<reference ref_id="1251302" ref_url="https://bugzilla.suse.com/1251302" source="BUGZILLA"/>
		<reference ref_id="1251303" ref_url="https://bugzilla.suse.com/1251303" source="BUGZILLA"/>
		<reference ref_id="1251306" ref_url="https://bugzilla.suse.com/1251306" source="BUGZILLA"/>
		<reference ref_id="1251310" ref_url="https://bugzilla.suse.com/1251310" source="BUGZILLA"/>
		<reference ref_id="1251312" ref_url="https://bugzilla.suse.com/1251312" source="BUGZILLA"/>
		<reference ref_id="1251322" ref_url="https://bugzilla.suse.com/1251322" source="BUGZILLA"/>
		<reference ref_id="1251324" ref_url="https://bugzilla.suse.com/1251324" source="BUGZILLA"/>
		<reference ref_id="1251325" ref_url="https://bugzilla.suse.com/1251325" source="BUGZILLA"/>
		<reference ref_id="1251326" ref_url="https://bugzilla.suse.com/1251326" source="BUGZILLA"/>
		<reference ref_id="1251327" ref_url="https://bugzilla.suse.com/1251327" source="BUGZILLA"/>
		<reference ref_id="1251329" ref_url="https://bugzilla.suse.com/1251329" source="BUGZILLA"/>
		<reference ref_id="1251330" ref_url="https://bugzilla.suse.com/1251330" source="BUGZILLA"/>
		<reference ref_id="1251331" ref_url="https://bugzilla.suse.com/1251331" source="BUGZILLA"/>
		<reference ref_id="1251519" ref_url="https://bugzilla.suse.com/1251519" source="BUGZILLA"/>
		<reference ref_id="1251521" ref_url="https://bugzilla.suse.com/1251521" source="BUGZILLA"/>
		<reference ref_id="1251522" ref_url="https://bugzilla.suse.com/1251522" source="BUGZILLA"/>
		<reference ref_id="1251527" ref_url="https://bugzilla.suse.com/1251527" source="BUGZILLA"/>
		<reference ref_id="1251529" ref_url="https://bugzilla.suse.com/1251529" source="BUGZILLA"/>
		<reference ref_id="1251550" ref_url="https://bugzilla.suse.com/1251550" source="BUGZILLA"/>
		<reference ref_id="1251723" ref_url="https://bugzilla.suse.com/1251723" source="BUGZILLA"/>
		<reference ref_id="1251725" ref_url="https://bugzilla.suse.com/1251725" source="BUGZILLA"/>
		<reference ref_id="1251728" ref_url="https://bugzilla.suse.com/1251728" source="BUGZILLA"/>
		<reference ref_id="1251730" ref_url="https://bugzilla.suse.com/1251730" source="BUGZILLA"/>
		<reference ref_id="1251736" ref_url="https://bugzilla.suse.com/1251736" source="BUGZILLA"/>
		<reference ref_id="1251737" ref_url="https://bugzilla.suse.com/1251737" source="BUGZILLA"/>
		<reference ref_id="1251741" ref_url="https://bugzilla.suse.com/1251741" source="BUGZILLA"/>
		<reference ref_id="1251743" ref_url="https://bugzilla.suse.com/1251743" source="BUGZILLA"/>
		<reference ref_id="1251750" ref_url="https://bugzilla.suse.com/1251750" source="BUGZILLA"/>
		<reference ref_id="1251753" ref_url="https://bugzilla.suse.com/1251753" source="BUGZILLA"/>
		<reference ref_id="1251759" ref_url="https://bugzilla.suse.com/1251759" source="BUGZILLA"/>
		<reference ref_id="1251761" ref_url="https://bugzilla.suse.com/1251761" source="BUGZILLA"/>
		<reference ref_id="1251762" ref_url="https://bugzilla.suse.com/1251762" source="BUGZILLA"/>
		<reference ref_id="1251763" ref_url="https://bugzilla.suse.com/1251763" source="BUGZILLA"/>
		<reference ref_id="1251764" ref_url="https://bugzilla.suse.com/1251764" source="BUGZILLA"/>
		<reference ref_id="1251767" ref_url="https://bugzilla.suse.com/1251767" source="BUGZILLA"/>
		<reference ref_id="1251769" ref_url="https://bugzilla.suse.com/1251769" source="BUGZILLA"/>
		<reference ref_id="1251772" ref_url="https://bugzilla.suse.com/1251772" source="BUGZILLA"/>
		<reference ref_id="1251775" ref_url="https://bugzilla.suse.com/1251775" source="BUGZILLA"/>
		<reference ref_id="1251777" ref_url="https://bugzilla.suse.com/1251777" source="BUGZILLA"/>
		<reference ref_id="1251785" ref_url="https://bugzilla.suse.com/1251785" source="BUGZILLA"/>
		<reference ref_id="1251823" ref_url="https://bugzilla.suse.com/1251823" source="BUGZILLA"/>
		<reference ref_id="1251930" ref_url="https://bugzilla.suse.com/1251930" source="BUGZILLA"/>
		<reference ref_id="1251967" ref_url="https://bugzilla.suse.com/1251967" source="BUGZILLA"/>
		<reference ref_id="1252033" ref_url="https://bugzilla.suse.com/1252033" source="BUGZILLA"/>
		<reference ref_id="1252035" ref_url="https://bugzilla.suse.com/1252035" source="BUGZILLA"/>
		<reference ref_id="1252047" ref_url="https://bugzilla.suse.com/1252047" source="BUGZILLA"/>
		<reference ref_id="1252069" ref_url="https://bugzilla.suse.com/1252069" source="BUGZILLA"/>
		<reference ref_id="1252265" ref_url="https://bugzilla.suse.com/1252265" source="BUGZILLA"/>
		<reference ref_id="1252474" ref_url="https://bugzilla.suse.com/1252474" source="BUGZILLA"/>
		<reference ref_id="1252475" ref_url="https://bugzilla.suse.com/1252475" source="BUGZILLA"/>
		<reference ref_id="1252476" ref_url="https://bugzilla.suse.com/1252476" source="BUGZILLA"/>
		<reference ref_id="1252480" ref_url="https://bugzilla.suse.com/1252480" source="BUGZILLA"/>
		<reference ref_id="1252484" ref_url="https://bugzilla.suse.com/1252484" source="BUGZILLA"/>
		<reference ref_id="1252486" ref_url="https://bugzilla.suse.com/1252486" source="BUGZILLA"/>
		<reference ref_id="1252489" ref_url="https://bugzilla.suse.com/1252489" source="BUGZILLA"/>
		<reference ref_id="1252490" ref_url="https://bugzilla.suse.com/1252490" source="BUGZILLA"/>
		<reference ref_id="1252492" ref_url="https://bugzilla.suse.com/1252492" source="BUGZILLA"/>
		<reference ref_id="1252495" ref_url="https://bugzilla.suse.com/1252495" source="BUGZILLA"/>
		<reference ref_id="1252497" ref_url="https://bugzilla.suse.com/1252497" source="BUGZILLA"/>
		<reference ref_id="1252499" ref_url="https://bugzilla.suse.com/1252499" source="BUGZILLA"/>
		<reference ref_id="1252501" ref_url="https://bugzilla.suse.com/1252501" source="BUGZILLA"/>
		<reference ref_id="1252508" ref_url="https://bugzilla.suse.com/1252508" source="BUGZILLA"/>
		<reference ref_id="1252509" ref_url="https://bugzilla.suse.com/1252509" source="BUGZILLA"/>
		<reference ref_id="1252513" ref_url="https://bugzilla.suse.com/1252513" source="BUGZILLA"/>
		<reference ref_id="1252515" ref_url="https://bugzilla.suse.com/1252515" source="BUGZILLA"/>
		<reference ref_id="1252516" ref_url="https://bugzilla.suse.com/1252516" source="BUGZILLA"/>
		<reference ref_id="1252519" ref_url="https://bugzilla.suse.com/1252519" source="BUGZILLA"/>
		<reference ref_id="1252521" ref_url="https://bugzilla.suse.com/1252521" source="BUGZILLA"/>
		<reference ref_id="1252522" ref_url="https://bugzilla.suse.com/1252522" source="BUGZILLA"/>
		<reference ref_id="1252523" ref_url="https://bugzilla.suse.com/1252523" source="BUGZILLA"/>
		<reference ref_id="1252526" ref_url="https://bugzilla.suse.com/1252526" source="BUGZILLA"/>
		<reference ref_id="1252528" ref_url="https://bugzilla.suse.com/1252528" source="BUGZILLA"/>
		<reference ref_id="1252529" ref_url="https://bugzilla.suse.com/1252529" source="BUGZILLA"/>
		<reference ref_id="1252532" ref_url="https://bugzilla.suse.com/1252532" source="BUGZILLA"/>
		<reference ref_id="1252535" ref_url="https://bugzilla.suse.com/1252535" source="BUGZILLA"/>
		<reference ref_id="1252536" ref_url="https://bugzilla.suse.com/1252536" source="BUGZILLA"/>
		<reference ref_id="1252537" ref_url="https://bugzilla.suse.com/1252537" source="BUGZILLA"/>
		<reference ref_id="1252538" ref_url="https://bugzilla.suse.com/1252538" source="BUGZILLA"/>
		<reference ref_id="1252539" ref_url="https://bugzilla.suse.com/1252539" source="BUGZILLA"/>
		<reference ref_id="1252542" ref_url="https://bugzilla.suse.com/1252542" source="BUGZILLA"/>
		<reference ref_id="1252545" ref_url="https://bugzilla.suse.com/1252545" source="BUGZILLA"/>
		<reference ref_id="1252549" ref_url="https://bugzilla.suse.com/1252549" source="BUGZILLA"/>
		<reference ref_id="1252554" ref_url="https://bugzilla.suse.com/1252554" source="BUGZILLA"/>
		<reference ref_id="1252560" ref_url="https://bugzilla.suse.com/1252560" source="BUGZILLA"/>
		<reference ref_id="1252564" ref_url="https://bugzilla.suse.com/1252564" source="BUGZILLA"/>
		<reference ref_id="1252565" ref_url="https://bugzilla.suse.com/1252565" source="BUGZILLA"/>
		<reference ref_id="1252568" ref_url="https://bugzilla.suse.com/1252568" source="BUGZILLA"/>
		<reference ref_id="1252634" ref_url="https://bugzilla.suse.com/1252634" source="BUGZILLA"/>
		<reference ref_id="1252688" ref_url="https://bugzilla.suse.com/1252688" source="BUGZILLA"/>
		<reference ref_id="1252785" ref_url="https://bugzilla.suse.com/1252785" source="BUGZILLA"/>
		<reference ref_id="1252893" ref_url="https://bugzilla.suse.com/1252893" source="BUGZILLA"/>
		<reference ref_id="1252904" ref_url="https://bugzilla.suse.com/1252904" source="BUGZILLA"/>
		<reference ref_id="1252919" ref_url="https://bugzilla.suse.com/1252919" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-50327" ref_url="https://www.suse.com/security/cve/CVE-2022-50327/" source="CVE"/>
		<reference ref_id="CVE-2022-50334" ref_url="https://www.suse.com/security/cve/CVE-2022-50334/" source="CVE"/>
		<reference ref_id="CVE-2022-50470" ref_url="https://www.suse.com/security/cve/CVE-2022-50470/" source="CVE"/>
		<reference ref_id="CVE-2022-50471" ref_url="https://www.suse.com/security/cve/CVE-2022-50471/" source="CVE"/>
		<reference ref_id="CVE-2022-50472" ref_url="https://www.suse.com/security/cve/CVE-2022-50472/" source="CVE"/>
		<reference ref_id="CVE-2022-50475" ref_url="https://www.suse.com/security/cve/CVE-2022-50475/" source="CVE"/>
		<reference ref_id="CVE-2022-50478" ref_url="https://www.suse.com/security/cve/CVE-2022-50478/" source="CVE"/>
		<reference ref_id="CVE-2022-50480" ref_url="https://www.suse.com/security/cve/CVE-2022-50480/" source="CVE"/>
		<reference ref_id="CVE-2022-50482" ref_url="https://www.suse.com/security/cve/CVE-2022-50482/" source="CVE"/>
		<reference ref_id="CVE-2022-50484" ref_url="https://www.suse.com/security/cve/CVE-2022-50484/" source="CVE"/>
		<reference ref_id="CVE-2022-50485" ref_url="https://www.suse.com/security/cve/CVE-2022-50485/" source="CVE"/>
		<reference ref_id="CVE-2022-50487" ref_url="https://www.suse.com/security/cve/CVE-2022-50487/" source="CVE"/>
		<reference ref_id="CVE-2022-50488" ref_url="https://www.suse.com/security/cve/CVE-2022-50488/" source="CVE"/>
		<reference ref_id="CVE-2022-50489" ref_url="https://www.suse.com/security/cve/CVE-2022-50489/" source="CVE"/>
		<reference ref_id="CVE-2022-50490" ref_url="https://www.suse.com/security/cve/CVE-2022-50490/" source="CVE"/>
		<reference ref_id="CVE-2022-50492" ref_url="https://www.suse.com/security/cve/CVE-2022-50492/" source="CVE"/>
		<reference ref_id="CVE-2022-50493" ref_url="https://www.suse.com/security/cve/CVE-2022-50493/" source="CVE"/>
		<reference ref_id="CVE-2022-50494" ref_url="https://www.suse.com/security/cve/CVE-2022-50494/" source="CVE"/>
		<reference ref_id="CVE-2022-50496" ref_url="https://www.suse.com/security/cve/CVE-2022-50496/" source="CVE"/>
		<reference ref_id="CVE-2022-50497" ref_url="https://www.suse.com/security/cve/CVE-2022-50497/" source="CVE"/>
		<reference ref_id="CVE-2022-50498" ref_url="https://www.suse.com/security/cve/CVE-2022-50498/" source="CVE"/>
		<reference ref_id="CVE-2022-50499" ref_url="https://www.suse.com/security/cve/CVE-2022-50499/" source="CVE"/>
		<reference ref_id="CVE-2022-50501" ref_url="https://www.suse.com/security/cve/CVE-2022-50501/" source="CVE"/>
		<reference ref_id="CVE-2022-50503" ref_url="https://www.suse.com/security/cve/CVE-2022-50503/" source="CVE"/>
		<reference ref_id="CVE-2022-50504" ref_url="https://www.suse.com/security/cve/CVE-2022-50504/" source="CVE"/>
		<reference ref_id="CVE-2022-50505" ref_url="https://www.suse.com/security/cve/CVE-2022-50505/" source="CVE"/>
		<reference ref_id="CVE-2022-50509" ref_url="https://www.suse.com/security/cve/CVE-2022-50509/" source="CVE"/>
		<reference ref_id="CVE-2022-50511" ref_url="https://www.suse.com/security/cve/CVE-2022-50511/" source="CVE"/>
		<reference ref_id="CVE-2022-50512" ref_url="https://www.suse.com/security/cve/CVE-2022-50512/" source="CVE"/>
		<reference ref_id="CVE-2022-50513" ref_url="https://www.suse.com/security/cve/CVE-2022-50513/" source="CVE"/>
		<reference ref_id="CVE-2022-50514" ref_url="https://www.suse.com/security/cve/CVE-2022-50514/" source="CVE"/>
		<reference ref_id="CVE-2022-50516" ref_url="https://www.suse.com/security/cve/CVE-2022-50516/" source="CVE"/>
		<reference ref_id="CVE-2022-50519" ref_url="https://www.suse.com/security/cve/CVE-2022-50519/" source="CVE"/>
		<reference ref_id="CVE-2022-50520" ref_url="https://www.suse.com/security/cve/CVE-2022-50520/" source="CVE"/>
		<reference ref_id="CVE-2022-50521" ref_url="https://www.suse.com/security/cve/CVE-2022-50521/" source="CVE"/>
		<reference ref_id="CVE-2022-50523" ref_url="https://www.suse.com/security/cve/CVE-2022-50523/" source="CVE"/>
		<reference ref_id="CVE-2022-50525" ref_url="https://www.suse.com/security/cve/CVE-2022-50525/" source="CVE"/>
		<reference ref_id="CVE-2022-50528" ref_url="https://www.suse.com/security/cve/CVE-2022-50528/" source="CVE"/>
		<reference ref_id="CVE-2022-50529" ref_url="https://www.suse.com/security/cve/CVE-2022-50529/" source="CVE"/>
		<reference ref_id="CVE-2022-50530" ref_url="https://www.suse.com/security/cve/CVE-2022-50530/" source="CVE"/>
		<reference ref_id="CVE-2022-50532" ref_url="https://www.suse.com/security/cve/CVE-2022-50532/" source="CVE"/>
		<reference ref_id="CVE-2022-50534" ref_url="https://www.suse.com/security/cve/CVE-2022-50534/" source="CVE"/>
		<reference ref_id="CVE-2022-50535" ref_url="https://www.suse.com/security/cve/CVE-2022-50535/" source="CVE"/>
		<reference ref_id="CVE-2022-50537" ref_url="https://www.suse.com/security/cve/CVE-2022-50537/" source="CVE"/>
		<reference ref_id="CVE-2022-50541" ref_url="https://www.suse.com/security/cve/CVE-2022-50541/" source="CVE"/>
		<reference ref_id="CVE-2022-50542" ref_url="https://www.suse.com/security/cve/CVE-2022-50542/" source="CVE"/>
		<reference ref_id="CVE-2022-50544" ref_url="https://www.suse.com/security/cve/CVE-2022-50544/" source="CVE"/>
		<reference ref_id="CVE-2022-50545" ref_url="https://www.suse.com/security/cve/CVE-2022-50545/" source="CVE"/>
		<reference ref_id="CVE-2022-50546" ref_url="https://www.suse.com/security/cve/CVE-2022-50546/" source="CVE"/>
		<reference ref_id="CVE-2022-50549" ref_url="https://www.suse.com/security/cve/CVE-2022-50549/" source="CVE"/>
		<reference ref_id="CVE-2022-50551" ref_url="https://www.suse.com/security/cve/CVE-2022-50551/" source="CVE"/>
		<reference ref_id="CVE-2022-50553" ref_url="https://www.suse.com/security/cve/CVE-2022-50553/" source="CVE"/>
		<reference ref_id="CVE-2022-50556" ref_url="https://www.suse.com/security/cve/CVE-2022-50556/" source="CVE"/>
		<reference ref_id="CVE-2022-50559" ref_url="https://www.suse.com/security/cve/CVE-2022-50559/" source="CVE"/>
		<reference ref_id="CVE-2022-50560" ref_url="https://www.suse.com/security/cve/CVE-2022-50560/" source="CVE"/>
		<reference ref_id="CVE-2022-50561" ref_url="https://www.suse.com/security/cve/CVE-2022-50561/" source="CVE"/>
		<reference ref_id="CVE-2022-50562" ref_url="https://www.suse.com/security/cve/CVE-2022-50562/" source="CVE"/>
		<reference ref_id="CVE-2022-50563" ref_url="https://www.suse.com/security/cve/CVE-2022-50563/" source="CVE"/>
		<reference ref_id="CVE-2022-50564" ref_url="https://www.suse.com/security/cve/CVE-2022-50564/" source="CVE"/>
		<reference ref_id="CVE-2022-50566" ref_url="https://www.suse.com/security/cve/CVE-2022-50566/" source="CVE"/>
		<reference ref_id="CVE-2022-50567" ref_url="https://www.suse.com/security/cve/CVE-2022-50567/" source="CVE"/>
		<reference ref_id="CVE-2022-50568" ref_url="https://www.suse.com/security/cve/CVE-2022-50568/" source="CVE"/>
		<reference ref_id="CVE-2022-50570" ref_url="https://www.suse.com/security/cve/CVE-2022-50570/" source="CVE"/>
		<reference ref_id="CVE-2022-50572" ref_url="https://www.suse.com/security/cve/CVE-2022-50572/" source="CVE"/>
		<reference ref_id="CVE-2022-50574" ref_url="https://www.suse.com/security/cve/CVE-2022-50574/" source="CVE"/>
		<reference ref_id="CVE-2022-50575" ref_url="https://www.suse.com/security/cve/CVE-2022-50575/" source="CVE"/>
		<reference ref_id="CVE-2022-50576" ref_url="https://www.suse.com/security/cve/CVE-2022-50576/" source="CVE"/>
		<reference ref_id="CVE-2022-50578" ref_url="https://www.suse.com/security/cve/CVE-2022-50578/" source="CVE"/>
		<reference ref_id="CVE-2022-50579" ref_url="https://www.suse.com/security/cve/CVE-2022-50579/" source="CVE"/>
		<reference ref_id="CVE-2022-50580" ref_url="https://www.suse.com/security/cve/CVE-2022-50580/" source="CVE"/>
		<reference ref_id="CVE-2022-50581" ref_url="https://www.suse.com/security/cve/CVE-2022-50581/" source="CVE"/>
		<reference ref_id="CVE-2022-50582" ref_url="https://www.suse.com/security/cve/CVE-2022-50582/" source="CVE"/>
		<reference ref_id="CVE-2023-52923" ref_url="https://www.suse.com/security/cve/CVE-2023-52923/" source="CVE"/>
		<reference ref_id="CVE-2023-53365" ref_url="https://www.suse.com/security/cve/CVE-2023-53365/" source="CVE"/>
		<reference ref_id="CVE-2023-53500" ref_url="https://www.suse.com/security/cve/CVE-2023-53500/" source="CVE"/>
		<reference ref_id="CVE-2023-53533" ref_url="https://www.suse.com/security/cve/CVE-2023-53533/" source="CVE"/>
		<reference ref_id="CVE-2023-53534" ref_url="https://www.suse.com/security/cve/CVE-2023-53534/" source="CVE"/>
		<reference ref_id="CVE-2023-53541" ref_url="https://www.suse.com/security/cve/CVE-2023-53541/" source="CVE"/>
		<reference ref_id="CVE-2023-53542" ref_url="https://www.suse.com/security/cve/CVE-2023-53542/" source="CVE"/>
		<reference ref_id="CVE-2023-53548" ref_url="https://www.suse.com/security/cve/CVE-2023-53548/" source="CVE"/>
		<reference ref_id="CVE-2023-53551" ref_url="https://www.suse.com/security/cve/CVE-2023-53551/" source="CVE"/>
		<reference ref_id="CVE-2023-53552" ref_url="https://www.suse.com/security/cve/CVE-2023-53552/" source="CVE"/>
		<reference ref_id="CVE-2023-53553" ref_url="https://www.suse.com/security/cve/CVE-2023-53553/" source="CVE"/>
		<reference ref_id="CVE-2023-53554" ref_url="https://www.suse.com/security/cve/CVE-2023-53554/" source="CVE"/>
		<reference ref_id="CVE-2023-53556" ref_url="https://www.suse.com/security/cve/CVE-2023-53556/" source="CVE"/>
		<reference ref_id="CVE-2023-53559" ref_url="https://www.suse.com/security/cve/CVE-2023-53559/" source="CVE"/>
		<reference ref_id="CVE-2023-53560" ref_url="https://www.suse.com/security/cve/CVE-2023-53560/" source="CVE"/>
		<reference ref_id="CVE-2023-53564" ref_url="https://www.suse.com/security/cve/CVE-2023-53564/" source="CVE"/>
		<reference ref_id="CVE-2023-53566" ref_url="https://www.suse.com/security/cve/CVE-2023-53566/" source="CVE"/>
		<reference ref_id="CVE-2023-53567" ref_url="https://www.suse.com/security/cve/CVE-2023-53567/" source="CVE"/>
		<reference ref_id="CVE-2023-53568" ref_url="https://www.suse.com/security/cve/CVE-2023-53568/" source="CVE"/>
		<reference ref_id="CVE-2023-53571" ref_url="https://www.suse.com/security/cve/CVE-2023-53571/" source="CVE"/>
		<reference ref_id="CVE-2023-53572" ref_url="https://www.suse.com/security/cve/CVE-2023-53572/" source="CVE"/>
		<reference ref_id="CVE-2023-53574" ref_url="https://www.suse.com/security/cve/CVE-2023-53574/" source="CVE"/>
		<reference ref_id="CVE-2023-53576" ref_url="https://www.suse.com/security/cve/CVE-2023-53576/" source="CVE"/>
		<reference ref_id="CVE-2023-53579" ref_url="https://www.suse.com/security/cve/CVE-2023-53579/" source="CVE"/>
		<reference ref_id="CVE-2023-53582" ref_url="https://www.suse.com/security/cve/CVE-2023-53582/" source="CVE"/>
		<reference ref_id="CVE-2023-53587" ref_url="https://www.suse.com/security/cve/CVE-2023-53587/" source="CVE"/>
		<reference ref_id="CVE-2023-53589" ref_url="https://www.suse.com/security/cve/CVE-2023-53589/" source="CVE"/>
		<reference ref_id="CVE-2023-53592" ref_url="https://www.suse.com/security/cve/CVE-2023-53592/" source="CVE"/>
		<reference ref_id="CVE-2023-53594" ref_url="https://www.suse.com/security/cve/CVE-2023-53594/" source="CVE"/>
		<reference ref_id="CVE-2023-53597" ref_url="https://www.suse.com/security/cve/CVE-2023-53597/" source="CVE"/>
		<reference ref_id="CVE-2023-53603" ref_url="https://www.suse.com/security/cve/CVE-2023-53603/" source="CVE"/>
		<reference ref_id="CVE-2023-53604" ref_url="https://www.suse.com/security/cve/CVE-2023-53604/" source="CVE"/>
		<reference ref_id="CVE-2023-53605" ref_url="https://www.suse.com/security/cve/CVE-2023-53605/" source="CVE"/>
		<reference ref_id="CVE-2023-53607" ref_url="https://www.suse.com/security/cve/CVE-2023-53607/" source="CVE"/>
		<reference ref_id="CVE-2023-53608" ref_url="https://www.suse.com/security/cve/CVE-2023-53608/" source="CVE"/>
		<reference ref_id="CVE-2023-53611" ref_url="https://www.suse.com/security/cve/CVE-2023-53611/" source="CVE"/>
		<reference ref_id="CVE-2023-53612" ref_url="https://www.suse.com/security/cve/CVE-2023-53612/" source="CVE"/>
		<reference ref_id="CVE-2023-53615" ref_url="https://www.suse.com/security/cve/CVE-2023-53615/" source="CVE"/>
		<reference ref_id="CVE-2023-53616" ref_url="https://www.suse.com/security/cve/CVE-2023-53616/" source="CVE"/>
		<reference ref_id="CVE-2023-53617" ref_url="https://www.suse.com/security/cve/CVE-2023-53617/" source="CVE"/>
		<reference ref_id="CVE-2023-53619" ref_url="https://www.suse.com/security/cve/CVE-2023-53619/" source="CVE"/>
		<reference ref_id="CVE-2023-53622" ref_url="https://www.suse.com/security/cve/CVE-2023-53622/" source="CVE"/>
		<reference ref_id="CVE-2023-53625" ref_url="https://www.suse.com/security/cve/CVE-2023-53625/" source="CVE"/>
		<reference ref_id="CVE-2023-53626" ref_url="https://www.suse.com/security/cve/CVE-2023-53626/" source="CVE"/>
		<reference ref_id="CVE-2023-53631" ref_url="https://www.suse.com/security/cve/CVE-2023-53631/" source="CVE"/>
		<reference ref_id="CVE-2023-53637" ref_url="https://www.suse.com/security/cve/CVE-2023-53637/" source="CVE"/>
		<reference ref_id="CVE-2023-53639" ref_url="https://www.suse.com/security/cve/CVE-2023-53639/" source="CVE"/>
		<reference ref_id="CVE-2023-53640" ref_url="https://www.suse.com/security/cve/CVE-2023-53640/" source="CVE"/>
		<reference ref_id="CVE-2023-53641" ref_url="https://www.suse.com/security/cve/CVE-2023-53641/" source="CVE"/>
		<reference ref_id="CVE-2023-53644" ref_url="https://www.suse.com/security/cve/CVE-2023-53644/" source="CVE"/>
		<reference ref_id="CVE-2023-53648" ref_url="https://www.suse.com/security/cve/CVE-2023-53648/" source="CVE"/>
		<reference ref_id="CVE-2023-53650" ref_url="https://www.suse.com/security/cve/CVE-2023-53650/" source="CVE"/>
		<reference ref_id="CVE-2023-53651" ref_url="https://www.suse.com/security/cve/CVE-2023-53651/" source="CVE"/>
		<reference ref_id="CVE-2023-53658" ref_url="https://www.suse.com/security/cve/CVE-2023-53658/" source="CVE"/>
		<reference ref_id="CVE-2023-53659" ref_url="https://www.suse.com/security/cve/CVE-2023-53659/" source="CVE"/>
		<reference ref_id="CVE-2023-53662" ref_url="https://www.suse.com/security/cve/CVE-2023-53662/" source="CVE"/>
		<reference ref_id="CVE-2023-53667" ref_url="https://www.suse.com/security/cve/CVE-2023-53667/" source="CVE"/>
		<reference ref_id="CVE-2023-53668" ref_url="https://www.suse.com/security/cve/CVE-2023-53668/" source="CVE"/>
		<reference ref_id="CVE-2023-53670" ref_url="https://www.suse.com/security/cve/CVE-2023-53670/" source="CVE"/>
		<reference ref_id="CVE-2023-53673" ref_url="https://www.suse.com/security/cve/CVE-2023-53673/" source="CVE"/>
		<reference ref_id="CVE-2023-53674" ref_url="https://www.suse.com/security/cve/CVE-2023-53674/" source="CVE"/>
		<reference ref_id="CVE-2023-53675" ref_url="https://www.suse.com/security/cve/CVE-2023-53675/" source="CVE"/>
		<reference ref_id="CVE-2023-53679" ref_url="https://www.suse.com/security/cve/CVE-2023-53679/" source="CVE"/>
		<reference ref_id="CVE-2023-53680" ref_url="https://www.suse.com/security/cve/CVE-2023-53680/" source="CVE"/>
		<reference ref_id="CVE-2023-53681" ref_url="https://www.suse.com/security/cve/CVE-2023-53681/" source="CVE"/>
		<reference ref_id="CVE-2023-53683" ref_url="https://www.suse.com/security/cve/CVE-2023-53683/" source="CVE"/>
		<reference ref_id="CVE-2023-53687" ref_url="https://www.suse.com/security/cve/CVE-2023-53687/" source="CVE"/>
		<reference ref_id="CVE-2023-53692" ref_url="https://www.suse.com/security/cve/CVE-2023-53692/" source="CVE"/>
		<reference ref_id="CVE-2023-53693" ref_url="https://www.suse.com/security/cve/CVE-2023-53693/" source="CVE"/>
		<reference ref_id="CVE-2023-53695" ref_url="https://www.suse.com/security/cve/CVE-2023-53695/" source="CVE"/>
		<reference ref_id="CVE-2023-53696" ref_url="https://www.suse.com/security/cve/CVE-2023-53696/" source="CVE"/>
		<reference ref_id="CVE-2023-53700" ref_url="https://www.suse.com/security/cve/CVE-2023-53700/" source="CVE"/>
		<reference ref_id="CVE-2023-53704" ref_url="https://www.suse.com/security/cve/CVE-2023-53704/" source="CVE"/>
		<reference ref_id="CVE-2023-53705" ref_url="https://www.suse.com/security/cve/CVE-2023-53705/" source="CVE"/>
		<reference ref_id="CVE-2023-53708" ref_url="https://www.suse.com/security/cve/CVE-2023-53708/" source="CVE"/>
		<reference ref_id="CVE-2023-53709" ref_url="https://www.suse.com/security/cve/CVE-2023-53709/" source="CVE"/>
		<reference ref_id="CVE-2023-53711" ref_url="https://www.suse.com/security/cve/CVE-2023-53711/" source="CVE"/>
		<reference ref_id="CVE-2023-53715" ref_url="https://www.suse.com/security/cve/CVE-2023-53715/" source="CVE"/>
		<reference ref_id="CVE-2023-53717" ref_url="https://www.suse.com/security/cve/CVE-2023-53717/" source="CVE"/>
		<reference ref_id="CVE-2023-53718" ref_url="https://www.suse.com/security/cve/CVE-2023-53718/" source="CVE"/>
		<reference ref_id="CVE-2023-53719" ref_url="https://www.suse.com/security/cve/CVE-2023-53719/" source="CVE"/>
		<reference ref_id="CVE-2023-53722" ref_url="https://www.suse.com/security/cve/CVE-2023-53722/" source="CVE"/>
		<reference ref_id="CVE-2023-53723" ref_url="https://www.suse.com/security/cve/CVE-2023-53723/" source="CVE"/>
		<reference ref_id="CVE-2023-53724" ref_url="https://www.suse.com/security/cve/CVE-2023-53724/" source="CVE"/>
		<reference ref_id="CVE-2023-53725" ref_url="https://www.suse.com/security/cve/CVE-2023-53725/" source="CVE"/>
		<reference ref_id="CVE-2023-53726" ref_url="https://www.suse.com/security/cve/CVE-2023-53726/" source="CVE"/>
		<reference ref_id="CVE-2023-53730" ref_url="https://www.suse.com/security/cve/CVE-2023-53730/" source="CVE"/>
		<reference ref_id="CVE-2023-7324" ref_url="https://www.suse.com/security/cve/CVE-2023-7324/" source="CVE"/>
		<reference ref_id="CVE-2025-39742" ref_url="https://www.suse.com/security/cve/CVE-2025-39742/" source="CVE"/>
		<reference ref_id="CVE-2025-39797" ref_url="https://www.suse.com/security/cve/CVE-2025-39797/" source="CVE"/>
		<reference ref_id="CVE-2025-39945" ref_url="https://www.suse.com/security/cve/CVE-2025-39945/" source="CVE"/>
		<reference ref_id="CVE-2025-39965" ref_url="https://www.suse.com/security/cve/CVE-2025-39965/" source="CVE"/>
		<reference ref_id="CVE-2025-39967" ref_url="https://www.suse.com/security/cve/CVE-2025-39967/" source="CVE"/>
		<reference ref_id="CVE-2025-39968" ref_url="https://www.suse.com/security/cve/CVE-2025-39968/" source="CVE"/>
		<reference ref_id="CVE-2025-39973" ref_url="https://www.suse.com/security/cve/CVE-2025-39973/" source="CVE"/>
		<reference ref_id="CVE-2025-39978" ref_url="https://www.suse.com/security/cve/CVE-2025-39978/" source="CVE"/>
		<reference ref_id="CVE-2025-40018" ref_url="https://www.suse.com/security/cve/CVE-2025-40018/" source="CVE"/>
		<reference ref_id="CVE-2025-40044" ref_url="https://www.suse.com/security/cve/CVE-2025-40044/" source="CVE"/>
		<reference ref_id="CVE-2025-40088" ref_url="https://www.suse.com/security/cve/CVE-2025-40088/" source="CVE"/>
		<reference ref_id="CVE-2025-40102" ref_url="https://www.suse.com/security/cve/CVE-2025-40102/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859).
- CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857).
- CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251164).
- CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
- CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988).
- CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816).
- CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052).
- CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222).
- CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743).
- CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763).
- CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554).
- CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (bsc#1249479).
- CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230).
- CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033).
- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).
- CVE-2025-40044: fs: udf: fix OOB read in lengthAllocDescs handling (bsc#1252785).
- CVE-2025-40088: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() (bsc#1252904).
- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).

The following non security issues were fixed:

- fbcon: Fix OOB access in font allocation (bsc#1252033)
- mm: avoid unnecessary page fault retires on shared memory types (bsc#1251823).
- net: hv_netvsc: fix loss of early receive events from host during channel open (bsc#1252265).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-15"/>
	<updated date="2025-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205128">SUSE bug 1205128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206893">SUSE bug 1206893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207612">SUSE bug 1207612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207619">SUSE bug 1207619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210763">SUSE bug 1210763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211162">SUSE bug 1211162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211692">SUSE bug 1211692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213098">SUSE bug 1213098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213114">SUSE bug 1213114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213747">SUSE bug 1213747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214954">SUSE bug 1214954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214992">SUSE bug 1214992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215148">SUSE bug 1215148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217366">SUSE bug 1217366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236104">SUSE bug 1236104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249479">SUSE bug 1249479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249608">SUSE bug 1249608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249857">SUSE bug 1249857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249859">SUSE bug 1249859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249988">SUSE bug 1249988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250742">SUSE bug 1250742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250816">SUSE bug 1250816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250946">SUSE bug 1250946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251027">SUSE bug 1251027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251032">SUSE bug 1251032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251034">SUSE bug 1251034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251035">SUSE bug 1251035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251040">SUSE bug 1251040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251043">SUSE bug 1251043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251045">SUSE bug 1251045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251047">SUSE bug 1251047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251052">SUSE bug 1251052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251057">SUSE bug 1251057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251059">SUSE bug 1251059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251061">SUSE bug 1251061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251063">SUSE bug 1251063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251064">SUSE bug 1251064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251065">SUSE bug 1251065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251066">SUSE bug 1251066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251068">SUSE bug 1251068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251072">SUSE bug 1251072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251080">SUSE bug 1251080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251082">SUSE bug 1251082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251086">SUSE bug 1251086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251087">SUSE bug 1251087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251088">SUSE bug 1251088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251091">SUSE bug 1251091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251092">SUSE bug 1251092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251093">SUSE bug 1251093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251097">SUSE bug 1251097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251099">SUSE bug 1251099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251101">SUSE bug 1251101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251104">SUSE bug 1251104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251110">SUSE bug 1251110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251113">SUSE bug 1251113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251115">SUSE bug 1251115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251123">SUSE bug 1251123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251128">SUSE bug 1251128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251129">SUSE bug 1251129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251133">SUSE bug 1251133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251136">SUSE bug 1251136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251147">SUSE bug 1251147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251149">SUSE bug 1251149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251154">SUSE bug 1251154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251159">SUSE bug 1251159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251164">SUSE bug 1251164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251166">SUSE bug 1251166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251169">SUSE bug 1251169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251170">SUSE bug 1251170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251173">SUSE bug 1251173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251178">SUSE bug 1251178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251180">SUSE bug 1251180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251182">SUSE bug 1251182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251197">SUSE bug 1251197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251200">SUSE bug 1251200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251201">SUSE bug 1251201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251202">SUSE bug 1251202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251208">SUSE bug 1251208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251210">SUSE bug 1251210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251215">SUSE bug 1251215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251218">SUSE bug 1251218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251222">SUSE bug 1251222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251223">SUSE bug 1251223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251230">SUSE bug 1251230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251247">SUSE bug 1251247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251268">SUSE bug 1251268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251281">SUSE bug 1251281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251282">SUSE bug 1251282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251283">SUSE bug 1251283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251285">SUSE bug 1251285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251286">SUSE bug 1251286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251292">SUSE bug 1251292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251294">SUSE bug 1251294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251295">SUSE bug 1251295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251296">SUSE bug 1251296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251298">SUSE bug 1251298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251299">SUSE bug 1251299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251300">SUSE bug 1251300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251302">SUSE bug 1251302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251303">SUSE bug 1251303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251306">SUSE bug 1251306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251310">SUSE bug 1251310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251312">SUSE bug 1251312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251322">SUSE bug 1251322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251324">SUSE bug 1251324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251325">SUSE bug 1251325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251326">SUSE bug 1251326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251327">SUSE bug 1251327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251329">SUSE bug 1251329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251330">SUSE bug 1251330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251331">SUSE bug 1251331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251519">SUSE bug 1251519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251521">SUSE bug 1251521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251522">SUSE bug 1251522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251527">SUSE bug 1251527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251529">SUSE bug 1251529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251550">SUSE bug 1251550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251723">SUSE bug 1251723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251725">SUSE bug 1251725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251728">SUSE bug 1251728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251730">SUSE bug 1251730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251736">SUSE bug 1251736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251737">SUSE bug 1251737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251741">SUSE bug 1251741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251743">SUSE bug 1251743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251750">SUSE bug 1251750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251753">SUSE bug 1251753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251759">SUSE bug 1251759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251761">SUSE bug 1251761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251762">SUSE bug 1251762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251763">SUSE bug 1251763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251764">SUSE bug 1251764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251767">SUSE bug 1251767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251769">SUSE bug 1251769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251772">SUSE bug 1251772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251775">SUSE bug 1251775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251777">SUSE bug 1251777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251785">SUSE bug 1251785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251823">SUSE bug 1251823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251930">SUSE bug 1251930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251967">SUSE bug 1251967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252033">SUSE bug 1252033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252035">SUSE bug 1252035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252047">SUSE bug 1252047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252069">SUSE bug 1252069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252265">SUSE bug 1252265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252474">SUSE bug 1252474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252475">SUSE bug 1252475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252476">SUSE bug 1252476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252480">SUSE bug 1252480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252484">SUSE bug 1252484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252486">SUSE bug 1252486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252489">SUSE bug 1252489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252490">SUSE bug 1252490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252492">SUSE bug 1252492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252495">SUSE bug 1252495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252497">SUSE bug 1252497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252499">SUSE bug 1252499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252501">SUSE bug 1252501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252508">SUSE bug 1252508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252509">SUSE bug 1252509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252513">SUSE bug 1252513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252515">SUSE bug 1252515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252516">SUSE bug 1252516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252519">SUSE bug 1252519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252521">SUSE bug 1252521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252522">SUSE bug 1252522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252523">SUSE bug 1252523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252526">SUSE bug 1252526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252528">SUSE bug 1252528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252529">SUSE bug 1252529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252532">SUSE bug 1252532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252535">SUSE bug 1252535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252536">SUSE bug 1252536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252537">SUSE bug 1252537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252538">SUSE bug 1252538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252539">SUSE bug 1252539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252542">SUSE bug 1252542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252545">SUSE bug 1252545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252549">SUSE bug 1252549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252554">SUSE bug 1252554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252560">SUSE bug 1252560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252564">SUSE bug 1252564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252565">SUSE bug 1252565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252568">SUSE bug 1252568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252634">SUSE bug 1252634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252688">SUSE bug 1252688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252785">SUSE bug 1252785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252893">SUSE bug 1252893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252904">SUSE bug 1252904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252919">SUSE bug 1252919</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50327/">CVE-2022-50327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50327">CVE-2022-50327 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50334/">CVE-2022-50334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50334">CVE-2022-50334 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50470/">CVE-2022-50470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50470">CVE-2022-50470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50471/">CVE-2022-50471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50471">CVE-2022-50471 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50472/">CVE-2022-50472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50472">CVE-2022-50472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50475/">CVE-2022-50475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50475">CVE-2022-50475 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50478/">CVE-2022-50478 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50478">CVE-2022-50478 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50480/">CVE-2022-50480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50480">CVE-2022-50480 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50482/">CVE-2022-50482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50482">CVE-2022-50482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50484/">CVE-2022-50484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50484">CVE-2022-50484 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50485/">CVE-2022-50485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50485">CVE-2022-50485 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50487/">CVE-2022-50487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50487">CVE-2022-50487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50488/">CVE-2022-50488 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50488">CVE-2022-50488 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50489/">CVE-2022-50489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50489">CVE-2022-50489 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50490/">CVE-2022-50490 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50490">CVE-2022-50490 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50492/">CVE-2022-50492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50492">CVE-2022-50492 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50493/">CVE-2022-50493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50493">CVE-2022-50493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50494/">CVE-2022-50494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50494">CVE-2022-50494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50496/">CVE-2022-50496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50496">CVE-2022-50496 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50497/">CVE-2022-50497 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50497">CVE-2022-50497 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50498/">CVE-2022-50498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50498">CVE-2022-50498 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50499/">CVE-2022-50499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50499">CVE-2022-50499 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50501/">CVE-2022-50501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50501">CVE-2022-50501 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50503/">CVE-2022-50503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50503">CVE-2022-50503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50504/">CVE-2022-50504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50504">CVE-2022-50504 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50505/">CVE-2022-50505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50505">CVE-2022-50505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50509/">CVE-2022-50509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50509">CVE-2022-50509 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50511/">CVE-2022-50511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50511">CVE-2022-50511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50512/">CVE-2022-50512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50512">CVE-2022-50512 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50513/">CVE-2022-50513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50513">CVE-2022-50513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50514/">CVE-2022-50514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50514">CVE-2022-50514 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50516/">CVE-2022-50516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50516">CVE-2022-50516 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50519/">CVE-2022-50519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50519">CVE-2022-50519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50520/">CVE-2022-50520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50520">CVE-2022-50520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50521/">CVE-2022-50521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50521">CVE-2022-50521 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50523/">CVE-2022-50523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50523">CVE-2022-50523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50525/">CVE-2022-50525 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50525">CVE-2022-50525 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50528/">CVE-2022-50528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50528">CVE-2022-50528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50529/">CVE-2022-50529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50529">CVE-2022-50529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50530/">CVE-2022-50530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50530">CVE-2022-50530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50532/">CVE-2022-50532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50532">CVE-2022-50532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50534/">CVE-2022-50534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50534">CVE-2022-50534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50535/">CVE-2022-50535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50535">CVE-2022-50535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50537/">CVE-2022-50537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50537">CVE-2022-50537 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50541/">CVE-2022-50541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50541">CVE-2022-50541 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50542/">CVE-2022-50542 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50542">CVE-2022-50542 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50544/">CVE-2022-50544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50544">CVE-2022-50544 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50545/">CVE-2022-50545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50545">CVE-2022-50545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50546/">CVE-2022-50546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50546">CVE-2022-50546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50549/">CVE-2022-50549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50549">CVE-2022-50549 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50551/">CVE-2022-50551 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50551">CVE-2022-50551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50553/">CVE-2022-50553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50553">CVE-2022-50553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50556/">CVE-2022-50556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50556">CVE-2022-50556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50559/">CVE-2022-50559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50559">CVE-2022-50559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50560/">CVE-2022-50560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50560">CVE-2022-50560 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50561/">CVE-2022-50561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50561">CVE-2022-50561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50562/">CVE-2022-50562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50562">CVE-2022-50562 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50563/">CVE-2022-50563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50563">CVE-2022-50563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50564/">CVE-2022-50564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50564">CVE-2022-50564 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50566/">CVE-2022-50566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50566">CVE-2022-50566 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50567/">CVE-2022-50567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50567">CVE-2022-50567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50568/">CVE-2022-50568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50568">CVE-2022-50568 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50570/">CVE-2022-50570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50570">CVE-2022-50570 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50572/">CVE-2022-50572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50572">CVE-2022-50572 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50574/">CVE-2022-50574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50574">CVE-2022-50574 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50575/">CVE-2022-50575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50575">CVE-2022-50575 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50576/">CVE-2022-50576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50576">CVE-2022-50576 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50578/">CVE-2022-50578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50578">CVE-2022-50578 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50579/">CVE-2022-50579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50579">CVE-2022-50579 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50580/">CVE-2022-50580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50580">CVE-2022-50580 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50581/">CVE-2022-50581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50581">CVE-2022-50581 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50582/">CVE-2022-50582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50582">CVE-2022-50582 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52923/">CVE-2023-52923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52923">CVE-2023-52923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53365/">CVE-2023-53365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53365">CVE-2023-53365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53500/">CVE-2023-53500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53500">CVE-2023-53500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53533/">CVE-2023-53533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53533">CVE-2023-53533 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53534/">CVE-2023-53534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53534">CVE-2023-53534 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53541/">CVE-2023-53541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53541">CVE-2023-53541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53542/">CVE-2023-53542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53542">CVE-2023-53542 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53548/">CVE-2023-53548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53548">CVE-2023-53548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53551/">CVE-2023-53551 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53551">CVE-2023-53551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53552/">CVE-2023-53552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53552">CVE-2023-53552 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53553/">CVE-2023-53553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53553">CVE-2023-53553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53554/">CVE-2023-53554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53554">CVE-2023-53554 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53556/">CVE-2023-53556 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53556">CVE-2023-53556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53559/">CVE-2023-53559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53559">CVE-2023-53559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53560/">CVE-2023-53560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53560">CVE-2023-53560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53564/">CVE-2023-53564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53564">CVE-2023-53564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53566/">CVE-2023-53566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53566">CVE-2023-53566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53567/">CVE-2023-53567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53567">CVE-2023-53567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53568/">CVE-2023-53568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53568">CVE-2023-53568 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53571/">CVE-2023-53571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53571">CVE-2023-53571 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53572/">CVE-2023-53572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53572">CVE-2023-53572 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53574/">CVE-2023-53574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53574">CVE-2023-53574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53576/">CVE-2023-53576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53576">CVE-2023-53576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53579/">CVE-2023-53579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53579">CVE-2023-53579 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53582/">CVE-2023-53582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53582">CVE-2023-53582 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53587/">CVE-2023-53587 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53587">CVE-2023-53587 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53589/">CVE-2023-53589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53589">CVE-2023-53589 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53592/">CVE-2023-53592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53592">CVE-2023-53592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53594/">CVE-2023-53594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53594">CVE-2023-53594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53597/">CVE-2023-53597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53597">CVE-2023-53597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53603/">CVE-2023-53603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53603">CVE-2023-53603 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53604/">CVE-2023-53604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53604">CVE-2023-53604 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53605/">CVE-2023-53605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53605">CVE-2023-53605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53607/">CVE-2023-53607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53607">CVE-2023-53607 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53608/">CVE-2023-53608 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53608">CVE-2023-53608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53611/">CVE-2023-53611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53611">CVE-2023-53611 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53612/">CVE-2023-53612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53612">CVE-2023-53612 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53615/">CVE-2023-53615 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53615">CVE-2023-53615 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53616/">CVE-2023-53616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53616">CVE-2023-53616 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53617/">CVE-2023-53617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53617">CVE-2023-53617 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53619/">CVE-2023-53619 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53619">CVE-2023-53619 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53622/">CVE-2023-53622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53622">CVE-2023-53622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53625/">CVE-2023-53625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53625">CVE-2023-53625 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53626/">CVE-2023-53626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53626">CVE-2023-53626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53631/">CVE-2023-53631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53631">CVE-2023-53631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53637/">CVE-2023-53637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53637">CVE-2023-53637 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53639/">CVE-2023-53639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53639">CVE-2023-53639 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53640/">CVE-2023-53640 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53640">CVE-2023-53640 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53641/">CVE-2023-53641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53641">CVE-2023-53641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53644/">CVE-2023-53644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53644">CVE-2023-53644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53648/">CVE-2023-53648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53648">CVE-2023-53648 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53650/">CVE-2023-53650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53650">CVE-2023-53650 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53651/">CVE-2023-53651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53651">CVE-2023-53651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53658/">CVE-2023-53658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53658">CVE-2023-53658 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53659/">CVE-2023-53659 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53659">CVE-2023-53659 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53662/">CVE-2023-53662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53662">CVE-2023-53662 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53667/">CVE-2023-53667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53667">CVE-2023-53667 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53668/">CVE-2023-53668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53668">CVE-2023-53668 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53670/">CVE-2023-53670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53670">CVE-2023-53670 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53673/">CVE-2023-53673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53673">CVE-2023-53673 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53674/">CVE-2023-53674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53674">CVE-2023-53674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53675/">CVE-2023-53675 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53675">CVE-2023-53675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53679/">CVE-2023-53679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53679">CVE-2023-53679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53680/">CVE-2023-53680 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53680">CVE-2023-53680 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53681/">CVE-2023-53681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53681">CVE-2023-53681 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53683/">CVE-2023-53683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53683">CVE-2023-53683 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53687/">CVE-2023-53687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53687">CVE-2023-53687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53692/">CVE-2023-53692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53692">CVE-2023-53692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53693/">CVE-2023-53693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53693">CVE-2023-53693 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53695/">CVE-2023-53695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53695">CVE-2023-53695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53696/">CVE-2023-53696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53696">CVE-2023-53696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53700/">CVE-2023-53700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53700">CVE-2023-53700 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53704/">CVE-2023-53704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53704">CVE-2023-53704 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53705/">CVE-2023-53705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53705">CVE-2023-53705 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53708/">CVE-2023-53708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53708">CVE-2023-53708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53709/">CVE-2023-53709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53709">CVE-2023-53709 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53711/">CVE-2023-53711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53711">CVE-2023-53711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53715/">CVE-2023-53715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53715">CVE-2023-53715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53717/">CVE-2023-53717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53717">CVE-2023-53717 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53718/">CVE-2023-53718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53718">CVE-2023-53718 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53719/">CVE-2023-53719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53719">CVE-2023-53719 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53722/">CVE-2023-53722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53722">CVE-2023-53722 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53723/">CVE-2023-53723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53723">CVE-2023-53723 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53724/">CVE-2023-53724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53724">CVE-2023-53724 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53725/">CVE-2023-53725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53725">CVE-2023-53725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53726/">CVE-2023-53726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53726">CVE-2023-53726 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53730/">CVE-2023-53730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53730">CVE-2023-53730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-7324/">CVE-2023-7324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7324">CVE-2023-7324 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39742/">CVE-2025-39742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39797/">CVE-2025-39797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39945/">CVE-2025-39945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39945">CVE-2025-39945 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39965/">CVE-2025-39965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39965">CVE-2025-39965 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39967/">CVE-2025-39967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39967">CVE-2025-39967 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39968/">CVE-2025-39968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39968">CVE-2025-39968 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39973/">CVE-2025-39973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39973">CVE-2025-39973 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39978/">CVE-2025-39978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39978">CVE-2025-39978 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40018/">CVE-2025-40018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40018">CVE-2025-40018 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40044/">CVE-2025-40044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40088/">CVE-2025-40088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40088">CVE-2025-40088 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40102/">CVE-2025-40102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40102">CVE-2025-40102 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029738" comment="kernel-default-5.14.21-150400.24.184.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029704" comment="kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206420" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1251198" ref_url="https://bugzilla.suse.com/1251198" source="BUGZILLA"/>
		<reference ref_id="1251199" ref_url="https://bugzilla.suse.com/1251199" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-61984" ref_url="https://www.suse.com/security/cve/CVE-2025-61984/" source="CVE"/>
		<reference ref_id="CVE-2025-61985" ref_url="https://www.suse.com/security/cve/CVE-2025-61985/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023293.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198)
- CVE-2025-61985: Fixed code execution via '\0' character in ssh:// URI when a ProxyCommand is used (bsc#1251199)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-15"/>
	<updated date="2025-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1251198">SUSE bug 1251198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251199">SUSE bug 1251199</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61984/">CVE-2025-61984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61984">CVE-2025-61984 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61985/">CVE-2025-61985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61985">CVE-2025-61985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029733" comment="openssh-8.4p1-150300.3.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029734" comment="openssh-clients-8.4p1-150300.3.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029735" comment="openssh-common-8.4p1-150300.3.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029736" comment="openssh-fips-8.4p1-150300.3.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029737" comment="openssh-server-8.4p1-150300.3.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206421" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1247850" ref_url="https://bugzilla.suse.com/1247850" source="BUGZILLA"/>
		<reference ref_id="1249076" ref_url="https://bugzilla.suse.com/1249076" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-8732" ref_url="https://www.suse.com/security/cve/CVE-2025-8732/" source="CVE"/>
		<reference ref_id="CVE-2025-9714" ref_url="https://www.suse.com/security/cve/CVE-2025-9714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023291.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2025-9714: Fixed inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c (bsc#1249076)
- CVE-2025-8732: Fixed infinite recursion in catalog parsing functions when processing malformed SGML catalog files (bsc#1247850)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-17"/>
	<updated date="2025-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1247850">SUSE bug 1247850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249076">SUSE bug 1249076</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8732/">CVE-2025-8732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8732">CVE-2025-8732 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9714/">CVE-2025-9714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9714">CVE-2025-9714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029785" comment="libxml2-2-2.9.14-150400.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029786" comment="libxml2-tools-2.9.14-150400.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029787" comment="python3-libxml2-2.9.14-150400.5.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206422" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1205128" ref_url="https://bugzilla.suse.com/1205128" source="BUGZILLA"/>
		<reference ref_id="1206893" ref_url="https://bugzilla.suse.com/1206893" source="BUGZILLA"/>
		<reference ref_id="1207612" ref_url="https://bugzilla.suse.com/1207612" source="BUGZILLA"/>
		<reference ref_id="1207619" ref_url="https://bugzilla.suse.com/1207619" source="BUGZILLA"/>
		<reference ref_id="1210763" ref_url="https://bugzilla.suse.com/1210763" source="BUGZILLA"/>
		<reference ref_id="1211162" ref_url="https://bugzilla.suse.com/1211162" source="BUGZILLA"/>
		<reference ref_id="1211692" ref_url="https://bugzilla.suse.com/1211692" source="BUGZILLA"/>
		<reference ref_id="1213098" ref_url="https://bugzilla.suse.com/1213098" source="BUGZILLA"/>
		<reference ref_id="1213114" ref_url="https://bugzilla.suse.com/1213114" source="BUGZILLA"/>
		<reference ref_id="1213747" ref_url="https://bugzilla.suse.com/1213747" source="BUGZILLA"/>
		<reference ref_id="1214954" ref_url="https://bugzilla.suse.com/1214954" source="BUGZILLA"/>
		<reference ref_id="1214992" ref_url="https://bugzilla.suse.com/1214992" source="BUGZILLA"/>
		<reference ref_id="1215148" ref_url="https://bugzilla.suse.com/1215148" source="BUGZILLA"/>
		<reference ref_id="1217366" ref_url="https://bugzilla.suse.com/1217366" source="BUGZILLA"/>
		<reference ref_id="1236104" ref_url="https://bugzilla.suse.com/1236104" source="BUGZILLA"/>
		<reference ref_id="1249479" ref_url="https://bugzilla.suse.com/1249479" source="BUGZILLA"/>
		<reference ref_id="1249608" ref_url="https://bugzilla.suse.com/1249608" source="BUGZILLA"/>
		<reference ref_id="1249857" ref_url="https://bugzilla.suse.com/1249857" source="BUGZILLA"/>
		<reference ref_id="1249859" ref_url="https://bugzilla.suse.com/1249859" source="BUGZILLA"/>
		<reference ref_id="1249988" ref_url="https://bugzilla.suse.com/1249988" source="BUGZILLA"/>
		<reference ref_id="1250742" ref_url="https://bugzilla.suse.com/1250742" source="BUGZILLA"/>
		<reference ref_id="1250816" ref_url="https://bugzilla.suse.com/1250816" source="BUGZILLA"/>
		<reference ref_id="1250946" ref_url="https://bugzilla.suse.com/1250946" source="BUGZILLA"/>
		<reference ref_id="1251027" ref_url="https://bugzilla.suse.com/1251027" source="BUGZILLA"/>
		<reference ref_id="1251032" ref_url="https://bugzilla.suse.com/1251032" source="BUGZILLA"/>
		<reference ref_id="1251034" ref_url="https://bugzilla.suse.com/1251034" source="BUGZILLA"/>
		<reference ref_id="1251035" ref_url="https://bugzilla.suse.com/1251035" source="BUGZILLA"/>
		<reference ref_id="1251040" ref_url="https://bugzilla.suse.com/1251040" source="BUGZILLA"/>
		<reference ref_id="1251043" ref_url="https://bugzilla.suse.com/1251043" source="BUGZILLA"/>
		<reference ref_id="1251045" ref_url="https://bugzilla.suse.com/1251045" source="BUGZILLA"/>
		<reference ref_id="1251047" ref_url="https://bugzilla.suse.com/1251047" source="BUGZILLA"/>
		<reference ref_id="1251052" ref_url="https://bugzilla.suse.com/1251052" source="BUGZILLA"/>
		<reference ref_id="1251057" ref_url="https://bugzilla.suse.com/1251057" source="BUGZILLA"/>
		<reference ref_id="1251059" ref_url="https://bugzilla.suse.com/1251059" source="BUGZILLA"/>
		<reference ref_id="1251061" ref_url="https://bugzilla.suse.com/1251061" source="BUGZILLA"/>
		<reference ref_id="1251063" ref_url="https://bugzilla.suse.com/1251063" source="BUGZILLA"/>
		<reference ref_id="1251064" ref_url="https://bugzilla.suse.com/1251064" source="BUGZILLA"/>
		<reference ref_id="1251065" ref_url="https://bugzilla.suse.com/1251065" source="BUGZILLA"/>
		<reference ref_id="1251066" ref_url="https://bugzilla.suse.com/1251066" source="BUGZILLA"/>
		<reference ref_id="1251068" ref_url="https://bugzilla.suse.com/1251068" source="BUGZILLA"/>
		<reference ref_id="1251072" ref_url="https://bugzilla.suse.com/1251072" source="BUGZILLA"/>
		<reference ref_id="1251080" ref_url="https://bugzilla.suse.com/1251080" source="BUGZILLA"/>
		<reference ref_id="1251082" ref_url="https://bugzilla.suse.com/1251082" source="BUGZILLA"/>
		<reference ref_id="1251086" ref_url="https://bugzilla.suse.com/1251086" source="BUGZILLA"/>
		<reference ref_id="1251087" ref_url="https://bugzilla.suse.com/1251087" source="BUGZILLA"/>
		<reference ref_id="1251088" ref_url="https://bugzilla.suse.com/1251088" source="BUGZILLA"/>
		<reference ref_id="1251091" ref_url="https://bugzilla.suse.com/1251091" source="BUGZILLA"/>
		<reference ref_id="1251092" ref_url="https://bugzilla.suse.com/1251092" source="BUGZILLA"/>
		<reference ref_id="1251093" ref_url="https://bugzilla.suse.com/1251093" source="BUGZILLA"/>
		<reference ref_id="1251097" ref_url="https://bugzilla.suse.com/1251097" source="BUGZILLA"/>
		<reference ref_id="1251099" ref_url="https://bugzilla.suse.com/1251099" source="BUGZILLA"/>
		<reference ref_id="1251101" ref_url="https://bugzilla.suse.com/1251101" source="BUGZILLA"/>
		<reference ref_id="1251104" ref_url="https://bugzilla.suse.com/1251104" source="BUGZILLA"/>
		<reference ref_id="1251110" ref_url="https://bugzilla.suse.com/1251110" source="BUGZILLA"/>
		<reference ref_id="1251113" ref_url="https://bugzilla.suse.com/1251113" source="BUGZILLA"/>
		<reference ref_id="1251115" ref_url="https://bugzilla.suse.com/1251115" source="BUGZILLA"/>
		<reference ref_id="1251123" ref_url="https://bugzilla.suse.com/1251123" source="BUGZILLA"/>
		<reference ref_id="1251128" ref_url="https://bugzilla.suse.com/1251128" source="BUGZILLA"/>
		<reference ref_id="1251129" ref_url="https://bugzilla.suse.com/1251129" source="BUGZILLA"/>
		<reference ref_id="1251133" ref_url="https://bugzilla.suse.com/1251133" source="BUGZILLA"/>
		<reference ref_id="1251136" ref_url="https://bugzilla.suse.com/1251136" source="BUGZILLA"/>
		<reference ref_id="1251147" ref_url="https://bugzilla.suse.com/1251147" source="BUGZILLA"/>
		<reference ref_id="1251149" ref_url="https://bugzilla.suse.com/1251149" source="BUGZILLA"/>
		<reference ref_id="1251154" ref_url="https://bugzilla.suse.com/1251154" source="BUGZILLA"/>
		<reference ref_id="1251159" ref_url="https://bugzilla.suse.com/1251159" source="BUGZILLA"/>
		<reference ref_id="1251164" ref_url="https://bugzilla.suse.com/1251164" source="BUGZILLA"/>
		<reference ref_id="1251166" ref_url="https://bugzilla.suse.com/1251166" source="BUGZILLA"/>
		<reference ref_id="1251169" ref_url="https://bugzilla.suse.com/1251169" source="BUGZILLA"/>
		<reference ref_id="1251170" ref_url="https://bugzilla.suse.com/1251170" source="BUGZILLA"/>
		<reference ref_id="1251173" ref_url="https://bugzilla.suse.com/1251173" source="BUGZILLA"/>
		<reference ref_id="1251178" ref_url="https://bugzilla.suse.com/1251178" source="BUGZILLA"/>
		<reference ref_id="1251180" ref_url="https://bugzilla.suse.com/1251180" source="BUGZILLA"/>
		<reference ref_id="1251182" ref_url="https://bugzilla.suse.com/1251182" source="BUGZILLA"/>
		<reference ref_id="1251197" ref_url="https://bugzilla.suse.com/1251197" source="BUGZILLA"/>
		<reference ref_id="1251200" ref_url="https://bugzilla.suse.com/1251200" source="BUGZILLA"/>
		<reference ref_id="1251201" ref_url="https://bugzilla.suse.com/1251201" source="BUGZILLA"/>
		<reference ref_id="1251202" ref_url="https://bugzilla.suse.com/1251202" source="BUGZILLA"/>
		<reference ref_id="1251208" ref_url="https://bugzilla.suse.com/1251208" source="BUGZILLA"/>
		<reference ref_id="1251210" ref_url="https://bugzilla.suse.com/1251210" source="BUGZILLA"/>
		<reference ref_id="1251215" ref_url="https://bugzilla.suse.com/1251215" source="BUGZILLA"/>
		<reference ref_id="1251218" ref_url="https://bugzilla.suse.com/1251218" source="BUGZILLA"/>
		<reference ref_id="1251222" ref_url="https://bugzilla.suse.com/1251222" source="BUGZILLA"/>
		<reference ref_id="1251223" ref_url="https://bugzilla.suse.com/1251223" source="BUGZILLA"/>
		<reference ref_id="1251230" ref_url="https://bugzilla.suse.com/1251230" source="BUGZILLA"/>
		<reference ref_id="1251247" ref_url="https://bugzilla.suse.com/1251247" source="BUGZILLA"/>
		<reference ref_id="1251268" ref_url="https://bugzilla.suse.com/1251268" source="BUGZILLA"/>
		<reference ref_id="1251281" ref_url="https://bugzilla.suse.com/1251281" source="BUGZILLA"/>
		<reference ref_id="1251282" ref_url="https://bugzilla.suse.com/1251282" source="BUGZILLA"/>
		<reference ref_id="1251283" ref_url="https://bugzilla.suse.com/1251283" source="BUGZILLA"/>
		<reference ref_id="1251285" ref_url="https://bugzilla.suse.com/1251285" source="BUGZILLA"/>
		<reference ref_id="1251286" ref_url="https://bugzilla.suse.com/1251286" source="BUGZILLA"/>
		<reference ref_id="1251292" ref_url="https://bugzilla.suse.com/1251292" source="BUGZILLA"/>
		<reference ref_id="1251294" ref_url="https://bugzilla.suse.com/1251294" source="BUGZILLA"/>
		<reference ref_id="1251295" ref_url="https://bugzilla.suse.com/1251295" source="BUGZILLA"/>
		<reference ref_id="1251296" ref_url="https://bugzilla.suse.com/1251296" source="BUGZILLA"/>
		<reference ref_id="1251298" ref_url="https://bugzilla.suse.com/1251298" source="BUGZILLA"/>
		<reference ref_id="1251299" ref_url="https://bugzilla.suse.com/1251299" source="BUGZILLA"/>
		<reference ref_id="1251300" ref_url="https://bugzilla.suse.com/1251300" source="BUGZILLA"/>
		<reference ref_id="1251302" ref_url="https://bugzilla.suse.com/1251302" source="BUGZILLA"/>
		<reference ref_id="1251303" ref_url="https://bugzilla.suse.com/1251303" source="BUGZILLA"/>
		<reference ref_id="1251306" ref_url="https://bugzilla.suse.com/1251306" source="BUGZILLA"/>
		<reference ref_id="1251310" ref_url="https://bugzilla.suse.com/1251310" source="BUGZILLA"/>
		<reference ref_id="1251312" ref_url="https://bugzilla.suse.com/1251312" source="BUGZILLA"/>
		<reference ref_id="1251322" ref_url="https://bugzilla.suse.com/1251322" source="BUGZILLA"/>
		<reference ref_id="1251324" ref_url="https://bugzilla.suse.com/1251324" source="BUGZILLA"/>
		<reference ref_id="1251325" ref_url="https://bugzilla.suse.com/1251325" source="BUGZILLA"/>
		<reference ref_id="1251326" ref_url="https://bugzilla.suse.com/1251326" source="BUGZILLA"/>
		<reference ref_id="1251327" ref_url="https://bugzilla.suse.com/1251327" source="BUGZILLA"/>
		<reference ref_id="1251329" ref_url="https://bugzilla.suse.com/1251329" source="BUGZILLA"/>
		<reference ref_id="1251330" ref_url="https://bugzilla.suse.com/1251330" source="BUGZILLA"/>
		<reference ref_id="1251331" ref_url="https://bugzilla.suse.com/1251331" source="BUGZILLA"/>
		<reference ref_id="1251519" ref_url="https://bugzilla.suse.com/1251519" source="BUGZILLA"/>
		<reference ref_id="1251521" ref_url="https://bugzilla.suse.com/1251521" source="BUGZILLA"/>
		<reference ref_id="1251522" ref_url="https://bugzilla.suse.com/1251522" source="BUGZILLA"/>
		<reference ref_id="1251527" ref_url="https://bugzilla.suse.com/1251527" source="BUGZILLA"/>
		<reference ref_id="1251529" ref_url="https://bugzilla.suse.com/1251529" source="BUGZILLA"/>
		<reference ref_id="1251550" ref_url="https://bugzilla.suse.com/1251550" source="BUGZILLA"/>
		<reference ref_id="1251723" ref_url="https://bugzilla.suse.com/1251723" source="BUGZILLA"/>
		<reference ref_id="1251725" ref_url="https://bugzilla.suse.com/1251725" source="BUGZILLA"/>
		<reference ref_id="1251728" ref_url="https://bugzilla.suse.com/1251728" source="BUGZILLA"/>
		<reference ref_id="1251730" ref_url="https://bugzilla.suse.com/1251730" source="BUGZILLA"/>
		<reference ref_id="1251736" ref_url="https://bugzilla.suse.com/1251736" source="BUGZILLA"/>
		<reference ref_id="1251737" ref_url="https://bugzilla.suse.com/1251737" source="BUGZILLA"/>
		<reference ref_id="1251741" ref_url="https://bugzilla.suse.com/1251741" source="BUGZILLA"/>
		<reference ref_id="1251743" ref_url="https://bugzilla.suse.com/1251743" source="BUGZILLA"/>
		<reference ref_id="1251750" ref_url="https://bugzilla.suse.com/1251750" source="BUGZILLA"/>
		<reference ref_id="1251753" ref_url="https://bugzilla.suse.com/1251753" source="BUGZILLA"/>
		<reference ref_id="1251759" ref_url="https://bugzilla.suse.com/1251759" source="BUGZILLA"/>
		<reference ref_id="1251761" ref_url="https://bugzilla.suse.com/1251761" source="BUGZILLA"/>
		<reference ref_id="1251762" ref_url="https://bugzilla.suse.com/1251762" source="BUGZILLA"/>
		<reference ref_id="1251763" ref_url="https://bugzilla.suse.com/1251763" source="BUGZILLA"/>
		<reference ref_id="1251764" ref_url="https://bugzilla.suse.com/1251764" source="BUGZILLA"/>
		<reference ref_id="1251767" ref_url="https://bugzilla.suse.com/1251767" source="BUGZILLA"/>
		<reference ref_id="1251769" ref_url="https://bugzilla.suse.com/1251769" source="BUGZILLA"/>
		<reference ref_id="1251772" ref_url="https://bugzilla.suse.com/1251772" source="BUGZILLA"/>
		<reference ref_id="1251775" ref_url="https://bugzilla.suse.com/1251775" source="BUGZILLA"/>
		<reference ref_id="1251777" ref_url="https://bugzilla.suse.com/1251777" source="BUGZILLA"/>
		<reference ref_id="1251785" ref_url="https://bugzilla.suse.com/1251785" source="BUGZILLA"/>
		<reference ref_id="1251823" ref_url="https://bugzilla.suse.com/1251823" source="BUGZILLA"/>
		<reference ref_id="1251930" ref_url="https://bugzilla.suse.com/1251930" source="BUGZILLA"/>
		<reference ref_id="1251967" ref_url="https://bugzilla.suse.com/1251967" source="BUGZILLA"/>
		<reference ref_id="1252033" ref_url="https://bugzilla.suse.com/1252033" source="BUGZILLA"/>
		<reference ref_id="1252035" ref_url="https://bugzilla.suse.com/1252035" source="BUGZILLA"/>
		<reference ref_id="1252047" ref_url="https://bugzilla.suse.com/1252047" source="BUGZILLA"/>
		<reference ref_id="1252069" ref_url="https://bugzilla.suse.com/1252069" source="BUGZILLA"/>
		<reference ref_id="1252265" ref_url="https://bugzilla.suse.com/1252265" source="BUGZILLA"/>
		<reference ref_id="1252474" ref_url="https://bugzilla.suse.com/1252474" source="BUGZILLA"/>
		<reference ref_id="1252475" ref_url="https://bugzilla.suse.com/1252475" source="BUGZILLA"/>
		<reference ref_id="1252476" ref_url="https://bugzilla.suse.com/1252476" source="BUGZILLA"/>
		<reference ref_id="1252480" ref_url="https://bugzilla.suse.com/1252480" source="BUGZILLA"/>
		<reference ref_id="1252484" ref_url="https://bugzilla.suse.com/1252484" source="BUGZILLA"/>
		<reference ref_id="1252486" ref_url="https://bugzilla.suse.com/1252486" source="BUGZILLA"/>
		<reference ref_id="1252489" ref_url="https://bugzilla.suse.com/1252489" source="BUGZILLA"/>
		<reference ref_id="1252490" ref_url="https://bugzilla.suse.com/1252490" source="BUGZILLA"/>
		<reference ref_id="1252492" ref_url="https://bugzilla.suse.com/1252492" source="BUGZILLA"/>
		<reference ref_id="1252495" ref_url="https://bugzilla.suse.com/1252495" source="BUGZILLA"/>
		<reference ref_id="1252497" ref_url="https://bugzilla.suse.com/1252497" source="BUGZILLA"/>
		<reference ref_id="1252499" ref_url="https://bugzilla.suse.com/1252499" source="BUGZILLA"/>
		<reference ref_id="1252501" ref_url="https://bugzilla.suse.com/1252501" source="BUGZILLA"/>
		<reference ref_id="1252508" ref_url="https://bugzilla.suse.com/1252508" source="BUGZILLA"/>
		<reference ref_id="1252509" ref_url="https://bugzilla.suse.com/1252509" source="BUGZILLA"/>
		<reference ref_id="1252513" ref_url="https://bugzilla.suse.com/1252513" source="BUGZILLA"/>
		<reference ref_id="1252515" ref_url="https://bugzilla.suse.com/1252515" source="BUGZILLA"/>
		<reference ref_id="1252516" ref_url="https://bugzilla.suse.com/1252516" source="BUGZILLA"/>
		<reference ref_id="1252519" ref_url="https://bugzilla.suse.com/1252519" source="BUGZILLA"/>
		<reference ref_id="1252521" ref_url="https://bugzilla.suse.com/1252521" source="BUGZILLA"/>
		<reference ref_id="1252522" ref_url="https://bugzilla.suse.com/1252522" source="BUGZILLA"/>
		<reference ref_id="1252523" ref_url="https://bugzilla.suse.com/1252523" source="BUGZILLA"/>
		<reference ref_id="1252526" ref_url="https://bugzilla.suse.com/1252526" source="BUGZILLA"/>
		<reference ref_id="1252528" ref_url="https://bugzilla.suse.com/1252528" source="BUGZILLA"/>
		<reference ref_id="1252529" ref_url="https://bugzilla.suse.com/1252529" source="BUGZILLA"/>
		<reference ref_id="1252532" ref_url="https://bugzilla.suse.com/1252532" source="BUGZILLA"/>
		<reference ref_id="1252535" ref_url="https://bugzilla.suse.com/1252535" source="BUGZILLA"/>
		<reference ref_id="1252536" ref_url="https://bugzilla.suse.com/1252536" source="BUGZILLA"/>
		<reference ref_id="1252537" ref_url="https://bugzilla.suse.com/1252537" source="BUGZILLA"/>
		<reference ref_id="1252538" ref_url="https://bugzilla.suse.com/1252538" source="BUGZILLA"/>
		<reference ref_id="1252539" ref_url="https://bugzilla.suse.com/1252539" source="BUGZILLA"/>
		<reference ref_id="1252542" ref_url="https://bugzilla.suse.com/1252542" source="BUGZILLA"/>
		<reference ref_id="1252545" ref_url="https://bugzilla.suse.com/1252545" source="BUGZILLA"/>
		<reference ref_id="1252549" ref_url="https://bugzilla.suse.com/1252549" source="BUGZILLA"/>
		<reference ref_id="1252554" ref_url="https://bugzilla.suse.com/1252554" source="BUGZILLA"/>
		<reference ref_id="1252560" ref_url="https://bugzilla.suse.com/1252560" source="BUGZILLA"/>
		<reference ref_id="1252564" ref_url="https://bugzilla.suse.com/1252564" source="BUGZILLA"/>
		<reference ref_id="1252565" ref_url="https://bugzilla.suse.com/1252565" source="BUGZILLA"/>
		<reference ref_id="1252568" ref_url="https://bugzilla.suse.com/1252568" source="BUGZILLA"/>
		<reference ref_id="1252634" ref_url="https://bugzilla.suse.com/1252634" source="BUGZILLA"/>
		<reference ref_id="1252688" ref_url="https://bugzilla.suse.com/1252688" source="BUGZILLA"/>
		<reference ref_id="1252785" ref_url="https://bugzilla.suse.com/1252785" source="BUGZILLA"/>
		<reference ref_id="1252893" ref_url="https://bugzilla.suse.com/1252893" source="BUGZILLA"/>
		<reference ref_id="1252904" ref_url="https://bugzilla.suse.com/1252904" source="BUGZILLA"/>
		<reference ref_id="1252919" ref_url="https://bugzilla.suse.com/1252919" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-50327" ref_url="https://www.suse.com/security/cve/CVE-2022-50327/" source="CVE"/>
		<reference ref_id="CVE-2022-50334" ref_url="https://www.suse.com/security/cve/CVE-2022-50334/" source="CVE"/>
		<reference ref_id="CVE-2022-50470" ref_url="https://www.suse.com/security/cve/CVE-2022-50470/" source="CVE"/>
		<reference ref_id="CVE-2022-50471" ref_url="https://www.suse.com/security/cve/CVE-2022-50471/" source="CVE"/>
		<reference ref_id="CVE-2022-50472" ref_url="https://www.suse.com/security/cve/CVE-2022-50472/" source="CVE"/>
		<reference ref_id="CVE-2022-50475" ref_url="https://www.suse.com/security/cve/CVE-2022-50475/" source="CVE"/>
		<reference ref_id="CVE-2022-50478" ref_url="https://www.suse.com/security/cve/CVE-2022-50478/" source="CVE"/>
		<reference ref_id="CVE-2022-50480" ref_url="https://www.suse.com/security/cve/CVE-2022-50480/" source="CVE"/>
		<reference ref_id="CVE-2022-50482" ref_url="https://www.suse.com/security/cve/CVE-2022-50482/" source="CVE"/>
		<reference ref_id="CVE-2022-50484" ref_url="https://www.suse.com/security/cve/CVE-2022-50484/" source="CVE"/>
		<reference ref_id="CVE-2022-50485" ref_url="https://www.suse.com/security/cve/CVE-2022-50485/" source="CVE"/>
		<reference ref_id="CVE-2022-50487" ref_url="https://www.suse.com/security/cve/CVE-2022-50487/" source="CVE"/>
		<reference ref_id="CVE-2022-50488" ref_url="https://www.suse.com/security/cve/CVE-2022-50488/" source="CVE"/>
		<reference ref_id="CVE-2022-50489" ref_url="https://www.suse.com/security/cve/CVE-2022-50489/" source="CVE"/>
		<reference ref_id="CVE-2022-50490" ref_url="https://www.suse.com/security/cve/CVE-2022-50490/" source="CVE"/>
		<reference ref_id="CVE-2022-50492" ref_url="https://www.suse.com/security/cve/CVE-2022-50492/" source="CVE"/>
		<reference ref_id="CVE-2022-50493" ref_url="https://www.suse.com/security/cve/CVE-2022-50493/" source="CVE"/>
		<reference ref_id="CVE-2022-50494" ref_url="https://www.suse.com/security/cve/CVE-2022-50494/" source="CVE"/>
		<reference ref_id="CVE-2022-50496" ref_url="https://www.suse.com/security/cve/CVE-2022-50496/" source="CVE"/>
		<reference ref_id="CVE-2022-50497" ref_url="https://www.suse.com/security/cve/CVE-2022-50497/" source="CVE"/>
		<reference ref_id="CVE-2022-50498" ref_url="https://www.suse.com/security/cve/CVE-2022-50498/" source="CVE"/>
		<reference ref_id="CVE-2022-50499" ref_url="https://www.suse.com/security/cve/CVE-2022-50499/" source="CVE"/>
		<reference ref_id="CVE-2022-50501" ref_url="https://www.suse.com/security/cve/CVE-2022-50501/" source="CVE"/>
		<reference ref_id="CVE-2022-50503" ref_url="https://www.suse.com/security/cve/CVE-2022-50503/" source="CVE"/>
		<reference ref_id="CVE-2022-50504" ref_url="https://www.suse.com/security/cve/CVE-2022-50504/" source="CVE"/>
		<reference ref_id="CVE-2022-50505" ref_url="https://www.suse.com/security/cve/CVE-2022-50505/" source="CVE"/>
		<reference ref_id="CVE-2022-50509" ref_url="https://www.suse.com/security/cve/CVE-2022-50509/" source="CVE"/>
		<reference ref_id="CVE-2022-50511" ref_url="https://www.suse.com/security/cve/CVE-2022-50511/" source="CVE"/>
		<reference ref_id="CVE-2022-50512" ref_url="https://www.suse.com/security/cve/CVE-2022-50512/" source="CVE"/>
		<reference ref_id="CVE-2022-50513" ref_url="https://www.suse.com/security/cve/CVE-2022-50513/" source="CVE"/>
		<reference ref_id="CVE-2022-50514" ref_url="https://www.suse.com/security/cve/CVE-2022-50514/" source="CVE"/>
		<reference ref_id="CVE-2022-50516" ref_url="https://www.suse.com/security/cve/CVE-2022-50516/" source="CVE"/>
		<reference ref_id="CVE-2022-50519" ref_url="https://www.suse.com/security/cve/CVE-2022-50519/" source="CVE"/>
		<reference ref_id="CVE-2022-50520" ref_url="https://www.suse.com/security/cve/CVE-2022-50520/" source="CVE"/>
		<reference ref_id="CVE-2022-50521" ref_url="https://www.suse.com/security/cve/CVE-2022-50521/" source="CVE"/>
		<reference ref_id="CVE-2022-50523" ref_url="https://www.suse.com/security/cve/CVE-2022-50523/" source="CVE"/>
		<reference ref_id="CVE-2022-50525" ref_url="https://www.suse.com/security/cve/CVE-2022-50525/" source="CVE"/>
		<reference ref_id="CVE-2022-50528" ref_url="https://www.suse.com/security/cve/CVE-2022-50528/" source="CVE"/>
		<reference ref_id="CVE-2022-50529" ref_url="https://www.suse.com/security/cve/CVE-2022-50529/" source="CVE"/>
		<reference ref_id="CVE-2022-50530" ref_url="https://www.suse.com/security/cve/CVE-2022-50530/" source="CVE"/>
		<reference ref_id="CVE-2022-50532" ref_url="https://www.suse.com/security/cve/CVE-2022-50532/" source="CVE"/>
		<reference ref_id="CVE-2022-50534" ref_url="https://www.suse.com/security/cve/CVE-2022-50534/" source="CVE"/>
		<reference ref_id="CVE-2022-50535" ref_url="https://www.suse.com/security/cve/CVE-2022-50535/" source="CVE"/>
		<reference ref_id="CVE-2022-50537" ref_url="https://www.suse.com/security/cve/CVE-2022-50537/" source="CVE"/>
		<reference ref_id="CVE-2022-50541" ref_url="https://www.suse.com/security/cve/CVE-2022-50541/" source="CVE"/>
		<reference ref_id="CVE-2022-50542" ref_url="https://www.suse.com/security/cve/CVE-2022-50542/" source="CVE"/>
		<reference ref_id="CVE-2022-50544" ref_url="https://www.suse.com/security/cve/CVE-2022-50544/" source="CVE"/>
		<reference ref_id="CVE-2022-50545" ref_url="https://www.suse.com/security/cve/CVE-2022-50545/" source="CVE"/>
		<reference ref_id="CVE-2022-50546" ref_url="https://www.suse.com/security/cve/CVE-2022-50546/" source="CVE"/>
		<reference ref_id="CVE-2022-50549" ref_url="https://www.suse.com/security/cve/CVE-2022-50549/" source="CVE"/>
		<reference ref_id="CVE-2022-50551" ref_url="https://www.suse.com/security/cve/CVE-2022-50551/" source="CVE"/>
		<reference ref_id="CVE-2022-50553" ref_url="https://www.suse.com/security/cve/CVE-2022-50553/" source="CVE"/>
		<reference ref_id="CVE-2022-50556" ref_url="https://www.suse.com/security/cve/CVE-2022-50556/" source="CVE"/>
		<reference ref_id="CVE-2022-50559" ref_url="https://www.suse.com/security/cve/CVE-2022-50559/" source="CVE"/>
		<reference ref_id="CVE-2022-50560" ref_url="https://www.suse.com/security/cve/CVE-2022-50560/" source="CVE"/>
		<reference ref_id="CVE-2022-50561" ref_url="https://www.suse.com/security/cve/CVE-2022-50561/" source="CVE"/>
		<reference ref_id="CVE-2022-50562" ref_url="https://www.suse.com/security/cve/CVE-2022-50562/" source="CVE"/>
		<reference ref_id="CVE-2022-50563" ref_url="https://www.suse.com/security/cve/CVE-2022-50563/" source="CVE"/>
		<reference ref_id="CVE-2022-50564" ref_url="https://www.suse.com/security/cve/CVE-2022-50564/" source="CVE"/>
		<reference ref_id="CVE-2022-50566" ref_url="https://www.suse.com/security/cve/CVE-2022-50566/" source="CVE"/>
		<reference ref_id="CVE-2022-50567" ref_url="https://www.suse.com/security/cve/CVE-2022-50567/" source="CVE"/>
		<reference ref_id="CVE-2022-50568" ref_url="https://www.suse.com/security/cve/CVE-2022-50568/" source="CVE"/>
		<reference ref_id="CVE-2022-50570" ref_url="https://www.suse.com/security/cve/CVE-2022-50570/" source="CVE"/>
		<reference ref_id="CVE-2022-50572" ref_url="https://www.suse.com/security/cve/CVE-2022-50572/" source="CVE"/>
		<reference ref_id="CVE-2022-50574" ref_url="https://www.suse.com/security/cve/CVE-2022-50574/" source="CVE"/>
		<reference ref_id="CVE-2022-50575" ref_url="https://www.suse.com/security/cve/CVE-2022-50575/" source="CVE"/>
		<reference ref_id="CVE-2022-50576" ref_url="https://www.suse.com/security/cve/CVE-2022-50576/" source="CVE"/>
		<reference ref_id="CVE-2022-50578" ref_url="https://www.suse.com/security/cve/CVE-2022-50578/" source="CVE"/>
		<reference ref_id="CVE-2022-50579" ref_url="https://www.suse.com/security/cve/CVE-2022-50579/" source="CVE"/>
		<reference ref_id="CVE-2022-50580" ref_url="https://www.suse.com/security/cve/CVE-2022-50580/" source="CVE"/>
		<reference ref_id="CVE-2022-50581" ref_url="https://www.suse.com/security/cve/CVE-2022-50581/" source="CVE"/>
		<reference ref_id="CVE-2022-50582" ref_url="https://www.suse.com/security/cve/CVE-2022-50582/" source="CVE"/>
		<reference ref_id="CVE-2023-52923" ref_url="https://www.suse.com/security/cve/CVE-2023-52923/" source="CVE"/>
		<reference ref_id="CVE-2023-53365" ref_url="https://www.suse.com/security/cve/CVE-2023-53365/" source="CVE"/>
		<reference ref_id="CVE-2023-53500" ref_url="https://www.suse.com/security/cve/CVE-2023-53500/" source="CVE"/>
		<reference ref_id="CVE-2023-53533" ref_url="https://www.suse.com/security/cve/CVE-2023-53533/" source="CVE"/>
		<reference ref_id="CVE-2023-53534" ref_url="https://www.suse.com/security/cve/CVE-2023-53534/" source="CVE"/>
		<reference ref_id="CVE-2023-53541" ref_url="https://www.suse.com/security/cve/CVE-2023-53541/" source="CVE"/>
		<reference ref_id="CVE-2023-53542" ref_url="https://www.suse.com/security/cve/CVE-2023-53542/" source="CVE"/>
		<reference ref_id="CVE-2023-53548" ref_url="https://www.suse.com/security/cve/CVE-2023-53548/" source="CVE"/>
		<reference ref_id="CVE-2023-53551" ref_url="https://www.suse.com/security/cve/CVE-2023-53551/" source="CVE"/>
		<reference ref_id="CVE-2023-53552" ref_url="https://www.suse.com/security/cve/CVE-2023-53552/" source="CVE"/>
		<reference ref_id="CVE-2023-53553" ref_url="https://www.suse.com/security/cve/CVE-2023-53553/" source="CVE"/>
		<reference ref_id="CVE-2023-53554" ref_url="https://www.suse.com/security/cve/CVE-2023-53554/" source="CVE"/>
		<reference ref_id="CVE-2023-53556" ref_url="https://www.suse.com/security/cve/CVE-2023-53556/" source="CVE"/>
		<reference ref_id="CVE-2023-53559" ref_url="https://www.suse.com/security/cve/CVE-2023-53559/" source="CVE"/>
		<reference ref_id="CVE-2023-53560" ref_url="https://www.suse.com/security/cve/CVE-2023-53560/" source="CVE"/>
		<reference ref_id="CVE-2023-53564" ref_url="https://www.suse.com/security/cve/CVE-2023-53564/" source="CVE"/>
		<reference ref_id="CVE-2023-53566" ref_url="https://www.suse.com/security/cve/CVE-2023-53566/" source="CVE"/>
		<reference ref_id="CVE-2023-53567" ref_url="https://www.suse.com/security/cve/CVE-2023-53567/" source="CVE"/>
		<reference ref_id="CVE-2023-53568" ref_url="https://www.suse.com/security/cve/CVE-2023-53568/" source="CVE"/>
		<reference ref_id="CVE-2023-53571" ref_url="https://www.suse.com/security/cve/CVE-2023-53571/" source="CVE"/>
		<reference ref_id="CVE-2023-53572" ref_url="https://www.suse.com/security/cve/CVE-2023-53572/" source="CVE"/>
		<reference ref_id="CVE-2023-53574" ref_url="https://www.suse.com/security/cve/CVE-2023-53574/" source="CVE"/>
		<reference ref_id="CVE-2023-53576" ref_url="https://www.suse.com/security/cve/CVE-2023-53576/" source="CVE"/>
		<reference ref_id="CVE-2023-53579" ref_url="https://www.suse.com/security/cve/CVE-2023-53579/" source="CVE"/>
		<reference ref_id="CVE-2023-53582" ref_url="https://www.suse.com/security/cve/CVE-2023-53582/" source="CVE"/>
		<reference ref_id="CVE-2023-53587" ref_url="https://www.suse.com/security/cve/CVE-2023-53587/" source="CVE"/>
		<reference ref_id="CVE-2023-53589" ref_url="https://www.suse.com/security/cve/CVE-2023-53589/" source="CVE"/>
		<reference ref_id="CVE-2023-53592" ref_url="https://www.suse.com/security/cve/CVE-2023-53592/" source="CVE"/>
		<reference ref_id="CVE-2023-53594" ref_url="https://www.suse.com/security/cve/CVE-2023-53594/" source="CVE"/>
		<reference ref_id="CVE-2023-53597" ref_url="https://www.suse.com/security/cve/CVE-2023-53597/" source="CVE"/>
		<reference ref_id="CVE-2023-53603" ref_url="https://www.suse.com/security/cve/CVE-2023-53603/" source="CVE"/>
		<reference ref_id="CVE-2023-53604" ref_url="https://www.suse.com/security/cve/CVE-2023-53604/" source="CVE"/>
		<reference ref_id="CVE-2023-53605" ref_url="https://www.suse.com/security/cve/CVE-2023-53605/" source="CVE"/>
		<reference ref_id="CVE-2023-53607" ref_url="https://www.suse.com/security/cve/CVE-2023-53607/" source="CVE"/>
		<reference ref_id="CVE-2023-53608" ref_url="https://www.suse.com/security/cve/CVE-2023-53608/" source="CVE"/>
		<reference ref_id="CVE-2023-53611" ref_url="https://www.suse.com/security/cve/CVE-2023-53611/" source="CVE"/>
		<reference ref_id="CVE-2023-53612" ref_url="https://www.suse.com/security/cve/CVE-2023-53612/" source="CVE"/>
		<reference ref_id="CVE-2023-53615" ref_url="https://www.suse.com/security/cve/CVE-2023-53615/" source="CVE"/>
		<reference ref_id="CVE-2023-53616" ref_url="https://www.suse.com/security/cve/CVE-2023-53616/" source="CVE"/>
		<reference ref_id="CVE-2023-53617" ref_url="https://www.suse.com/security/cve/CVE-2023-53617/" source="CVE"/>
		<reference ref_id="CVE-2023-53619" ref_url="https://www.suse.com/security/cve/CVE-2023-53619/" source="CVE"/>
		<reference ref_id="CVE-2023-53622" ref_url="https://www.suse.com/security/cve/CVE-2023-53622/" source="CVE"/>
		<reference ref_id="CVE-2023-53625" ref_url="https://www.suse.com/security/cve/CVE-2023-53625/" source="CVE"/>
		<reference ref_id="CVE-2023-53626" ref_url="https://www.suse.com/security/cve/CVE-2023-53626/" source="CVE"/>
		<reference ref_id="CVE-2023-53631" ref_url="https://www.suse.com/security/cve/CVE-2023-53631/" source="CVE"/>
		<reference ref_id="CVE-2023-53637" ref_url="https://www.suse.com/security/cve/CVE-2023-53637/" source="CVE"/>
		<reference ref_id="CVE-2023-53639" ref_url="https://www.suse.com/security/cve/CVE-2023-53639/" source="CVE"/>
		<reference ref_id="CVE-2023-53640" ref_url="https://www.suse.com/security/cve/CVE-2023-53640/" source="CVE"/>
		<reference ref_id="CVE-2023-53641" ref_url="https://www.suse.com/security/cve/CVE-2023-53641/" source="CVE"/>
		<reference ref_id="CVE-2023-53644" ref_url="https://www.suse.com/security/cve/CVE-2023-53644/" source="CVE"/>
		<reference ref_id="CVE-2023-53648" ref_url="https://www.suse.com/security/cve/CVE-2023-53648/" source="CVE"/>
		<reference ref_id="CVE-2023-53650" ref_url="https://www.suse.com/security/cve/CVE-2023-53650/" source="CVE"/>
		<reference ref_id="CVE-2023-53651" ref_url="https://www.suse.com/security/cve/CVE-2023-53651/" source="CVE"/>
		<reference ref_id="CVE-2023-53658" ref_url="https://www.suse.com/security/cve/CVE-2023-53658/" source="CVE"/>
		<reference ref_id="CVE-2023-53659" ref_url="https://www.suse.com/security/cve/CVE-2023-53659/" source="CVE"/>
		<reference ref_id="CVE-2023-53662" ref_url="https://www.suse.com/security/cve/CVE-2023-53662/" source="CVE"/>
		<reference ref_id="CVE-2023-53667" ref_url="https://www.suse.com/security/cve/CVE-2023-53667/" source="CVE"/>
		<reference ref_id="CVE-2023-53668" ref_url="https://www.suse.com/security/cve/CVE-2023-53668/" source="CVE"/>
		<reference ref_id="CVE-2023-53670" ref_url="https://www.suse.com/security/cve/CVE-2023-53670/" source="CVE"/>
		<reference ref_id="CVE-2023-53673" ref_url="https://www.suse.com/security/cve/CVE-2023-53673/" source="CVE"/>
		<reference ref_id="CVE-2023-53674" ref_url="https://www.suse.com/security/cve/CVE-2023-53674/" source="CVE"/>
		<reference ref_id="CVE-2023-53675" ref_url="https://www.suse.com/security/cve/CVE-2023-53675/" source="CVE"/>
		<reference ref_id="CVE-2023-53679" ref_url="https://www.suse.com/security/cve/CVE-2023-53679/" source="CVE"/>
		<reference ref_id="CVE-2023-53680" ref_url="https://www.suse.com/security/cve/CVE-2023-53680/" source="CVE"/>
		<reference ref_id="CVE-2023-53681" ref_url="https://www.suse.com/security/cve/CVE-2023-53681/" source="CVE"/>
		<reference ref_id="CVE-2023-53683" ref_url="https://www.suse.com/security/cve/CVE-2023-53683/" source="CVE"/>
		<reference ref_id="CVE-2023-53687" ref_url="https://www.suse.com/security/cve/CVE-2023-53687/" source="CVE"/>
		<reference ref_id="CVE-2023-53692" ref_url="https://www.suse.com/security/cve/CVE-2023-53692/" source="CVE"/>
		<reference ref_id="CVE-2023-53693" ref_url="https://www.suse.com/security/cve/CVE-2023-53693/" source="CVE"/>
		<reference ref_id="CVE-2023-53695" ref_url="https://www.suse.com/security/cve/CVE-2023-53695/" source="CVE"/>
		<reference ref_id="CVE-2023-53696" ref_url="https://www.suse.com/security/cve/CVE-2023-53696/" source="CVE"/>
		<reference ref_id="CVE-2023-53700" ref_url="https://www.suse.com/security/cve/CVE-2023-53700/" source="CVE"/>
		<reference ref_id="CVE-2023-53704" ref_url="https://www.suse.com/security/cve/CVE-2023-53704/" source="CVE"/>
		<reference ref_id="CVE-2023-53705" ref_url="https://www.suse.com/security/cve/CVE-2023-53705/" source="CVE"/>
		<reference ref_id="CVE-2023-53708" ref_url="https://www.suse.com/security/cve/CVE-2023-53708/" source="CVE"/>
		<reference ref_id="CVE-2023-53709" ref_url="https://www.suse.com/security/cve/CVE-2023-53709/" source="CVE"/>
		<reference ref_id="CVE-2023-53711" ref_url="https://www.suse.com/security/cve/CVE-2023-53711/" source="CVE"/>
		<reference ref_id="CVE-2023-53715" ref_url="https://www.suse.com/security/cve/CVE-2023-53715/" source="CVE"/>
		<reference ref_id="CVE-2023-53717" ref_url="https://www.suse.com/security/cve/CVE-2023-53717/" source="CVE"/>
		<reference ref_id="CVE-2023-53718" ref_url="https://www.suse.com/security/cve/CVE-2023-53718/" source="CVE"/>
		<reference ref_id="CVE-2023-53719" ref_url="https://www.suse.com/security/cve/CVE-2023-53719/" source="CVE"/>
		<reference ref_id="CVE-2023-53722" ref_url="https://www.suse.com/security/cve/CVE-2023-53722/" source="CVE"/>
		<reference ref_id="CVE-2023-53723" ref_url="https://www.suse.com/security/cve/CVE-2023-53723/" source="CVE"/>
		<reference ref_id="CVE-2023-53724" ref_url="https://www.suse.com/security/cve/CVE-2023-53724/" source="CVE"/>
		<reference ref_id="CVE-2023-53725" ref_url="https://www.suse.com/security/cve/CVE-2023-53725/" source="CVE"/>
		<reference ref_id="CVE-2023-53726" ref_url="https://www.suse.com/security/cve/CVE-2023-53726/" source="CVE"/>
		<reference ref_id="CVE-2023-53730" ref_url="https://www.suse.com/security/cve/CVE-2023-53730/" source="CVE"/>
		<reference ref_id="CVE-2023-7324" ref_url="https://www.suse.com/security/cve/CVE-2023-7324/" source="CVE"/>
		<reference ref_id="CVE-2025-39742" ref_url="https://www.suse.com/security/cve/CVE-2025-39742/" source="CVE"/>
		<reference ref_id="CVE-2025-39797" ref_url="https://www.suse.com/security/cve/CVE-2025-39797/" source="CVE"/>
		<reference ref_id="CVE-2025-39945" ref_url="https://www.suse.com/security/cve/CVE-2025-39945/" source="CVE"/>
		<reference ref_id="CVE-2025-39965" ref_url="https://www.suse.com/security/cve/CVE-2025-39965/" source="CVE"/>
		<reference ref_id="CVE-2025-39967" ref_url="https://www.suse.com/security/cve/CVE-2025-39967/" source="CVE"/>
		<reference ref_id="CVE-2025-39968" ref_url="https://www.suse.com/security/cve/CVE-2025-39968/" source="CVE"/>
		<reference ref_id="CVE-2025-39973" ref_url="https://www.suse.com/security/cve/CVE-2025-39973/" source="CVE"/>
		<reference ref_id="CVE-2025-39978" ref_url="https://www.suse.com/security/cve/CVE-2025-39978/" source="CVE"/>
		<reference ref_id="CVE-2025-40018" ref_url="https://www.suse.com/security/cve/CVE-2025-40018/" source="CVE"/>
		<reference ref_id="CVE-2025-40044" ref_url="https://www.suse.com/security/cve/CVE-2025-40044/" source="CVE"/>
		<reference ref_id="CVE-2025-40088" ref_url="https://www.suse.com/security/cve/CVE-2025-40088/" source="CVE"/>
		<reference ref_id="CVE-2025-40102" ref_url="https://www.suse.com/security/cve/CVE-2025-40102/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859).
- CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857).
- CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251164).
- CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
- CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988).
- CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816).
- CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052).
- CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222).
- CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743).
- CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763).
- CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554).
- CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (bsc#1249479).
- CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230).
- CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033).
- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).
- CVE-2025-40044: fs: udf: fix OOB read in lengthAllocDescs handling (bsc#1252785).
- CVE-2025-40088: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() (bsc#1252904).
- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).

The following non security issues were fixed:

- fbcon: Fix OOB access in font allocation (bsc#1252033)
- mm: avoid unnecessary page fault retires on shared memory types (bsc#1251823).
- net: hv_netvsc: fix loss of early receive events from host during channel open (bsc#1252265).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-19"/>
	<updated date="2025-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205128">SUSE bug 1205128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206893">SUSE bug 1206893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207612">SUSE bug 1207612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207619">SUSE bug 1207619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210763">SUSE bug 1210763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211162">SUSE bug 1211162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211692">SUSE bug 1211692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213098">SUSE bug 1213098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213114">SUSE bug 1213114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213747">SUSE bug 1213747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214954">SUSE bug 1214954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214992">SUSE bug 1214992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215148">SUSE bug 1215148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217366">SUSE bug 1217366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236104">SUSE bug 1236104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249479">SUSE bug 1249479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249608">SUSE bug 1249608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249857">SUSE bug 1249857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249859">SUSE bug 1249859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249988">SUSE bug 1249988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250742">SUSE bug 1250742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250816">SUSE bug 1250816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250946">SUSE bug 1250946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251027">SUSE bug 1251027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251032">SUSE bug 1251032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251034">SUSE bug 1251034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251035">SUSE bug 1251035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251040">SUSE bug 1251040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251043">SUSE bug 1251043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251045">SUSE bug 1251045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251047">SUSE bug 1251047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251052">SUSE bug 1251052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251057">SUSE bug 1251057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251059">SUSE bug 1251059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251061">SUSE bug 1251061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251063">SUSE bug 1251063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251064">SUSE bug 1251064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251065">SUSE bug 1251065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251066">SUSE bug 1251066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251068">SUSE bug 1251068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251072">SUSE bug 1251072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251080">SUSE bug 1251080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251082">SUSE bug 1251082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251086">SUSE bug 1251086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251087">SUSE bug 1251087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251088">SUSE bug 1251088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251091">SUSE bug 1251091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251092">SUSE bug 1251092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251093">SUSE bug 1251093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251097">SUSE bug 1251097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251099">SUSE bug 1251099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251101">SUSE bug 1251101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251104">SUSE bug 1251104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251110">SUSE bug 1251110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251113">SUSE bug 1251113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251115">SUSE bug 1251115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251123">SUSE bug 1251123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251128">SUSE bug 1251128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251129">SUSE bug 1251129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251133">SUSE bug 1251133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251136">SUSE bug 1251136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251147">SUSE bug 1251147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251149">SUSE bug 1251149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251154">SUSE bug 1251154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251159">SUSE bug 1251159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251164">SUSE bug 1251164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251166">SUSE bug 1251166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251169">SUSE bug 1251169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251170">SUSE bug 1251170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251173">SUSE bug 1251173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251178">SUSE bug 1251178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251180">SUSE bug 1251180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251182">SUSE bug 1251182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251197">SUSE bug 1251197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251200">SUSE bug 1251200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251201">SUSE bug 1251201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251202">SUSE bug 1251202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251208">SUSE bug 1251208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251210">SUSE bug 1251210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251215">SUSE bug 1251215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251218">SUSE bug 1251218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251222">SUSE bug 1251222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251223">SUSE bug 1251223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251230">SUSE bug 1251230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251247">SUSE bug 1251247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251268">SUSE bug 1251268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251281">SUSE bug 1251281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251282">SUSE bug 1251282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251283">SUSE bug 1251283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251285">SUSE bug 1251285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251286">SUSE bug 1251286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251292">SUSE bug 1251292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251294">SUSE bug 1251294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251295">SUSE bug 1251295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251296">SUSE bug 1251296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251298">SUSE bug 1251298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251299">SUSE bug 1251299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251300">SUSE bug 1251300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251302">SUSE bug 1251302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251303">SUSE bug 1251303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251306">SUSE bug 1251306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251310">SUSE bug 1251310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251312">SUSE bug 1251312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251322">SUSE bug 1251322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251324">SUSE bug 1251324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251325">SUSE bug 1251325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251326">SUSE bug 1251326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251327">SUSE bug 1251327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251329">SUSE bug 1251329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251330">SUSE bug 1251330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251331">SUSE bug 1251331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251519">SUSE bug 1251519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251521">SUSE bug 1251521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251522">SUSE bug 1251522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251527">SUSE bug 1251527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251529">SUSE bug 1251529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251550">SUSE bug 1251550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251723">SUSE bug 1251723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251725">SUSE bug 1251725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251728">SUSE bug 1251728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251730">SUSE bug 1251730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251736">SUSE bug 1251736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251737">SUSE bug 1251737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251741">SUSE bug 1251741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251743">SUSE bug 1251743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251750">SUSE bug 1251750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251753">SUSE bug 1251753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251759">SUSE bug 1251759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251761">SUSE bug 1251761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251762">SUSE bug 1251762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251763">SUSE bug 1251763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251764">SUSE bug 1251764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251767">SUSE bug 1251767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251769">SUSE bug 1251769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251772">SUSE bug 1251772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251775">SUSE bug 1251775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251777">SUSE bug 1251777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251785">SUSE bug 1251785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251823">SUSE bug 1251823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251930">SUSE bug 1251930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251967">SUSE bug 1251967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252033">SUSE bug 1252033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252035">SUSE bug 1252035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252047">SUSE bug 1252047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252069">SUSE bug 1252069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252265">SUSE bug 1252265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252474">SUSE bug 1252474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252475">SUSE bug 1252475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252476">SUSE bug 1252476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252480">SUSE bug 1252480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252484">SUSE bug 1252484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252486">SUSE bug 1252486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252489">SUSE bug 1252489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252490">SUSE bug 1252490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252492">SUSE bug 1252492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252495">SUSE bug 1252495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252497">SUSE bug 1252497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252499">SUSE bug 1252499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252501">SUSE bug 1252501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252508">SUSE bug 1252508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252509">SUSE bug 1252509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252513">SUSE bug 1252513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252515">SUSE bug 1252515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252516">SUSE bug 1252516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252519">SUSE bug 1252519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252521">SUSE bug 1252521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252522">SUSE bug 1252522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252523">SUSE bug 1252523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252526">SUSE bug 1252526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252528">SUSE bug 1252528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252529">SUSE bug 1252529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252532">SUSE bug 1252532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252535">SUSE bug 1252535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252536">SUSE bug 1252536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252537">SUSE bug 1252537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252538">SUSE bug 1252538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252539">SUSE bug 1252539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252542">SUSE bug 1252542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252545">SUSE bug 1252545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252549">SUSE bug 1252549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252554">SUSE bug 1252554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252560">SUSE bug 1252560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252564">SUSE bug 1252564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252565">SUSE bug 1252565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252568">SUSE bug 1252568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252634">SUSE bug 1252634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252688">SUSE bug 1252688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252785">SUSE bug 1252785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252893">SUSE bug 1252893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252904">SUSE bug 1252904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252919">SUSE bug 1252919</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50327/">CVE-2022-50327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50327">CVE-2022-50327 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50334/">CVE-2022-50334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50334">CVE-2022-50334 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50470/">CVE-2022-50470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50470">CVE-2022-50470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50471/">CVE-2022-50471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50471">CVE-2022-50471 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50472/">CVE-2022-50472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50472">CVE-2022-50472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50475/">CVE-2022-50475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50475">CVE-2022-50475 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50478/">CVE-2022-50478 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50478">CVE-2022-50478 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50480/">CVE-2022-50480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50480">CVE-2022-50480 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50482/">CVE-2022-50482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50482">CVE-2022-50482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50484/">CVE-2022-50484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50484">CVE-2022-50484 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50485/">CVE-2022-50485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50485">CVE-2022-50485 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50487/">CVE-2022-50487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50487">CVE-2022-50487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50488/">CVE-2022-50488 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50488">CVE-2022-50488 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50489/">CVE-2022-50489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50489">CVE-2022-50489 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50490/">CVE-2022-50490 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50490">CVE-2022-50490 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50492/">CVE-2022-50492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50492">CVE-2022-50492 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50493/">CVE-2022-50493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50493">CVE-2022-50493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50494/">CVE-2022-50494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50494">CVE-2022-50494 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50496/">CVE-2022-50496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50496">CVE-2022-50496 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50497/">CVE-2022-50497 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50497">CVE-2022-50497 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50498/">CVE-2022-50498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50498">CVE-2022-50498 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50499/">CVE-2022-50499 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50499">CVE-2022-50499 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50501/">CVE-2022-50501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50501">CVE-2022-50501 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50503/">CVE-2022-50503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50503">CVE-2022-50503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50504/">CVE-2022-50504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50504">CVE-2022-50504 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50505/">CVE-2022-50505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50505">CVE-2022-50505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50509/">CVE-2022-50509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50509">CVE-2022-50509 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50511/">CVE-2022-50511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50511">CVE-2022-50511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50512/">CVE-2022-50512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50512">CVE-2022-50512 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50513/">CVE-2022-50513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50513">CVE-2022-50513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50514/">CVE-2022-50514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50514">CVE-2022-50514 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50516/">CVE-2022-50516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50516">CVE-2022-50516 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50519/">CVE-2022-50519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50519">CVE-2022-50519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50520/">CVE-2022-50520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50520">CVE-2022-50520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50521/">CVE-2022-50521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50521">CVE-2022-50521 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50523/">CVE-2022-50523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50523">CVE-2022-50523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50525/">CVE-2022-50525 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50525">CVE-2022-50525 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50528/">CVE-2022-50528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50528">CVE-2022-50528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50529/">CVE-2022-50529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50529">CVE-2022-50529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50530/">CVE-2022-50530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50530">CVE-2022-50530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50532/">CVE-2022-50532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50532">CVE-2022-50532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50534/">CVE-2022-50534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50534">CVE-2022-50534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50535/">CVE-2022-50535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50535">CVE-2022-50535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50537/">CVE-2022-50537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50537">CVE-2022-50537 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50541/">CVE-2022-50541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50541">CVE-2022-50541 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50542/">CVE-2022-50542 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50542">CVE-2022-50542 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50544/">CVE-2022-50544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50544">CVE-2022-50544 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50545/">CVE-2022-50545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50545">CVE-2022-50545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50546/">CVE-2022-50546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50546">CVE-2022-50546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50549/">CVE-2022-50549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50549">CVE-2022-50549 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50551/">CVE-2022-50551 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50551">CVE-2022-50551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50553/">CVE-2022-50553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50553">CVE-2022-50553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50556/">CVE-2022-50556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50556">CVE-2022-50556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50559/">CVE-2022-50559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50559">CVE-2022-50559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50560/">CVE-2022-50560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50560">CVE-2022-50560 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50561/">CVE-2022-50561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50561">CVE-2022-50561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50562/">CVE-2022-50562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50562">CVE-2022-50562 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50563/">CVE-2022-50563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50563">CVE-2022-50563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50564/">CVE-2022-50564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50564">CVE-2022-50564 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50566/">CVE-2022-50566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50566">CVE-2022-50566 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50567/">CVE-2022-50567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50567">CVE-2022-50567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50568/">CVE-2022-50568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50568">CVE-2022-50568 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50570/">CVE-2022-50570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50570">CVE-2022-50570 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50572/">CVE-2022-50572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50572">CVE-2022-50572 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50574/">CVE-2022-50574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50574">CVE-2022-50574 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50575/">CVE-2022-50575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50575">CVE-2022-50575 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50576/">CVE-2022-50576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50576">CVE-2022-50576 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50578/">CVE-2022-50578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50578">CVE-2022-50578 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50579/">CVE-2022-50579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50579">CVE-2022-50579 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50580/">CVE-2022-50580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50580">CVE-2022-50580 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50581/">CVE-2022-50581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50581">CVE-2022-50581 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50582/">CVE-2022-50582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50582">CVE-2022-50582 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52923/">CVE-2023-52923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52923">CVE-2023-52923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53365/">CVE-2023-53365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53365">CVE-2023-53365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53500/">CVE-2023-53500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53500">CVE-2023-53500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53533/">CVE-2023-53533 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53533">CVE-2023-53533 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53534/">CVE-2023-53534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53534">CVE-2023-53534 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53541/">CVE-2023-53541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53541">CVE-2023-53541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53542/">CVE-2023-53542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53542">CVE-2023-53542 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53548/">CVE-2023-53548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53548">CVE-2023-53548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53551/">CVE-2023-53551 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53551">CVE-2023-53551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53552/">CVE-2023-53552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53552">CVE-2023-53552 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53553/">CVE-2023-53553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53553">CVE-2023-53553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53554/">CVE-2023-53554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53554">CVE-2023-53554 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53556/">CVE-2023-53556 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53556">CVE-2023-53556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53559/">CVE-2023-53559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53559">CVE-2023-53559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53560/">CVE-2023-53560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53560">CVE-2023-53560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53564/">CVE-2023-53564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53564">CVE-2023-53564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53566/">CVE-2023-53566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53566">CVE-2023-53566 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53567/">CVE-2023-53567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53567">CVE-2023-53567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53568/">CVE-2023-53568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53568">CVE-2023-53568 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53571/">CVE-2023-53571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53571">CVE-2023-53571 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53572/">CVE-2023-53572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53572">CVE-2023-53572 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53574/">CVE-2023-53574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53574">CVE-2023-53574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53576/">CVE-2023-53576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53576">CVE-2023-53576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53579/">CVE-2023-53579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53579">CVE-2023-53579 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53582/">CVE-2023-53582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53582">CVE-2023-53582 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53587/">CVE-2023-53587 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53587">CVE-2023-53587 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53589/">CVE-2023-53589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53589">CVE-2023-53589 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53592/">CVE-2023-53592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53592">CVE-2023-53592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53594/">CVE-2023-53594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53594">CVE-2023-53594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53597/">CVE-2023-53597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53597">CVE-2023-53597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53603/">CVE-2023-53603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53603">CVE-2023-53603 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53604/">CVE-2023-53604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53604">CVE-2023-53604 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53605/">CVE-2023-53605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53605">CVE-2023-53605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53607/">CVE-2023-53607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53607">CVE-2023-53607 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53608/">CVE-2023-53608 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53608">CVE-2023-53608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53611/">CVE-2023-53611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53611">CVE-2023-53611 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53612/">CVE-2023-53612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53612">CVE-2023-53612 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53615/">CVE-2023-53615 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53615">CVE-2023-53615 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53616/">CVE-2023-53616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53616">CVE-2023-53616 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53617/">CVE-2023-53617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53617">CVE-2023-53617 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53619/">CVE-2023-53619 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53619">CVE-2023-53619 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53622/">CVE-2023-53622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53622">CVE-2023-53622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53625/">CVE-2023-53625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53625">CVE-2023-53625 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53626/">CVE-2023-53626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53626">CVE-2023-53626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53631/">CVE-2023-53631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53631">CVE-2023-53631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53637/">CVE-2023-53637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53637">CVE-2023-53637 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53639/">CVE-2023-53639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53639">CVE-2023-53639 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53640/">CVE-2023-53640 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53640">CVE-2023-53640 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53641/">CVE-2023-53641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53641">CVE-2023-53641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53644/">CVE-2023-53644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53644">CVE-2023-53644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53648/">CVE-2023-53648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53648">CVE-2023-53648 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53650/">CVE-2023-53650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53650">CVE-2023-53650 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53651/">CVE-2023-53651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53651">CVE-2023-53651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53658/">CVE-2023-53658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53658">CVE-2023-53658 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53659/">CVE-2023-53659 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53659">CVE-2023-53659 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53662/">CVE-2023-53662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53662">CVE-2023-53662 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53667/">CVE-2023-53667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53667">CVE-2023-53667 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53668/">CVE-2023-53668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53668">CVE-2023-53668 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53670/">CVE-2023-53670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53670">CVE-2023-53670 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53673/">CVE-2023-53673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53673">CVE-2023-53673 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53674/">CVE-2023-53674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53674">CVE-2023-53674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53675/">CVE-2023-53675 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53675">CVE-2023-53675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53679/">CVE-2023-53679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53679">CVE-2023-53679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53680/">CVE-2023-53680 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53680">CVE-2023-53680 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53681/">CVE-2023-53681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53681">CVE-2023-53681 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53683/">CVE-2023-53683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53683">CVE-2023-53683 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53687/">CVE-2023-53687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53687">CVE-2023-53687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53692/">CVE-2023-53692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53692">CVE-2023-53692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53693/">CVE-2023-53693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53693">CVE-2023-53693 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53695/">CVE-2023-53695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53695">CVE-2023-53695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53696/">CVE-2023-53696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53696">CVE-2023-53696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53700/">CVE-2023-53700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53700">CVE-2023-53700 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53704/">CVE-2023-53704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53704">CVE-2023-53704 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53705/">CVE-2023-53705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53705">CVE-2023-53705 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53708/">CVE-2023-53708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53708">CVE-2023-53708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53709/">CVE-2023-53709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53709">CVE-2023-53709 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53711/">CVE-2023-53711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53711">CVE-2023-53711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53715/">CVE-2023-53715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53715">CVE-2023-53715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53717/">CVE-2023-53717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53717">CVE-2023-53717 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53718/">CVE-2023-53718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53718">CVE-2023-53718 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53719/">CVE-2023-53719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53719">CVE-2023-53719 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53722/">CVE-2023-53722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53722">CVE-2023-53722 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53723/">CVE-2023-53723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53723">CVE-2023-53723 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53724/">CVE-2023-53724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53724">CVE-2023-53724 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53725/">CVE-2023-53725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53725">CVE-2023-53725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53726/">CVE-2023-53726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53726">CVE-2023-53726 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53730/">CVE-2023-53730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53730">CVE-2023-53730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-7324/">CVE-2023-7324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7324">CVE-2023-7324 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39742/">CVE-2025-39742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39797/">CVE-2025-39797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39945/">CVE-2025-39945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39945">CVE-2025-39945 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39965/">CVE-2025-39965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39965">CVE-2025-39965 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39967/">CVE-2025-39967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39967">CVE-2025-39967 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39968/">CVE-2025-39968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39968">CVE-2025-39968 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39973/">CVE-2025-39973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39973">CVE-2025-39973 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39978/">CVE-2025-39978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39978">CVE-2025-39978 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40018/">CVE-2025-40018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40018">CVE-2025-40018 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40044/">CVE-2025-40044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40088/">CVE-2025-40088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40088">CVE-2025-40088 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40102/">CVE-2025-40102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40102">CVE-2025-40102 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030031" comment="kernel-rt-5.14.21-150400.15.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030032" comment="kernel-source-rt-5.14.21-150400.15.136.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206423" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1253542" ref_url="https://bugzilla.suse.com/1253542" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023313.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2025-47913: golang.org/x/crypto/ssh/agent: Fixed client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253542)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-21"/>
	<updated date="2025-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253542">SUSE bug 1253542</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030609" comment="podman-4.9.5-150400.4.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030610" comment="podman-remote-4.9.5-150400.4.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206424" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1244325" ref_url="https://bugzilla.suse.com/1244325" source="BUGZILLA"/>
		<reference ref_id="1251827" ref_url="https://bugzilla.suse.com/1251827" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11561" ref_url="https://www.suse.com/security/cve/CVE-2025-11561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023321.html" source="SUSE-SU"/>
		<description>
This update for sssd fixes the following issues:

- CVE-2025-11561: Fixed privilege escalation on AD-joined Linux systems due
  to default Kerberos configuration disabling localauth an2ln plugin (bsc#1251827)

Other fixes:

- Install file in krb5.conf.d to include sssd krb5 config snippets (bsc#1244325)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-24"/>
	<updated date="2025-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1244325">SUSE bug 1244325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251827">SUSE bug 1251827</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11561/">CVE-2025-11561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11561">CVE-2025-11561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031386" comment="libsss_certmap0-2.5.2-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031387" comment="libsss_idmap0-2.5.2-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031388" comment="libsss_nss_idmap0-2.5.2-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031389" comment="sssd-2.5.2-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031390" comment="sssd-common-2.5.2-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031391" comment="sssd-krb5-common-2.5.2-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031392" comment="sssd-ldap-2.5.2-150400.4.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206425" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1252931" ref_url="https://bugzilla.suse.com/1252931" source="BUGZILLA"/>
		<reference ref_id="1252932" ref_url="https://bugzilla.suse.com/1252932" source="BUGZILLA"/>
		<reference ref_id="1252933" ref_url="https://bugzilla.suse.com/1252933" source="BUGZILLA"/>
		<reference ref_id="1252934" ref_url="https://bugzilla.suse.com/1252934" source="BUGZILLA"/>
		<reference ref_id="1252935" ref_url="https://bugzilla.suse.com/1252935" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-54771" ref_url="https://www.suse.com/security/cve/CVE-2025-54771/" source="CVE"/>
		<reference ref_id="CVE-2025-61661" ref_url="https://www.suse.com/security/cve/CVE-2025-61661/" source="CVE"/>
		<reference ref_id="CVE-2025-61662" ref_url="https://www.suse.com/security/cve/CVE-2025-61662/" source="CVE"/>
		<reference ref_id="CVE-2025-61663" ref_url="https://www.suse.com/security/cve/CVE-2025-61663/" source="CVE"/>
		<reference ref_id="CVE-2025-61664" ref_url="https://www.suse.com/security/cve/CVE-2025-61664/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2025-54771: Fixed rub_file_close() does not properly controls the fs refcount (bsc#1252931) 
- CVE-2025-61661: Fixed out-of-bounds write in grub_usb_get_string() function (bsc#1252932)
- CVE-2025-61662: Fixed missing unregister call for gettext command may lead to use-after-free (bsc#1252933) 
- CVE-2025-61663: Fixed missing unregister call for normal commands may lead to use-after-free (bsc#1252934)
- CVE-2025-61664: Fixed missing unregister call for normal_exit command may lead to use-after-free (bsc#1252935)

Other fixes:

- Bump upstream SBAT generation to 6
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2025-11-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1252931">SUSE bug 1252931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252932">SUSE bug 1252932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252933">SUSE bug 1252933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252934">SUSE bug 1252934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252935">SUSE bug 1252935</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54771/">CVE-2025-54771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54771">CVE-2025-54771 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="4.3/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61661/">CVE-2025-61661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61661">CVE-2025-61661 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61662/">CVE-2025-61662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61662">CVE-2025-61662 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61663/">CVE-2025-61663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61663">CVE-2025-61663 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61664/">CVE-2025-61664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61664">CVE-2025-61664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031393" comment="grub2-2.06-150400.11.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031394" comment="grub2-arm64-efi-2.06-150400.11.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030938" comment="grub2-i386-pc-2.06-150400.11.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031395" comment="grub2-s390x-emu-2.06-150400.11.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030939" comment="grub2-snapper-plugin-2.06-150400.11.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030941" comment="grub2-x86_64-efi-2.06-150400.11.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030942" comment="grub2-x86_64-xen-2.06-150400.11.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206426" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1253126" ref_url="https://bugzilla.suse.com/1253126" source="BUGZILLA"/>
		<reference ref_id="1253132" ref_url="https://bugzilla.suse.com/1253132" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25621" ref_url="https://www.suse.com/security/cve/CVE-2024-25621/" source="CVE"/>
		<reference ref_id="CVE-2025-64329" ref_url="https://www.suse.com/security/cve/CVE-2025-64329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023426.html" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

- Update to containerd v1.7.29
- CVE-2024-25621: Fixed an overly broad default permission vulnerability. (bsc#1253126)
- CVE-2025-64329: Fixed a goroutine leaks which can lead to memory exhaustion on the host. (bsc#1253132)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1253126">SUSE bug 1253126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253132">SUSE bug 1253132</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-25621/">CVE-2024-25621 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25621">CVE-2024-25621 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64329/">CVE-2025-64329 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64329">CVE-2025-64329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032138" comment="containerd-1.7.29-150000.128.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206427" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234225" ref_url="https://bugzilla.suse.com/1234225" source="BUGZILLA"/>
		<reference ref_id="1244057" ref_url="https://bugzilla.suse.com/1244057" source="BUGZILLA"/>
		<reference ref_id="1253783" ref_url="https://bugzilla.suse.com/1253783" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-58436" ref_url="https://www.suse.com/security/cve/CVE-2025-58436/" source="CVE"/>
		<reference ref_id="CVE-2025-61915" ref_url="https://www.suse.com/security/cve/CVE-2025-61915/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023424.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2025-61915: Fixed a local denial-of-service via cupsd.conf update and related issues. (bsc#1253783)
- CVE-2025-58436: Fixed an issue where a slow client communication leads to a possible DoS attack. (bsc#1244057)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1234225">SUSE bug 1234225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244057">SUSE bug 1244057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253783">SUSE bug 1253783</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58436/">CVE-2025-58436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58436">CVE-2025-58436 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61915/">CVE-2025-61915 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61915">CVE-2025-61915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032139" comment="cups-config-2.2.7-150000.3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032140" comment="libcups2-2.2.7-150000.3.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206428" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1253757" ref_url="https://bugzilla.suse.com/1253757" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11563" ref_url="https://www.suse.com/security/cve/CVE-2025-11563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023437.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2025-11563: Fixed wcurl path traversal with percent-encoded slashes (bsc#1253757)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1253757">SUSE bug 1253757</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11563/">CVE-2025-11563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11563">CVE-2025-11563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032141" comment="curl-8.14.1-150400.5.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032142" comment="libcurl4-8.14.1-150400.5.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206429" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254353" ref_url="https://bugzilla.suse.com/1254353" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-58436" ref_url="https://www.suse.com/security/cve/CVE-2025-58436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023444.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- The fix for CVE-2025-58436 causes a regression where
  GTK applications will hang. (bsc#1254353)

  See also https://github.com/OpenPrinting/cups/issues/1429

  The fix has been temporary disabled.
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-03"/>
	<updated date="2025-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254353">SUSE bug 1254353</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58436/">CVE-2025-58436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58436">CVE-2025-58436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032522" comment="cups-config-2.2.7-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032523" comment="libcups2-2.2.7-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206430" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1193914" ref_url="https://bugzilla.suse.com/1193914" source="BUGZILLA"/>
		<reference ref_id="1201944" ref_url="https://bugzilla.suse.com/1201944" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020313.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2021-3611: Fixed segmentation fault due to stack overflow (bsc#1193914).

Other fixes:

- qemu.spec: mark bridge.conf as noreplace (bsc#1201944).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2025-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193914">SUSE bug 1193914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201944">SUSE bug 1201944</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3611">CVE-2021-3611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963626" comment="qemu-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963515" comment="qemu-accel-tcg-x86-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963627" comment="qemu-arm-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963628" comment="qemu-audio-spice-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963629" comment="qemu-chardev-spice-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963630" comment="qemu-guest-agent-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963631" comment="qemu-hw-display-qxl-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963632" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963633" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963634" comment="qemu-hw-usb-redirect-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963532" comment="qemu-ipxe-1.0.0+-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963635" comment="qemu-s390x-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963536" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963537" comment="qemu-sgabios-8-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963636" comment="qemu-tools-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963637" comment="qemu-ui-opengl-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963638" comment="qemu-ui-spice-core-6.2.0-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963544" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963545" comment="qemu-x86-6.2.0-150400.37.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206431" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1249055" ref_url="https://bugzilla.suse.com/1249055" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-7039" ref_url="https://www.suse.com/security/cve/CVE-2025-7039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023497.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2025-7039: Fixed buffer under-read on glib through glib/gfileutils.c via get_tmp_file() (bsc#1249055)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2025-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1249055">SUSE bug 1249055</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7039/">CVE-2025-7039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7039">CVE-2025-7039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032879" comment="glib2-tools-2.70.5-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032880" comment="libgio-2_0-0-2.70.5-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032881" comment="libglib-2_0-0-2.70.5-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032882" comment="libgmodule-2_0-0-2.70.5-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032883" comment="libgobject-2_0-0-2.70.5-150400.3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206432" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1251305" ref_url="https://bugzilla.suse.com/1251305" source="BUGZILLA"/>
		<reference ref_id="1252974" ref_url="https://bugzilla.suse.com/1252974" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023523.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2025-6075: quadratic complexity in `os.path.expandvars()` can lead to performance degradation when values passed
  to it are user-controlled (bsc#1252974).
- CVE-2025-8291: lack of validity checks on the ZIP64 End of Central Directory (EOCD) record allows for the creation of
  ZIP archives that are processed inconsistently by the `zipfile` module (bsc#1251305).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-11"/>
	<updated date="2025-12-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1251305">SUSE bug 1251305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252974">SUSE bug 1252974</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033194" comment="libpython3_6m1_0-3.6.15-150300.10.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033195" comment="python3-3.6.15-150300.10.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033196" comment="python3-base-3.6.15-150300.10.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206433" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1229950" ref_url="https://bugzilla.suse.com/1229950" source="BUGZILLA"/>
		<reference ref_id="1243867" ref_url="https://bugzilla.suse.com/1243867" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224/" source="CVE"/>
		<reference ref_id="CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023562.html" source="SUSE-SU"/>
		<description>
This update for librsvg fixes the following issues:

Update to version 2.52.12.
  
- CVE-2024-12224: idna: incorrect hostname comparisons and URL parsing may be performed due to acceptance of Punycode
  labels that do not produce any non-ASCII output when decoded (bsc#1243867).
- CVE-2024-43806: rustix: unbounded memory explosion leading to an application OOM crash when using the `rustix::fs::Dir`
  iterator with the `linux_raw` backend (bsc#1229950).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-16"/>
	<updated date="2025-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229950">SUSE bug 1229950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243867">SUSE bug 1243867</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033767" comment="gdk-pixbuf-loader-rsvg-2.52.12-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033768" comment="librsvg-2-2-2.52.12-150400.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206434" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1244057" ref_url="https://bugzilla.suse.com/1244057" source="BUGZILLA"/>
		<reference ref_id="1254353" ref_url="https://bugzilla.suse.com/1254353" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-58436" ref_url="https://www.suse.com/security/cve/CVE-2025-58436/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023570.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

Security issues fixed:

- CVE-2025-58436: single client sending slow messages to cupsd can delay the application and make it unusable for other
  clients (bsc#1244057).

Other issues fixed:    
    
- Update the CVE-2025-58436 patch to fix a regression that causes GTK applications to hang (bsc#1254353).
  		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-17"/>
	<updated date="2025-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1244057">SUSE bug 1244057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254353">SUSE bug 1254353</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58436/">CVE-2025-58436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58436">CVE-2025-58436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034188" comment="cups-config-2.2.7-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034189" comment="libcups2-2.2.7-150000.3.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206435" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254157" ref_url="https://bugzilla.suse.com/1254157" source="BUGZILLA"/>
		<reference ref_id="1254158" ref_url="https://bugzilla.suse.com/1254158" source="BUGZILLA"/>
		<reference ref_id="1254159" ref_url="https://bugzilla.suse.com/1254159" source="BUGZILLA"/>
		<reference ref_id="1254160" ref_url="https://bugzilla.suse.com/1254160" source="BUGZILLA"/>
		<reference ref_id="1254480" ref_url="https://bugzilla.suse.com/1254480" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-64505" ref_url="https://www.suse.com/security/cve/CVE-2025-64505/" source="CVE"/>
		<reference ref_id="CVE-2025-64506" ref_url="https://www.suse.com/security/cve/CVE-2025-64506/" source="CVE"/>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2025-66293" ref_url="https://www.suse.com/security/cve/CVE-2025-66293/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<description>
This update for libpng16 fixes the following issues:

- CVE-2025-65018: Fixed heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read` (bsc#1254160)
- CVE-2025-66293: Fixed LIBPNG out-of-bounds read in `png_image_read_composite` (bsc#1254480)
- CVE-2025-64506: Fixed heap buffer over-read in `png_write_image_8bit` with 8-bit input and `convert_to_8bit` enabled (bsc#1254158)
- CVE-2025-64720: Fixed buffer overflow in `png_image_read_composite` via incorrect palette premultiplication (bsc#1254159)
- CVE-2025-64505: Fixed heap buffer over-read in `png_do_quantize` via malformed palette index (bsc#1254157)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-17"/>
	<updated date="2025-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254157">SUSE bug 1254157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254158">SUSE bug 1254158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254159">SUSE bug 1254159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254160">SUSE bug 1254160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254480">SUSE bug 1254480</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64505/">CVE-2025-64505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64505">CVE-2025-64505 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64506/">CVE-2025-64506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64506">CVE-2025-64506 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66293/">CVE-2025-66293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66293">CVE-2025-66293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034190" comment="libpng16-16-1.6.34-150000.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206436" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1227207" ref_url="https://bugzilla.suse.com/1227207" source="BUGZILLA"/>
		<reference ref_id="1250520" ref_url="https://bugzilla.suse.com/1250520" source="BUGZILLA"/>
		<reference ref_id="1250755" ref_url="https://bugzilla.suse.com/1250755" source="BUGZILLA"/>
		<reference ref_id="1251776" ref_url="https://bugzilla.suse.com/1251776" source="BUGZILLA"/>
		<reference ref_id="1252244" ref_url="https://bugzilla.suse.com/1252244" source="BUGZILLA"/>
		<reference ref_id="1252285" ref_url="https://bugzilla.suse.com/1252285" source="BUGZILLA"/>
		<reference ref_id="1254256" ref_url="https://bugzilla.suse.com/1254256" source="BUGZILLA"/>
		<reference ref_id="1254257" ref_url="https://bugzilla.suse.com/1254257" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-62348" ref_url="https://www.suse.com/security/cve/CVE-2025-62348/" source="CVE"/>
		<reference ref_id="CVE-2025-62349" ref_url="https://www.suse.com/security/cve/CVE-2025-62349/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023619.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Security issues fixed:

  - CVE-2025-62349: Added minimum_auth_version to enforce security (bsc#1254257)
  - CVE-2025-62348: Fixed Junos module yaml loader (bsc#1254256)
  - Backport security fixes for vendored tornado
    * BDSA-2024-3438
    * BDSA-2024-3439
    * BDSA-2024-9026

- Other changes and bugs fixed:

  - Fixed TLS and x509 modules for OSes with older cryptography module
  - Fixed Salt for Python &gt; 3.11 (bsc#1252285) (bsc#1252244)
    * Use external tornado on Python &gt; 3.11
    * Make tls and x509 to use python-cryptography
    * Remove usage of spwd
  - Fixed payload signature verification on Tumbleweed (bsc#1251776)
  - Fixed broken symlink on migration to Leap 16.0 (bsc#1250755)
  - Fixed known_hosts error on gitfs (bsc#1250520) (bsc#1227207)
  - Improved SL Micro 6.2 detection with grains
  - Reverted requirement of M2Crypto &gt;= 0.44.0 for SUSE Family distros
  - Set python-CherryPy as required for python-salt-testsuite

		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227207">SUSE bug 1227207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250520">SUSE bug 1250520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250755">SUSE bug 1250755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251776">SUSE bug 1251776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252244">SUSE bug 1252244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252285">SUSE bug 1252285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254256">SUSE bug 1254256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254257">SUSE bug 1254257</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62348/">CVE-2025-62348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62348">CVE-2025-62348 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62349/">CVE-2025-62349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62349">CVE-2025-62349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034544" comment="python3-salt-3006.0-150400.8.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034545" comment="salt-3006.0-150400.8.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034546" comment="salt-minion-3006.0-150400.8.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034547" comment="salt-transactional-update-3006.0-150400.8.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206437" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254297" ref_url="https://bugzilla.suse.com/1254297" source="BUGZILLA"/>
		<reference ref_id="1254662" ref_url="https://bugzilla.suse.com/1254662" source="BUGZILLA"/>
		<reference ref_id="1254878" ref_url="https://bugzilla.suse.com/1254878" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13601" ref_url="https://www.suse.com/security/cve/CVE-2025-13601/" source="CVE"/>
		<reference ref_id="CVE-2025-14087" ref_url="https://www.suse.com/security/cve/CVE-2025-14087/" source="CVE"/>
		<reference ref_id="CVE-2025-14512" ref_url="https://www.suse.com/security/cve/CVE-2025-14512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023641.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote
  filesystem attribute values can lead to denial-of-service (bsc#1254878).
- CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when
  processing attacker-influenced data may lead to crash or code execution (bsc#1254662).
- CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a
  large number of unacceptable characters may lead to crash or code execution (bsc#1254297).

  		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-22"/>
	<updated date="2025-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254297">SUSE bug 1254297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254662">SUSE bug 1254662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254878">SUSE bug 1254878</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13601/">CVE-2025-13601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13601">CVE-2025-13601 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14087/">CVE-2025-14087 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14087">CVE-2025-14087 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14512/">CVE-2025-14512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14512">CVE-2025-14512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034872" comment="glib2-tools-2.70.5-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034873" comment="libgio-2_0-0-2.70.5-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034874" comment="libglib-2_0-0-2.70.5-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034875" comment="libgmodule-2_0-0-2.70.5-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034876" comment="libgobject-2_0-0-2.70.5-150400.3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206438" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254132" ref_url="https://bugzilla.suse.com/1254132" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-9820" ref_url="https://www.suse.com/security/cve/CVE-2025-9820/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:4525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023657.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2025-9820: Fixed buffer overflow in gnutls_pkcs11_token_init. (bsc#1254132)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-12-26"/>
	<updated date="2025-12-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254132">SUSE bug 1254132</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9820/">CVE-2025-9820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9820">CVE-2025-9820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035436" comment="gnutls-3.7.3-150400.4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035437" comment="libgnutls30-3.7.3-150400.4.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035438" comment="libgnutls30-hmac-3.7.3-150400.4.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206439" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218879" ref_url="https://bugzilla.suse.com/1218879" source="BUGZILLA"/>
		<reference ref_id="1218880" ref_url="https://bugzilla.suse.com/1218880" source="BUGZILLA"/>
		<reference ref_id="1218881" ref_url="https://bugzilla.suse.com/1218881" source="BUGZILLA"/>
		<reference ref_id="1218882" ref_url="https://bugzilla.suse.com/1218882" source="BUGZILLA"/>
		<reference ref_id="1218883" ref_url="https://bugzilla.suse.com/1218883" source="BUGZILLA"/>
		<reference ref_id="1218884" ref_url="https://bugzilla.suse.com/1218884" source="BUGZILLA"/>
		<reference ref_id="1218885" ref_url="https://bugzilla.suse.com/1218885" source="BUGZILLA"/>
		<reference ref_id="1218886" ref_url="https://bugzilla.suse.com/1218886" source="BUGZILLA"/>
		<reference ref_id="1218887" ref_url="https://bugzilla.suse.com/1218887" source="BUGZILLA"/>
		<reference ref_id="1225889" ref_url="https://bugzilla.suse.com/1225889" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45229" ref_url="https://www.suse.com/security/cve/CVE-2023-45229/" source="CVE"/>
		<reference ref_id="CVE-2023-45230" ref_url="https://www.suse.com/security/cve/CVE-2023-45230/" source="CVE"/>
		<reference ref_id="CVE-2023-45231" ref_url="https://www.suse.com/security/cve/CVE-2023-45231/" source="CVE"/>
		<reference ref_id="CVE-2023-45232" ref_url="https://www.suse.com/security/cve/CVE-2023-45232/" source="CVE"/>
		<reference ref_id="CVE-2023-45233" ref_url="https://www.suse.com/security/cve/CVE-2023-45233/" source="CVE"/>
		<reference ref_id="CVE-2023-45234" ref_url="https://www.suse.com/security/cve/CVE-2023-45234/" source="CVE"/>
		<reference ref_id="CVE-2023-45235" ref_url="https://www.suse.com/security/cve/CVE-2023-45235/" source="CVE"/>
		<reference ref_id="CVE-2023-45236" ref_url="https://www.suse.com/security/cve/CVE-2023-45236/" source="CVE"/>
		<reference ref_id="CVE-2023-45237" ref_url="https://www.suse.com/security/cve/CVE-2023-45237/" source="CVE"/>
		<reference ref_id="CVE-2024-1298" ref_url="https://www.suse.com/security/cve/CVE-2024-1298/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020334.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2024-1298: potential division-by-zero crash in edk2 due to UINT32 overflow in S3 ResumeCount. (bsc#1225889)
- CVE-2023-45229: out-of-bounds read in edk2 when processing IA_NA/IA_TA options in DHCPv6 Advertise messages.
  (bsc#1218879)
- CVE-2023-45230: buffer overflow in the DHCPv6 client in edk2 via a long Server ID option. (bsc#1218880)
- CVE-2023-45231: out-of-bounds read in edk2 when handling a ND Redirect message with truncated options. (bsc#1218881)
- CVE-2023-45232: infinite loop in edk2 when parsing unknown options in the Destination Options header. (bsc#1218882)
- CVE-2023-45233: infinite loop in edk2 when parsing PadN options in the Destination Options header. (bsc#1218883)
- CVE-2023-45234: buffer overflow in edk2 when processing DNS Servers options in a DHCPv6 Advertise message.
  (bsc#1218884)
- CVE-2023-45235: buffer overflow in edk2 when handling the Server ID option in a DHCPv6 proxy Advertise message.
  (bsc#1218885)
- CVE-2023-45236: predictable TCP Initial Sequence Numbers in edk2 network packages. (bsc#1218886)
- CVE-2023-45237: use of a weak pseudorandom number generator in edk2. (bsc#1218887)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-13"/>
	<updated date="2025-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218879">SUSE bug 1218879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218880">SUSE bug 1218880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218881">SUSE bug 1218881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218882">SUSE bug 1218882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218883">SUSE bug 1218883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218884">SUSE bug 1218884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218885">SUSE bug 1218885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218886">SUSE bug 1218886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218887">SUSE bug 1218887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225889">SUSE bug 1225889</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45229/">CVE-2023-45229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45229">CVE-2023-45229 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45230/">CVE-2023-45230 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45230">CVE-2023-45230 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45231/">CVE-2023-45231 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45231">CVE-2023-45231 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45232/">CVE-2023-45232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45232">CVE-2023-45232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45233/">CVE-2023-45233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45233">CVE-2023-45233 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45234/">CVE-2023-45234 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45234">CVE-2023-45234 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45235/">CVE-2023-45235 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45235">CVE-2023-45235 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45236/">CVE-2023-45236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45236">CVE-2023-45236 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45237/">CVE-2023-45237 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45237">CVE-2023-45237 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1298/">CVE-2024-1298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1298">CVE-2024-1298 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964062" comment="qemu-ovmf-x86_64-202202-150400.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964063" comment="qemu-uefi-aarch64-202202-150400.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206440" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236878" ref_url="https://bugzilla.suse.com/1236878" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-12133" ref_url="https://www.suse.com/security/cve/CVE-2024-12133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020349.html" source="SUSE-SU"/>
		<description>
This update for libtasn1 fixes the following issues:

- CVE-2024-12133: the processing of input DER data containing a large number of SEQUENCE OF or SET OF elements takes
  quadratic time to complete. (bsc#1236878)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-14"/>
	<updated date="2025-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1236878">SUSE bug 1236878</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12133/">CVE-2024-12133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12133">CVE-2024-12133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964549" comment="libtasn1-4.13-150000.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964550" comment="libtasn1-6-4.13-150000.4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206441" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236705" ref_url="https://bugzilla.suse.com/1236705" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020354.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2025-0938: domain names containing square brackets are not identified as incorrect by urlparse. (bsc#1236705)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-14"/>
	<updated date="2025-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1236705">SUSE bug 1236705</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964555" comment="libpython3_6m1_0-3.6.15-150300.10.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964556" comment="python3-3.6.15-150300.10.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964557" comment="python3-base-3.6.15-150300.10.81.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206442" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230697" ref_url="https://bugzilla.suse.com/1230697" source="BUGZILLA"/>
		<reference ref_id="1231847" ref_url="https://bugzilla.suse.com/1231847" source="BUGZILLA"/>
		<reference ref_id="1233112" ref_url="https://bugzilla.suse.com/1233112" source="BUGZILLA"/>
		<reference ref_id="1233642" ref_url="https://bugzilla.suse.com/1233642" source="BUGZILLA"/>
		<reference ref_id="1234025" ref_url="https://bugzilla.suse.com/1234025" source="BUGZILLA"/>
		<reference ref_id="1234690" ref_url="https://bugzilla.suse.com/1234690" source="BUGZILLA"/>
		<reference ref_id="1234884" ref_url="https://bugzilla.suse.com/1234884" source="BUGZILLA"/>
		<reference ref_id="1234896" ref_url="https://bugzilla.suse.com/1234896" source="BUGZILLA"/>
		<reference ref_id="1234931" ref_url="https://bugzilla.suse.com/1234931" source="BUGZILLA"/>
		<reference ref_id="1235134" ref_url="https://bugzilla.suse.com/1235134" source="BUGZILLA"/>
		<reference ref_id="1235217" ref_url="https://bugzilla.suse.com/1235217" source="BUGZILLA"/>
		<reference ref_id="1235230" ref_url="https://bugzilla.suse.com/1235230" source="BUGZILLA"/>
		<reference ref_id="1235249" ref_url="https://bugzilla.suse.com/1235249" source="BUGZILLA"/>
		<reference ref_id="1235430" ref_url="https://bugzilla.suse.com/1235430" source="BUGZILLA"/>
		<reference ref_id="1235433" ref_url="https://bugzilla.suse.com/1235433" source="BUGZILLA"/>
		<reference ref_id="1235441" ref_url="https://bugzilla.suse.com/1235441" source="BUGZILLA"/>
		<reference ref_id="1235451" ref_url="https://bugzilla.suse.com/1235451" source="BUGZILLA"/>
		<reference ref_id="1235466" ref_url="https://bugzilla.suse.com/1235466" source="BUGZILLA"/>
		<reference ref_id="1235480" ref_url="https://bugzilla.suse.com/1235480" source="BUGZILLA"/>
		<reference ref_id="1235521" ref_url="https://bugzilla.suse.com/1235521" source="BUGZILLA"/>
		<reference ref_id="1235584" ref_url="https://bugzilla.suse.com/1235584" source="BUGZILLA"/>
		<reference ref_id="1235645" ref_url="https://bugzilla.suse.com/1235645" source="BUGZILLA"/>
		<reference ref_id="1235723" ref_url="https://bugzilla.suse.com/1235723" source="BUGZILLA"/>
		<reference ref_id="1235759" ref_url="https://bugzilla.suse.com/1235759" source="BUGZILLA"/>
		<reference ref_id="1235764" ref_url="https://bugzilla.suse.com/1235764" source="BUGZILLA"/>
		<reference ref_id="1235814" ref_url="https://bugzilla.suse.com/1235814" source="BUGZILLA"/>
		<reference ref_id="1235818" ref_url="https://bugzilla.suse.com/1235818" source="BUGZILLA"/>
		<reference ref_id="1235920" ref_url="https://bugzilla.suse.com/1235920" source="BUGZILLA"/>
		<reference ref_id="1235969" ref_url="https://bugzilla.suse.com/1235969" source="BUGZILLA"/>
		<reference ref_id="1236628" ref_url="https://bugzilla.suse.com/1236628" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-50199" ref_url="https://www.suse.com/security/cve/CVE-2024-50199/" source="CVE"/>
		<reference ref_id="CVE-2024-53095" ref_url="https://www.suse.com/security/cve/CVE-2024-53095/" source="CVE"/>
		<reference ref_id="CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104/" source="CVE"/>
		<reference ref_id="CVE-2024-53144" ref_url="https://www.suse.com/security/cve/CVE-2024-53144/" source="CVE"/>
		<reference ref_id="CVE-2024-53166" ref_url="https://www.suse.com/security/cve/CVE-2024-53166/" source="CVE"/>
		<reference ref_id="CVE-2024-53177" ref_url="https://www.suse.com/security/cve/CVE-2024-53177/" source="CVE"/>
		<reference ref_id="CVE-2024-54680" ref_url="https://www.suse.com/security/cve/CVE-2024-54680/" source="CVE"/>
		<reference ref_id="CVE-2024-56600" ref_url="https://www.suse.com/security/cve/CVE-2024-56600/" source="CVE"/>
		<reference ref_id="CVE-2024-56601" ref_url="https://www.suse.com/security/cve/CVE-2024-56601/" source="CVE"/>
		<reference ref_id="CVE-2024-56602" ref_url="https://www.suse.com/security/cve/CVE-2024-56602/" source="CVE"/>
		<reference ref_id="CVE-2024-56623" ref_url="https://www.suse.com/security/cve/CVE-2024-56623/" source="CVE"/>
		<reference ref_id="CVE-2024-56631" ref_url="https://www.suse.com/security/cve/CVE-2024-56631/" source="CVE"/>
		<reference ref_id="CVE-2024-56642" ref_url="https://www.suse.com/security/cve/CVE-2024-56642/" source="CVE"/>
		<reference ref_id="CVE-2024-56645" ref_url="https://www.suse.com/security/cve/CVE-2024-56645/" source="CVE"/>
		<reference ref_id="CVE-2024-56648" ref_url="https://www.suse.com/security/cve/CVE-2024-56648/" source="CVE"/>
		<reference ref_id="CVE-2024-56650" ref_url="https://www.suse.com/security/cve/CVE-2024-56650/" source="CVE"/>
		<reference ref_id="CVE-2024-56658" ref_url="https://www.suse.com/security/cve/CVE-2024-56658/" source="CVE"/>
		<reference ref_id="CVE-2024-56661" ref_url="https://www.suse.com/security/cve/CVE-2024-56661/" source="CVE"/>
		<reference ref_id="CVE-2024-56664" ref_url="https://www.suse.com/security/cve/CVE-2024-56664/" source="CVE"/>
		<reference ref_id="CVE-2024-56704" ref_url="https://www.suse.com/security/cve/CVE-2024-56704/" source="CVE"/>
		<reference ref_id="CVE-2024-56759" ref_url="https://www.suse.com/security/cve/CVE-2024-56759/" source="CVE"/>
		<reference ref_id="CVE-2024-57791" ref_url="https://www.suse.com/security/cve/CVE-2024-57791/" source="CVE"/>
		<reference ref_id="CVE-2024-57792" ref_url="https://www.suse.com/security/cve/CVE-2024-57792/" source="CVE"/>
		<reference ref_id="CVE-2024-57798" ref_url="https://www.suse.com/security/cve/CVE-2024-57798/" source="CVE"/>
		<reference ref_id="CVE-2024-57849" ref_url="https://www.suse.com/security/cve/CVE-2024-57849/" source="CVE"/>
		<reference ref_id="CVE-2024-57893" ref_url="https://www.suse.com/security/cve/CVE-2024-57893/" source="CVE"/>
		<reference ref_id="CVE-2024-57897" ref_url="https://www.suse.com/security/cve/CVE-2024-57897/" source="CVE"/>
		<reference ref_id="CVE-2024-8805" ref_url="https://www.suse.com/security/cve/CVE-2024-8805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234884).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
- CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521).
- CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).
- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).
- CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433).
- CVE-2024-56645: can: j1939: j1939_session_new(): fix skb reference counting (bsc#1235134).
- CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).
- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).
- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).
- CVE-2024-57792: power: supply: gpio-charger: Fix set charge current limits (bsc#1235764).
- CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (bsc#1235818).
- CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling (bsc#1235814).
- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).
- CVE-2024-57897: drm/amdkfd: Correct the migration DMA map direction (bsc#1235969).

The following non-security bugs were fixed:

- NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).
- NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).
- NFS: Improve heuristic for readdirplus (bsc#1231847).
- NFS: Trigger the 'ls -l' readdir heuristic sooner (bsc#1231847).
- tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
- x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-14"/>
	<updated date="2025-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230697">SUSE bug 1230697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231847">SUSE bug 1231847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233112">SUSE bug 1233112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233642">SUSE bug 1233642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234025">SUSE bug 1234025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234690">SUSE bug 1234690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234884">SUSE bug 1234884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234896">SUSE bug 1234896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234931">SUSE bug 1234931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235134">SUSE bug 1235134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235217">SUSE bug 1235217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235230">SUSE bug 1235230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235249">SUSE bug 1235249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235430">SUSE bug 1235430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235433">SUSE bug 1235433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235441">SUSE bug 1235441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235451">SUSE bug 1235451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235466">SUSE bug 1235466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235480">SUSE bug 1235480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235521">SUSE bug 1235521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235584">SUSE bug 1235584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235645">SUSE bug 1235645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235723">SUSE bug 1235723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235759">SUSE bug 1235759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235764">SUSE bug 1235764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235814">SUSE bug 1235814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235818">SUSE bug 1235818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235920">SUSE bug 1235920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235969">SUSE bug 1235969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236628">SUSE bug 1236628</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50199/">CVE-2024-50199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50199">CVE-2024-50199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53095/">CVE-2024-53095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53095">CVE-2024-53095 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53144/">CVE-2024-53144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53144">CVE-2024-53144 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53166/">CVE-2024-53166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53166">CVE-2024-53166 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53177/">CVE-2024-53177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53177">CVE-2024-53177 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54680/">CVE-2024-54680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56600/">CVE-2024-56600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56601/">CVE-2024-56601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56602/">CVE-2024-56602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56623/">CVE-2024-56623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56631/">CVE-2024-56631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56642/">CVE-2024-56642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56645/">CVE-2024-56645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56648/">CVE-2024-56648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56650/">CVE-2024-56650 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56658/">CVE-2024-56658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56661/">CVE-2024-56661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56664/">CVE-2024-56664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56704/">CVE-2024-56704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56704">CVE-2024-56704 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56759/">CVE-2024-56759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56759">CVE-2024-56759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57791/">CVE-2024-57791 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57792/">CVE-2024-57792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57798/">CVE-2024-57798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57849/">CVE-2024-57849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57893/">CVE-2024-57893 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57893">CVE-2024-57893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57897/">CVE-2024-57897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57897">CVE-2024-57897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8805/">CVE-2024-8805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8805">CVE-2024-8805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964558" comment="kernel-rt-5.14.21-150400.15.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964559" comment="kernel-source-rt-5.14.21-150400.15.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206443" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236282" ref_url="https://bugzilla.suse.com/1236282" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-0395" ref_url="https://www.suse.com/security/cve/CVE-2025-0395/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020358.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2025-0395: Fix underallocation of abort_msg_s struct (bsc#1236282)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-17"/>
	<updated date="2025-02-17"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1236282">SUSE bug 1236282</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0395/">CVE-2025-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964551" comment="glibc-2.31-150300.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964552" comment="glibc-devel-2.31-150300.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964553" comment="glibc-locale-2.31-150300.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964554" comment="glibc-locale-base-2.31-150300.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206444" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230697" ref_url="https://bugzilla.suse.com/1230697" source="BUGZILLA"/>
		<reference ref_id="1231847" ref_url="https://bugzilla.suse.com/1231847" source="BUGZILLA"/>
		<reference ref_id="1233112" ref_url="https://bugzilla.suse.com/1233112" source="BUGZILLA"/>
		<reference ref_id="1233642" ref_url="https://bugzilla.suse.com/1233642" source="BUGZILLA"/>
		<reference ref_id="1234025" ref_url="https://bugzilla.suse.com/1234025" source="BUGZILLA"/>
		<reference ref_id="1234690" ref_url="https://bugzilla.suse.com/1234690" source="BUGZILLA"/>
		<reference ref_id="1234884" ref_url="https://bugzilla.suse.com/1234884" source="BUGZILLA"/>
		<reference ref_id="1234896" ref_url="https://bugzilla.suse.com/1234896" source="BUGZILLA"/>
		<reference ref_id="1234931" ref_url="https://bugzilla.suse.com/1234931" source="BUGZILLA"/>
		<reference ref_id="1235134" ref_url="https://bugzilla.suse.com/1235134" source="BUGZILLA"/>
		<reference ref_id="1235217" ref_url="https://bugzilla.suse.com/1235217" source="BUGZILLA"/>
		<reference ref_id="1235230" ref_url="https://bugzilla.suse.com/1235230" source="BUGZILLA"/>
		<reference ref_id="1235249" ref_url="https://bugzilla.suse.com/1235249" source="BUGZILLA"/>
		<reference ref_id="1235430" ref_url="https://bugzilla.suse.com/1235430" source="BUGZILLA"/>
		<reference ref_id="1235433" ref_url="https://bugzilla.suse.com/1235433" source="BUGZILLA"/>
		<reference ref_id="1235441" ref_url="https://bugzilla.suse.com/1235441" source="BUGZILLA"/>
		<reference ref_id="1235451" ref_url="https://bugzilla.suse.com/1235451" source="BUGZILLA"/>
		<reference ref_id="1235466" ref_url="https://bugzilla.suse.com/1235466" source="BUGZILLA"/>
		<reference ref_id="1235480" ref_url="https://bugzilla.suse.com/1235480" source="BUGZILLA"/>
		<reference ref_id="1235521" ref_url="https://bugzilla.suse.com/1235521" source="BUGZILLA"/>
		<reference ref_id="1235584" ref_url="https://bugzilla.suse.com/1235584" source="BUGZILLA"/>
		<reference ref_id="1235645" ref_url="https://bugzilla.suse.com/1235645" source="BUGZILLA"/>
		<reference ref_id="1235723" ref_url="https://bugzilla.suse.com/1235723" source="BUGZILLA"/>
		<reference ref_id="1235759" ref_url="https://bugzilla.suse.com/1235759" source="BUGZILLA"/>
		<reference ref_id="1235764" ref_url="https://bugzilla.suse.com/1235764" source="BUGZILLA"/>
		<reference ref_id="1235814" ref_url="https://bugzilla.suse.com/1235814" source="BUGZILLA"/>
		<reference ref_id="1235818" ref_url="https://bugzilla.suse.com/1235818" source="BUGZILLA"/>
		<reference ref_id="1235920" ref_url="https://bugzilla.suse.com/1235920" source="BUGZILLA"/>
		<reference ref_id="1235969" ref_url="https://bugzilla.suse.com/1235969" source="BUGZILLA"/>
		<reference ref_id="1236628" ref_url="https://bugzilla.suse.com/1236628" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-50199" ref_url="https://www.suse.com/security/cve/CVE-2024-50199/" source="CVE"/>
		<reference ref_id="CVE-2024-53095" ref_url="https://www.suse.com/security/cve/CVE-2024-53095/" source="CVE"/>
		<reference ref_id="CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104/" source="CVE"/>
		<reference ref_id="CVE-2024-53144" ref_url="https://www.suse.com/security/cve/CVE-2024-53144/" source="CVE"/>
		<reference ref_id="CVE-2024-53166" ref_url="https://www.suse.com/security/cve/CVE-2024-53166/" source="CVE"/>
		<reference ref_id="CVE-2024-53177" ref_url="https://www.suse.com/security/cve/CVE-2024-53177/" source="CVE"/>
		<reference ref_id="CVE-2024-54680" ref_url="https://www.suse.com/security/cve/CVE-2024-54680/" source="CVE"/>
		<reference ref_id="CVE-2024-56600" ref_url="https://www.suse.com/security/cve/CVE-2024-56600/" source="CVE"/>
		<reference ref_id="CVE-2024-56601" ref_url="https://www.suse.com/security/cve/CVE-2024-56601/" source="CVE"/>
		<reference ref_id="CVE-2024-56602" ref_url="https://www.suse.com/security/cve/CVE-2024-56602/" source="CVE"/>
		<reference ref_id="CVE-2024-56623" ref_url="https://www.suse.com/security/cve/CVE-2024-56623/" source="CVE"/>
		<reference ref_id="CVE-2024-56631" ref_url="https://www.suse.com/security/cve/CVE-2024-56631/" source="CVE"/>
		<reference ref_id="CVE-2024-56642" ref_url="https://www.suse.com/security/cve/CVE-2024-56642/" source="CVE"/>
		<reference ref_id="CVE-2024-56645" ref_url="https://www.suse.com/security/cve/CVE-2024-56645/" source="CVE"/>
		<reference ref_id="CVE-2024-56648" ref_url="https://www.suse.com/security/cve/CVE-2024-56648/" source="CVE"/>
		<reference ref_id="CVE-2024-56650" ref_url="https://www.suse.com/security/cve/CVE-2024-56650/" source="CVE"/>
		<reference ref_id="CVE-2024-56658" ref_url="https://www.suse.com/security/cve/CVE-2024-56658/" source="CVE"/>
		<reference ref_id="CVE-2024-56661" ref_url="https://www.suse.com/security/cve/CVE-2024-56661/" source="CVE"/>
		<reference ref_id="CVE-2024-56664" ref_url="https://www.suse.com/security/cve/CVE-2024-56664/" source="CVE"/>
		<reference ref_id="CVE-2024-56704" ref_url="https://www.suse.com/security/cve/CVE-2024-56704/" source="CVE"/>
		<reference ref_id="CVE-2024-56759" ref_url="https://www.suse.com/security/cve/CVE-2024-56759/" source="CVE"/>
		<reference ref_id="CVE-2024-57791" ref_url="https://www.suse.com/security/cve/CVE-2024-57791/" source="CVE"/>
		<reference ref_id="CVE-2024-57792" ref_url="https://www.suse.com/security/cve/CVE-2024-57792/" source="CVE"/>
		<reference ref_id="CVE-2024-57798" ref_url="https://www.suse.com/security/cve/CVE-2024-57798/" source="CVE"/>
		<reference ref_id="CVE-2024-57849" ref_url="https://www.suse.com/security/cve/CVE-2024-57849/" source="CVE"/>
		<reference ref_id="CVE-2024-57893" ref_url="https://www.suse.com/security/cve/CVE-2024-57893/" source="CVE"/>
		<reference ref_id="CVE-2024-57897" ref_url="https://www.suse.com/security/cve/CVE-2024-57897/" source="CVE"/>
		<reference ref_id="CVE-2024-8805" ref_url="https://www.suse.com/security/cve/CVE-2024-8805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234884).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
- CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521).
- CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).
- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).
- CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433).
- CVE-2024-56645: can: j1939: j1939_session_new(): fix skb reference counting (bsc#1235134).
- CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).
- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).
- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).
- CVE-2024-57792: power: supply: gpio-charger: Fix set charge current limits (bsc#1235764).
- CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (bsc#1235818).
- CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling (bsc#1235814).
- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).
- CVE-2024-57897: drm/amdkfd: Correct the migration DMA map direction (bsc#1235969).

The following non-security bugs were fixed:

- NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).
- NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).
- NFS: Improve heuristic for readdirplus (bsc#1231847).
- NFS: Trigger the 'ls -l' readdir heuristic sooner (bsc#1231847).
- tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
- x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-18"/>
	<updated date="2025-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230697">SUSE bug 1230697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231847">SUSE bug 1231847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233112">SUSE bug 1233112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233642">SUSE bug 1233642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234025">SUSE bug 1234025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234690">SUSE bug 1234690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234884">SUSE bug 1234884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234896">SUSE bug 1234896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234931">SUSE bug 1234931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235134">SUSE bug 1235134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235217">SUSE bug 1235217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235230">SUSE bug 1235230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235249">SUSE bug 1235249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235430">SUSE bug 1235430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235433">SUSE bug 1235433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235441">SUSE bug 1235441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235451">SUSE bug 1235451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235466">SUSE bug 1235466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235480">SUSE bug 1235480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235521">SUSE bug 1235521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235584">SUSE bug 1235584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235645">SUSE bug 1235645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235723">SUSE bug 1235723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235759">SUSE bug 1235759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235764">SUSE bug 1235764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235814">SUSE bug 1235814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235818">SUSE bug 1235818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235920">SUSE bug 1235920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235969">SUSE bug 1235969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236628">SUSE bug 1236628</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50199/">CVE-2024-50199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50199">CVE-2024-50199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53095/">CVE-2024-53095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53095">CVE-2024-53095 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53144/">CVE-2024-53144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53144">CVE-2024-53144 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53166/">CVE-2024-53166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53166">CVE-2024-53166 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53177/">CVE-2024-53177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53177">CVE-2024-53177 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54680/">CVE-2024-54680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56600/">CVE-2024-56600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56601/">CVE-2024-56601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56602/">CVE-2024-56602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56623/">CVE-2024-56623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56631/">CVE-2024-56631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56642/">CVE-2024-56642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56645/">CVE-2024-56645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56648/">CVE-2024-56648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56650/">CVE-2024-56650 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56658/">CVE-2024-56658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56661/">CVE-2024-56661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56664/">CVE-2024-56664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56704/">CVE-2024-56704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56704">CVE-2024-56704 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56759/">CVE-2024-56759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56759">CVE-2024-56759 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57791/">CVE-2024-57791 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57792/">CVE-2024-57792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57798/">CVE-2024-57798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57849/">CVE-2024-57849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57893/">CVE-2024-57893 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57893">CVE-2024-57893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57897/">CVE-2024-57897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57897">CVE-2024-57897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8805/">CVE-2024-8805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8805">CVE-2024-8805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964560" comment="kernel-default-5.14.21-150400.24.150.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964487" comment="kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206445" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1227052" ref_url="https://bugzilla.suse.com/1227052" source="BUGZILLA"/>
		<reference ref_id="1236507" ref_url="https://bugzilla.suse.com/1236507" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020368.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2024-6104: possible sensitive data exposure due to hashicorp/go-retryablehttp not sanitizing URLs when writing
  them to log files. (bsc#1227052)
- CVE-2023-45288: possible excessive CPU consumption due to no limit being set on the number of CONTINUATION frames
  read for an HTTP/2 request in golang.org/x/net/http2. (bsc#1236507)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-18"/>
	<updated date="2025-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227052">SUSE bug 1227052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236507">SUSE bug 1236507</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964561" comment="podman-4.9.5-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964562" comment="podman-remote-4.9.5-150400.4.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206446" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1233606" ref_url="https://bugzilla.suse.com/1233606" source="BUGZILLA"/>
		<reference ref_id="1233608" ref_url="https://bugzilla.suse.com/1233608" source="BUGZILLA"/>
		<reference ref_id="1233609" ref_url="https://bugzilla.suse.com/1233609" source="BUGZILLA"/>
		<reference ref_id="1233610" ref_url="https://bugzilla.suse.com/1233610" source="BUGZILLA"/>
		<reference ref_id="1233612" ref_url="https://bugzilla.suse.com/1233612" source="BUGZILLA"/>
		<reference ref_id="1233613" ref_url="https://bugzilla.suse.com/1233613" source="BUGZILLA"/>
		<reference ref_id="1233614" ref_url="https://bugzilla.suse.com/1233614" source="BUGZILLA"/>
		<reference ref_id="1233615" ref_url="https://bugzilla.suse.com/1233615" source="BUGZILLA"/>
		<reference ref_id="1233616" ref_url="https://bugzilla.suse.com/1233616" source="BUGZILLA"/>
		<reference ref_id="1233617" ref_url="https://bugzilla.suse.com/1233617" source="BUGZILLA"/>
		<reference ref_id="1234958" ref_url="https://bugzilla.suse.com/1234958" source="BUGZILLA"/>
		<reference ref_id="1236316" ref_url="https://bugzilla.suse.com/1236316" source="BUGZILLA"/>
		<reference ref_id="1236317" ref_url="https://bugzilla.suse.com/1236317" source="BUGZILLA"/>
		<reference ref_id="1237002" ref_url="https://bugzilla.suse.com/1237002" source="BUGZILLA"/>
		<reference ref_id="1237006" ref_url="https://bugzilla.suse.com/1237006" source="BUGZILLA"/>
		<reference ref_id="1237008" ref_url="https://bugzilla.suse.com/1237008" source="BUGZILLA"/>
		<reference ref_id="1237009" ref_url="https://bugzilla.suse.com/1237009" source="BUGZILLA"/>
		<reference ref_id="1237010" ref_url="https://bugzilla.suse.com/1237010" source="BUGZILLA"/>
		<reference ref_id="1237011" ref_url="https://bugzilla.suse.com/1237011" source="BUGZILLA"/>
		<reference ref_id="1237012" ref_url="https://bugzilla.suse.com/1237012" source="BUGZILLA"/>
		<reference ref_id="1237013" ref_url="https://bugzilla.suse.com/1237013" source="BUGZILLA"/>
		<reference ref_id="1237014" ref_url="https://bugzilla.suse.com/1237014" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45774" ref_url="https://www.suse.com/security/cve/CVE-2024-45774/" source="CVE"/>
		<reference ref_id="CVE-2024-45775" ref_url="https://www.suse.com/security/cve/CVE-2024-45775/" source="CVE"/>
		<reference ref_id="CVE-2024-45776" ref_url="https://www.suse.com/security/cve/CVE-2024-45776/" source="CVE"/>
		<reference ref_id="CVE-2024-45777" ref_url="https://www.suse.com/security/cve/CVE-2024-45777/" source="CVE"/>
		<reference ref_id="CVE-2024-45778" ref_url="https://www.suse.com/security/cve/CVE-2024-45778/" source="CVE"/>
		<reference ref_id="CVE-2024-45779" ref_url="https://www.suse.com/security/cve/CVE-2024-45779/" source="CVE"/>
		<reference ref_id="CVE-2024-45780" ref_url="https://www.suse.com/security/cve/CVE-2024-45780/" source="CVE"/>
		<reference ref_id="CVE-2024-45781" ref_url="https://www.suse.com/security/cve/CVE-2024-45781/" source="CVE"/>
		<reference ref_id="CVE-2024-45782" ref_url="https://www.suse.com/security/cve/CVE-2024-45782/" source="CVE"/>
		<reference ref_id="CVE-2024-45783" ref_url="https://www.suse.com/security/cve/CVE-2024-45783/" source="CVE"/>
		<reference ref_id="CVE-2024-56737" ref_url="https://www.suse.com/security/cve/CVE-2024-56737/" source="CVE"/>
		<reference ref_id="CVE-2025-0622" ref_url="https://www.suse.com/security/cve/CVE-2025-0622/" source="CVE"/>
		<reference ref_id="CVE-2025-0624" ref_url="https://www.suse.com/security/cve/CVE-2025-0624/" source="CVE"/>
		<reference ref_id="CVE-2025-0677" ref_url="https://www.suse.com/security/cve/CVE-2025-0677/" source="CVE"/>
		<reference ref_id="CVE-2025-0678" ref_url="https://www.suse.com/security/cve/CVE-2025-0678/" source="CVE"/>
		<reference ref_id="CVE-2025-0684" ref_url="https://www.suse.com/security/cve/CVE-2025-0684/" source="CVE"/>
		<reference ref_id="CVE-2025-0685" ref_url="https://www.suse.com/security/cve/CVE-2025-0685/" source="CVE"/>
		<reference ref_id="CVE-2025-0686" ref_url="https://www.suse.com/security/cve/CVE-2025-0686/" source="CVE"/>
		<reference ref_id="CVE-2025-0689" ref_url="https://www.suse.com/security/cve/CVE-2025-0689/" source="CVE"/>
		<reference ref_id="CVE-2025-0690" ref_url="https://www.suse.com/security/cve/CVE-2025-0690/" source="CVE"/>
		<reference ref_id="CVE-2025-1118" ref_url="https://www.suse.com/security/cve/CVE-2025-1118/" source="CVE"/>
		<reference ref_id="CVE-2025-1125" ref_url="https://www.suse.com/security/cve/CVE-2025-1125/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- CVE-2024-45781: Fixed strcpy overflow in ufs. (bsc#1233617)
- CVE-2024-56737: Fixed a heap-based buffer overflow in hfs. (bsc#1234958)
- CVE-2024-45782: Fixed strcpy overflow in hfs. (bsc#1233615)
- CVE-2024-45780: Fixed an overflow in tar/cpio. (bsc#1233614)
- CVE-2024-45783: Fixed a refcount overflow in hfsplus. (bsc#1233616)
- CVE-2024-45774: Fixed a heap overflow in JPEG parser. (bsc#1233609)
- CVE-2024-45775: Fixed a missing NULL check in extcmd parser. (bsc#1233610)
- CVE-2024-45776: Fixed an overflow in .MO file handling. (bsc#1233612)
- CVE-2024-45777: Fixed an integer overflow in gettext. (bsc#1233613)
- CVE-2024-45778: Fixed bfs filesystem by removing it from lockdown capable modules. (bsc#1233606)
- CVE-2024-45779: Fixed a heap overflow in bfs. (bsc#1233608)
- CVE-2025-0624: Fixed an out-of-bounds write during the network boot process. (bsc#1236316)
- CVE-2025-0622: Fixed a use-after-free when handling hooks during module unload in command/gpg . (bsc#1236317)
- CVE-2025-0690: Fixed an integer overflow that may lead to an out-of-bounds write through the read command.
  (bsc#1237012)
- CVE-2025-1118: Fixed an issue where the dump command was not being blocked when grub was in lockdown mode.
  (bsc#1237013)
- CVE-2025-0677: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in ufs.
  (bsc#1237002)
- CVE-2025-0684: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in reiserfs.
  (bsc#1237008)
- CVE-2025-0685: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in jfs.
  (bsc#1237009)
- CVE-2025-0686: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in romfs.
  (bsc#1237010)
- CVE-2025-0689: Fixed a heap-based buffer overflow in udf that may lead to arbitrary code execution. (bsc#1237011)
- CVE-2025-1125: Fixed an integer overflow that may lead to an out-of-bounds write in hfs. (bsc#1237014)
- CVE-2025-0678: Fixed an integer overflow that may lead to an out-of-bounds write in squash4. (bsc#1237006)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-19"/>
	<updated date="2025-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233606">SUSE bug 1233606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233608">SUSE bug 1233608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233609">SUSE bug 1233609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233610">SUSE bug 1233610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233612">SUSE bug 1233612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233613">SUSE bug 1233613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233614">SUSE bug 1233614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233615">SUSE bug 1233615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233616">SUSE bug 1233616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233617">SUSE bug 1233617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234958">SUSE bug 1234958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236316">SUSE bug 1236316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236317">SUSE bug 1236317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237002">SUSE bug 1237002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237006">SUSE bug 1237006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237008">SUSE bug 1237008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237009">SUSE bug 1237009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237010">SUSE bug 1237010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237011">SUSE bug 1237011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237012">SUSE bug 1237012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237013">SUSE bug 1237013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237014">SUSE bug 1237014</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45774/">CVE-2024-45774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45774">CVE-2024-45774 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45775/">CVE-2024-45775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45775">CVE-2024-45775 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45776/">CVE-2024-45776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45776">CVE-2024-45776 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45777/">CVE-2024-45777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45777">CVE-2024-45777 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-45778/">CVE-2024-45778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45778">CVE-2024-45778 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45779/">CVE-2024-45779 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45779">CVE-2024-45779 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45780/">CVE-2024-45780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45780">CVE-2024-45780 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45781/">CVE-2024-45781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45781">CVE-2024-45781 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45782/">CVE-2024-45782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45782">CVE-2024-45782 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45783/">CVE-2024-45783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45783">CVE-2024-45783 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56737/">CVE-2024-56737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56737">CVE-2024-56737 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0622/">CVE-2025-0622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0622">CVE-2025-0622 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0624/">CVE-2025-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0624">CVE-2025-0624 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0677/">CVE-2025-0677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0677">CVE-2025-0677 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0678/">CVE-2025-0678 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0678">CVE-2025-0678 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0684/">CVE-2025-0684 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0684">CVE-2025-0684 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0685/">CVE-2025-0685 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0685">CVE-2025-0685 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0686/">CVE-2025-0686 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0686">CVE-2025-0686 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0689/">CVE-2025-0689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0689">CVE-2025-0689 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0690/">CVE-2025-0690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0690">CVE-2025-0690 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1118/">CVE-2025-1118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1118">CVE-2025-1118 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-1125/">CVE-2025-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1125">CVE-2025-1125 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964920" comment="grub2-2.06-150400.11.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964840" comment="grub2-arm64-efi-2.06-150400.11.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964841" comment="grub2-i386-pc-2.06-150400.11.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964843" comment="grub2-s390x-emu-2.06-150400.11.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964844" comment="grub2-snapper-plugin-2.06-150400.11.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964846" comment="grub2-x86_64-efi-2.06-150400.11.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964847" comment="grub2-x86_64-xen-2.06-150400.11.55.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206447" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1237096" ref_url="https://bugzilla.suse.com/1237096" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-31068" ref_url="https://www.suse.com/security/cve/CVE-2024-31068/" source="CVE"/>
		<reference ref_id="CVE-2024-36293" ref_url="https://www.suse.com/security/cve/CVE-2024-36293/" source="CVE"/>
		<reference ref_id="CVE-2024-37020" ref_url="https://www.suse.com/security/cve/CVE-2024-37020/" source="CVE"/>
		<reference ref_id="CVE-2024-39355" ref_url="https://www.suse.com/security/cve/CVE-2024-39355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020376.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode was updated to the 20250211 release (bsc#1237096)

  - CVE-2024-31068: Improper Finite State Machines (FSMs) in Hardware Logic for some Intel Processors may allow privileged user to potentially enable denial of service via local access.
  - CVE-2024-36293: A potential security vulnerability in some Intel Software Guard Extensions (Intel SGX) Platforms may allow denial of service. Intel is releasing microcode updates to mitigate this potential vulnerability.
  - CVE-2024-39355: A potential security vulnerability in some 13th and 14th Generation Intel Core Processors may allow denial of service. Intel is releasing microcode and UEFI reference code updates to mitigate this potential vulnerability.
  - CVE-2024-37020: A potential security vulnerability in the Intel Data Streaming Accelerator (Intel DSA) for some Intel Xeon Processors may allow denial of service. Intel is releasing software updates to mitigate this potential vulnerability.

  - New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | SRF-SP         | C0       | 06-af-03/01 |          | 03000330 | Xeon 6700-Series Processors with E-Cores
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL            | C0       | 06-97-02/07 | 00000037 | 00000038 | Core Gen12
  | ADL            | H0       | 06-97-05/07 | 00000037 | 00000038 | Core Gen12
  | ADL            | L0       | 06-9a-03/80 | 00000435 | 00000436 | Core Gen12
  | ADL            | R0       | 06-9a-04/80 | 00000435 | 00000436 | Core Gen12
  | ADL-N          | N0       | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
  | AZB            | A0/R0    | 06-9a-04/40 | 00000007 | 00000009 | Intel(R) Atom(R) C1100
  | CFL-H          | R0       | 06-9e-0d/22 | 00000100 | 00000102 | Core Gen9 Mobile
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000f8 | 000000fa | Core Gen8 Desktop, Mobile, Xeon E
  | EMR-SP         | A0       | 06-cf-01/87 | 21000283 | 21000291 | Xeon Scalable Gen5
  | EMR-SP         | A1       | 06-cf-02/87 | 21000283 | 21000291 | Xeon Scalable Gen5
  | ICL-D          | B0       | 06-6c-01/10 | 010002b0 | 010002c0 | Xeon D-17xx, D-27xx
  | ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003e7 | 0d0003f5 | Xeon Scalable Gen3
  | RPL-E/HX/S     | B0       | 06-b7-01/32 | 0000012b | 0000012c | Core Gen13/Gen14
  | RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004123 | 00004124 | Core Gen13
  | RPL-HX/S       | C0       | 06-bf-02/07 | 00000037 | 00000038 | Core Gen13/Gen14
  | RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004123 | 00004124 | Core Gen13
  | RPL-S          | H0       | 06-bf-05/07 | 00000037 | 00000038 | Core Gen13/Gen14
  | RKL-S          | B0       | 06-a7-01/02 | 00000062 | 00000063 | Core Gen11
  | SPR-HBM        | Bx       | 06-8f-08/10 | 2c000390 | 2c0003e0 | Xeon Max
  | SPR-SP         | E4/S2    | 06-8f-07/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4 
  | SPR-SP         | E5/S3    | 06-8f-08/87 | 2b000603 | 2b000620 | Xeon Scalable Gen4
  | TWL            | N0       | 06-be-00/19 | 0000001a | 0000001c | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
  ### New Disclosures Updated in Prior Releases
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-19"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1237096">SUSE bug 1237096</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-31068/">CVE-2024-31068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31068">CVE-2024-31068 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36293/">CVE-2024-36293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36293">CVE-2024-36293 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-37020/">CVE-2024-37020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37020">CVE-2024-37020 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39355/">CVE-2024-39355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39355">CVE-2024-39355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964817" comment="ucode-intel-20250211-150200.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206448" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1237040" ref_url="https://bugzilla.suse.com/1237040" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-26465" ref_url="https://www.suse.com/security/cve/CVE-2025-26465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020381.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-20"/>
	<updated date="2025-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1237040">SUSE bug 1237040</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-26465/">CVE-2025-26465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965239" comment="openssh-8.4p1-150300.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965240" comment="openssh-clients-8.4p1-150300.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965241" comment="openssh-common-8.4p1-150300.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965242" comment="openssh-fips-8.4p1-150300.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965243" comment="openssh-server-8.4p1-150300.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206449" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234415" ref_url="https://bugzilla.suse.com/1234415" source="BUGZILLA"/>
		<reference ref_id="1234450" ref_url="https://bugzilla.suse.com/1234450" source="BUGZILLA"/>
		<reference ref_id="1234453" ref_url="https://bugzilla.suse.com/1234453" source="BUGZILLA"/>
		<reference ref_id="1234455" ref_url="https://bugzilla.suse.com/1234455" source="BUGZILLA"/>
		<reference ref_id="1234456" ref_url="https://bugzilla.suse.com/1234456" source="BUGZILLA"/>
		<reference ref_id="1234459" ref_url="https://bugzilla.suse.com/1234459" source="BUGZILLA"/>
		<reference ref_id="1234460" ref_url="https://bugzilla.suse.com/1234460" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-47538" ref_url="https://www.suse.com/security/cve/CVE-2024-47538/" source="CVE"/>
		<reference ref_id="CVE-2024-47541" ref_url="https://www.suse.com/security/cve/CVE-2024-47541/" source="CVE"/>
		<reference ref_id="CVE-2024-47542" ref_url="https://www.suse.com/security/cve/CVE-2024-47542/" source="CVE"/>
		<reference ref_id="CVE-2024-47600" ref_url="https://www.suse.com/security/cve/CVE-2024-47600/" source="CVE"/>
		<reference ref_id="CVE-2024-47607" ref_url="https://www.suse.com/security/cve/CVE-2024-47607/" source="CVE"/>
		<reference ref_id="CVE-2024-47615" ref_url="https://www.suse.com/security/cve/CVE-2024-47615/" source="CVE"/>
		<reference ref_id="CVE-2024-47835" ref_url="https://www.suse.com/security/cve/CVE-2024-47835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020096.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issues:

- CVE-2024-47538: Fixed a stack-buffer overflow in vorbis_handle_identification_packet. (bsc#1234415)
- CVE-2024-47835: Fixed a NULL-pointer dereference in LRC subtitle parser. (bsc#1234450)
- CVE-2024-47600: Fixed an out-of-bounds read in gst-discoverer-1.0 commandline tool. (bsc#1234453)
- CVE-2024-47615: Fixed an out-of-bounds write in Ogg demuxer. (bsc#1234456)
- CVE-2024-47541: Fixed an out-of-bounds write in SSA subtitle parser. (bsc#1234459)
- CVE-2024-47542: Fixed an ID3v2 parser out-of-bounds read and NULL-pointer dereference. (bsc#1234460)
- CVE-2024-47607: Fixed a stack buffer-overflow in Opus decoder. (bsc#1234455)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234415">SUSE bug 1234415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234450">SUSE bug 1234450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234453">SUSE bug 1234453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234455">SUSE bug 1234455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234456">SUSE bug 1234456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234459">SUSE bug 1234459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234460">SUSE bug 1234460</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47538/">CVE-2024-47538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47538">CVE-2024-47538 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-47541/">CVE-2024-47541 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47541">CVE-2024-47541 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47542/">CVE-2024-47542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47542">CVE-2024-47542 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47600/">CVE-2024-47600 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47600">CVE-2024-47600 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47607/">CVE-2024-47607 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47607">CVE-2024-47607 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47615/">CVE-2024-47615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47615">CVE-2024-47615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47835/">CVE-2024-47835 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47835">CVE-2024-47835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960008" comment="gstreamer-plugins-base-1.20.1-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960009" comment="libgstallocators-1_0-0-1.20.1-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960010" comment="libgstapp-1_0-0-1.20.1-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960011" comment="libgstaudio-1_0-0-1.20.1-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960012" comment="libgstgl-1_0-0-1.20.1-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960013" comment="libgstpbutils-1_0-0-1.20.1-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960014" comment="libgstriff-1_0-0-1.20.1-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960015" comment="libgsttag-1_0-0-1.20.1-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960016" comment="libgstvideo-1_0-0-1.20.1-150400.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206450" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1237084" ref_url="https://bugzilla.suse.com/1237084" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45236" ref_url="https://www.suse.com/security/cve/CVE-2023-45236/" source="CVE"/>
		<reference ref_id="CVE-2023-45237" ref_url="https://www.suse.com/security/cve/CVE-2023-45237/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020425.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- PXE boot is failing due to patches applied to fix CVE-2023-45236 and CVE-2023-45237 (bsc#1237084).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-24"/>
	<updated date="2025-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1237084">SUSE bug 1237084</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45236/">CVE-2023-45236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45236">CVE-2023-45236 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45237/">CVE-2023-45237 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45237">CVE-2023-45237 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966191" comment="qemu-ovmf-x86_64-202202-150400.5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966192" comment="qemu-uefi-aarch64-202202-150400.5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206451" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234449" ref_url="https://bugzilla.suse.com/1234449" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-47606" ref_url="https://www.suse.com/security/cve/CVE-2024-47606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020095.html" source="SUSE-SU"/>
		<description>
This update for gstreamer fixes the following issues:

- CVE-2024-47606: Fixed an integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes. (boo#1234449)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234449">SUSE bug 1234449</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47606/">CVE-2024-47606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47606">CVE-2024-47606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960017" comment="gstreamer-1.20.1-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960018" comment="libgstreamer-1_0-0-1.20.1-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206452" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1200344" ref_url="https://bugzilla.suse.com/1200344" source="BUGZILLA"/>
		<reference ref_id="1207174" ref_url="https://bugzilla.suse.com/1207174" source="BUGZILLA"/>
		<reference ref_id="1209358" ref_url="https://bugzilla.suse.com/1209358" source="BUGZILLA"/>
		<reference ref_id="1214884" ref_url="https://bugzilla.suse.com/1214884" source="BUGZILLA"/>
		<reference ref_id="1219823" ref_url="https://bugzilla.suse.com/1219823" source="BUGZILLA"/>
		<reference ref_id="1219826" ref_url="https://bugzilla.suse.com/1219826" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020094.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- Version update to 2.90:
- CVE-2023-50387: Fixed a Denial Of Service while trying to validate specially crafted DNSSEC responses. (bsc#1219823)
- CVE-2023-50868: Fixed a Denial Of Service while trying to validate specially crafted DNSSEC responses. (bsc#1219826)
- CVE-2023-28450: Default maximum EDNS.0 UDP packet size should be 1232. (bsc#1209358)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200344">SUSE bug 1200344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207174">SUSE bug 1207174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209358">SUSE bug 1209358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214884">SUSE bug 1214884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219826">SUSE bug 1219826</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960019" comment="dnsmasq-2.90-150400.16.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206453" version="1" class="patch">
	<metadata>
		<title>Security update for pam_pkcs11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1237058" ref_url="https://bugzilla.suse.com/1237058" source="BUGZILLA"/>
		<reference ref_id="1237062" ref_url="https://bugzilla.suse.com/1237062" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-24031" ref_url="https://www.suse.com/security/cve/CVE-2025-24031/" source="CVE"/>
		<reference ref_id="CVE-2025-24032" ref_url="https://www.suse.com/security/cve/CVE-2025-24032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020434.html" source="SUSE-SU"/>
		<description>
This update for pam_pkcs11 fixes the following issues:

- CVE-2025-24032: default value for `cert_policy` (`none`) allows for authentication bypass (bsc#1237062).
- CVE-2025-24031: uninitialized pointer dereference caused by user pressing ctrl-c/ctrl-d when asked for PIN leads to
  crash (bsc#1237058).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-25"/>
	<updated date="2025-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1237058">SUSE bug 1237058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237062">SUSE bug 1237062</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24031/">CVE-2025-24031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24031">CVE-2025-24031 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24032/">CVE-2025-24032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24032">CVE-2025-24032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966324" comment="pam_pkcs11-0.6.10-150100.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206454" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1229685" ref_url="https://bugzilla.suse.com/1229685" source="BUGZILLA"/>
		<reference ref_id="1229822" ref_url="https://bugzilla.suse.com/1229822" source="BUGZILLA"/>
		<reference ref_id="1230078" ref_url="https://bugzilla.suse.com/1230078" source="BUGZILLA"/>
		<reference ref_id="1235695" ref_url="https://bugzilla.suse.com/1235695" source="BUGZILLA"/>
		<reference ref_id="1236151" ref_url="https://bugzilla.suse.com/1236151" source="BUGZILLA"/>
		<reference ref_id="1237137" ref_url="https://bugzilla.suse.com/1237137" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-43790" ref_url="https://www.suse.com/security/cve/CVE-2024-43790/" source="CVE"/>
		<reference ref_id="CVE-2024-43802" ref_url="https://www.suse.com/security/cve/CVE-2024-43802/" source="CVE"/>
		<reference ref_id="CVE-2024-45306" ref_url="https://www.suse.com/security/cve/CVE-2024-45306/" source="CVE"/>
		<reference ref_id="CVE-2025-1215" ref_url="https://www.suse.com/security/cve/CVE-2025-1215/" source="CVE"/>
		<reference ref_id="CVE-2025-22134" ref_url="https://www.suse.com/security/cve/CVE-2025-22134/" source="CVE"/>
		<reference ref_id="CVE-2025-24014" ref_url="https://www.suse.com/security/cve/CVE-2025-24014/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020447.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Update to version 9.1.1101:

- CVE-2024-43790: possible out-of-bounds read when performing a search command (bsc#1229685).
- CVE-2024-43802: heap buffer overflow due to incorrect flushing of the typeahead buffer (bsc#1229822).
- CVE-2024-45306: heap buffer overflow when cursor position is invalid (bsc#1230078).
- CVE-2025-22134: heap buffer overflow when switching to other buffers using the :all command with active visual mode
  (bsc#1235695).
- CVE-2025-24014: NULL pointer dereference may lead to segmentation fault when in silent Ex mode (bsc#1236151).
- CVE-2025-1215: memory corruption when manipulating the --log argument (bsc#1237137).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-26"/>
	<updated date="2025-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229685">SUSE bug 1229685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229822">SUSE bug 1229822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230078">SUSE bug 1230078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235695">SUSE bug 1235695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236151">SUSE bug 1236151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237137">SUSE bug 1237137</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-43790/">CVE-2024-43790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43790">CVE-2024-43790 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43802/">CVE-2024-43802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43802">CVE-2024-43802 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45306/">CVE-2024-45306 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45306">CVE-2024-45306 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1215/">CVE-2025-1215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1215">CVE-2025-1215 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22134/">CVE-2025-22134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22134">CVE-2025-22134 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24014/">CVE-2025-24014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24014">CVE-2025-24014 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966485" comment="vim-data-common-9.1.1101-150000.5.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966599" comment="vim-small-9.1.1101-150000.5.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966600" comment="xxd-9.1.1101-150000.5.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206455" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1214290" ref_url="https://bugzilla.suse.com/1214290" source="BUGZILLA"/>
		<reference ref_id="1236842" ref_url="https://bugzilla.suse.com/1236842" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4016" ref_url="https://www.suse.com/security/cve/CVE-2023-4016/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020453.html" source="SUSE-SU"/>
		<description>
This update for procps fixes the following issues:

- Integer overflow due to incomplete fix for CVE-2023-4016 can lead to segmentation fault in ps command when pid
  argument has a leading space (bsc#1236842, bsc#1214290).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-28"/>
	<updated date="2025-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214290">SUSE bug 1214290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236842">SUSE bug 1236842</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4016/">CVE-2023-4016 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966922" comment="libprocps8-3.3.17-150000.7.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966923" comment="procps-3.3.17-150000.7.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206456" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1237363" ref_url="https://bugzilla.suse.com/1237363" source="BUGZILLA"/>
		<reference ref_id="1237370" ref_url="https://bugzilla.suse.com/1237370" source="BUGZILLA"/>
		<reference ref_id="1237418" ref_url="https://bugzilla.suse.com/1237418" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-56171" ref_url="https://www.suse.com/security/cve/CVE-2024-56171/" source="CVE"/>
		<reference ref_id="CVE-2025-24928" ref_url="https://www.suse.com/security/cve/CVE-2025-24928/" source="CVE"/>
		<reference ref_id="CVE-2025-27113" ref_url="https://www.suse.com/security/cve/CVE-2025-27113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020467.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2024-56171: use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c
  (bsc#1237363).
- CVE-2025-24928: stack-based buffer overflow in xmlSnprintfElements in valid.c (bsc#1237370).
- CVE-2025-27113: NULL pointer dereference in xmlPatMatch in pattern.c (bsc#1237418).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-28"/>
	<updated date="2025-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1237363">SUSE bug 1237363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237370">SUSE bug 1237370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237418">SUSE bug 1237418</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56171/">CVE-2024-56171 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24928/">CVE-2025-24928 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27113/">CVE-2025-27113 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27113">CVE-2025-27113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966926" comment="libxml2-2-2.9.14-150400.5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966927" comment="libxml2-tools-2.9.14-150400.5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966928" comment="python3-libxml2-2.9.14-150400.5.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206457" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1237431" ref_url="https://bugzilla.suse.com/1237431" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020459.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2025-26597: improper resizing of key actions when nGroups is 0 can lead to buffer overflows in
  XkbChangeTypesOfKey() (bsc#1237431).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-02-28"/>
	<updated date="2025-02-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1237431">SUSE bug 1237431</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966924" comment="libX11-6-1.6.5-150000.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966756" comment="libX11-data-1.6.5-150000.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966925" comment="libX11-xcb1-1.6.5-150000.3.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206458" version="1" class="patch">
	<metadata>
		<title>Security update for u-boot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1237284" ref_url="https://bugzilla.suse.com/1237284" source="BUGZILLA"/>
		<reference ref_id="1237287" ref_url="https://bugzilla.suse.com/1237287" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-57256" ref_url="https://www.suse.com/security/cve/CVE-2024-57256/" source="CVE"/>
		<reference ref_id="CVE-2024-57258" ref_url="https://www.suse.com/security/cve/CVE-2024-57258/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020474.html" source="SUSE-SU"/>
		<description>
This update for u-boot fixes the following issues:

- CVE-2024-57256: integer overflow in U-Boot's ext4 symlink resolution function (bsc#1237284).
- CVE-2024-57258: multiple integer overflows in U-Boot's memory allocator (bsc#1237287).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-03"/>
	<updated date="2025-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1237284">SUSE bug 1237284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237287">SUSE bug 1237287</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57256/">CVE-2024-57256 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57256">CVE-2024-57256 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57258/">CVE-2024-57258 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57258">CVE-2024-57258 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967082" comment="u-boot-rpiarm64-2021.10-150400.4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206459" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1236974" ref_url="https://bugzilla.suse.com/1236974" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-12243" ref_url="https://www.suse.com/security/cve/CVE-2024-12243/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020472.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2024-12243: quadratic complexity of DER input decoding in libtasn1 can lead to a DoS (bsc#1236974).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-03"/>
	<updated date="2025-03-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1236974">SUSE bug 1236974</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12243/">CVE-2024-12243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12243">CVE-2024-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967083" comment="gnutls-3.7.3-150400.4.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967084" comment="libgnutls30-3.7.3-150400.4.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967085" comment="libgnutls30-hmac-3.7.3-150400.4.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206460" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1234089" ref_url="https://bugzilla.suse.com/1234089" source="BUGZILLA"/>
		<reference ref_id="1237335" ref_url="https://bugzilla.suse.com/1237335" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29018" ref_url="https://www.suse.com/security/cve/CVE-2024-29018/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020478.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

Update to Docker 27.5.1-ce (bsc#1237335):

- CVE-2024-29018: External DNS requests from 'internal' networks could lead to data exfiltration (bsc#1234089).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-04"/>
	<updated date="2025-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1234089">SUSE bug 1234089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237335">SUSE bug 1237335</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-29018/">CVE-2024-29018 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29018">CVE-2024-29018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967143" comment="docker-27.5.1_ce-150000.215.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206461" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1237641" ref_url="https://bugzilla.suse.com/1237641" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020482.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2025-27144: Fixed denial of service in parsing function of embedded library Go JOSE (bsc#1237641)
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-05"/>
	<updated date="2025-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1237641">SUSE bug 1237641</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967209" comment="podman-4.9.5-150400.4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967210" comment="podman-remote-4.9.5-150400.4.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206462" version="1" class="patch">
	<metadata>
		<title>Recommended update for python3-M2Crypto (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1205042" ref_url="https://bugzilla.suse.com/1205042" source="BUGZILLA"/>
		<reference ref_id="1231589" ref_url="https://bugzilla.suse.com/1231589" source="BUGZILLA"/>
		<reference ref_id="1236664" ref_url="https://bugzilla.suse.com/1236664" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25657" ref_url="https://www.suse.com/security/cve/CVE-2020-25657/" source="CVE"/>
		<reference ref_id="SUSE-RU-2025:0800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-March/038638.html" source="SUSE-SU"/>
		<description>
This update for python3-M2Crypto fixes the following issues:

- Fix spelling of BSD-2-Clause license.
- Update to 0.44.0:
- The real license is BSD 2-Clause, not MIT.
- Remove python-M2Crypto.keyring, because PyPI broke GPG support
- Build for modern python stack on SLE/Leap
- require setuptools
- Make tests running again.
- Remove unnecessary fdupes call
- Add python-typing as a dependency
- SLE12 requires swig3 for a successful build, too		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2025-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205042">SUSE bug 1205042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231589">SUSE bug 1231589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236664">SUSE bug 1236664</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25657/">CVE-2020-25657 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25657">CVE-2020-25657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967418" comment="python3-M2Crypto-0.44.0-150400.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206463" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208995" ref_url="https://bugzilla.suse.com/1208995" source="BUGZILLA"/>
		<reference ref_id="1220946" ref_url="https://bugzilla.suse.com/1220946" source="BUGZILLA"/>
		<reference ref_id="1224700" ref_url="https://bugzilla.suse.com/1224700" source="BUGZILLA"/>
		<reference ref_id="1225742" ref_url="https://bugzilla.suse.com/1225742" source="BUGZILLA"/>
		<reference ref_id="1232905" ref_url="https://bugzilla.suse.com/1232905" source="BUGZILLA"/>
		<reference ref_id="1232919" ref_url="https://bugzilla.suse.com/1232919" source="BUGZILLA"/>
		<reference ref_id="1234154" ref_url="https://bugzilla.suse.com/1234154" source="BUGZILLA"/>
		<reference ref_id="1234853" ref_url="https://bugzilla.suse.com/1234853" source="BUGZILLA"/>
		<reference ref_id="1234891" ref_url="https://bugzilla.suse.com/1234891" source="BUGZILLA"/>
		<reference ref_id="1234963" ref_url="https://bugzilla.suse.com/1234963" source="BUGZILLA"/>
		<reference ref_id="1235054" ref_url="https://bugzilla.suse.com/1235054" source="BUGZILLA"/>
		<reference ref_id="1235061" ref_url="https://bugzilla.suse.com/1235061" source="BUGZILLA"/>
		<reference ref_id="1235073" ref_url="https://bugzilla.suse.com/1235073" source="BUGZILLA"/>
		<reference ref_id="1236661" ref_url="https://bugzilla.suse.com/1236661" source="BUGZILLA"/>
		<reference ref_id="1236675" ref_url="https://bugzilla.suse.com/1236675" source="BUGZILLA"/>
		<reference ref_id="1236677" ref_url="https://bugzilla.suse.com/1236677" source="BUGZILLA"/>
		<reference ref_id="1236757" ref_url="https://bugzilla.suse.com/1236757" source="BUGZILLA"/>
		<reference ref_id="1236758" ref_url="https://bugzilla.suse.com/1236758" source="BUGZILLA"/>
		<reference ref_id="1236760" ref_url="https://bugzilla.suse.com/1236760" source="BUGZILLA"/>
		<reference ref_id="1236761" ref_url="https://bugzilla.suse.com/1236761" source="BUGZILLA"/>
		<reference ref_id="1237025" ref_url="https://bugzilla.suse.com/1237025" source="BUGZILLA"/>
		<reference ref_id="1237028" ref_url="https://bugzilla.suse.com/1237028" source="BUGZILLA"/>
		<reference ref_id="1237139" ref_url="https://bugzilla.suse.com/1237139" source="BUGZILLA"/>
		<reference ref_id="1237316" ref_url="https://bugzilla.suse.com/1237316" source="BUGZILLA"/>
		<reference ref_id="1237693" ref_url="https://bugzilla.suse.com/1237693" source="BUGZILLA"/>
		<reference ref_id="1238033" ref_url="https://bugzilla.suse.com/1238033" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-49080" ref_url="https://www.suse.com/security/cve/CVE-2022-49080/" source="CVE"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-52572" ref_url="https://www.suse.com/security/cve/CVE-2023-52572/" source="CVE"/>
		<reference ref_id="CVE-2024-35949" ref_url="https://www.suse.com/security/cve/CVE-2024-35949/" source="CVE"/>
		<reference ref_id="CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115/" source="CVE"/>
		<reference ref_id="CVE-2024-50128" ref_url="https://www.suse.com/security/cve/CVE-2024-50128/" source="CVE"/>
		<reference ref_id="CVE-2024-53135" ref_url="https://www.suse.com/security/cve/CVE-2024-53135/" source="CVE"/>
		<reference ref_id="CVE-2024-53173" ref_url="https://www.suse.com/security/cve/CVE-2024-53173/" source="CVE"/>
		<reference ref_id="CVE-2024-53239" ref_url="https://www.suse.com/security/cve/CVE-2024-53239/" source="CVE"/>
		<reference ref_id="CVE-2024-56539" ref_url="https://www.suse.com/security/cve/CVE-2024-56539/" source="CVE"/>
		<reference ref_id="CVE-2024-56548" ref_url="https://www.suse.com/security/cve/CVE-2024-56548/" source="CVE"/>
		<reference ref_id="CVE-2024-56605" ref_url="https://www.suse.com/security/cve/CVE-2024-56605/" source="CVE"/>
		<reference ref_id="CVE-2024-57948" ref_url="https://www.suse.com/security/cve/CVE-2024-57948/" source="CVE"/>
		<reference ref_id="CVE-2025-21690" ref_url="https://www.suse.com/security/cve/CVE-2025-21690/" source="CVE"/>
		<reference ref_id="CVE-2025-21692" ref_url="https://www.suse.com/security/cve/CVE-2025-21692/" source="CVE"/>
		<reference ref_id="CVE-2025-21699" ref_url="https://www.suse.com/security/cve/CVE-2025-21699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020498.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033).
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).
- CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
- CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154).
- CVE-2024-57948: mac802154: check local interfaces before deleting sdata list (bsc#1236677).
- CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025).
- CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).
- CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (bsc#1237139).

The following non-security bugs were fixed:

- idpf: call set_real_num_queues in idpf_open (bsc#1236661 bsc#1237316).
- ipv4/tcp: do not use per netns ctl sockets (bsc#1237693).
- net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
- net: mana: Cleanup 'mana' debugfs dir after cleanup of all children (bsc#1236760).
- net: mana: Enable debugfs files for MANA device (bsc#1236758).
- net: netvsc: Update default VMBus channels (bsc#1236757).
- scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-fixes).
- x86/kvm: fix is_stale_page_fault() (bsc#1236675).
- x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).
- x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-11"/>
	<updated date="2025-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208995">SUSE bug 1208995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220946">SUSE bug 1220946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224700">SUSE bug 1224700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232905">SUSE bug 1232905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232919">SUSE bug 1232919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234154">SUSE bug 1234154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234853">SUSE bug 1234853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234891">SUSE bug 1234891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234963">SUSE bug 1234963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235054">SUSE bug 1235054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235061">SUSE bug 1235061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235073">SUSE bug 1235073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236661">SUSE bug 1236661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236675">SUSE bug 1236675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236677">SUSE bug 1236677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236757">SUSE bug 1236757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236758">SUSE bug 1236758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236760">SUSE bug 1236760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236761">SUSE bug 1236761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237025">SUSE bug 1237025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237028">SUSE bug 1237028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237139">SUSE bug 1237139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237316">SUSE bug 1237316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237693">SUSE bug 1237693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238033">SUSE bug 1238033</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49080/">CVE-2022-49080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49080">CVE-2022-49080 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52572/">CVE-2023-52572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52572">CVE-2023-52572 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35949/">CVE-2024-35949 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35949">CVE-2024-35949 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50128/">CVE-2024-50128 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53135/">CVE-2024-53135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53135">CVE-2024-53135 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53173/">CVE-2024-53173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53239/">CVE-2024-53239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53239">CVE-2024-53239 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56539/">CVE-2024-56539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56539">CVE-2024-56539 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56548/">CVE-2024-56548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56548">CVE-2024-56548 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56605/">CVE-2024-56605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57948/">CVE-2024-57948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57948">CVE-2024-57948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21690/">CVE-2025-21690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21690">CVE-2025-21690 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21692/">CVE-2025-21692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21692">CVE-2025-21692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21699/">CVE-2025-21699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21699">CVE-2025-21699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967690" comment="kernel-default-5.14.21-150400.24.153.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967665" comment="kernel-default-base-5.14.21-150400.24.153.1.150400.24.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206464" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1208995" ref_url="https://bugzilla.suse.com/1208995" source="BUGZILLA"/>
		<reference ref_id="1220946" ref_url="https://bugzilla.suse.com/1220946" source="BUGZILLA"/>
		<reference ref_id="1224700" ref_url="https://bugzilla.suse.com/1224700" source="BUGZILLA"/>
		<reference ref_id="1225742" ref_url="https://bugzilla.suse.com/1225742" source="BUGZILLA"/>
		<reference ref_id="1232905" ref_url="https://bugzilla.suse.com/1232905" source="BUGZILLA"/>
		<reference ref_id="1232919" ref_url="https://bugzilla.suse.com/1232919" source="BUGZILLA"/>
		<reference ref_id="1234154" ref_url="https://bugzilla.suse.com/1234154" source="BUGZILLA"/>
		<reference ref_id="1234853" ref_url="https://bugzilla.suse.com/1234853" source="BUGZILLA"/>
		<reference ref_id="1234891" ref_url="https://bugzilla.suse.com/1234891" source="BUGZILLA"/>
		<reference ref_id="1234963" ref_url="https://bugzilla.suse.com/1234963" source="BUGZILLA"/>
		<reference ref_id="1235054" ref_url="https://bugzilla.suse.com/1235054" source="BUGZILLA"/>
		<reference ref_id="1235061" ref_url="https://bugzilla.suse.com/1235061" source="BUGZILLA"/>
		<reference ref_id="1235073" ref_url="https://bugzilla.suse.com/1235073" source="BUGZILLA"/>
		<reference ref_id="1236661" ref_url="https://bugzilla.suse.com/1236661" source="BUGZILLA"/>
		<reference ref_id="1236675" ref_url="https://bugzilla.suse.com/1236675" source="BUGZILLA"/>
		<reference ref_id="1236677" ref_url="https://bugzilla.suse.com/1236677" source="BUGZILLA"/>
		<reference ref_id="1236757" ref_url="https://bugzilla.suse.com/1236757" source="BUGZILLA"/>
		<reference ref_id="1236758" ref_url="https://bugzilla.suse.com/1236758" source="BUGZILLA"/>
		<reference ref_id="1236760" ref_url="https://bugzilla.suse.com/1236760" source="BUGZILLA"/>
		<reference ref_id="1236761" ref_url="https://bugzilla.suse.com/1236761" source="BUGZILLA"/>
		<reference ref_id="1237025" ref_url="https://bugzilla.suse.com/1237025" source="BUGZILLA"/>
		<reference ref_id="1237028" ref_url="https://bugzilla.suse.com/1237028" source="BUGZILLA"/>
		<reference ref_id="1237139" ref_url="https://bugzilla.suse.com/1237139" source="BUGZILLA"/>
		<reference ref_id="1237316" ref_url="https://bugzilla.suse.com/1237316" source="BUGZILLA"/>
		<reference ref_id="1237693" ref_url="https://bugzilla.suse.com/1237693" source="BUGZILLA"/>
		<reference ref_id="1238033" ref_url="https://bugzilla.suse.com/1238033" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-49080" ref_url="https://www.suse.com/security/cve/CVE-2022-49080/" source="CVE"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-52572" ref_url="https://www.suse.com/security/cve/CVE-2023-52572/" source="CVE"/>
		<reference ref_id="CVE-2024-35949" ref_url="https://www.suse.com/security/cve/CVE-2024-35949/" source="CVE"/>
		<reference ref_id="CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115/" source="CVE"/>
		<reference ref_id="CVE-2024-50128" ref_url="https://www.suse.com/security/cve/CVE-2024-50128/" source="CVE"/>
		<reference ref_id="CVE-2024-53135" ref_url="https://www.suse.com/security/cve/CVE-2024-53135/" source="CVE"/>
		<reference ref_id="CVE-2024-53173" ref_url="https://www.suse.com/security/cve/CVE-2024-53173/" source="CVE"/>
		<reference ref_id="CVE-2024-53239" ref_url="https://www.suse.com/security/cve/CVE-2024-53239/" source="CVE"/>
		<reference ref_id="CVE-2024-56539" ref_url="https://www.suse.com/security/cve/CVE-2024-56539/" source="CVE"/>
		<reference ref_id="CVE-2024-56548" ref_url="https://www.suse.com/security/cve/CVE-2024-56548/" source="CVE"/>
		<reference ref_id="CVE-2024-56605" ref_url="https://www.suse.com/security/cve/CVE-2024-56605/" source="CVE"/>
		<reference ref_id="CVE-2024-57948" ref_url="https://www.suse.com/security/cve/CVE-2024-57948/" source="CVE"/>
		<reference ref_id="CVE-2025-21690" ref_url="https://www.suse.com/security/cve/CVE-2025-21690/" source="CVE"/>
		<reference ref_id="CVE-2025-21692" ref_url="https://www.suse.com/security/cve/CVE-2025-21692/" source="CVE"/>
		<reference ref_id="CVE-2025-21699" ref_url="https://www.suse.com/security/cve/CVE-2025-21699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033).
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).
- CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
- CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154).
- CVE-2024-57948: mac802154: check local interfaces before deleting sdata list (bsc#1236677).
- CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025).
- CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).
- CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (bsc#1237139).

The following non-security bugs were fixed:

- idpf: call set_real_num_queues in idpf_open (bsc#1236661 bsc#1237316).
- ipv4/tcp: do not use per netns ctl sockets (bsc#1237693).
- net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
- net: mana: Cleanup 'mana' debugfs dir after cleanup of all children (bsc#1236760).
- net: mana: Enable debugfs files for MANA device (bsc#1236758).
- net: netvsc: Update default VMBus channels (bsc#1236757).
- scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-fixes).
- x86/kvm: fix is_stale_page_fault() (bsc#1236675).
- x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).
- x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-19"/>
	<updated date="2025-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208995">SUSE bug 1208995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220946">SUSE bug 1220946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224700">SUSE bug 1224700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232905">SUSE bug 1232905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232919">SUSE bug 1232919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234154">SUSE bug 1234154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234853">SUSE bug 1234853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234891">SUSE bug 1234891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234963">SUSE bug 1234963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235054">SUSE bug 1235054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235061">SUSE bug 1235061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235073">SUSE bug 1235073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236661">SUSE bug 1236661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236675">SUSE bug 1236675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236677">SUSE bug 1236677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236757">SUSE bug 1236757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236758">SUSE bug 1236758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236760">SUSE bug 1236760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236761">SUSE bug 1236761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237025">SUSE bug 1237025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237028">SUSE bug 1237028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237139">SUSE bug 1237139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237316">SUSE bug 1237316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237693">SUSE bug 1237693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238033">SUSE bug 1238033</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49080/">CVE-2022-49080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49080">CVE-2022-49080 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52572/">CVE-2023-52572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52572">CVE-2023-52572 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35949/">CVE-2024-35949 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35949">CVE-2024-35949 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50128/">CVE-2024-50128 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53135/">CVE-2024-53135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53135">CVE-2024-53135 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53173/">CVE-2024-53173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53239/">CVE-2024-53239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53239">CVE-2024-53239 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56539/">CVE-2024-56539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56539">CVE-2024-56539 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56548/">CVE-2024-56548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56548">CVE-2024-56548 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56605/">CVE-2024-56605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57948/">CVE-2024-57948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57948">CVE-2024-57948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21690/">CVE-2025-21690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21690">CVE-2025-21690 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21692/">CVE-2025-21692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21692">CVE-2025-21692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21699/">CVE-2025-21699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21699">CVE-2025-21699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968657" comment="kernel-rt-5.14.21-150400.15.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968658" comment="kernel-source-rt-5.14.21-150400.15.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206465" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1238610" ref_url="https://bugzilla.suse.com/1238610" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-25724" ref_url="https://www.suse.com/security/cve/CVE-2025-25724/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020576.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2025-25724: Fixed buffer overflow vulnerability in function list_item_verbose() in tar/util.c (bsc#1238610).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-21"/>
	<updated date="2025-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1238610">SUSE bug 1238610</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25724/">CVE-2025-25724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25724">CVE-2025-25724 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969035" comment="libarchive13-3.5.1-150400.3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206466" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1239465" ref_url="https://bugzilla.suse.com/1239465" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-27363" ref_url="https://www.suse.com/security/cve/CVE-2025-27363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020586.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2025-27363: Fixed out-of-bounds write when attempting to parse font 
  subglyph structures related to TrueType GX and variable font files (bsc#1239465).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-03-25"/>
	<updated date="2025-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1239465">SUSE bug 1239465</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27363/">CVE-2025-27363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27363">CVE-2025-27363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969532" comment="libfreetype6-2.10.4-150000.4.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206467" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1240532" ref_url="https://bugzilla.suse.com/1240532" source="BUGZILLA"/>
		<reference ref_id="1246130" ref_url="https://bugzilla.suse.com/1246130" source="BUGZILLA"/>
		<reference ref_id="1254325" ref_url="https://bugzilla.suse.com/1254325" source="BUGZILLA"/>
		<reference ref_id="1254400" ref_url="https://bugzilla.suse.com/1254400" source="BUGZILLA"/>
		<reference ref_id="1254903" ref_url="https://bugzilla.suse.com/1254903" source="BUGZILLA"/>
		<reference ref_id="1254904" ref_url="https://bugzilla.suse.com/1254904" source="BUGZILLA"/>
		<reference ref_id="1254905" ref_url="https://bugzilla.suse.com/1254905" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<reference ref_id="CVE-2025-67724" ref_url="https://www.suse.com/security/cve/CVE-2025-67724/" source="CVE"/>
		<reference ref_id="CVE-2025-67725" ref_url="https://www.suse.com/security/cve/CVE-2025-67725/" source="CVE"/>
		<reference ref_id="CVE-2025-67726" ref_url="https://www.suse.com/security/cve/CVE-2025-67726/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024910.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Security issues fixed:

  * CVE-2025-67724: Fixed missing validation of supplied reason phrase (bsc#1254903)
  * CVE-2025-67725: Fixed DoS via malicious HTTP request (bsc#1254905)
  * CVE-2025-67726: Fixed HTTP header parameter parsing algorithm (bsc#1254904)
  * CVE-2025-13836: Set a safe limit to http.client response read (bsc#1254400)

- Made syntax in httputil_test compatible with Python 3.6
- Fixed KeyError in postgres module with PostgreSQL 17 (bsc#1254325)
- Use internal deb classes instead of external aptsource lib
- Improved wheel key.finger call (bsc#1240532)
- Improved utils.find_json function (bsc#1246130)
- Extended warn_until period to 2027
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1240532">SUSE bug 1240532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246130">SUSE bug 1246130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254325">SUSE bug 1254325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254400">SUSE bug 1254400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254903">SUSE bug 1254903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254904">SUSE bug 1254904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254905">SUSE bug 1254905</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67724/">CVE-2025-67724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67724">CVE-2025-67724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67725/">CVE-2025-67725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67725">CVE-2025-67725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67726/">CVE-2025-67726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67726">CVE-2025-67726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050898" comment="python3-salt-3006.0-150400.8.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050899" comment="salt-3006.0-150400.8.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050900" comment="salt-minion-3006.0-150400.8.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050901" comment="salt-transactional-update-3006.0-150400.8.94.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206468" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1259418" ref_url="https://bugzilla.suse.com/1259418" source="BUGZILLA"/>
		<reference ref_id="1259650" ref_url="https://bugzilla.suse.com/1259650" source="BUGZILLA"/>
		<reference ref_id="1259697" ref_url="https://bugzilla.suse.com/1259697" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-29111" ref_url="https://www.suse.com/security/cve/CVE-2026-29111/" source="CVE"/>
		<reference ref_id="CVE-2026-4105" ref_url="https://www.suse.com/security/cve/CVE-2026-4105/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024948.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2026-4105: privilege escalation due to improper access control in RegisterMachine D-Bus method (bsc#1259650).
- CVE-2026-29111: local unprivileged user can trigger an assert in systemd (bsc#1259418).
- udev: check for invalid chars in various fields received from the kernel (bsc#1259697).  

Changelog:

- 6a38d88a42 machined: reject invalid class types when registering machines
- 8c9a592e5a udev: fix review mixup
- b57007a917 udev-builtin-net-id: print cescaped bad attributes
- ee23c7604b udev-builtin-net_id: do not assume the current interface name is ethX
- 0f63e799e6 udev: ensure tag parsing stays within bounds
- 046f52ec12 udev: ensure there is space for trailing NUL before calling sprintf
- 5be21460ce udev: check for invalid chars in various fields received from the kernel
- 9559607b16 core/cgroup: avoid one unnecessary strjoina()
- fcae348ca4 core: validate input cgroup path more prudently
- a3ca6b3031 alloc-util: add strdupa_safe() + strndupa_safe() and use it everywhere
- 08125d6b06 units: add dep on systemd-logind.service by user@.service
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259418">SUSE bug 1259418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259650">SUSE bug 1259650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259697">SUSE bug 1259697</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-29111/">CVE-2026-29111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-29111">CVE-2026-29111 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4105/">CVE-2026-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4105">CVE-2026-4105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051425" comment="libsystemd0-249.17-150400.8.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051426" comment="libudev1-249.17-150400.8.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051427" comment="systemd-249.17-150400.8.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051428" comment="systemd-container-249.17-150400.8.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051429" comment="systemd-journal-remote-249.17-150400.8.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051430" comment="systemd-sysvinit-249.17-150400.8.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051431" comment="udev-249.17-150400.8.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206469" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254670" ref_url="https://bugzilla.suse.com/1254670" source="BUGZILLA"/>
		<reference ref_id="1259619" ref_url="https://bugzilla.suse.com/1259619" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-70873" ref_url="https://www.suse.com/security/cve/CVE-2025-70873/" source="CVE"/>
		<reference ref_id="CVE-2025-7709" ref_url="https://www.suse.com/security/cve/CVE-2025-7709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024944.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

Update sqlite3 to 3.51.3:

- CVE-2025-7709: Integer Overflow in FTS5 Extension (bsc#1254670).
- CVE-2025-70873: SQLite zipfile extension may disclose uninitialized heap memory during inflation (bsc#1259619).

Changelog:

 * Fix the WAL-reset database corruption bug:
   https://sqlite.org/wal.html#walresetbug
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254670">SUSE bug 1254670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259619">SUSE bug 1259619</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-70873/">CVE-2025-70873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-70873">CVE-2025-70873 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-7709/">CVE-2025-7709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7709">CVE-2025-7709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051420" comment="libsqlite3-0-3.51.3-150000.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051432" comment="sqlite3-tcl-3.51.3-150000.3.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206470" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254867" ref_url="https://bugzilla.suse.com/1254867" source="BUGZILLA"/>
		<reference ref_id="1259829" ref_url="https://bugzilla.suse.com/1259829" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024942.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issue:

- CVE-2025-66471: excessive resource consumption via decompression of highly compressed data in Streaming API
  (bsc#1254867).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254867">SUSE bug 1254867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259829">SUSE bug 1259829</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051071" comment="python3-urllib3-1.25.10-150300.4.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206471" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1257181" ref_url="https://bugzilla.suse.com/1257181" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024967.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2026-1299: header injection when an email is serialized due to improper newline quoting in BytesGenerator (bsc#1257181).		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257181">SUSE bug 1257181</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051421" comment="libpython3_6m1_0-3.6.15-150300.10.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051422" comment="python3-3.6.15-150300.10.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051423" comment="python3-base-3.6.15-150300.10.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206472" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246602" ref_url="https://bugzilla.suse.com/1246602" source="BUGZILLA"/>
		<reference ref_id="1258229" ref_url="https://bugzilla.suse.com/1258229" source="BUGZILLA"/>
		<reference ref_id="1259051" ref_url="https://bugzilla.suse.com/1259051" source="BUGZILLA"/>
		<reference ref_id="1259052" ref_url="https://bugzilla.suse.com/1259052" source="BUGZILLA"/>
		<reference ref_id="1259053" ref_url="https://bugzilla.suse.com/1259053" source="BUGZILLA"/>
		<reference ref_id="1259054" ref_url="https://bugzilla.suse.com/1259054" source="BUGZILLA"/>
		<reference ref_id="1259055" ref_url="https://bugzilla.suse.com/1259055" source="BUGZILLA"/>
		<reference ref_id="1259056" ref_url="https://bugzilla.suse.com/1259056" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-53906" ref_url="https://www.suse.com/security/cve/CVE-2025-53906/" source="CVE"/>
		<reference ref_id="CVE-2026-26269" ref_url="https://www.suse.com/security/cve/CVE-2026-26269/" source="CVE"/>
		<reference ref_id="CVE-2026-28417" ref_url="https://www.suse.com/security/cve/CVE-2026-28417/" source="CVE"/>
		<reference ref_id="CVE-2026-28418" ref_url="https://www.suse.com/security/cve/CVE-2026-28418/" source="CVE"/>
		<reference ref_id="CVE-2026-28419" ref_url="https://www.suse.com/security/cve/CVE-2026-28419/" source="CVE"/>
		<reference ref_id="CVE-2026-28420" ref_url="https://www.suse.com/security/cve/CVE-2026-28420/" source="CVE"/>
		<reference ref_id="CVE-2026-28421" ref_url="https://www.suse.com/security/cve/CVE-2026-28421/" source="CVE"/>
		<reference ref_id="CVE-2026-28422" ref_url="https://www.suse.com/security/cve/CVE-2026-28422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024962.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Update Vim to version 9.2.0110:

- CVE-2025-53906: Fixed that malicious zip archive may cause a path traversal in Vim's zip (bsc#1246602).
- CVE-2026-26269: Fixed Netbeans specialKeys stack buffer overflow (bsc#1258229).
- CVE-2026-28417: Fixed crafted URL parsed by netrw plugin can lead to execute arbitrary shell commands (bsc#1259051).
- CVE-2026-28418: Fixed that a malformed tags file can cause an heap-based buffer overflow out-of-bounds read (bsc#1259052)
- CVE-2026-28419: Fixed processing a malformed tags file containing a delimiter can lead to a crash (bsc#1259053)
- CVE-2026-28420: Fixed that processing maximum combining characters in terminal emulator can lead to heap-based buffer overflow write (bsc#1259054)
- CVE-2026-28421: Fixed that a crafted swap file can cause a heap-buffer-overflow and a segmentation fault
- CVE-2026-28422: Fixed that a malicious modeline or plugin can trigger a stack-buffer-overflow (bsc#1259056)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-07"/>
	<updated date="2026-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1246602">SUSE bug 1246602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258229">SUSE bug 1258229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259051">SUSE bug 1259051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259052">SUSE bug 1259052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259053">SUSE bug 1259053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259054">SUSE bug 1259054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259055">SUSE bug 1259055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259056">SUSE bug 1259056</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-53906/">CVE-2025-53906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-26269/">CVE-2026-26269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26269">CVE-2026-26269 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28417/">CVE-2026-28417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28417">CVE-2026-28417 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28418/">CVE-2026-28418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28418">CVE-2026-28418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28419/">CVE-2026-28419 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28419">CVE-2026-28419 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28420/">CVE-2026-28420 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28420">CVE-2026-28420 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28421/">CVE-2026-28421 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28421">CVE-2026-28421 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" cvss4="1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28422/">CVE-2026-28422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28422">CVE-2026-28422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051163" comment="vim-data-common-9.2.0110-150000.5.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051424" comment="vim-small-9.2.0110-150000.5.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206473" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="SUSE-SU-2026:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025018.html" source="SUSE-SU"/>
		<description>

This update for containerd rebuilds it against the current go 1.25 security release.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051974" comment="containerd-1.7.29-150000.130.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206474" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1220137" ref_url="https://bugzilla.suse.com/1220137" source="BUGZILLA"/>
		<reference ref_id="1220144" ref_url="https://bugzilla.suse.com/1220144" source="BUGZILLA"/>
		<reference ref_id="1223007" ref_url="https://bugzilla.suse.com/1223007" source="BUGZILLA"/>
		<reference ref_id="1231084" ref_url="https://bugzilla.suse.com/1231084" source="BUGZILLA"/>
		<reference ref_id="1233038" ref_url="https://bugzilla.suse.com/1233038" source="BUGZILLA"/>
		<reference ref_id="1235905" ref_url="https://bugzilla.suse.com/1235905" source="BUGZILLA"/>
		<reference ref_id="1236104" ref_url="https://bugzilla.suse.com/1236104" source="BUGZILLA"/>
		<reference ref_id="1236208" ref_url="https://bugzilla.suse.com/1236208" source="BUGZILLA"/>
		<reference ref_id="1237885" ref_url="https://bugzilla.suse.com/1237885" source="BUGZILLA"/>
		<reference ref_id="1237906" ref_url="https://bugzilla.suse.com/1237906" source="BUGZILLA"/>
		<reference ref_id="1238414" ref_url="https://bugzilla.suse.com/1238414" source="BUGZILLA"/>
		<reference ref_id="1238754" ref_url="https://bugzilla.suse.com/1238754" source="BUGZILLA"/>
		<reference ref_id="1238763" ref_url="https://bugzilla.suse.com/1238763" source="BUGZILLA"/>
		<reference ref_id="1238917" ref_url="https://bugzilla.suse.com/1238917" source="BUGZILLA"/>
		<reference ref_id="1244758" ref_url="https://bugzilla.suse.com/1244758" source="BUGZILLA"/>
		<reference ref_id="1244904" ref_url="https://bugzilla.suse.com/1244904" source="BUGZILLA"/>
		<reference ref_id="1245110" ref_url="https://bugzilla.suse.com/1245110" source="BUGZILLA"/>
		<reference ref_id="1248306" ref_url="https://bugzilla.suse.com/1248306" source="BUGZILLA"/>
		<reference ref_id="1248377" ref_url="https://bugzilla.suse.com/1248377" source="BUGZILLA"/>
		<reference ref_id="1249156" ref_url="https://bugzilla.suse.com/1249156" source="BUGZILLA"/>
		<reference ref_id="1249158" ref_url="https://bugzilla.suse.com/1249158" source="BUGZILLA"/>
		<reference ref_id="1249827" ref_url="https://bugzilla.suse.com/1249827" source="BUGZILLA"/>
		<reference ref_id="1252785" ref_url="https://bugzilla.suse.com/1252785" source="BUGZILLA"/>
		<reference ref_id="1253028" ref_url="https://bugzilla.suse.com/1253028" source="BUGZILLA"/>
		<reference ref_id="1253409" ref_url="https://bugzilla.suse.com/1253409" source="BUGZILLA"/>
		<reference ref_id="1254462" ref_url="https://bugzilla.suse.com/1254462" source="BUGZILLA"/>
		<reference ref_id="1254463" ref_url="https://bugzilla.suse.com/1254463" source="BUGZILLA"/>
		<reference ref_id="1254464" ref_url="https://bugzilla.suse.com/1254464" source="BUGZILLA"/>
		<reference ref_id="1254767" ref_url="https://bugzilla.suse.com/1254767" source="BUGZILLA"/>
		<reference ref_id="1255075" ref_url="https://bugzilla.suse.com/1255075" source="BUGZILLA"/>
		<reference ref_id="1255171" ref_url="https://bugzilla.suse.com/1255171" source="BUGZILLA"/>
		<reference ref_id="1256623" ref_url="https://bugzilla.suse.com/1256623" source="BUGZILLA"/>
		<reference ref_id="1256645" ref_url="https://bugzilla.suse.com/1256645" source="BUGZILLA"/>
		<reference ref_id="1256726" ref_url="https://bugzilla.suse.com/1256726" source="BUGZILLA"/>
		<reference ref_id="1256792" ref_url="https://bugzilla.suse.com/1256792" source="BUGZILLA"/>
		<reference ref_id="1257231" ref_url="https://bugzilla.suse.com/1257231" source="BUGZILLA"/>
		<reference ref_id="1257232" ref_url="https://bugzilla.suse.com/1257232" source="BUGZILLA"/>
		<reference ref_id="1257236" ref_url="https://bugzilla.suse.com/1257236" source="BUGZILLA"/>
		<reference ref_id="1257296" ref_url="https://bugzilla.suse.com/1257296" source="BUGZILLA"/>
		<reference ref_id="1257473" ref_url="https://bugzilla.suse.com/1257473" source="BUGZILLA"/>
		<reference ref_id="1257732" ref_url="https://bugzilla.suse.com/1257732" source="BUGZILLA"/>
		<reference ref_id="1257735" ref_url="https://bugzilla.suse.com/1257735" source="BUGZILLA"/>
		<reference ref_id="1257749" ref_url="https://bugzilla.suse.com/1257749" source="BUGZILLA"/>
		<reference ref_id="1257771" ref_url="https://bugzilla.suse.com/1257771" source="BUGZILLA"/>
		<reference ref_id="1257790" ref_url="https://bugzilla.suse.com/1257790" source="BUGZILLA"/>
		<reference ref_id="1258340" ref_url="https://bugzilla.suse.com/1258340" source="BUGZILLA"/>
		<reference ref_id="1258395" ref_url="https://bugzilla.suse.com/1258395" source="BUGZILLA"/>
		<reference ref_id="1258518" ref_url="https://bugzilla.suse.com/1258518" source="BUGZILLA"/>
		<reference ref_id="1258849" ref_url="https://bugzilla.suse.com/1258849" source="BUGZILLA"/>
		<reference ref_id="1258850" ref_url="https://bugzilla.suse.com/1258850" source="BUGZILLA"/>
		<reference ref_id="1259857" ref_url="https://bugzilla.suse.com/1259857" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-49604" ref_url="https://www.suse.com/security/cve/CVE-2022-49604/" source="CVE"/>
		<reference ref_id="CVE-2022-49943" ref_url="https://www.suse.com/security/cve/CVE-2022-49943/" source="CVE"/>
		<reference ref_id="CVE-2022-49980" ref_url="https://www.suse.com/security/cve/CVE-2022-49980/" source="CVE"/>
		<reference ref_id="CVE-2022-50232" ref_url="https://www.suse.com/security/cve/CVE-2022-50232/" source="CVE"/>
		<reference ref_id="CVE-2023-52433" ref_url="https://www.suse.com/security/cve/CVE-2023-52433/" source="CVE"/>
		<reference ref_id="CVE-2023-52923" ref_url="https://www.suse.com/security/cve/CVE-2023-52923/" source="CVE"/>
		<reference ref_id="CVE-2023-53178" ref_url="https://www.suse.com/security/cve/CVE-2023-53178/" source="CVE"/>
		<reference ref_id="CVE-2023-53407" ref_url="https://www.suse.com/security/cve/CVE-2023-53407/" source="CVE"/>
		<reference ref_id="CVE-2023-53412" ref_url="https://www.suse.com/security/cve/CVE-2023-53412/" source="CVE"/>
		<reference ref_id="CVE-2023-53417" ref_url="https://www.suse.com/security/cve/CVE-2023-53417/" source="CVE"/>
		<reference ref_id="CVE-2023-53418" ref_url="https://www.suse.com/security/cve/CVE-2023-53418/" source="CVE"/>
		<reference ref_id="CVE-2024-26581" ref_url="https://www.suse.com/security/cve/CVE-2024-26581/" source="CVE"/>
		<reference ref_id="CVE-2024-26832" ref_url="https://www.suse.com/security/cve/CVE-2024-26832/" source="CVE"/>
		<reference ref_id="CVE-2024-46854" ref_url="https://www.suse.com/security/cve/CVE-2024-46854/" source="CVE"/>
		<reference ref_id="CVE-2024-50143" ref_url="https://www.suse.com/security/cve/CVE-2024-50143/" source="CVE"/>
		<reference ref_id="CVE-2024-54031" ref_url="https://www.suse.com/security/cve/CVE-2024-54031/" source="CVE"/>
		<reference ref_id="CVE-2025-21658" ref_url="https://www.suse.com/security/cve/CVE-2025-21658/" source="CVE"/>
		<reference ref_id="CVE-2025-21738" ref_url="https://www.suse.com/security/cve/CVE-2025-21738/" source="CVE"/>
		<reference ref_id="CVE-2025-21760" ref_url="https://www.suse.com/security/cve/CVE-2025-21760/" source="CVE"/>
		<reference ref_id="CVE-2025-21764" ref_url="https://www.suse.com/security/cve/CVE-2025-21764/" source="CVE"/>
		<reference ref_id="CVE-2025-21765" ref_url="https://www.suse.com/security/cve/CVE-2025-21765/" source="CVE"/>
		<reference ref_id="CVE-2025-21766" ref_url="https://www.suse.com/security/cve/CVE-2025-21766/" source="CVE"/>
		<reference ref_id="CVE-2025-38563" ref_url="https://www.suse.com/security/cve/CVE-2025-38563/" source="CVE"/>
		<reference ref_id="CVE-2025-38565" ref_url="https://www.suse.com/security/cve/CVE-2025-38565/" source="CVE"/>
		<reference ref_id="CVE-2025-38684" ref_url="https://www.suse.com/security/cve/CVE-2025-38684/" source="CVE"/>
		<reference ref_id="CVE-2025-40044" ref_url="https://www.suse.com/security/cve/CVE-2025-40044/" source="CVE"/>
		<reference ref_id="CVE-2025-40139" ref_url="https://www.suse.com/security/cve/CVE-2025-40139/" source="CVE"/>
		<reference ref_id="CVE-2025-40242" ref_url="https://www.suse.com/security/cve/CVE-2025-40242/" source="CVE"/>
		<reference ref_id="CVE-2025-68312" ref_url="https://www.suse.com/security/cve/CVE-2025-68312/" source="CVE"/>
		<reference ref_id="CVE-2025-71066" ref_url="https://www.suse.com/security/cve/CVE-2025-71066/" source="CVE"/>
		<reference ref_id="CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085/" source="CVE"/>
		<reference ref_id="CVE-2025-71112" ref_url="https://www.suse.com/security/cve/CVE-2025-71112/" source="CVE"/>
		<reference ref_id="CVE-2026-22999" ref_url="https://www.suse.com/security/cve/CVE-2026-22999/" source="CVE"/>
		<reference ref_id="CVE-2026-23001" ref_url="https://www.suse.com/security/cve/CVE-2026-23001/" source="CVE"/>
		<reference ref_id="CVE-2026-23004" ref_url="https://www.suse.com/security/cve/CVE-2026-23004/" source="CVE"/>
		<reference ref_id="CVE-2026-23054" ref_url="https://www.suse.com/security/cve/CVE-2026-23054/" source="CVE"/>
		<reference ref_id="CVE-2026-23060" ref_url="https://www.suse.com/security/cve/CVE-2026-23060/" source="CVE"/>
		<reference ref_id="CVE-2026-23074" ref_url="https://www.suse.com/security/cve/CVE-2026-23074/" source="CVE"/>
		<reference ref_id="CVE-2026-23089" ref_url="https://www.suse.com/security/cve/CVE-2026-23089/" source="CVE"/>
		<reference ref_id="CVE-2026-23191" ref_url="https://www.suse.com/security/cve/CVE-2026-23191/" source="CVE"/>
		<reference ref_id="CVE-2026-23204" ref_url="https://www.suse.com/security/cve/CVE-2026-23204/" source="CVE"/>
		<reference ref_id="CVE-2026-23209" ref_url="https://www.suse.com/security/cve/CVE-2026-23209/" source="CVE"/>
		<reference ref_id="CVE-2026-23268" ref_url="https://www.suse.com/security/cve/CVE-2026-23268/" source="CVE"/>
		<reference ref_id="CVE-2026-23269" ref_url="https://www.suse.com/security/cve/CVE-2026-23269/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
- CVE-2025-21738: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (bsc#1238917).
- CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
- CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).
- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change
  (bsc#1256645).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).
- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).
- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).
- CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232).
- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).
- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen&lt;8) to match ESP/ESN spec (bsc#1257735).
- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).
- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).
- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).
- CVE-2026-23204: net: add skb_header_pointer_careful() helper (bsc#1258340).
- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).
- CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management (bsc#1258850).
- CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1259857).

The following non security issues were fixed:

- apparmor: fix differential encoding verification (bsc#1258849).
- apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).
- apparmor: fix memory leak in verify_header (bsc#1258849).
- apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).
- apparmor: fix race between freeing data and fs accessing it (bsc#1258849).
- apparmor: fix race on rawdata dereference (bsc#1258849).
- apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).
- apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).
- apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).
- apparmor: replace recursive profile removal with iterative approach (bsc#1258849).
- apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).
- net: hv_netvsc: reject RSS hash key programming without RX indirection table (bsc#1257473).
- net: tcp: allow zero-window ACK update the window (bsc#1254767).
- net: tcp: send zero-window ACK when no memory (bsc#1254767).
- scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
- tcp: correct handling of extreme memory squeeze (bsc#1254767).
- x86/its: Fix crash during dynamic its initialization (bsc#1257771).
- x86/modules: Set VM_FLUSH_RESET_PERMS in module_alloc() (bsc#1257771).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-27"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220137">SUSE bug 1220137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220144">SUSE bug 1220144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223007">SUSE bug 1223007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231084">SUSE bug 1231084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233038">SUSE bug 1233038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235905">SUSE bug 1235905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236104">SUSE bug 1236104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236208">SUSE bug 1236208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237885">SUSE bug 1237885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237906">SUSE bug 1237906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238414">SUSE bug 1238414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238754">SUSE bug 1238754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238763">SUSE bug 1238763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238917">SUSE bug 1238917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244758">SUSE bug 1244758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244904">SUSE bug 1244904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245110">SUSE bug 1245110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248306">SUSE bug 1248306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248377">SUSE bug 1248377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249156">SUSE bug 1249156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249158">SUSE bug 1249158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249827">SUSE bug 1249827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252785">SUSE bug 1252785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253028">SUSE bug 1253028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253409">SUSE bug 1253409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254462">SUSE bug 1254462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254463">SUSE bug 1254463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254464">SUSE bug 1254464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254767">SUSE bug 1254767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255075">SUSE bug 1255075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255171">SUSE bug 1255171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256623">SUSE bug 1256623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256645">SUSE bug 1256645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256726">SUSE bug 1256726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256792">SUSE bug 1256792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257231">SUSE bug 1257231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257232">SUSE bug 1257232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257236">SUSE bug 1257236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257296">SUSE bug 1257296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257473">SUSE bug 1257473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257732">SUSE bug 1257732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257735">SUSE bug 1257735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257749">SUSE bug 1257749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257771">SUSE bug 1257771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257790">SUSE bug 1257790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258340">SUSE bug 1258340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258395">SUSE bug 1258395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258518">SUSE bug 1258518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258849">SUSE bug 1258849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258850">SUSE bug 1258850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259857">SUSE bug 1259857</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49604/">CVE-2022-49604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49604">CVE-2022-49604 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49943/">CVE-2022-49943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49943">CVE-2022-49943 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49980/">CVE-2022-49980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49980">CVE-2022-49980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50232/">CVE-2022-50232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50232">CVE-2022-50232 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52433/">CVE-2023-52433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52433">CVE-2023-52433 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52923/">CVE-2023-52923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52923">CVE-2023-52923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53178/">CVE-2023-53178 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53178">CVE-2023-53178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53407/">CVE-2023-53407 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53407">CVE-2023-53407 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53412/">CVE-2023-53412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53412">CVE-2023-53412 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53417/">CVE-2023-53417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53417">CVE-2023-53417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-53418/">CVE-2023-53418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53418">CVE-2023-53418 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26581/">CVE-2024-26581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26581">CVE-2024-26581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26832/">CVE-2024-26832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26832">CVE-2024-26832 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46854/">CVE-2024-46854 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46854">CVE-2024-46854 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50143/">CVE-2024-50143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54031/">CVE-2024-54031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21658/">CVE-2025-21658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21658">CVE-2025-21658 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21738/">CVE-2025-21738 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21738">CVE-2025-21738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21760/">CVE-2025-21760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21760">CVE-2025-21760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21764/">CVE-2025-21764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21765/">CVE-2025-21765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21765">CVE-2025-21765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21766/">CVE-2025-21766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21766">CVE-2025-21766 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38563/">CVE-2025-38563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38565/">CVE-2025-38565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38565">CVE-2025-38565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38684/">CVE-2025-38684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40044/">CVE-2025-40044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40139/">CVE-2025-40139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40139">CVE-2025-40139 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40242/">CVE-2025-40242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40242">CVE-2025-40242 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68312/">CVE-2025-68312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68312">CVE-2025-68312 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-71066/">CVE-2025-71066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71066">CVE-2025-71066 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71112/">CVE-2025-71112 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71112">CVE-2025-71112 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22999/">CVE-2026-22999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22999">CVE-2026-22999 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23001/">CVE-2026-23001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23001">CVE-2026-23001 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23004/">CVE-2026-23004 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23004">CVE-2026-23004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23054/">CVE-2026-23054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23054">CVE-2026-23054 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23060/">CVE-2026-23060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23060">CVE-2026-23060 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23074/">CVE-2026-23074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23089/">CVE-2026-23089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23089">CVE-2026-23089 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23191/">CVE-2026-23191 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23191">CVE-2026-23191 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23204/">CVE-2026-23204 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23204">CVE-2026-23204 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23209/">CVE-2026-23209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23209">CVE-2026-23209 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23268/">CVE-2026-23268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23268">CVE-2026-23268 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23269/">CVE-2026-23269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23269">CVE-2026-23269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051976" comment="kernel-rt-5.14.21-150400.15.145.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051977" comment="kernel-source-rt-5.14.21-150400.15.145.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206475" version="1" class="patch">
	<metadata>
		<title>Security update for python-pyasn1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1259803" ref_url="https://bugzilla.suse.com/1259803" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-30922" ref_url="https://www.suse.com/security/cve/CVE-2026-30922/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045194.html" source="SUSE-SU"/>
		<description>
This update for python-pyasn1 fixes the following issues:

- CVE-2026-30922: Denial of Service via Unbounded Recursion (bsc#1259803).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-31"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259803">SUSE bug 1259803</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30922/">CVE-2026-30922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-30922">CVE-2026-30922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052319" comment="python3-pyasn1-0.4.2-150000.3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206476" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1259711" ref_url="https://bugzilla.suse.com/1259711" source="BUGZILLA"/>
		<reference ref_id="1259726" ref_url="https://bugzilla.suse.com/1259726" source="BUGZILLA"/>
		<reference ref_id="1259729" ref_url="https://bugzilla.suse.com/1259729" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-32776" ref_url="https://www.suse.com/security/cve/CVE-2026-32776/" source="CVE"/>
		<reference ref_id="CVE-2026-32777" ref_url="https://www.suse.com/security/cve/CVE-2026-32777/" source="CVE"/>
		<reference ref_id="CVE-2026-32778" ref_url="https://www.suse.com/security/cve/CVE-2026-32778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1166-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045260.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2026-32776: NULL pointer dereference when processing empty external parameter entities inside an entity
  declaration value (bsc#1259726).
- CVE-2026-32777: denial of service due to infinite loop in DTD content parsing (bsc#1259711).
- CVE-2026-32778: NULL pointer dereference in `setContext` on retry after an out-of-memory condition (bsc#1259729).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-02"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259711">SUSE bug 1259711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259726">SUSE bug 1259726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259729">SUSE bug 1259729</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32776/">CVE-2026-32776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32776">CVE-2026-32776 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32777/">CVE-2026-32777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32777">CVE-2026-32777 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32778/">CVE-2026-32778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32778">CVE-2026-32778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052485" comment="libexpat1-2.7.1-150400.3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206477" version="1" class="patch">
	<metadata>
		<title>Security update for python-tornado (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254905" ref_url="https://bugzilla.suse.com/1254905" source="BUGZILLA"/>
		<reference ref_id="1259553" ref_url="https://bugzilla.suse.com/1259553" source="BUGZILLA"/>
		<reference ref_id="1259630" ref_url="https://bugzilla.suse.com/1259630" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-31958" ref_url="https://www.suse.com/security/cve/CVE-2026-31958/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045262.html" source="SUSE-SU"/>
		<description>
This update for python-tornado fixes the following issues:

- CVE-2026-31958: parsing large multipart bodies with many parts can cause a denial of service (bsc#1259553).
- incomplete validation of cookie attributes allows for injection of user-controlled values in other cookie attributes
  (bsc#1259630).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-02"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254905">SUSE bug 1254905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259553">SUSE bug 1259553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259630">SUSE bug 1259630</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31958/">CVE-2026-31958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31958">CVE-2026-31958 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052716" comment="python3-tornado-4.5.3-150000.3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206478" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246399" ref_url="https://bugzilla.suse.com/1246399" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-45582" ref_url="https://www.suse.com/security/cve/CVE-2025-45582/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1177-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045267.html" source="SUSE-SU"/>
		<description>
This update for tar fixes the following issue:

- CVE-2025-45582: file overwrite via directory traversal in crafted TAR archives (bsc#1246399).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-02"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246399">SUSE bug 1246399</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-45582/">CVE-2025-45582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-45582">CVE-2025-45582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052717" comment="tar-1.34-150000.3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206479" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1256418" ref_url="https://bugzilla.suse.com/1256418" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-0716" ref_url="https://www.suse.com/security/cve/CVE-2026-0716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045265.html" source="SUSE-SU"/>
		<description>
This update for libsoup2 fixes the following issue:

- CVE-2026-0716: improper bounds handling may allow out-of-bounds read (bsc#1256418).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-02"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256418">SUSE bug 1256418</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0716/">CVE-2026-0716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0716">CVE-2026-0716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052718" comment="libsoup-2_4-1-2.74.2-150400.3.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206480" version="1" class="patch">
	<metadata>
		<title>Security update for ignition (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1260251" ref_url="https://bugzilla.suse.com/1260251" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-33186" ref_url="https://www.suse.com/security/cve/CVE-2026-33186/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045306.html" source="SUSE-SU"/>
		<description>
This update for ignition fixes the following issue:

- CVE-2026-33186: google.golang.org/grpc: authorization bypass due to improper validation of the HTTP/2: path pseudo-
  header (bsc#1260251)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1260251">SUSE bug 1260251</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33186/">CVE-2026-33186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33186">CVE-2026-33186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053183" comment="ignition-2.15.0-150400.4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053184" comment="ignition-dracut-grub2-2.15.0-150400.4.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206481" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1260441" ref_url="https://bugzilla.suse.com/1260441" source="BUGZILLA"/>
		<reference ref_id="1260442" ref_url="https://bugzilla.suse.com/1260442" source="BUGZILLA"/>
		<reference ref_id="1260443" ref_url="https://bugzilla.suse.com/1260443" source="BUGZILLA"/>
		<reference ref_id="1260444" ref_url="https://bugzilla.suse.com/1260444" source="BUGZILLA"/>
		<reference ref_id="1260445" ref_url="https://bugzilla.suse.com/1260445" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-28387" ref_url="https://www.suse.com/security/cve/CVE-2026-28387/" source="CVE"/>
		<reference ref_id="CVE-2026-28388" ref_url="https://www.suse.com/security/cve/CVE-2026-28388/" source="CVE"/>
		<reference ref_id="CVE-2026-28389" ref_url="https://www.suse.com/security/cve/CVE-2026-28389/" source="CVE"/>
		<reference ref_id="CVE-2026-31789" ref_url="https://www.suse.com/security/cve/CVE-2026-31789/" source="CVE"/>
		<reference ref_id="CVE-2026-31790" ref_url="https://www.suse.com/security/cve/CVE-2026-31790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1214-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045328.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2026-28387: Potential use-after-free in DANE client code (bsc#1260441).
- CVE-2026-28388: NULL Pointer Dereference When Processing a Delta CRL (bsc#1260442).
- CVE-2026-28389: Possible NULL dereference when processing CMS KeyAgreeRecipientInfo (bsc#1260443).
- CVE-2026-31789: Heap buffer overflow in hexadecimal conversion (bsc#1260444).
- CVE-2026-31790: Incorrect failure handling in RSA KEM RSASVE encapsulation (bsc#1260445).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1260441">SUSE bug 1260441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1260442">SUSE bug 1260442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1260443">SUSE bug 1260443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1260444">SUSE bug 1260444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1260445">SUSE bug 1260445</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-28387/">CVE-2026-28387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28387">CVE-2026-28387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-28388/">CVE-2026-28388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28388">CVE-2026-28388 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-28389/">CVE-2026-28389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28389">CVE-2026-28389 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-31789/">CVE-2026-31789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31789">CVE-2026-31789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-31790/">CVE-2026-31790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31790">CVE-2026-31790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053182" comment="libopenssl3-3.0.8-150400.4.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206482" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1259845" ref_url="https://bugzilla.suse.com/1259845" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1247-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045376.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issue:

- CVE-2026-27135: assertion failure due to missing state validation can lead to DoS (bsc#1259845).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259845">SUSE bug 1259845</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056157" comment="libnghttp2-14-1.40.0-150200.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206483" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1253993" ref_url="https://bugzilla.suse.com/1253993" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023780.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

  - CVE-2025-47914: Fixed ssh-agent that could cause a panic due to an
  out-of-bounds read with non validated message size (bsc#1253993)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-14"/>
	<updated date="2026-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1253993">SUSE bug 1253993</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037483" comment="podman-4.9.5-150400.4.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037484" comment="podman-remote-4.9.5-150400.4.65.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206484" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1260441" ref_url="https://bugzilla.suse.com/1260441" source="BUGZILLA"/>
		<reference ref_id="1260442" ref_url="https://bugzilla.suse.com/1260442" source="BUGZILLA"/>
		<reference ref_id="1260443" ref_url="https://bugzilla.suse.com/1260443" source="BUGZILLA"/>
		<reference ref_id="1260444" ref_url="https://bugzilla.suse.com/1260444" source="BUGZILLA"/>
		<reference ref_id="1260445" ref_url="https://bugzilla.suse.com/1260445" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-28387" ref_url="https://www.suse.com/security/cve/CVE-2026-28387/" source="CVE"/>
		<reference ref_id="CVE-2026-28388" ref_url="https://www.suse.com/security/cve/CVE-2026-28388/" source="CVE"/>
		<reference ref_id="CVE-2026-28389" ref_url="https://www.suse.com/security/cve/CVE-2026-28389/" source="CVE"/>
		<reference ref_id="CVE-2026-31789" ref_url="https://www.suse.com/security/cve/CVE-2026-31789/" source="CVE"/>
		<reference ref_id="CVE-2026-31790" ref_url="https://www.suse.com/security/cve/CVE-2026-31790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045370.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2026-28387: Potential use-after-free in DANE client code (bsc#1260441).
- CVE-2026-28388: NULL Pointer Dereference When Processing a Delta CRL (bsc#1260442).
- CVE-2026-28389: Possible NULL dereference when processing CMS KeyAgreeRecipientInfo (bsc#1260443).
- CVE-2026-31789: Heap buffer overflow in hexadecimal conversion (bsc#1260444).
- CVE-2026-31790: Incorrect failure handling in RSA KEM RSASVE encapsulation (bsc#1260445).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1260441">SUSE bug 1260441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1260442">SUSE bug 1260442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1260443">SUSE bug 1260443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1260444">SUSE bug 1260444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1260445">SUSE bug 1260445</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-28387/">CVE-2026-28387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28387">CVE-2026-28387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-28388/">CVE-2026-28388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28388">CVE-2026-28388 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-28389/">CVE-2026-28389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28389">CVE-2026-28389 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-31789/">CVE-2026-31789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31789">CVE-2026-31789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-31790/">CVE-2026-31790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-31790">CVE-2026-31790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056161" comment="libopenssl-1_1-devel-1.1.1l-150400.7.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056162" comment="libopenssl1_1-1.1.1l-150400.7.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056163" comment="libopenssl1_1-hmac-1.1.1l-150400.7.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056164" comment="openssl-1_1-1.1.1l-150400.7.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206485" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1218680" ref_url="https://bugzilla.suse.com/1218680" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36765" ref_url="https://www.suse.com/security/cve/CVE-2022-36765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023873.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2022-36765: Fixed integer overflow to buffer overflow via local network vulnerability (bsc#1218680).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218680">SUSE bug 1218680</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36765/">CVE-2022-36765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36765">CVE-2022-36765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038755" comment="qemu-ovmf-x86_64-202202-150400.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038756" comment="qemu-uefi-aarch64-202202-150400.5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206486" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1255715" ref_url="https://bugzilla.suse.com/1255715" source="BUGZILLA"/>
		<reference ref_id="1256244" ref_url="https://bugzilla.suse.com/1256244" source="BUGZILLA"/>
		<reference ref_id="1256246" ref_url="https://bugzilla.suse.com/1256246" source="BUGZILLA"/>
		<reference ref_id="1256390" ref_url="https://bugzilla.suse.com/1256390" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68973" ref_url="https://www.suse.com/security/cve/CVE-2025-68973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023871.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

- CVE-2025-68973: Fix possible memory corruption in the armor parser (gpg.fail/memcpy)(bsc#1255715).
- Avoid potential downgrade to SHA1 in 3rd party key signatures (gpg.fail/sha1) (bsc#1256246).
- Error out on unverified output for non-detached signatures (gpg.fail/detached) (bsc#1256244).
- Fix Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG (gpg.fail/notdash) (bsc#1256390).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255715">SUSE bug 1255715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256244">SUSE bug 1256244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256246">SUSE bug 1256246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256390">SUSE bug 1256390</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-68973/">CVE-2025-68973 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68973">CVE-2025-68973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039541" comment="gpg2-2.2.27-150300.3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206487" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1256483" ref_url="https://bugzilla.suse.com/1256483" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2026:0216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023869.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Update AMD CPU ucode to 20251203 (bsc#1256483)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256483">SUSE bug 1256483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038760" comment="kernel-firmware-all-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038761" comment="kernel-firmware-amdgpu-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038762" comment="kernel-firmware-ath10k-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038763" comment="kernel-firmware-ath11k-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038764" comment="kernel-firmware-atheros-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038765" comment="kernel-firmware-bluetooth-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038766" comment="kernel-firmware-bnx2-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038767" comment="kernel-firmware-brcm-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038768" comment="kernel-firmware-chelsio-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038769" comment="kernel-firmware-dpaa2-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038770" comment="kernel-firmware-i915-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038771" comment="kernel-firmware-intel-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038772" comment="kernel-firmware-iwlwifi-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038773" comment="kernel-firmware-liquidio-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038774" comment="kernel-firmware-marvell-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038775" comment="kernel-firmware-media-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038776" comment="kernel-firmware-mediatek-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038777" comment="kernel-firmware-mellanox-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038778" comment="kernel-firmware-mwifiex-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038779" comment="kernel-firmware-network-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038780" comment="kernel-firmware-nfp-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038781" comment="kernel-firmware-nvidia-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038782" comment="kernel-firmware-platform-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038783" comment="kernel-firmware-prestera-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038784" comment="kernel-firmware-qcom-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038785" comment="kernel-firmware-qlogic-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038786" comment="kernel-firmware-radeon-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038787" comment="kernel-firmware-realtek-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038788" comment="kernel-firmware-serial-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038789" comment="kernel-firmware-sound-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038790" comment="kernel-firmware-ti-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038791" comment="kernel-firmware-ueagle-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038792" comment="kernel-firmware-usb-network-20220509-150400.4.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038793" comment="ucode-amd-20220509-150400.4.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206488" version="1" class="patch">
	<metadata>
		<title>Security update for python-tornado (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254904" ref_url="https://bugzilla.suse.com/1254904" source="BUGZILLA"/>
		<reference ref_id="1254905" ref_url="https://bugzilla.suse.com/1254905" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-67725" ref_url="https://www.suse.com/security/cve/CVE-2025-67725/" source="CVE"/>
		<reference ref_id="CVE-2025-67726" ref_url="https://www.suse.com/security/cve/CVE-2025-67726/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023863.html" source="SUSE-SU"/>
		<description>
This update for python-tornado fixes the following issues:

- CVE-2025-67725: inefficient algorithm when parsing parameters for HTTP header values (bsc#1254905).
- CVE-2025-67726: Denial of Service (DoS) via maliciously crafted HTTP request caused by the HTTPHeaders.add method (bsc#1254904).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254904">SUSE bug 1254904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254905">SUSE bug 1254905</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67725/">CVE-2025-67725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67725">CVE-2025-67725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67726/">CVE-2025-67726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67726">CVE-2025-67726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039542" comment="python3-tornado-4.5.3-150000.3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206489" version="1" class="patch">
	<metadata>
		<title>Security update for libsodium (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1256070" ref_url="https://bugzilla.suse.com/1256070" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-15444" ref_url="https://www.suse.com/security/cve/CVE-2025-15444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023862.html" source="SUSE-SU"/>
		<description>
This update for libsodium fixes the following issues:

- CVE-2025-15444: fixed cryptographic bypass via improper elliptic curve point validation (bsc#1256070).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256070">SUSE bug 1256070</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-15444/">CVE-2025-15444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15444">CVE-2025-15444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039543" comment="libsodium23-1.0.18-150000.4.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206490" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1256341" ref_url="https://bugzilla.suse.com/1256341" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-13151" ref_url="https://www.suse.com/security/cve/CVE-2025-13151/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023861.html" source="SUSE-SU"/>
		<description>

This update for libtasn1 fixes the following issues:

- CVE-2025-13151: stack-based buffer overflow in `asn1_expend_octet_string` (bsc#1256341).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256341">SUSE bug 1256341</bugzilla>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13151/">CVE-2025-13151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13151">CVE-2025-13151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039544" comment="libtasn1-4.13-150000.4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039545" comment="libtasn1-6-4.13-150000.4.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206491" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1255491" ref_url="https://bugzilla.suse.com/1255491" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68615" ref_url="https://www.suse.com/security/cve/CVE-2025-68615/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023859.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2025-68615: Fixed snmptrapd buffer overflow (bsc#1255491)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1255491">SUSE bug 1255491</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68615/">CVE-2025-68615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68615">CVE-2025-68615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039552" comment="libsnmp40-5.9.4-150300.15.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039553" comment="snmp-mibs-5.9.4-150300.15.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206492" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254876" ref_url="https://bugzilla.suse.com/1254876" source="BUGZILLA"/>
		<reference ref_id="1256399" ref_url="https://bugzilla.suse.com/1256399" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-14523" ref_url="https://www.suse.com/security/cve/CVE-2025-14523/" source="CVE"/>
		<reference ref_id="CVE-2026-0719" ref_url="https://www.suse.com/security/cve/CVE-2026-0719/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023890.html" source="SUSE-SU"/>
		<description>
This update for libsoup2 fixes the following issues:

- CVE-2025-14523: Reject duplicated Host in headers and followed upstream update (bsc#1254876).
- CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399)
  		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254876">SUSE bug 1254876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256399">SUSE bug 1256399</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14523/">CVE-2025-14523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14523">CVE-2025-14523 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0719/">CVE-2026-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0719">CVE-2026-0719 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039554" comment="libsoup-2_4-1-2.74.2-150400.3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206493" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254400" ref_url="https://bugzilla.suse.com/1254400" source="BUGZILLA"/>
		<reference ref_id="1254401" ref_url="https://bugzilla.suse.com/1254401" source="BUGZILLA"/>
		<reference ref_id="1254997" ref_url="https://bugzilla.suse.com/1254997" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<reference ref_id="CVE-2025-13837" ref_url="https://www.suse.com/security/cve/CVE-2025-13837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023681.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2025-12084: cpython: Fixed quadratic algorithm in xml.dom.minidom leading to denial of service (bsc#1254997)
- CVE-2025-13836: Fixed default Content-Lenght read amount from HTTP response (bsc#1254400)
- CVE-2025-13837: Fixed plistlib module denial of service (bsc#1254401)
  		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-05"/>
	<updated date="2026-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254400">SUSE bug 1254400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254401">SUSE bug 1254401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254997">SUSE bug 1254997</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13837/">CVE-2025-13837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036160" comment="libpython3_6m1_0-3.6.15-150300.10.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036161" comment="python3-3.6.15-150300.10.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036162" comment="python3-base-3.6.15-150300.10.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206494" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1249806" ref_url="https://bugzilla.suse.com/1249806" source="BUGZILLA"/>
		<reference ref_id="1251786" ref_url="https://bugzilla.suse.com/1251786" source="BUGZILLA"/>
		<reference ref_id="1252033" ref_url="https://bugzilla.suse.com/1252033" source="BUGZILLA"/>
		<reference ref_id="1252267" ref_url="https://bugzilla.suse.com/1252267" source="BUGZILLA"/>
		<reference ref_id="1252780" ref_url="https://bugzilla.suse.com/1252780" source="BUGZILLA"/>
		<reference ref_id="1252862" ref_url="https://bugzilla.suse.com/1252862" source="BUGZILLA"/>
		<reference ref_id="1253367" ref_url="https://bugzilla.suse.com/1253367" source="BUGZILLA"/>
		<reference ref_id="1253431" ref_url="https://bugzilla.suse.com/1253431" source="BUGZILLA"/>
		<reference ref_id="1253436" ref_url="https://bugzilla.suse.com/1253436" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-50280" ref_url="https://www.suse.com/security/cve/CVE-2022-50280/" source="CVE"/>
		<reference ref_id="CVE-2023-53676" ref_url="https://www.suse.com/security/cve/CVE-2023-53676/" source="CVE"/>
		<reference ref_id="CVE-2025-39967" ref_url="https://www.suse.com/security/cve/CVE-2025-39967/" source="CVE"/>
		<reference ref_id="CVE-2025-40040" ref_url="https://www.suse.com/security/cve/CVE-2025-40040/" source="CVE"/>
		<reference ref_id="CVE-2025-40048" ref_url="https://www.suse.com/security/cve/CVE-2025-40048/" source="CVE"/>
		<reference ref_id="CVE-2025-40121" ref_url="https://www.suse.com/security/cve/CVE-2025-40121/" source="CVE"/>
		<reference ref_id="CVE-2025-40154" ref_url="https://www.suse.com/security/cve/CVE-2025-40154/" source="CVE"/>
		<reference ref_id="CVE-2025-40204" ref_url="https://www.suse.com/security/cve/CVE-2025-40204/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-50280: pnode: terminate at peers of source (bsc#1249806).
- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).
- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).
- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).
- CVE-2025-40121: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (bsc#1253367).
- CVE-2025-40154: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (bsc#1253431).
- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).
- CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033)

The following non-security bugs were fixed:

- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-05"/>
	<updated date="2026-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249806">SUSE bug 1249806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251786">SUSE bug 1251786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252033">SUSE bug 1252033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252267">SUSE bug 1252267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252780">SUSE bug 1252780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252862">SUSE bug 1252862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253367">SUSE bug 1253367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253431">SUSE bug 1253431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253436">SUSE bug 1253436</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50280/">CVE-2022-50280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50280">CVE-2022-50280 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53676/">CVE-2023-53676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53676">CVE-2023-53676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39967/">CVE-2025-39967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39967">CVE-2025-39967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40040/">CVE-2025-40040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40040">CVE-2025-40040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40048/">CVE-2025-40048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40048">CVE-2025-40048 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40121/">CVE-2025-40121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40121">CVE-2025-40121 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40154/">CVE-2025-40154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40154">CVE-2025-40154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40204/">CVE-2025-40204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40204">CVE-2025-40204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036165" comment="kernel-default-5.14.21-150400.24.187.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036141" comment="kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206495" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1256830" ref_url="https://bugzilla.suse.com/1256830" source="BUGZILLA"/>
		<reference ref_id="1256834" ref_url="https://bugzilla.suse.com/1256834" source="BUGZILLA"/>
		<reference ref_id="1256835" ref_url="https://bugzilla.suse.com/1256835" source="BUGZILLA"/>
		<reference ref_id="1256836" ref_url="https://bugzilla.suse.com/1256836" source="BUGZILLA"/>
		<reference ref_id="1256837" ref_url="https://bugzilla.suse.com/1256837" source="BUGZILLA"/>
		<reference ref_id="1256838" ref_url="https://bugzilla.suse.com/1256838" source="BUGZILLA"/>
		<reference ref_id="1256839" ref_url="https://bugzilla.suse.com/1256839" source="BUGZILLA"/>
		<reference ref_id="1256840" ref_url="https://bugzilla.suse.com/1256840" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-15467" ref_url="https://www.suse.com/security/cve/CVE-2025-15467/" source="CVE"/>
		<reference ref_id="CVE-2025-68160" ref_url="https://www.suse.com/security/cve/CVE-2025-68160/" source="CVE"/>
		<reference ref_id="CVE-2025-69418" ref_url="https://www.suse.com/security/cve/CVE-2025-69418/" source="CVE"/>
		<reference ref_id="CVE-2025-69419" ref_url="https://www.suse.com/security/cve/CVE-2025-69419/" source="CVE"/>
		<reference ref_id="CVE-2025-69420" ref_url="https://www.suse.com/security/cve/CVE-2025-69420/" source="CVE"/>
		<reference ref_id="CVE-2025-69421" ref_url="https://www.suse.com/security/cve/CVE-2025-69421/" source="CVE"/>
		<reference ref_id="CVE-2026-22795" ref_url="https://www.suse.com/security/cve/CVE-2026-22795/" source="CVE"/>
		<reference ref_id="CVE-2026-22796" ref_url="https://www.suse.com/security/cve/CVE-2026-22796/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

 - CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256830).
 - CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
 - CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
 - CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
 - CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
 - CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
 - CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
 - CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-28"/>
	<updated date="2026-01-28"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1256830">SUSE bug 1256830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256834">SUSE bug 1256834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256835">SUSE bug 1256835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256836">SUSE bug 1256836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256837">SUSE bug 1256837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256838">SUSE bug 1256838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256839">SUSE bug 1256839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256840">SUSE bug 1256840</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15467/">CVE-2025-15467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15467">CVE-2025-15467 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68160/">CVE-2025-68160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68160">CVE-2025-68160 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69418/">CVE-2025-69418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69418">CVE-2025-69418 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69419/">CVE-2025-69419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69419">CVE-2025-69419 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69420/">CVE-2025-69420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69420">CVE-2025-69420 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69421/">CVE-2025-69421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69421">CVE-2025-69421 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22795/">CVE-2026-22795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22795">CVE-2026-22795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22796/">CVE-2026-22796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22796">CVE-2026-22796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040510" comment="libopenssl3-3.0.8-150400.4.78.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206496" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1249806" ref_url="https://bugzilla.suse.com/1249806" source="BUGZILLA"/>
		<reference ref_id="1251786" ref_url="https://bugzilla.suse.com/1251786" source="BUGZILLA"/>
		<reference ref_id="1252033" ref_url="https://bugzilla.suse.com/1252033" source="BUGZILLA"/>
		<reference ref_id="1252267" ref_url="https://bugzilla.suse.com/1252267" source="BUGZILLA"/>
		<reference ref_id="1252780" ref_url="https://bugzilla.suse.com/1252780" source="BUGZILLA"/>
		<reference ref_id="1252862" ref_url="https://bugzilla.suse.com/1252862" source="BUGZILLA"/>
		<reference ref_id="1253367" ref_url="https://bugzilla.suse.com/1253367" source="BUGZILLA"/>
		<reference ref_id="1253431" ref_url="https://bugzilla.suse.com/1253431" source="BUGZILLA"/>
		<reference ref_id="1253436" ref_url="https://bugzilla.suse.com/1253436" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-50280" ref_url="https://www.suse.com/security/cve/CVE-2022-50280/" source="CVE"/>
		<reference ref_id="CVE-2023-53676" ref_url="https://www.suse.com/security/cve/CVE-2023-53676/" source="CVE"/>
		<reference ref_id="CVE-2025-39967" ref_url="https://www.suse.com/security/cve/CVE-2025-39967/" source="CVE"/>
		<reference ref_id="CVE-2025-40040" ref_url="https://www.suse.com/security/cve/CVE-2025-40040/" source="CVE"/>
		<reference ref_id="CVE-2025-40048" ref_url="https://www.suse.com/security/cve/CVE-2025-40048/" source="CVE"/>
		<reference ref_id="CVE-2025-40121" ref_url="https://www.suse.com/security/cve/CVE-2025-40121/" source="CVE"/>
		<reference ref_id="CVE-2025-40154" ref_url="https://www.suse.com/security/cve/CVE-2025-40154/" source="CVE"/>
		<reference ref_id="CVE-2025-40204" ref_url="https://www.suse.com/security/cve/CVE-2025-40204/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-50280: pnode: terminate at peers of source (bsc#1249806).
- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).
- CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033).
- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).
- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).
- CVE-2025-40121: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (bsc#1253367).
- CVE-2025-40154: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (bsc#1253431).
- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).

The following non-security bugs were fixed:

- scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-05"/>
	<updated date="2026-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1249806">SUSE bug 1249806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251786">SUSE bug 1251786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252033">SUSE bug 1252033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252267">SUSE bug 1252267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252780">SUSE bug 1252780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252862">SUSE bug 1252862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253367">SUSE bug 1253367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253431">SUSE bug 1253431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253436">SUSE bug 1253436</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50280/">CVE-2022-50280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50280">CVE-2022-50280 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53676/">CVE-2023-53676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53676">CVE-2023-53676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39967/">CVE-2025-39967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39967">CVE-2025-39967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40040/">CVE-2025-40040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40040">CVE-2025-40040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40048/">CVE-2025-40048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40048">CVE-2025-40048 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40121/">CVE-2025-40121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40121">CVE-2025-40121 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40154/">CVE-2025-40154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40154">CVE-2025-40154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40204/">CVE-2025-40204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40204">CVE-2025-40204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036166" comment="kernel-rt-5.14.21-150400.15.139.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036167" comment="kernel-source-rt-5.14.21-150400.15.139.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206497" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1256834" ref_url="https://bugzilla.suse.com/1256834" source="BUGZILLA"/>
		<reference ref_id="1256835" ref_url="https://bugzilla.suse.com/1256835" source="BUGZILLA"/>
		<reference ref_id="1256836" ref_url="https://bugzilla.suse.com/1256836" source="BUGZILLA"/>
		<reference ref_id="1256837" ref_url="https://bugzilla.suse.com/1256837" source="BUGZILLA"/>
		<reference ref_id="1256838" ref_url="https://bugzilla.suse.com/1256838" source="BUGZILLA"/>
		<reference ref_id="1256839" ref_url="https://bugzilla.suse.com/1256839" source="BUGZILLA"/>
		<reference ref_id="1256840" ref_url="https://bugzilla.suse.com/1256840" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68160" ref_url="https://www.suse.com/security/cve/CVE-2025-68160/" source="CVE"/>
		<reference ref_id="CVE-2025-69418" ref_url="https://www.suse.com/security/cve/CVE-2025-69418/" source="CVE"/>
		<reference ref_id="CVE-2025-69419" ref_url="https://www.suse.com/security/cve/CVE-2025-69419/" source="CVE"/>
		<reference ref_id="CVE-2025-69420" ref_url="https://www.suse.com/security/cve/CVE-2025-69420/" source="CVE"/>
		<reference ref_id="CVE-2025-69421" ref_url="https://www.suse.com/security/cve/CVE-2025-69421/" source="CVE"/>
		<reference ref_id="CVE-2026-22795" ref_url="https://www.suse.com/security/cve/CVE-2026-22795/" source="CVE"/>
		<reference ref_id="CVE-2026-22796" ref_url="https://www.suse.com/security/cve/CVE-2026-22796/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing (bsc#1256839).
- CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response() function (bsc#1256837).
- CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (bsc#1256838).
- CVE-2026-22796: ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (bsc#1256840).
- CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes (bsc#1256834).
- CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (bsc#1256835).
- CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (bsc#1256836).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-02"/>
	<updated date="2026-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256834">SUSE bug 1256834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256835">SUSE bug 1256835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256836">SUSE bug 1256836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256837">SUSE bug 1256837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256838">SUSE bug 1256838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256839">SUSE bug 1256839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256840">SUSE bug 1256840</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68160/">CVE-2025-68160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68160">CVE-2025-68160 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69418/">CVE-2025-69418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69418">CVE-2025-69418 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69419/">CVE-2025-69419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69419">CVE-2025-69419 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69420/">CVE-2025-69420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69420">CVE-2025-69420 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69421/">CVE-2025-69421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69421">CVE-2025-69421 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22795/">CVE-2026-22795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22795">CVE-2026-22795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22796/">CVE-2026-22796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22796">CVE-2026-22796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041662" comment="libopenssl-1_1-devel-1.1.1l-150400.7.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041663" comment="libopenssl1_1-1.1.1l-150400.7.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041664" comment="libopenssl1_1-hmac-1.1.1l-150400.7.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041665" comment="openssl-1_1-1.1.1l-150400.7.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206498" version="1" class="patch">
	<metadata>
		<title>Security update for libsodium (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1255764" ref_url="https://bugzilla.suse.com/1255764" source="BUGZILLA"/>
		<reference ref_id="1256070" ref_url="https://bugzilla.suse.com/1256070" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-15444" ref_url="https://www.suse.com/security/cve/CVE-2025-15444/" source="CVE"/>
		<reference ref_id="CVE-2025-69277" ref_url="https://www.suse.com/security/cve/CVE-2025-69277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024038.html" source="SUSE-SU"/>
		<description>
This update for libsodium fixes the following issues: 

- CVE-2025-15444: Fixed cryptographic bypass via improper elliptic curve point validation (bsc#1256070).
- CVE-2025-69277: Fixed incorrect validation of elliptic curve points in crypto_core_ed25519_is_valid_point function (bsc#1255764).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1255764">SUSE bug 1255764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256070">SUSE bug 1256070</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-15444/">CVE-2025-15444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15444">CVE-2025-15444 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69277/">CVE-2025-69277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69277">CVE-2025-69277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041952" comment="libsodium23-1.0.18-150000.4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206499" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1251822" ref_url="https://bugzilla.suse.com/1251822" source="BUGZILLA"/>
		<reference ref_id="1253278" ref_url="https://bugzilla.suse.com/1253278" source="BUGZILLA"/>
		<reference ref_id="1253703" ref_url="https://bugzilla.suse.com/1253703" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-12748" ref_url="https://www.suse.com/security/cve/CVE-2025-12748/" source="CVE"/>
		<reference ref_id="CVE-2025-13193" ref_url="https://www.suse.com/security/cve/CVE-2025-13193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024045.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security fixes:
    
  - CVE-2025-13193: Fixed umask for 'qemu-img' when creating external inactive snapshots (bsc#1253703)
  - CVE-2025-12748: Fixed check ACLs before parsing the whole domain XML (bsc#1253278)

Other fixes:
    
  - libvirt-supportconfig: Add support for supportconfig.rc (bsc#1251822)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1251822">SUSE bug 1251822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253278">SUSE bug 1253278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253703">SUSE bug 1253703</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12748/">CVE-2025-12748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12748">CVE-2025-12748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13193/">CVE-2025-13193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13193">CVE-2025-13193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042124" comment="libvirt-client-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042125" comment="libvirt-daemon-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042126" comment="libvirt-daemon-driver-interface-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042127" comment="libvirt-daemon-driver-network-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042128" comment="libvirt-daemon-driver-nodedev-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042129" comment="libvirt-daemon-driver-nwfilter-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042130" comment="libvirt-daemon-driver-qemu-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042131" comment="libvirt-daemon-driver-secret-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042132" comment="libvirt-daemon-driver-storage-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042133" comment="libvirt-daemon-driver-storage-core-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042134" comment="libvirt-daemon-driver-storage-disk-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042135" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042136" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042137" comment="libvirt-daemon-driver-storage-logical-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042138" comment="libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042139" comment="libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042140" comment="libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042141" comment="libvirt-daemon-qemu-8.0.0-150400.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042142" comment="libvirt-libs-8.0.0-150400.7.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206500" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1252692" ref_url="https://bugzilla.suse.com/1252692" source="BUGZILLA"/>
		<reference ref_id="1254180" ref_url="https://bugzilla.suse.com/1254180" source="BUGZILLA"/>
		<reference ref_id="1256745" ref_url="https://bugzilla.suse.com/1256745" source="BUGZILLA"/>
		<reference ref_id="1256747" ref_url="https://bugzilla.suse.com/1256747" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-58149" ref_url="https://www.suse.com/security/cve/CVE-2025-58149/" source="CVE"/>
		<reference ref_id="CVE-2025-58150" ref_url="https://www.suse.com/security/cve/CVE-2025-58150/" source="CVE"/>
		<reference ref_id="CVE-2026-23553" ref_url="https://www.suse.com/security/cve/CVE-2026-23553/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024075.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security fixes:
  
- CVE-2025-58150: Fixed buffer overrun with shadow paging and 
  tracing (XSA-477) (bsc#1256745)
- CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation 
  (XSA-479) (bsc#1256747)
- CVE-2025-58149: Fixed incorrect removal od permissions on PCI
  device unplug allow PV guests to access memory of devices no 
  longer assigned to it (XSA-476) (bsc#1252692)

Other fixes:

- Fixed virtxend service restart. Caused by a failure to start 
  xenstored (bsc#1254180)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-05"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1252692">SUSE bug 1252692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254180">SUSE bug 1254180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256745">SUSE bug 1256745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256747">SUSE bug 1256747</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="4.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58149/">CVE-2025-58149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58149">CVE-2025-58149 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58150/">CVE-2025-58150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58150">CVE-2025-58150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23553/">CVE-2026-23553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23553">CVE-2026-23553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042192" comment="xen-libs-4.16.7_06-150400.4.78.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206501" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254441" ref_url="https://bugzilla.suse.com/1254441" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10158" ref_url="https://www.suse.com/security/cve/CVE-2025-10158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023689.html" source="SUSE-SU"/>
		<description>
This update for rsync fixes the following issues:

- CVE-2025-10158: Fixed out of bounds array access via negative index (bsc#1254441)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-01-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254441">SUSE bug 1254441</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-10158/">CVE-2025-10158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10158">CVE-2025-10158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036401" comment="rsync-3.2.3-150400.3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206502" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1204957" ref_url="https://bugzilla.suse.com/1204957" source="BUGZILLA"/>
		<reference ref_id="1205567" ref_url="https://bugzilla.suse.com/1205567" source="BUGZILLA"/>
		<reference ref_id="1206889" ref_url="https://bugzilla.suse.com/1206889" source="BUGZILLA"/>
		<reference ref_id="1207051" ref_url="https://bugzilla.suse.com/1207051" source="BUGZILLA"/>
		<reference ref_id="1207088" ref_url="https://bugzilla.suse.com/1207088" source="BUGZILLA"/>
		<reference ref_id="1207611" ref_url="https://bugzilla.suse.com/1207611" source="BUGZILLA"/>
		<reference ref_id="1207620" ref_url="https://bugzilla.suse.com/1207620" source="BUGZILLA"/>
		<reference ref_id="1207622" ref_url="https://bugzilla.suse.com/1207622" source="BUGZILLA"/>
		<reference ref_id="1207636" ref_url="https://bugzilla.suse.com/1207636" source="BUGZILLA"/>
		<reference ref_id="1207644" ref_url="https://bugzilla.suse.com/1207644" source="BUGZILLA"/>
		<reference ref_id="1207646" ref_url="https://bugzilla.suse.com/1207646" source="BUGZILLA"/>
		<reference ref_id="1207652" ref_url="https://bugzilla.suse.com/1207652" source="BUGZILLA"/>
		<reference ref_id="1207653" ref_url="https://bugzilla.suse.com/1207653" source="BUGZILLA"/>
		<reference ref_id="1208570" ref_url="https://bugzilla.suse.com/1208570" source="BUGZILLA"/>
		<reference ref_id="1208758" ref_url="https://bugzilla.suse.com/1208758" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1210817" ref_url="https://bugzilla.suse.com/1210817" source="BUGZILLA"/>
		<reference ref_id="1210943" ref_url="https://bugzilla.suse.com/1210943" source="BUGZILLA"/>
		<reference ref_id="1211690" ref_url="https://bugzilla.suse.com/1211690" source="BUGZILLA"/>
		<reference ref_id="1213025" ref_url="https://bugzilla.suse.com/1213025" source="BUGZILLA"/>
		<reference ref_id="1213032" ref_url="https://bugzilla.suse.com/1213032" source="BUGZILLA"/>
		<reference ref_id="1213093" ref_url="https://bugzilla.suse.com/1213093" source="BUGZILLA"/>
		<reference ref_id="1213105" ref_url="https://bugzilla.suse.com/1213105" source="BUGZILLA"/>
		<reference ref_id="1213110" ref_url="https://bugzilla.suse.com/1213110" source="BUGZILLA"/>
		<reference ref_id="1213111" ref_url="https://bugzilla.suse.com/1213111" source="BUGZILLA"/>
		<reference ref_id="1213653" ref_url="https://bugzilla.suse.com/1213653" source="BUGZILLA"/>
		<reference ref_id="1213747" ref_url="https://bugzilla.suse.com/1213747" source="BUGZILLA"/>
		<reference ref_id="1213867" ref_url="https://bugzilla.suse.com/1213867" source="BUGZILLA"/>
		<reference ref_id="1214635" ref_url="https://bugzilla.suse.com/1214635" source="BUGZILLA"/>
		<reference ref_id="1214940" ref_url="https://bugzilla.suse.com/1214940" source="BUGZILLA"/>
		<reference ref_id="1214962" ref_url="https://bugzilla.suse.com/1214962" source="BUGZILLA"/>
		<reference ref_id="1214986" ref_url="https://bugzilla.suse.com/1214986" source="BUGZILLA"/>
		<reference ref_id="1214990" ref_url="https://bugzilla.suse.com/1214990" source="BUGZILLA"/>
		<reference ref_id="1216062" ref_url="https://bugzilla.suse.com/1216062" source="BUGZILLA"/>
		<reference ref_id="1228015" ref_url="https://bugzilla.suse.com/1228015" source="BUGZILLA"/>
		<reference ref_id="1230185" ref_url="https://bugzilla.suse.com/1230185" source="BUGZILLA"/>
		<reference ref_id="1238896" ref_url="https://bugzilla.suse.com/1238896" source="BUGZILLA"/>
		<reference ref_id="1242006" ref_url="https://bugzilla.suse.com/1242006" source="BUGZILLA"/>
		<reference ref_id="1245210" ref_url="https://bugzilla.suse.com/1245210" source="BUGZILLA"/>
		<reference ref_id="1245723" ref_url="https://bugzilla.suse.com/1245723" source="BUGZILLA"/>
		<reference ref_id="1245751" ref_url="https://bugzilla.suse.com/1245751" source="BUGZILLA"/>
		<reference ref_id="1247177" ref_url="https://bugzilla.suse.com/1247177" source="BUGZILLA"/>
		<reference ref_id="1247483" ref_url="https://bugzilla.suse.com/1247483" source="BUGZILLA"/>
		<reference ref_id="1249871" ref_url="https://bugzilla.suse.com/1249871" source="BUGZILLA"/>
		<reference ref_id="1250397" ref_url="https://bugzilla.suse.com/1250397" source="BUGZILLA"/>
		<reference ref_id="1252046" ref_url="https://bugzilla.suse.com/1252046" source="BUGZILLA"/>
		<reference ref_id="1252678" ref_url="https://bugzilla.suse.com/1252678" source="BUGZILLA"/>
		<reference ref_id="1253409" ref_url="https://bugzilla.suse.com/1253409" source="BUGZILLA"/>
		<reference ref_id="1253702" ref_url="https://bugzilla.suse.com/1253702" source="BUGZILLA"/>
		<reference ref_id="1254520" ref_url="https://bugzilla.suse.com/1254520" source="BUGZILLA"/>
		<reference ref_id="1254559" ref_url="https://bugzilla.suse.com/1254559" source="BUGZILLA"/>
		<reference ref_id="1254562" ref_url="https://bugzilla.suse.com/1254562" source="BUGZILLA"/>
		<reference ref_id="1254572" ref_url="https://bugzilla.suse.com/1254572" source="BUGZILLA"/>
		<reference ref_id="1254578" ref_url="https://bugzilla.suse.com/1254578" source="BUGZILLA"/>
		<reference ref_id="1254580" ref_url="https://bugzilla.suse.com/1254580" source="BUGZILLA"/>
		<reference ref_id="1254592" ref_url="https://bugzilla.suse.com/1254592" source="BUGZILLA"/>
		<reference ref_id="1254608" ref_url="https://bugzilla.suse.com/1254608" source="BUGZILLA"/>
		<reference ref_id="1254609" ref_url="https://bugzilla.suse.com/1254609" source="BUGZILLA"/>
		<reference ref_id="1254614" ref_url="https://bugzilla.suse.com/1254614" source="BUGZILLA"/>
		<reference ref_id="1254615" ref_url="https://bugzilla.suse.com/1254615" source="BUGZILLA"/>
		<reference ref_id="1254617" ref_url="https://bugzilla.suse.com/1254617" source="BUGZILLA"/>
		<reference ref_id="1254625" ref_url="https://bugzilla.suse.com/1254625" source="BUGZILLA"/>
		<reference ref_id="1254631" ref_url="https://bugzilla.suse.com/1254631" source="BUGZILLA"/>
		<reference ref_id="1254632" ref_url="https://bugzilla.suse.com/1254632" source="BUGZILLA"/>
		<reference ref_id="1254634" ref_url="https://bugzilla.suse.com/1254634" source="BUGZILLA"/>
		<reference ref_id="1254644" ref_url="https://bugzilla.suse.com/1254644" source="BUGZILLA"/>
		<reference ref_id="1254645" ref_url="https://bugzilla.suse.com/1254645" source="BUGZILLA"/>
		<reference ref_id="1254649" ref_url="https://bugzilla.suse.com/1254649" source="BUGZILLA"/>
		<reference ref_id="1254653" ref_url="https://bugzilla.suse.com/1254653" source="BUGZILLA"/>
		<reference ref_id="1254656" ref_url="https://bugzilla.suse.com/1254656" source="BUGZILLA"/>
		<reference ref_id="1254658" ref_url="https://bugzilla.suse.com/1254658" source="BUGZILLA"/>
		<reference ref_id="1254660" ref_url="https://bugzilla.suse.com/1254660" source="BUGZILLA"/>
		<reference ref_id="1254664" ref_url="https://bugzilla.suse.com/1254664" source="BUGZILLA"/>
		<reference ref_id="1254671" ref_url="https://bugzilla.suse.com/1254671" source="BUGZILLA"/>
		<reference ref_id="1254674" ref_url="https://bugzilla.suse.com/1254674" source="BUGZILLA"/>
		<reference ref_id="1254676" ref_url="https://bugzilla.suse.com/1254676" source="BUGZILLA"/>
		<reference ref_id="1254677" ref_url="https://bugzilla.suse.com/1254677" source="BUGZILLA"/>
		<reference ref_id="1254686" ref_url="https://bugzilla.suse.com/1254686" source="BUGZILLA"/>
		<reference ref_id="1254690" ref_url="https://bugzilla.suse.com/1254690" source="BUGZILLA"/>
		<reference ref_id="1254692" ref_url="https://bugzilla.suse.com/1254692" source="BUGZILLA"/>
		<reference ref_id="1254694" ref_url="https://bugzilla.suse.com/1254694" source="BUGZILLA"/>
		<reference ref_id="1254696" ref_url="https://bugzilla.suse.com/1254696" source="BUGZILLA"/>
		<reference ref_id="1254698" ref_url="https://bugzilla.suse.com/1254698" source="BUGZILLA"/>
		<reference ref_id="1254699" ref_url="https://bugzilla.suse.com/1254699" source="BUGZILLA"/>
		<reference ref_id="1254704" ref_url="https://bugzilla.suse.com/1254704" source="BUGZILLA"/>
		<reference ref_id="1254706" ref_url="https://bugzilla.suse.com/1254706" source="BUGZILLA"/>
		<reference ref_id="1254709" ref_url="https://bugzilla.suse.com/1254709" source="BUGZILLA"/>
		<reference ref_id="1254710" ref_url="https://bugzilla.suse.com/1254710" source="BUGZILLA"/>
		<reference ref_id="1254711" ref_url="https://bugzilla.suse.com/1254711" source="BUGZILLA"/>
		<reference ref_id="1254712" ref_url="https://bugzilla.suse.com/1254712" source="BUGZILLA"/>
		<reference ref_id="1254713" ref_url="https://bugzilla.suse.com/1254713" source="BUGZILLA"/>
		<reference ref_id="1254714" ref_url="https://bugzilla.suse.com/1254714" source="BUGZILLA"/>
		<reference ref_id="1254716" ref_url="https://bugzilla.suse.com/1254716" source="BUGZILLA"/>
		<reference ref_id="1254723" ref_url="https://bugzilla.suse.com/1254723" source="BUGZILLA"/>
		<reference ref_id="1254725" ref_url="https://bugzilla.suse.com/1254725" source="BUGZILLA"/>
		<reference ref_id="1254728" ref_url="https://bugzilla.suse.com/1254728" source="BUGZILLA"/>
		<reference ref_id="1254729" ref_url="https://bugzilla.suse.com/1254729" source="BUGZILLA"/>
		<reference ref_id="1254743" ref_url="https://bugzilla.suse.com/1254743" source="BUGZILLA"/>
		<reference ref_id="1254745" ref_url="https://bugzilla.suse.com/1254745" source="BUGZILLA"/>
		<reference ref_id="1254751" ref_url="https://bugzilla.suse.com/1254751" source="BUGZILLA"/>
		<reference ref_id="1254756" ref_url="https://bugzilla.suse.com/1254756" source="BUGZILLA"/>
		<reference ref_id="1254759" ref_url="https://bugzilla.suse.com/1254759" source="BUGZILLA"/>
		<reference ref_id="1254763" ref_url="https://bugzilla.suse.com/1254763" source="BUGZILLA"/>
		<reference ref_id="1254775" ref_url="https://bugzilla.suse.com/1254775" source="BUGZILLA"/>
		<reference ref_id="1254780" ref_url="https://bugzilla.suse.com/1254780" source="BUGZILLA"/>
		<reference ref_id="1254781" ref_url="https://bugzilla.suse.com/1254781" source="BUGZILLA"/>
		<reference ref_id="1254782" ref_url="https://bugzilla.suse.com/1254782" source="BUGZILLA"/>
		<reference ref_id="1254783" ref_url="https://bugzilla.suse.com/1254783" source="BUGZILLA"/>
		<reference ref_id="1254785" ref_url="https://bugzilla.suse.com/1254785" source="BUGZILLA"/>
		<reference ref_id="1254788" ref_url="https://bugzilla.suse.com/1254788" source="BUGZILLA"/>
		<reference ref_id="1254789" ref_url="https://bugzilla.suse.com/1254789" source="BUGZILLA"/>
		<reference ref_id="1254792" ref_url="https://bugzilla.suse.com/1254792" source="BUGZILLA"/>
		<reference ref_id="1254813" ref_url="https://bugzilla.suse.com/1254813" source="BUGZILLA"/>
		<reference ref_id="1254842" ref_url="https://bugzilla.suse.com/1254842" source="BUGZILLA"/>
		<reference ref_id="1254843" ref_url="https://bugzilla.suse.com/1254843" source="BUGZILLA"/>
		<reference ref_id="1254847" ref_url="https://bugzilla.suse.com/1254847" source="BUGZILLA"/>
		<reference ref_id="1254851" ref_url="https://bugzilla.suse.com/1254851" source="BUGZILLA"/>
		<reference ref_id="1254894" ref_url="https://bugzilla.suse.com/1254894" source="BUGZILLA"/>
		<reference ref_id="1254902" ref_url="https://bugzilla.suse.com/1254902" source="BUGZILLA"/>
		<reference ref_id="1254915" ref_url="https://bugzilla.suse.com/1254915" source="BUGZILLA"/>
		<reference ref_id="1254916" ref_url="https://bugzilla.suse.com/1254916" source="BUGZILLA"/>
		<reference ref_id="1254917" ref_url="https://bugzilla.suse.com/1254917" source="BUGZILLA"/>
		<reference ref_id="1254920" ref_url="https://bugzilla.suse.com/1254920" source="BUGZILLA"/>
		<reference ref_id="1254959" ref_url="https://bugzilla.suse.com/1254959" source="BUGZILLA"/>
		<reference ref_id="1254974" ref_url="https://bugzilla.suse.com/1254974" source="BUGZILLA"/>
		<reference ref_id="1254986" ref_url="https://bugzilla.suse.com/1254986" source="BUGZILLA"/>
		<reference ref_id="1254994" ref_url="https://bugzilla.suse.com/1254994" source="BUGZILLA"/>
		<reference ref_id="1255002" ref_url="https://bugzilla.suse.com/1255002" source="BUGZILLA"/>
		<reference ref_id="1255005" ref_url="https://bugzilla.suse.com/1255005" source="BUGZILLA"/>
		<reference ref_id="1255007" ref_url="https://bugzilla.suse.com/1255007" source="BUGZILLA"/>
		<reference ref_id="1255049" ref_url="https://bugzilla.suse.com/1255049" source="BUGZILLA"/>
		<reference ref_id="1255060" ref_url="https://bugzilla.suse.com/1255060" source="BUGZILLA"/>
		<reference ref_id="1255163" ref_url="https://bugzilla.suse.com/1255163" source="BUGZILLA"/>
		<reference ref_id="1255165" ref_url="https://bugzilla.suse.com/1255165" source="BUGZILLA"/>
		<reference ref_id="1255251" ref_url="https://bugzilla.suse.com/1255251" source="BUGZILLA"/>
		<reference ref_id="1255377" ref_url="https://bugzilla.suse.com/1255377" source="BUGZILLA"/>
		<reference ref_id="1255401" ref_url="https://bugzilla.suse.com/1255401" source="BUGZILLA"/>
		<reference ref_id="1255467" ref_url="https://bugzilla.suse.com/1255467" source="BUGZILLA"/>
		<reference ref_id="1255469" ref_url="https://bugzilla.suse.com/1255469" source="BUGZILLA"/>
		<reference ref_id="1255521" ref_url="https://bugzilla.suse.com/1255521" source="BUGZILLA"/>
		<reference ref_id="1255528" ref_url="https://bugzilla.suse.com/1255528" source="BUGZILLA"/>
		<reference ref_id="1255546" ref_url="https://bugzilla.suse.com/1255546" source="BUGZILLA"/>
		<reference ref_id="1255549" ref_url="https://bugzilla.suse.com/1255549" source="BUGZILLA"/>
		<reference ref_id="1255554" ref_url="https://bugzilla.suse.com/1255554" source="BUGZILLA"/>
		<reference ref_id="1255555" ref_url="https://bugzilla.suse.com/1255555" source="BUGZILLA"/>
		<reference ref_id="1255558" ref_url="https://bugzilla.suse.com/1255558" source="BUGZILLA"/>
		<reference ref_id="1255560" ref_url="https://bugzilla.suse.com/1255560" source="BUGZILLA"/>
		<reference ref_id="1255562" ref_url="https://bugzilla.suse.com/1255562" source="BUGZILLA"/>
		<reference ref_id="1255565" ref_url="https://bugzilla.suse.com/1255565" source="BUGZILLA"/>
		<reference ref_id="1255574" ref_url="https://bugzilla.suse.com/1255574" source="BUGZILLA"/>
		<reference ref_id="1255576" ref_url="https://bugzilla.suse.com/1255576" source="BUGZILLA"/>
		<reference ref_id="1255578" ref_url="https://bugzilla.suse.com/1255578" source="BUGZILLA"/>
		<reference ref_id="1255582" ref_url="https://bugzilla.suse.com/1255582" source="BUGZILLA"/>
		<reference ref_id="1255594" ref_url="https://bugzilla.suse.com/1255594" source="BUGZILLA"/>
		<reference ref_id="1255600" ref_url="https://bugzilla.suse.com/1255600" source="BUGZILLA"/>
		<reference ref_id="1255607" ref_url="https://bugzilla.suse.com/1255607" source="BUGZILLA"/>
		<reference ref_id="1255608" ref_url="https://bugzilla.suse.com/1255608" source="BUGZILLA"/>
		<reference ref_id="1255609" ref_url="https://bugzilla.suse.com/1255609" source="BUGZILLA"/>
		<reference ref_id="1255618" ref_url="https://bugzilla.suse.com/1255618" source="BUGZILLA"/>
		<reference ref_id="1255619" ref_url="https://bugzilla.suse.com/1255619" source="BUGZILLA"/>
		<reference ref_id="1255620" ref_url="https://bugzilla.suse.com/1255620" source="BUGZILLA"/>
		<reference ref_id="1255623" ref_url="https://bugzilla.suse.com/1255623" source="BUGZILLA"/>
		<reference ref_id="1255624" ref_url="https://bugzilla.suse.com/1255624" source="BUGZILLA"/>
		<reference ref_id="1255626" ref_url="https://bugzilla.suse.com/1255626" source="BUGZILLA"/>
		<reference ref_id="1255627" ref_url="https://bugzilla.suse.com/1255627" source="BUGZILLA"/>
		<reference ref_id="1255628" ref_url="https://bugzilla.suse.com/1255628" source="BUGZILLA"/>
		<reference ref_id="1255636" ref_url="https://bugzilla.suse.com/1255636" source="BUGZILLA"/>
		<reference ref_id="1255688" ref_url="https://bugzilla.suse.com/1255688" source="BUGZILLA"/>
		<reference ref_id="1255690" ref_url="https://bugzilla.suse.com/1255690" source="BUGZILLA"/>
		<reference ref_id="1255697" ref_url="https://bugzilla.suse.com/1255697" source="BUGZILLA"/>
		<reference ref_id="1255702" ref_url="https://bugzilla.suse.com/1255702" source="BUGZILLA"/>
		<reference ref_id="1255704" ref_url="https://bugzilla.suse.com/1255704" source="BUGZILLA"/>
		<reference ref_id="1255749" ref_url="https://bugzilla.suse.com/1255749" source="BUGZILLA"/>
		<reference ref_id="1255750" ref_url="https://bugzilla.suse.com/1255750" source="BUGZILLA"/>
		<reference ref_id="1255757" ref_url="https://bugzilla.suse.com/1255757" source="BUGZILLA"/>
		<reference ref_id="1255758" ref_url="https://bugzilla.suse.com/1255758" source="BUGZILLA"/>
		<reference ref_id="1255760" ref_url="https://bugzilla.suse.com/1255760" source="BUGZILLA"/>
		<reference ref_id="1255762" ref_url="https://bugzilla.suse.com/1255762" source="BUGZILLA"/>
		<reference ref_id="1255769" ref_url="https://bugzilla.suse.com/1255769" source="BUGZILLA"/>
		<reference ref_id="1255771" ref_url="https://bugzilla.suse.com/1255771" source="BUGZILLA"/>
		<reference ref_id="1255773" ref_url="https://bugzilla.suse.com/1255773" source="BUGZILLA"/>
		<reference ref_id="1255780" ref_url="https://bugzilla.suse.com/1255780" source="BUGZILLA"/>
		<reference ref_id="1255786" ref_url="https://bugzilla.suse.com/1255786" source="BUGZILLA"/>
		<reference ref_id="1255787" ref_url="https://bugzilla.suse.com/1255787" source="BUGZILLA"/>
		<reference ref_id="1255789" ref_url="https://bugzilla.suse.com/1255789" source="BUGZILLA"/>
		<reference ref_id="1255790" ref_url="https://bugzilla.suse.com/1255790" source="BUGZILLA"/>
		<reference ref_id="1255791" ref_url="https://bugzilla.suse.com/1255791" source="BUGZILLA"/>
		<reference ref_id="1255792" ref_url="https://bugzilla.suse.com/1255792" source="BUGZILLA"/>
		<reference ref_id="1255796" ref_url="https://bugzilla.suse.com/1255796" source="BUGZILLA"/>
		<reference ref_id="1255797" ref_url="https://bugzilla.suse.com/1255797" source="BUGZILLA"/>
		<reference ref_id="1255800" ref_url="https://bugzilla.suse.com/1255800" source="BUGZILLA"/>
		<reference ref_id="1255801" ref_url="https://bugzilla.suse.com/1255801" source="BUGZILLA"/>
		<reference ref_id="1255802" ref_url="https://bugzilla.suse.com/1255802" source="BUGZILLA"/>
		<reference ref_id="1255803" ref_url="https://bugzilla.suse.com/1255803" source="BUGZILLA"/>
		<reference ref_id="1255804" ref_url="https://bugzilla.suse.com/1255804" source="BUGZILLA"/>
		<reference ref_id="1255806" ref_url="https://bugzilla.suse.com/1255806" source="BUGZILLA"/>
		<reference ref_id="1255808" ref_url="https://bugzilla.suse.com/1255808" source="BUGZILLA"/>
		<reference ref_id="1255819" ref_url="https://bugzilla.suse.com/1255819" source="BUGZILLA"/>
		<reference ref_id="1255839" ref_url="https://bugzilla.suse.com/1255839" source="BUGZILLA"/>
		<reference ref_id="1255843" ref_url="https://bugzilla.suse.com/1255843" source="BUGZILLA"/>
		<reference ref_id="1255844" ref_url="https://bugzilla.suse.com/1255844" source="BUGZILLA"/>
		<reference ref_id="1255872" ref_url="https://bugzilla.suse.com/1255872" source="BUGZILLA"/>
		<reference ref_id="1255875" ref_url="https://bugzilla.suse.com/1255875" source="BUGZILLA"/>
		<reference ref_id="1255876" ref_url="https://bugzilla.suse.com/1255876" source="BUGZILLA"/>
		<reference ref_id="1255877" ref_url="https://bugzilla.suse.com/1255877" source="BUGZILLA"/>
		<reference ref_id="1255878" ref_url="https://bugzilla.suse.com/1255878" source="BUGZILLA"/>
		<reference ref_id="1255880" ref_url="https://bugzilla.suse.com/1255880" source="BUGZILLA"/>
		<reference ref_id="1255889" ref_url="https://bugzilla.suse.com/1255889" source="BUGZILLA"/>
		<reference ref_id="1255901" ref_url="https://bugzilla.suse.com/1255901" source="BUGZILLA"/>
		<reference ref_id="1255902" ref_url="https://bugzilla.suse.com/1255902" source="BUGZILLA"/>
		<reference ref_id="1255905" ref_url="https://bugzilla.suse.com/1255905" source="BUGZILLA"/>
		<reference ref_id="1255906" ref_url="https://bugzilla.suse.com/1255906" source="BUGZILLA"/>
		<reference ref_id="1255908" ref_url="https://bugzilla.suse.com/1255908" source="BUGZILLA"/>
		<reference ref_id="1255909" ref_url="https://bugzilla.suse.com/1255909" source="BUGZILLA"/>
		<reference ref_id="1255910" ref_url="https://bugzilla.suse.com/1255910" source="BUGZILLA"/>
		<reference ref_id="1255912" ref_url="https://bugzilla.suse.com/1255912" source="BUGZILLA"/>
		<reference ref_id="1255919" ref_url="https://bugzilla.suse.com/1255919" source="BUGZILLA"/>
		<reference ref_id="1255922" ref_url="https://bugzilla.suse.com/1255922" source="BUGZILLA"/>
		<reference ref_id="1255925" ref_url="https://bugzilla.suse.com/1255925" source="BUGZILLA"/>
		<reference ref_id="1255939" ref_url="https://bugzilla.suse.com/1255939" source="BUGZILLA"/>
		<reference ref_id="1255950" ref_url="https://bugzilla.suse.com/1255950" source="BUGZILLA"/>
		<reference ref_id="1255953" ref_url="https://bugzilla.suse.com/1255953" source="BUGZILLA"/>
		<reference ref_id="1255954" ref_url="https://bugzilla.suse.com/1255954" source="BUGZILLA"/>
		<reference ref_id="1255962" ref_url="https://bugzilla.suse.com/1255962" source="BUGZILLA"/>
		<reference ref_id="1255964" ref_url="https://bugzilla.suse.com/1255964" source="BUGZILLA"/>
		<reference ref_id="1255968" ref_url="https://bugzilla.suse.com/1255968" source="BUGZILLA"/>
		<reference ref_id="1255969" ref_url="https://bugzilla.suse.com/1255969" source="BUGZILLA"/>
		<reference ref_id="1255970" ref_url="https://bugzilla.suse.com/1255970" source="BUGZILLA"/>
		<reference ref_id="1255971" ref_url="https://bugzilla.suse.com/1255971" source="BUGZILLA"/>
		<reference ref_id="1255978" ref_url="https://bugzilla.suse.com/1255978" source="BUGZILLA"/>
		<reference ref_id="1255979" ref_url="https://bugzilla.suse.com/1255979" source="BUGZILLA"/>
		<reference ref_id="1255983" ref_url="https://bugzilla.suse.com/1255983" source="BUGZILLA"/>
		<reference ref_id="1255985" ref_url="https://bugzilla.suse.com/1255985" source="BUGZILLA"/>
		<reference ref_id="1255990" ref_url="https://bugzilla.suse.com/1255990" source="BUGZILLA"/>
		<reference ref_id="1255993" ref_url="https://bugzilla.suse.com/1255993" source="BUGZILLA"/>
		<reference ref_id="1255994" ref_url="https://bugzilla.suse.com/1255994" source="BUGZILLA"/>
		<reference ref_id="1255996" ref_url="https://bugzilla.suse.com/1255996" source="BUGZILLA"/>
		<reference ref_id="1256034" ref_url="https://bugzilla.suse.com/1256034" source="BUGZILLA"/>
		<reference ref_id="1256040" ref_url="https://bugzilla.suse.com/1256040" source="BUGZILLA"/>
		<reference ref_id="1256042" ref_url="https://bugzilla.suse.com/1256042" source="BUGZILLA"/>
		<reference ref_id="1256045" ref_url="https://bugzilla.suse.com/1256045" source="BUGZILLA"/>
		<reference ref_id="1256046" ref_url="https://bugzilla.suse.com/1256046" source="BUGZILLA"/>
		<reference ref_id="1256048" ref_url="https://bugzilla.suse.com/1256048" source="BUGZILLA"/>
		<reference ref_id="1256049" ref_url="https://bugzilla.suse.com/1256049" source="BUGZILLA"/>
		<reference ref_id="1256053" ref_url="https://bugzilla.suse.com/1256053" source="BUGZILLA"/>
		<reference ref_id="1256056" ref_url="https://bugzilla.suse.com/1256056" source="BUGZILLA"/>
		<reference ref_id="1256057" ref_url="https://bugzilla.suse.com/1256057" source="BUGZILLA"/>
		<reference ref_id="1256062" ref_url="https://bugzilla.suse.com/1256062" source="BUGZILLA"/>
		<reference ref_id="1256063" ref_url="https://bugzilla.suse.com/1256063" source="BUGZILLA"/>
		<reference ref_id="1256064" ref_url="https://bugzilla.suse.com/1256064" source="BUGZILLA"/>
		<reference ref_id="1256065" ref_url="https://bugzilla.suse.com/1256065" source="BUGZILLA"/>
		<reference ref_id="1256074" ref_url="https://bugzilla.suse.com/1256074" source="BUGZILLA"/>
		<reference ref_id="1256081" ref_url="https://bugzilla.suse.com/1256081" source="BUGZILLA"/>
		<reference ref_id="1256086" ref_url="https://bugzilla.suse.com/1256086" source="BUGZILLA"/>
		<reference ref_id="1256091" ref_url="https://bugzilla.suse.com/1256091" source="BUGZILLA"/>
		<reference ref_id="1256093" ref_url="https://bugzilla.suse.com/1256093" source="BUGZILLA"/>
		<reference ref_id="1256095" ref_url="https://bugzilla.suse.com/1256095" source="BUGZILLA"/>
		<reference ref_id="1256099" ref_url="https://bugzilla.suse.com/1256099" source="BUGZILLA"/>
		<reference ref_id="1256114" ref_url="https://bugzilla.suse.com/1256114" source="BUGZILLA"/>
		<reference ref_id="1256115" ref_url="https://bugzilla.suse.com/1256115" source="BUGZILLA"/>
		<reference ref_id="1256118" ref_url="https://bugzilla.suse.com/1256118" source="BUGZILLA"/>
		<reference ref_id="1256119" ref_url="https://bugzilla.suse.com/1256119" source="BUGZILLA"/>
		<reference ref_id="1256121" ref_url="https://bugzilla.suse.com/1256121" source="BUGZILLA"/>
		<reference ref_id="1256122" ref_url="https://bugzilla.suse.com/1256122" source="BUGZILLA"/>
		<reference ref_id="1256124" ref_url="https://bugzilla.suse.com/1256124" source="BUGZILLA"/>
		<reference ref_id="1256125" ref_url="https://bugzilla.suse.com/1256125" source="BUGZILLA"/>
		<reference ref_id="1256126" ref_url="https://bugzilla.suse.com/1256126" source="BUGZILLA"/>
		<reference ref_id="1256127" ref_url="https://bugzilla.suse.com/1256127" source="BUGZILLA"/>
		<reference ref_id="1256130" ref_url="https://bugzilla.suse.com/1256130" source="BUGZILLA"/>
		<reference ref_id="1256131" ref_url="https://bugzilla.suse.com/1256131" source="BUGZILLA"/>
		<reference ref_id="1256132" ref_url="https://bugzilla.suse.com/1256132" source="BUGZILLA"/>
		<reference ref_id="1256133" ref_url="https://bugzilla.suse.com/1256133" source="BUGZILLA"/>
		<reference ref_id="1256136" ref_url="https://bugzilla.suse.com/1256136" source="BUGZILLA"/>
		<reference ref_id="1256137" ref_url="https://bugzilla.suse.com/1256137" source="BUGZILLA"/>
		<reference ref_id="1256140" ref_url="https://bugzilla.suse.com/1256140" source="BUGZILLA"/>
		<reference ref_id="1256141" ref_url="https://bugzilla.suse.com/1256141" source="BUGZILLA"/>
		<reference ref_id="1256142" ref_url="https://bugzilla.suse.com/1256142" source="BUGZILLA"/>
		<reference ref_id="1256143" ref_url="https://bugzilla.suse.com/1256143" source="BUGZILLA"/>
		<reference ref_id="1256145" ref_url="https://bugzilla.suse.com/1256145" source="BUGZILLA"/>
		<reference ref_id="1256149" ref_url="https://bugzilla.suse.com/1256149" source="BUGZILLA"/>
		<reference ref_id="1256152" ref_url="https://bugzilla.suse.com/1256152" source="BUGZILLA"/>
		<reference ref_id="1256154" ref_url="https://bugzilla.suse.com/1256154" source="BUGZILLA"/>
		<reference ref_id="1256155" ref_url="https://bugzilla.suse.com/1256155" source="BUGZILLA"/>
		<reference ref_id="1256157" ref_url="https://bugzilla.suse.com/1256157" source="BUGZILLA"/>
		<reference ref_id="1256158" ref_url="https://bugzilla.suse.com/1256158" source="BUGZILLA"/>
		<reference ref_id="1256162" ref_url="https://bugzilla.suse.com/1256162" source="BUGZILLA"/>
		<reference ref_id="1256165" ref_url="https://bugzilla.suse.com/1256165" source="BUGZILLA"/>
		<reference ref_id="1256167" ref_url="https://bugzilla.suse.com/1256167" source="BUGZILLA"/>
		<reference ref_id="1256172" ref_url="https://bugzilla.suse.com/1256172" source="BUGZILLA"/>
		<reference ref_id="1256173" ref_url="https://bugzilla.suse.com/1256173" source="BUGZILLA"/>
		<reference ref_id="1256174" ref_url="https://bugzilla.suse.com/1256174" source="BUGZILLA"/>
		<reference ref_id="1256177" ref_url="https://bugzilla.suse.com/1256177" source="BUGZILLA"/>
		<reference ref_id="1256178" ref_url="https://bugzilla.suse.com/1256178" source="BUGZILLA"/>
		<reference ref_id="1256179" ref_url="https://bugzilla.suse.com/1256179" source="BUGZILLA"/>
		<reference ref_id="1256182" ref_url="https://bugzilla.suse.com/1256182" source="BUGZILLA"/>
		<reference ref_id="1256184" ref_url="https://bugzilla.suse.com/1256184" source="BUGZILLA"/>
		<reference ref_id="1256185" ref_url="https://bugzilla.suse.com/1256185" source="BUGZILLA"/>
		<reference ref_id="1256186" ref_url="https://bugzilla.suse.com/1256186" source="BUGZILLA"/>
		<reference ref_id="1256188" ref_url="https://bugzilla.suse.com/1256188" source="BUGZILLA"/>
		<reference ref_id="1256189" ref_url="https://bugzilla.suse.com/1256189" source="BUGZILLA"/>
		<reference ref_id="1256191" ref_url="https://bugzilla.suse.com/1256191" source="BUGZILLA"/>
		<reference ref_id="1256192" ref_url="https://bugzilla.suse.com/1256192" source="BUGZILLA"/>
		<reference ref_id="1256193" ref_url="https://bugzilla.suse.com/1256193" source="BUGZILLA"/>
		<reference ref_id="1256194" ref_url="https://bugzilla.suse.com/1256194" source="BUGZILLA"/>
		<reference ref_id="1256196" ref_url="https://bugzilla.suse.com/1256196" source="BUGZILLA"/>
		<reference ref_id="1256199" ref_url="https://bugzilla.suse.com/1256199" source="BUGZILLA"/>
		<reference ref_id="1256200" ref_url="https://bugzilla.suse.com/1256200" source="BUGZILLA"/>
		<reference ref_id="1256202" ref_url="https://bugzilla.suse.com/1256202" source="BUGZILLA"/>
		<reference ref_id="1256203" ref_url="https://bugzilla.suse.com/1256203" source="BUGZILLA"/>
		<reference ref_id="1256204" ref_url="https://bugzilla.suse.com/1256204" source="BUGZILLA"/>
		<reference ref_id="1256205" ref_url="https://bugzilla.suse.com/1256205" source="BUGZILLA"/>
		<reference ref_id="1256206" ref_url="https://bugzilla.suse.com/1256206" source="BUGZILLA"/>
		<reference ref_id="1256207" ref_url="https://bugzilla.suse.com/1256207" source="BUGZILLA"/>
		<reference ref_id="1256208" ref_url="https://bugzilla.suse.com/1256208" source="BUGZILLA"/>
		<reference ref_id="1256211" ref_url="https://bugzilla.suse.com/1256211" source="BUGZILLA"/>
		<reference ref_id="1256215" ref_url="https://bugzilla.suse.com/1256215" source="BUGZILLA"/>
		<reference ref_id="1256216" ref_url="https://bugzilla.suse.com/1256216" source="BUGZILLA"/>
		<reference ref_id="1256219" ref_url="https://bugzilla.suse.com/1256219" source="BUGZILLA"/>
		<reference ref_id="1256220" ref_url="https://bugzilla.suse.com/1256220" source="BUGZILLA"/>
		<reference ref_id="1256221" ref_url="https://bugzilla.suse.com/1256221" source="BUGZILLA"/>
		<reference ref_id="1256223" ref_url="https://bugzilla.suse.com/1256223" source="BUGZILLA"/>
		<reference ref_id="1256228" ref_url="https://bugzilla.suse.com/1256228" source="BUGZILLA"/>
		<reference ref_id="1256230" ref_url="https://bugzilla.suse.com/1256230" source="BUGZILLA"/>
		<reference ref_id="1256231" ref_url="https://bugzilla.suse.com/1256231" source="BUGZILLA"/>
		<reference ref_id="1256235" ref_url="https://bugzilla.suse.com/1256235" source="BUGZILLA"/>
		<reference ref_id="1256241" ref_url="https://bugzilla.suse.com/1256241" source="BUGZILLA"/>
		<reference ref_id="1256242" ref_url="https://bugzilla.suse.com/1256242" source="BUGZILLA"/>
		<reference ref_id="1256245" ref_url="https://bugzilla.suse.com/1256245" source="BUGZILLA"/>
		<reference ref_id="1256248" ref_url="https://bugzilla.suse.com/1256248" source="BUGZILLA"/>
		<reference ref_id="1256250" ref_url="https://bugzilla.suse.com/1256250" source="BUGZILLA"/>
		<reference ref_id="1256254" ref_url="https://bugzilla.suse.com/1256254" source="BUGZILLA"/>
		<reference ref_id="1256260" ref_url="https://bugzilla.suse.com/1256260" source="BUGZILLA"/>
		<reference ref_id="1256265" ref_url="https://bugzilla.suse.com/1256265" source="BUGZILLA"/>
		<reference ref_id="1256269" ref_url="https://bugzilla.suse.com/1256269" source="BUGZILLA"/>
		<reference ref_id="1256271" ref_url="https://bugzilla.suse.com/1256271" source="BUGZILLA"/>
		<reference ref_id="1256274" ref_url="https://bugzilla.suse.com/1256274" source="BUGZILLA"/>
		<reference ref_id="1256282" ref_url="https://bugzilla.suse.com/1256282" source="BUGZILLA"/>
		<reference ref_id="1256285" ref_url="https://bugzilla.suse.com/1256285" source="BUGZILLA"/>
		<reference ref_id="1256291" ref_url="https://bugzilla.suse.com/1256291" source="BUGZILLA"/>
		<reference ref_id="1256295" ref_url="https://bugzilla.suse.com/1256295" source="BUGZILLA"/>
		<reference ref_id="1256300" ref_url="https://bugzilla.suse.com/1256300" source="BUGZILLA"/>
		<reference ref_id="1256306" ref_url="https://bugzilla.suse.com/1256306" source="BUGZILLA"/>
		<reference ref_id="1256317" ref_url="https://bugzilla.suse.com/1256317" source="BUGZILLA"/>
		<reference ref_id="1256320" ref_url="https://bugzilla.suse.com/1256320" source="BUGZILLA"/>
		<reference ref_id="1256323" ref_url="https://bugzilla.suse.com/1256323" source="BUGZILLA"/>
		<reference ref_id="1256326" ref_url="https://bugzilla.suse.com/1256326" source="BUGZILLA"/>
		<reference ref_id="1256328" ref_url="https://bugzilla.suse.com/1256328" source="BUGZILLA"/>
		<reference ref_id="1256333" ref_url="https://bugzilla.suse.com/1256333" source="BUGZILLA"/>
		<reference ref_id="1256334" ref_url="https://bugzilla.suse.com/1256334" source="BUGZILLA"/>
		<reference ref_id="1256335" ref_url="https://bugzilla.suse.com/1256335" source="BUGZILLA"/>
		<reference ref_id="1256337" ref_url="https://bugzilla.suse.com/1256337" source="BUGZILLA"/>
		<reference ref_id="1256338" ref_url="https://bugzilla.suse.com/1256338" source="BUGZILLA"/>
		<reference ref_id="1256344" ref_url="https://bugzilla.suse.com/1256344" source="BUGZILLA"/>
		<reference ref_id="1256346" ref_url="https://bugzilla.suse.com/1256346" source="BUGZILLA"/>
		<reference ref_id="1256349" ref_url="https://bugzilla.suse.com/1256349" source="BUGZILLA"/>
		<reference ref_id="1256353" ref_url="https://bugzilla.suse.com/1256353" source="BUGZILLA"/>
		<reference ref_id="1256355" ref_url="https://bugzilla.suse.com/1256355" source="BUGZILLA"/>
		<reference ref_id="1256368" ref_url="https://bugzilla.suse.com/1256368" source="BUGZILLA"/>
		<reference ref_id="1256370" ref_url="https://bugzilla.suse.com/1256370" source="BUGZILLA"/>
		<reference ref_id="1256375" ref_url="https://bugzilla.suse.com/1256375" source="BUGZILLA"/>
		<reference ref_id="1256382" ref_url="https://bugzilla.suse.com/1256382" source="BUGZILLA"/>
		<reference ref_id="1256383" ref_url="https://bugzilla.suse.com/1256383" source="BUGZILLA"/>
		<reference ref_id="1256384" ref_url="https://bugzilla.suse.com/1256384" source="BUGZILLA"/>
		<reference ref_id="1256386" ref_url="https://bugzilla.suse.com/1256386" source="BUGZILLA"/>
		<reference ref_id="1256388" ref_url="https://bugzilla.suse.com/1256388" source="BUGZILLA"/>
		<reference ref_id="1256391" ref_url="https://bugzilla.suse.com/1256391" source="BUGZILLA"/>
		<reference ref_id="1256394" ref_url="https://bugzilla.suse.com/1256394" source="BUGZILLA"/>
		<reference ref_id="1256395" ref_url="https://bugzilla.suse.com/1256395" source="BUGZILLA"/>
		<reference ref_id="1256396" ref_url="https://bugzilla.suse.com/1256396" source="BUGZILLA"/>
		<reference ref_id="1256397" ref_url="https://bugzilla.suse.com/1256397" source="BUGZILLA"/>
		<reference ref_id="1256423" ref_url="https://bugzilla.suse.com/1256423" source="BUGZILLA"/>
		<reference ref_id="1256426" ref_url="https://bugzilla.suse.com/1256426" source="BUGZILLA"/>
		<reference ref_id="1256432" ref_url="https://bugzilla.suse.com/1256432" source="BUGZILLA"/>
		<reference ref_id="1256582" ref_url="https://bugzilla.suse.com/1256582" source="BUGZILLA"/>
		<reference ref_id="1256612" ref_url="https://bugzilla.suse.com/1256612" source="BUGZILLA"/>
		<reference ref_id="1256641" ref_url="https://bugzilla.suse.com/1256641" source="BUGZILLA"/>
		<reference ref_id="1256744" ref_url="https://bugzilla.suse.com/1256744" source="BUGZILLA"/>
		<reference ref_id="1256779" ref_url="https://bugzilla.suse.com/1256779" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-48853" ref_url="https://www.suse.com/security/cve/CVE-2022-48853/" source="CVE"/>
		<reference ref_id="CVE-2022-50614" ref_url="https://www.suse.com/security/cve/CVE-2022-50614/" source="CVE"/>
		<reference ref_id="CVE-2022-50615" ref_url="https://www.suse.com/security/cve/CVE-2022-50615/" source="CVE"/>
		<reference ref_id="CVE-2022-50617" ref_url="https://www.suse.com/security/cve/CVE-2022-50617/" source="CVE"/>
		<reference ref_id="CVE-2022-50618" ref_url="https://www.suse.com/security/cve/CVE-2022-50618/" source="CVE"/>
		<reference ref_id="CVE-2022-50619" ref_url="https://www.suse.com/security/cve/CVE-2022-50619/" source="CVE"/>
		<reference ref_id="CVE-2022-50622" ref_url="https://www.suse.com/security/cve/CVE-2022-50622/" source="CVE"/>
		<reference ref_id="CVE-2022-50623" ref_url="https://www.suse.com/security/cve/CVE-2022-50623/" source="CVE"/>
		<reference ref_id="CVE-2022-50625" ref_url="https://www.suse.com/security/cve/CVE-2022-50625/" source="CVE"/>
		<reference ref_id="CVE-2022-50626" ref_url="https://www.suse.com/security/cve/CVE-2022-50626/" source="CVE"/>
		<reference ref_id="CVE-2022-50629" ref_url="https://www.suse.com/security/cve/CVE-2022-50629/" source="CVE"/>
		<reference ref_id="CVE-2022-50630" ref_url="https://www.suse.com/security/cve/CVE-2022-50630/" source="CVE"/>
		<reference ref_id="CVE-2022-50633" ref_url="https://www.suse.com/security/cve/CVE-2022-50633/" source="CVE"/>
		<reference ref_id="CVE-2022-50635" ref_url="https://www.suse.com/security/cve/CVE-2022-50635/" source="CVE"/>
		<reference ref_id="CVE-2022-50636" ref_url="https://www.suse.com/security/cve/CVE-2022-50636/" source="CVE"/>
		<reference ref_id="CVE-2022-50638" ref_url="https://www.suse.com/security/cve/CVE-2022-50638/" source="CVE"/>
		<reference ref_id="CVE-2022-50640" ref_url="https://www.suse.com/security/cve/CVE-2022-50640/" source="CVE"/>
		<reference ref_id="CVE-2022-50641" ref_url="https://www.suse.com/security/cve/CVE-2022-50641/" source="CVE"/>
		<reference ref_id="CVE-2022-50643" ref_url="https://www.suse.com/security/cve/CVE-2022-50643/" source="CVE"/>
		<reference ref_id="CVE-2022-50644" ref_url="https://www.suse.com/security/cve/CVE-2022-50644/" source="CVE"/>
		<reference ref_id="CVE-2022-50646" ref_url="https://www.suse.com/security/cve/CVE-2022-50646/" source="CVE"/>
		<reference ref_id="CVE-2022-50649" ref_url="https://www.suse.com/security/cve/CVE-2022-50649/" source="CVE"/>
		<reference ref_id="CVE-2022-50652" ref_url="https://www.suse.com/security/cve/CVE-2022-50652/" source="CVE"/>
		<reference ref_id="CVE-2022-50653" ref_url="https://www.suse.com/security/cve/CVE-2022-50653/" source="CVE"/>
		<reference ref_id="CVE-2022-50656" ref_url="https://www.suse.com/security/cve/CVE-2022-50656/" source="CVE"/>
		<reference ref_id="CVE-2022-50658" ref_url="https://www.suse.com/security/cve/CVE-2022-50658/" source="CVE"/>
		<reference ref_id="CVE-2022-50660" ref_url="https://www.suse.com/security/cve/CVE-2022-50660/" source="CVE"/>
		<reference ref_id="CVE-2022-50661" ref_url="https://www.suse.com/security/cve/CVE-2022-50661/" source="CVE"/>
		<reference ref_id="CVE-2022-50662" ref_url="https://www.suse.com/security/cve/CVE-2022-50662/" source="CVE"/>
		<reference ref_id="CVE-2022-50664" ref_url="https://www.suse.com/security/cve/CVE-2022-50664/" source="CVE"/>
		<reference ref_id="CVE-2022-50666" ref_url="https://www.suse.com/security/cve/CVE-2022-50666/" source="CVE"/>
		<reference ref_id="CVE-2022-50668" ref_url="https://www.suse.com/security/cve/CVE-2022-50668/" source="CVE"/>
		<reference ref_id="CVE-2022-50669" ref_url="https://www.suse.com/security/cve/CVE-2022-50669/" source="CVE"/>
		<reference ref_id="CVE-2022-50670" ref_url="https://www.suse.com/security/cve/CVE-2022-50670/" source="CVE"/>
		<reference ref_id="CVE-2022-50671" ref_url="https://www.suse.com/security/cve/CVE-2022-50671/" source="CVE"/>
		<reference ref_id="CVE-2022-50672" ref_url="https://www.suse.com/security/cve/CVE-2022-50672/" source="CVE"/>
		<reference ref_id="CVE-2022-50673" ref_url="https://www.suse.com/security/cve/CVE-2022-50673/" source="CVE"/>
		<reference ref_id="CVE-2022-50675" ref_url="https://www.suse.com/security/cve/CVE-2022-50675/" source="CVE"/>
		<reference ref_id="CVE-2022-50677" ref_url="https://www.suse.com/security/cve/CVE-2022-50677/" source="CVE"/>
		<reference ref_id="CVE-2022-50678" ref_url="https://www.suse.com/security/cve/CVE-2022-50678/" source="CVE"/>
		<reference ref_id="CVE-2022-50679" ref_url="https://www.suse.com/security/cve/CVE-2022-50679/" source="CVE"/>
		<reference ref_id="CVE-2022-50697" ref_url="https://www.suse.com/security/cve/CVE-2022-50697/" source="CVE"/>
		<reference ref_id="CVE-2022-50698" ref_url="https://www.suse.com/security/cve/CVE-2022-50698/" source="CVE"/>
		<reference ref_id="CVE-2022-50699" ref_url="https://www.suse.com/security/cve/CVE-2022-50699/" source="CVE"/>
		<reference ref_id="CVE-2022-50700" ref_url="https://www.suse.com/security/cve/CVE-2022-50700/" source="CVE"/>
		<reference ref_id="CVE-2022-50702" ref_url="https://www.suse.com/security/cve/CVE-2022-50702/" source="CVE"/>
		<reference ref_id="CVE-2022-50703" ref_url="https://www.suse.com/security/cve/CVE-2022-50703/" source="CVE"/>
		<reference ref_id="CVE-2022-50704" ref_url="https://www.suse.com/security/cve/CVE-2022-50704/" source="CVE"/>
		<reference ref_id="CVE-2022-50709" ref_url="https://www.suse.com/security/cve/CVE-2022-50709/" source="CVE"/>
		<reference ref_id="CVE-2022-50715" ref_url="https://www.suse.com/security/cve/CVE-2022-50715/" source="CVE"/>
		<reference ref_id="CVE-2022-50716" ref_url="https://www.suse.com/security/cve/CVE-2022-50716/" source="CVE"/>
		<reference ref_id="CVE-2022-50717" ref_url="https://www.suse.com/security/cve/CVE-2022-50717/" source="CVE"/>
		<reference ref_id="CVE-2022-50718" ref_url="https://www.suse.com/security/cve/CVE-2022-50718/" source="CVE"/>
		<reference ref_id="CVE-2022-50719" ref_url="https://www.suse.com/security/cve/CVE-2022-50719/" source="CVE"/>
		<reference ref_id="CVE-2022-50722" ref_url="https://www.suse.com/security/cve/CVE-2022-50722/" source="CVE"/>
		<reference ref_id="CVE-2022-50724" ref_url="https://www.suse.com/security/cve/CVE-2022-50724/" source="CVE"/>
		<reference ref_id="CVE-2022-50726" ref_url="https://www.suse.com/security/cve/CVE-2022-50726/" source="CVE"/>
		<reference ref_id="CVE-2022-50727" ref_url="https://www.suse.com/security/cve/CVE-2022-50727/" source="CVE"/>
		<reference ref_id="CVE-2022-50728" ref_url="https://www.suse.com/security/cve/CVE-2022-50728/" source="CVE"/>
		<reference ref_id="CVE-2022-50730" ref_url="https://www.suse.com/security/cve/CVE-2022-50730/" source="CVE"/>
		<reference ref_id="CVE-2022-50731" ref_url="https://www.suse.com/security/cve/CVE-2022-50731/" source="CVE"/>
		<reference ref_id="CVE-2022-50732" ref_url="https://www.suse.com/security/cve/CVE-2022-50732/" source="CVE"/>
		<reference ref_id="CVE-2022-50733" ref_url="https://www.suse.com/security/cve/CVE-2022-50733/" source="CVE"/>
		<reference ref_id="CVE-2022-50735" ref_url="https://www.suse.com/security/cve/CVE-2022-50735/" source="CVE"/>
		<reference ref_id="CVE-2022-50736" ref_url="https://www.suse.com/security/cve/CVE-2022-50736/" source="CVE"/>
		<reference ref_id="CVE-2022-50740" ref_url="https://www.suse.com/security/cve/CVE-2022-50740/" source="CVE"/>
		<reference ref_id="CVE-2022-50742" ref_url="https://www.suse.com/security/cve/CVE-2022-50742/" source="CVE"/>
		<reference ref_id="CVE-2022-50744" ref_url="https://www.suse.com/security/cve/CVE-2022-50744/" source="CVE"/>
		<reference ref_id="CVE-2022-50745" ref_url="https://www.suse.com/security/cve/CVE-2022-50745/" source="CVE"/>
		<reference ref_id="CVE-2022-50747" ref_url="https://www.suse.com/security/cve/CVE-2022-50747/" source="CVE"/>
		<reference ref_id="CVE-2022-50749" ref_url="https://www.suse.com/security/cve/CVE-2022-50749/" source="CVE"/>
		<reference ref_id="CVE-2022-50750" ref_url="https://www.suse.com/security/cve/CVE-2022-50750/" source="CVE"/>
		<reference ref_id="CVE-2022-50751" ref_url="https://www.suse.com/security/cve/CVE-2022-50751/" source="CVE"/>
		<reference ref_id="CVE-2022-50752" ref_url="https://www.suse.com/security/cve/CVE-2022-50752/" source="CVE"/>
		<reference ref_id="CVE-2022-50754" ref_url="https://www.suse.com/security/cve/CVE-2022-50754/" source="CVE"/>
		<reference ref_id="CVE-2022-50755" ref_url="https://www.suse.com/security/cve/CVE-2022-50755/" source="CVE"/>
		<reference ref_id="CVE-2022-50756" ref_url="https://www.suse.com/security/cve/CVE-2022-50756/" source="CVE"/>
		<reference ref_id="CVE-2022-50757" ref_url="https://www.suse.com/security/cve/CVE-2022-50757/" source="CVE"/>
		<reference ref_id="CVE-2022-50758" ref_url="https://www.suse.com/security/cve/CVE-2022-50758/" source="CVE"/>
		<reference ref_id="CVE-2022-50760" ref_url="https://www.suse.com/security/cve/CVE-2022-50760/" source="CVE"/>
		<reference ref_id="CVE-2022-50761" ref_url="https://www.suse.com/security/cve/CVE-2022-50761/" source="CVE"/>
		<reference ref_id="CVE-2022-50763" ref_url="https://www.suse.com/security/cve/CVE-2022-50763/" source="CVE"/>
		<reference ref_id="CVE-2022-50767" ref_url="https://www.suse.com/security/cve/CVE-2022-50767/" source="CVE"/>
		<reference ref_id="CVE-2022-50769" ref_url="https://www.suse.com/security/cve/CVE-2022-50769/" source="CVE"/>
		<reference ref_id="CVE-2022-50770" ref_url="https://www.suse.com/security/cve/CVE-2022-50770/" source="CVE"/>
		<reference ref_id="CVE-2022-50773" ref_url="https://www.suse.com/security/cve/CVE-2022-50773/" source="CVE"/>
		<reference ref_id="CVE-2022-50774" ref_url="https://www.suse.com/security/cve/CVE-2022-50774/" source="CVE"/>
		<reference ref_id="CVE-2022-50776" ref_url="https://www.suse.com/security/cve/CVE-2022-50776/" source="CVE"/>
		<reference ref_id="CVE-2022-50777" ref_url="https://www.suse.com/security/cve/CVE-2022-50777/" source="CVE"/>
		<reference ref_id="CVE-2022-50779" ref_url="https://www.suse.com/security/cve/CVE-2022-50779/" source="CVE"/>
		<reference ref_id="CVE-2022-50781" ref_url="https://www.suse.com/security/cve/CVE-2022-50781/" source="CVE"/>
		<reference ref_id="CVE-2022-50782" ref_url="https://www.suse.com/security/cve/CVE-2022-50782/" source="CVE"/>
		<reference ref_id="CVE-2022-50809" ref_url="https://www.suse.com/security/cve/CVE-2022-50809/" source="CVE"/>
		<reference ref_id="CVE-2022-50814" ref_url="https://www.suse.com/security/cve/CVE-2022-50814/" source="CVE"/>
		<reference ref_id="CVE-2022-50819" ref_url="https://www.suse.com/security/cve/CVE-2022-50819/" source="CVE"/>
		<reference ref_id="CVE-2022-50821" ref_url="https://www.suse.com/security/cve/CVE-2022-50821/" source="CVE"/>
		<reference ref_id="CVE-2022-50822" ref_url="https://www.suse.com/security/cve/CVE-2022-50822/" source="CVE"/>
		<reference ref_id="CVE-2022-50823" ref_url="https://www.suse.com/security/cve/CVE-2022-50823/" source="CVE"/>
		<reference ref_id="CVE-2022-50824" ref_url="https://www.suse.com/security/cve/CVE-2022-50824/" source="CVE"/>
		<reference ref_id="CVE-2022-50826" ref_url="https://www.suse.com/security/cve/CVE-2022-50826/" source="CVE"/>
		<reference ref_id="CVE-2022-50827" ref_url="https://www.suse.com/security/cve/CVE-2022-50827/" source="CVE"/>
		<reference ref_id="CVE-2022-50828" ref_url="https://www.suse.com/security/cve/CVE-2022-50828/" source="CVE"/>
		<reference ref_id="CVE-2022-50829" ref_url="https://www.suse.com/security/cve/CVE-2022-50829/" source="CVE"/>
		<reference ref_id="CVE-2022-50830" ref_url="https://www.suse.com/security/cve/CVE-2022-50830/" source="CVE"/>
		<reference ref_id="CVE-2022-50832" ref_url="https://www.suse.com/security/cve/CVE-2022-50832/" source="CVE"/>
		<reference ref_id="CVE-2022-50834" ref_url="https://www.suse.com/security/cve/CVE-2022-50834/" source="CVE"/>
		<reference ref_id="CVE-2022-50835" ref_url="https://www.suse.com/security/cve/CVE-2022-50835/" source="CVE"/>
		<reference ref_id="CVE-2022-50836" ref_url="https://www.suse.com/security/cve/CVE-2022-50836/" source="CVE"/>
		<reference ref_id="CVE-2022-50839" ref_url="https://www.suse.com/security/cve/CVE-2022-50839/" source="CVE"/>
		<reference ref_id="CVE-2022-50840" ref_url="https://www.suse.com/security/cve/CVE-2022-50840/" source="CVE"/>
		<reference ref_id="CVE-2022-50842" ref_url="https://www.suse.com/security/cve/CVE-2022-50842/" source="CVE"/>
		<reference ref_id="CVE-2022-50843" ref_url="https://www.suse.com/security/cve/CVE-2022-50843/" source="CVE"/>
		<reference ref_id="CVE-2022-50844" ref_url="https://www.suse.com/security/cve/CVE-2022-50844/" source="CVE"/>
		<reference ref_id="CVE-2022-50845" ref_url="https://www.suse.com/security/cve/CVE-2022-50845/" source="CVE"/>
		<reference ref_id="CVE-2022-50846" ref_url="https://www.suse.com/security/cve/CVE-2022-50846/" source="CVE"/>
		<reference ref_id="CVE-2022-50848" ref_url="https://www.suse.com/security/cve/CVE-2022-50848/" source="CVE"/>
		<reference ref_id="CVE-2022-50849" ref_url="https://www.suse.com/security/cve/CVE-2022-50849/" source="CVE"/>
		<reference ref_id="CVE-2022-50850" ref_url="https://www.suse.com/security/cve/CVE-2022-50850/" source="CVE"/>
		<reference ref_id="CVE-2022-50851" ref_url="https://www.suse.com/security/cve/CVE-2022-50851/" source="CVE"/>
		<reference ref_id="CVE-2022-50853" ref_url="https://www.suse.com/security/cve/CVE-2022-50853/" source="CVE"/>
		<reference ref_id="CVE-2022-50856" ref_url="https://www.suse.com/security/cve/CVE-2022-50856/" source="CVE"/>
		<reference ref_id="CVE-2022-50858" ref_url="https://www.suse.com/security/cve/CVE-2022-50858/" source="CVE"/>
		<reference ref_id="CVE-2022-50859" ref_url="https://www.suse.com/security/cve/CVE-2022-50859/" source="CVE"/>
		<reference ref_id="CVE-2022-50860" ref_url="https://www.suse.com/security/cve/CVE-2022-50860/" source="CVE"/>
		<reference ref_id="CVE-2022-50861" ref_url="https://www.suse.com/security/cve/CVE-2022-50861/" source="CVE"/>
		<reference ref_id="CVE-2022-50864" ref_url="https://www.suse.com/security/cve/CVE-2022-50864/" source="CVE"/>
		<reference ref_id="CVE-2022-50866" ref_url="https://www.suse.com/security/cve/CVE-2022-50866/" source="CVE"/>
		<reference ref_id="CVE-2022-50868" ref_url="https://www.suse.com/security/cve/CVE-2022-50868/" source="CVE"/>
		<reference ref_id="CVE-2022-50870" ref_url="https://www.suse.com/security/cve/CVE-2022-50870/" source="CVE"/>
		<reference ref_id="CVE-2022-50872" ref_url="https://www.suse.com/security/cve/CVE-2022-50872/" source="CVE"/>
		<reference ref_id="CVE-2022-50876" ref_url="https://www.suse.com/security/cve/CVE-2022-50876/" source="CVE"/>
		<reference ref_id="CVE-2022-50878" ref_url="https://www.suse.com/security/cve/CVE-2022-50878/" source="CVE"/>
		<reference ref_id="CVE-2022-50880" ref_url="https://www.suse.com/security/cve/CVE-2022-50880/" source="CVE"/>
		<reference ref_id="CVE-2022-50881" ref_url="https://www.suse.com/security/cve/CVE-2022-50881/" source="CVE"/>
		<reference ref_id="CVE-2022-50882" ref_url="https://www.suse.com/security/cve/CVE-2022-50882/" source="CVE"/>
		<reference ref_id="CVE-2022-50884" ref_url="https://www.suse.com/security/cve/CVE-2022-50884/" source="CVE"/>
		<reference ref_id="CVE-2022-50885" ref_url="https://www.suse.com/security/cve/CVE-2022-50885/" source="CVE"/>
		<reference ref_id="CVE-2022-50886" ref_url="https://www.suse.com/security/cve/CVE-2022-50886/" source="CVE"/>
		<reference ref_id="CVE-2022-50887" ref_url="https://www.suse.com/security/cve/CVE-2022-50887/" source="CVE"/>
		<reference ref_id="CVE-2022-50888" ref_url="https://www.suse.com/security/cve/CVE-2022-50888/" source="CVE"/>
		<reference ref_id="CVE-2022-50889" ref_url="https://www.suse.com/security/cve/CVE-2022-50889/" source="CVE"/>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<reference ref_id="CVE-2023-53215" ref_url="https://www.suse.com/security/cve/CVE-2023-53215/" source="CVE"/>
		<reference ref_id="CVE-2023-53254" ref_url="https://www.suse.com/security/cve/CVE-2023-53254/" source="CVE"/>
		<reference ref_id="CVE-2023-53743" ref_url="https://www.suse.com/security/cve/CVE-2023-53743/" source="CVE"/>
		<reference ref_id="CVE-2023-53744" ref_url="https://www.suse.com/security/cve/CVE-2023-53744/" source="CVE"/>
		<reference ref_id="CVE-2023-53746" ref_url="https://www.suse.com/security/cve/CVE-2023-53746/" source="CVE"/>
		<reference ref_id="CVE-2023-53747" ref_url="https://www.suse.com/security/cve/CVE-2023-53747/" source="CVE"/>
		<reference ref_id="CVE-2023-53751" ref_url="https://www.suse.com/security/cve/CVE-2023-53751/" source="CVE"/>
		<reference ref_id="CVE-2023-53754" ref_url="https://www.suse.com/security/cve/CVE-2023-53754/" source="CVE"/>
		<reference ref_id="CVE-2023-53755" ref_url="https://www.suse.com/security/cve/CVE-2023-53755/" source="CVE"/>
		<reference ref_id="CVE-2023-53761" ref_url="https://www.suse.com/security/cve/CVE-2023-53761/" source="CVE"/>
		<reference ref_id="CVE-2023-53766" ref_url="https://www.suse.com/security/cve/CVE-2023-53766/" source="CVE"/>
		<reference ref_id="CVE-2023-53781" ref_url="https://www.suse.com/security/cve/CVE-2023-53781/" source="CVE"/>
		<reference ref_id="CVE-2023-53783" ref_url="https://www.suse.com/security/cve/CVE-2023-53783/" source="CVE"/>
		<reference ref_id="CVE-2023-53786" ref_url="https://www.suse.com/security/cve/CVE-2023-53786/" source="CVE"/>
		<reference ref_id="CVE-2023-53788" ref_url="https://www.suse.com/security/cve/CVE-2023-53788/" source="CVE"/>
		<reference ref_id="CVE-2023-53792" ref_url="https://www.suse.com/security/cve/CVE-2023-53792/" source="CVE"/>
		<reference ref_id="CVE-2023-53794" ref_url="https://www.suse.com/security/cve/CVE-2023-53794/" source="CVE"/>
		<reference ref_id="CVE-2023-53802" ref_url="https://www.suse.com/security/cve/CVE-2023-53802/" source="CVE"/>
		<reference ref_id="CVE-2023-53803" ref_url="https://www.suse.com/security/cve/CVE-2023-53803/" source="CVE"/>
		<reference ref_id="CVE-2023-53804" ref_url="https://www.suse.com/security/cve/CVE-2023-53804/" source="CVE"/>
		<reference ref_id="CVE-2023-53808" ref_url="https://www.suse.com/security/cve/CVE-2023-53808/" source="CVE"/>
		<reference ref_id="CVE-2023-53811" ref_url="https://www.suse.com/security/cve/CVE-2023-53811/" source="CVE"/>
		<reference ref_id="CVE-2023-53814" ref_url="https://www.suse.com/security/cve/CVE-2023-53814/" source="CVE"/>
		<reference ref_id="CVE-2023-53818" ref_url="https://www.suse.com/security/cve/CVE-2023-53818/" source="CVE"/>
		<reference ref_id="CVE-2023-53819" ref_url="https://www.suse.com/security/cve/CVE-2023-53819/" source="CVE"/>
		<reference ref_id="CVE-2023-53820" ref_url="https://www.suse.com/security/cve/CVE-2023-53820/" source="CVE"/>
		<reference ref_id="CVE-2023-53827" ref_url="https://www.suse.com/security/cve/CVE-2023-53827/" source="CVE"/>
		<reference ref_id="CVE-2023-53830" ref_url="https://www.suse.com/security/cve/CVE-2023-53830/" source="CVE"/>
		<reference ref_id="CVE-2023-53832" ref_url="https://www.suse.com/security/cve/CVE-2023-53832/" source="CVE"/>
		<reference ref_id="CVE-2023-53834" ref_url="https://www.suse.com/security/cve/CVE-2023-53834/" source="CVE"/>
		<reference ref_id="CVE-2023-53837" ref_url="https://www.suse.com/security/cve/CVE-2023-53837/" source="CVE"/>
		<reference ref_id="CVE-2023-53840" ref_url="https://www.suse.com/security/cve/CVE-2023-53840/" source="CVE"/>
		<reference ref_id="CVE-2023-53842" ref_url="https://www.suse.com/security/cve/CVE-2023-53842/" source="CVE"/>
		<reference ref_id="CVE-2023-53844" ref_url="https://www.suse.com/security/cve/CVE-2023-53844/" source="CVE"/>
		<reference ref_id="CVE-2023-53845" ref_url="https://www.suse.com/security/cve/CVE-2023-53845/" source="CVE"/>
		<reference ref_id="CVE-2023-53847" ref_url="https://www.suse.com/security/cve/CVE-2023-53847/" source="CVE"/>
		<reference ref_id="CVE-2023-53850" ref_url="https://www.suse.com/security/cve/CVE-2023-53850/" source="CVE"/>
		<reference ref_id="CVE-2023-53852" ref_url="https://www.suse.com/security/cve/CVE-2023-53852/" source="CVE"/>
		<reference ref_id="CVE-2023-53858" ref_url="https://www.suse.com/security/cve/CVE-2023-53858/" source="CVE"/>
		<reference ref_id="CVE-2023-53862" ref_url="https://www.suse.com/security/cve/CVE-2023-53862/" source="CVE"/>
		<reference ref_id="CVE-2023-53866" ref_url="https://www.suse.com/security/cve/CVE-2023-53866/" source="CVE"/>
		<reference ref_id="CVE-2023-53990" ref_url="https://www.suse.com/security/cve/CVE-2023-53990/" source="CVE"/>
		<reference ref_id="CVE-2023-53991" ref_url="https://www.suse.com/security/cve/CVE-2023-53991/" source="CVE"/>
		<reference ref_id="CVE-2023-53996" ref_url="https://www.suse.com/security/cve/CVE-2023-53996/" source="CVE"/>
		<reference ref_id="CVE-2023-53998" ref_url="https://www.suse.com/security/cve/CVE-2023-53998/" source="CVE"/>
		<reference ref_id="CVE-2023-54001" ref_url="https://www.suse.com/security/cve/CVE-2023-54001/" source="CVE"/>
		<reference ref_id="CVE-2023-54003" ref_url="https://www.suse.com/security/cve/CVE-2023-54003/" source="CVE"/>
		<reference ref_id="CVE-2023-54007" ref_url="https://www.suse.com/security/cve/CVE-2023-54007/" source="CVE"/>
		<reference ref_id="CVE-2023-54009" ref_url="https://www.suse.com/security/cve/CVE-2023-54009/" source="CVE"/>
		<reference ref_id="CVE-2023-54010" ref_url="https://www.suse.com/security/cve/CVE-2023-54010/" source="CVE"/>
		<reference ref_id="CVE-2023-54014" ref_url="https://www.suse.com/security/cve/CVE-2023-54014/" source="CVE"/>
		<reference ref_id="CVE-2023-54015" ref_url="https://www.suse.com/security/cve/CVE-2023-54015/" source="CVE"/>
		<reference ref_id="CVE-2023-54018" ref_url="https://www.suse.com/security/cve/CVE-2023-54018/" source="CVE"/>
		<reference ref_id="CVE-2023-54019" ref_url="https://www.suse.com/security/cve/CVE-2023-54019/" source="CVE"/>
		<reference ref_id="CVE-2023-54020" ref_url="https://www.suse.com/security/cve/CVE-2023-54020/" source="CVE"/>
		<reference ref_id="CVE-2023-54021" ref_url="https://www.suse.com/security/cve/CVE-2023-54021/" source="CVE"/>
		<reference ref_id="CVE-2023-54024" ref_url="https://www.suse.com/security/cve/CVE-2023-54024/" source="CVE"/>
		<reference ref_id="CVE-2023-54025" ref_url="https://www.suse.com/security/cve/CVE-2023-54025/" source="CVE"/>
		<reference ref_id="CVE-2023-54026" ref_url="https://www.suse.com/security/cve/CVE-2023-54026/" source="CVE"/>
		<reference ref_id="CVE-2023-54028" ref_url="https://www.suse.com/security/cve/CVE-2023-54028/" source="CVE"/>
		<reference ref_id="CVE-2023-54036" ref_url="https://www.suse.com/security/cve/CVE-2023-54036/" source="CVE"/>
		<reference ref_id="CVE-2023-54039" ref_url="https://www.suse.com/security/cve/CVE-2023-54039/" source="CVE"/>
		<reference ref_id="CVE-2023-54040" ref_url="https://www.suse.com/security/cve/CVE-2023-54040/" source="CVE"/>
		<reference ref_id="CVE-2023-54042" ref_url="https://www.suse.com/security/cve/CVE-2023-54042/" source="CVE"/>
		<reference ref_id="CVE-2023-54045" ref_url="https://www.suse.com/security/cve/CVE-2023-54045/" source="CVE"/>
		<reference ref_id="CVE-2023-54046" ref_url="https://www.suse.com/security/cve/CVE-2023-54046/" source="CVE"/>
		<reference ref_id="CVE-2023-54048" ref_url="https://www.suse.com/security/cve/CVE-2023-54048/" source="CVE"/>
		<reference ref_id="CVE-2023-54049" ref_url="https://www.suse.com/security/cve/CVE-2023-54049/" source="CVE"/>
		<reference ref_id="CVE-2023-54050" ref_url="https://www.suse.com/security/cve/CVE-2023-54050/" source="CVE"/>
		<reference ref_id="CVE-2023-54051" ref_url="https://www.suse.com/security/cve/CVE-2023-54051/" source="CVE"/>
		<reference ref_id="CVE-2023-54053" ref_url="https://www.suse.com/security/cve/CVE-2023-54053/" source="CVE"/>
		<reference ref_id="CVE-2023-54055" ref_url="https://www.suse.com/security/cve/CVE-2023-54055/" source="CVE"/>
		<reference ref_id="CVE-2023-54058" ref_url="https://www.suse.com/security/cve/CVE-2023-54058/" source="CVE"/>
		<reference ref_id="CVE-2023-54064" ref_url="https://www.suse.com/security/cve/CVE-2023-54064/" source="CVE"/>
		<reference ref_id="CVE-2023-54072" ref_url="https://www.suse.com/security/cve/CVE-2023-54072/" source="CVE"/>
		<reference ref_id="CVE-2023-54076" ref_url="https://www.suse.com/security/cve/CVE-2023-54076/" source="CVE"/>
		<reference ref_id="CVE-2023-54078" ref_url="https://www.suse.com/security/cve/CVE-2023-54078/" source="CVE"/>
		<reference ref_id="CVE-2023-54079" ref_url="https://www.suse.com/security/cve/CVE-2023-54079/" source="CVE"/>
		<reference ref_id="CVE-2023-54083" ref_url="https://www.suse.com/security/cve/CVE-2023-54083/" source="CVE"/>
		<reference ref_id="CVE-2023-54084" ref_url="https://www.suse.com/security/cve/CVE-2023-54084/" source="CVE"/>
		<reference ref_id="CVE-2023-54090" ref_url="https://www.suse.com/security/cve/CVE-2023-54090/" source="CVE"/>
		<reference ref_id="CVE-2023-54091" ref_url="https://www.suse.com/security/cve/CVE-2023-54091/" source="CVE"/>
		<reference ref_id="CVE-2023-54092" ref_url="https://www.suse.com/security/cve/CVE-2023-54092/" source="CVE"/>
		<reference ref_id="CVE-2023-54095" ref_url="https://www.suse.com/security/cve/CVE-2023-54095/" source="CVE"/>
		<reference ref_id="CVE-2023-54096" ref_url="https://www.suse.com/security/cve/CVE-2023-54096/" source="CVE"/>
		<reference ref_id="CVE-2023-54097" ref_url="https://www.suse.com/security/cve/CVE-2023-54097/" source="CVE"/>
		<reference ref_id="CVE-2023-54098" ref_url="https://www.suse.com/security/cve/CVE-2023-54098/" source="CVE"/>
		<reference ref_id="CVE-2023-54100" ref_url="https://www.suse.com/security/cve/CVE-2023-54100/" source="CVE"/>
		<reference ref_id="CVE-2023-54102" ref_url="https://www.suse.com/security/cve/CVE-2023-54102/" source="CVE"/>
		<reference ref_id="CVE-2023-54104" ref_url="https://www.suse.com/security/cve/CVE-2023-54104/" source="CVE"/>
		<reference ref_id="CVE-2023-54108" ref_url="https://www.suse.com/security/cve/CVE-2023-54108/" source="CVE"/>
		<reference ref_id="CVE-2023-54110" ref_url="https://www.suse.com/security/cve/CVE-2023-54110/" source="CVE"/>
		<reference ref_id="CVE-2023-54111" ref_url="https://www.suse.com/security/cve/CVE-2023-54111/" source="CVE"/>
		<reference ref_id="CVE-2023-54115" ref_url="https://www.suse.com/security/cve/CVE-2023-54115/" source="CVE"/>
		<reference ref_id="CVE-2023-54118" ref_url="https://www.suse.com/security/cve/CVE-2023-54118/" source="CVE"/>
		<reference ref_id="CVE-2023-54119" ref_url="https://www.suse.com/security/cve/CVE-2023-54119/" source="CVE"/>
		<reference ref_id="CVE-2023-54120" ref_url="https://www.suse.com/security/cve/CVE-2023-54120/" source="CVE"/>
		<reference ref_id="CVE-2023-54122" ref_url="https://www.suse.com/security/cve/CVE-2023-54122/" source="CVE"/>
		<reference ref_id="CVE-2023-54123" ref_url="https://www.suse.com/security/cve/CVE-2023-54123/" source="CVE"/>
		<reference ref_id="CVE-2023-54126" ref_url="https://www.suse.com/security/cve/CVE-2023-54126/" source="CVE"/>
		<reference ref_id="CVE-2023-54127" ref_url="https://www.suse.com/security/cve/CVE-2023-54127/" source="CVE"/>
		<reference ref_id="CVE-2023-54130" ref_url="https://www.suse.com/security/cve/CVE-2023-54130/" source="CVE"/>
		<reference ref_id="CVE-2023-54131" ref_url="https://www.suse.com/security/cve/CVE-2023-54131/" source="CVE"/>
		<reference ref_id="CVE-2023-54136" ref_url="https://www.suse.com/security/cve/CVE-2023-54136/" source="CVE"/>
		<reference ref_id="CVE-2023-54140" ref_url="https://www.suse.com/security/cve/CVE-2023-54140/" source="CVE"/>
		<reference ref_id="CVE-2023-54142" ref_url="https://www.suse.com/security/cve/CVE-2023-54142/" source="CVE"/>
		<reference ref_id="CVE-2023-54146" ref_url="https://www.suse.com/security/cve/CVE-2023-54146/" source="CVE"/>
		<reference ref_id="CVE-2023-54150" ref_url="https://www.suse.com/security/cve/CVE-2023-54150/" source="CVE"/>
		<reference ref_id="CVE-2023-54153" ref_url="https://www.suse.com/security/cve/CVE-2023-54153/" source="CVE"/>
		<reference ref_id="CVE-2023-54156" ref_url="https://www.suse.com/security/cve/CVE-2023-54156/" source="CVE"/>
		<reference ref_id="CVE-2023-54159" ref_url="https://www.suse.com/security/cve/CVE-2023-54159/" source="CVE"/>
		<reference ref_id="CVE-2023-54166" ref_url="https://www.suse.com/security/cve/CVE-2023-54166/" source="CVE"/>
		<reference ref_id="CVE-2023-54168" ref_url="https://www.suse.com/security/cve/CVE-2023-54168/" source="CVE"/>
		<reference ref_id="CVE-2023-54170" ref_url="https://www.suse.com/security/cve/CVE-2023-54170/" source="CVE"/>
		<reference ref_id="CVE-2023-54171" ref_url="https://www.suse.com/security/cve/CVE-2023-54171/" source="CVE"/>
		<reference ref_id="CVE-2023-54173" ref_url="https://www.suse.com/security/cve/CVE-2023-54173/" source="CVE"/>
		<reference ref_id="CVE-2023-54177" ref_url="https://www.suse.com/security/cve/CVE-2023-54177/" source="CVE"/>
		<reference ref_id="CVE-2023-54179" ref_url="https://www.suse.com/security/cve/CVE-2023-54179/" source="CVE"/>
		<reference ref_id="CVE-2023-54183" ref_url="https://www.suse.com/security/cve/CVE-2023-54183/" source="CVE"/>
		<reference ref_id="CVE-2023-54186" ref_url="https://www.suse.com/security/cve/CVE-2023-54186/" source="CVE"/>
		<reference ref_id="CVE-2023-54189" ref_url="https://www.suse.com/security/cve/CVE-2023-54189/" source="CVE"/>
		<reference ref_id="CVE-2023-54190" ref_url="https://www.suse.com/security/cve/CVE-2023-54190/" source="CVE"/>
		<reference ref_id="CVE-2023-54197" ref_url="https://www.suse.com/security/cve/CVE-2023-54197/" source="CVE"/>
		<reference ref_id="CVE-2023-54198" ref_url="https://www.suse.com/security/cve/CVE-2023-54198/" source="CVE"/>
		<reference ref_id="CVE-2023-54199" ref_url="https://www.suse.com/security/cve/CVE-2023-54199/" source="CVE"/>
		<reference ref_id="CVE-2023-54201" ref_url="https://www.suse.com/security/cve/CVE-2023-54201/" source="CVE"/>
		<reference ref_id="CVE-2023-54202" ref_url="https://www.suse.com/security/cve/CVE-2023-54202/" source="CVE"/>
		<reference ref_id="CVE-2023-54205" ref_url="https://www.suse.com/security/cve/CVE-2023-54205/" source="CVE"/>
		<reference ref_id="CVE-2023-54208" ref_url="https://www.suse.com/security/cve/CVE-2023-54208/" source="CVE"/>
		<reference ref_id="CVE-2023-54211" ref_url="https://www.suse.com/security/cve/CVE-2023-54211/" source="CVE"/>
		<reference ref_id="CVE-2023-54213" ref_url="https://www.suse.com/security/cve/CVE-2023-54213/" source="CVE"/>
		<reference ref_id="CVE-2023-54214" ref_url="https://www.suse.com/security/cve/CVE-2023-54214/" source="CVE"/>
		<reference ref_id="CVE-2023-54219" ref_url="https://www.suse.com/security/cve/CVE-2023-54219/" source="CVE"/>
		<reference ref_id="CVE-2023-54230" ref_url="https://www.suse.com/security/cve/CVE-2023-54230/" source="CVE"/>
		<reference ref_id="CVE-2023-54236" ref_url="https://www.suse.com/security/cve/CVE-2023-54236/" source="CVE"/>
		<reference ref_id="CVE-2023-54242" ref_url="https://www.suse.com/security/cve/CVE-2023-54242/" source="CVE"/>
		<reference ref_id="CVE-2023-54243" ref_url="https://www.suse.com/security/cve/CVE-2023-54243/" source="CVE"/>
		<reference ref_id="CVE-2023-54244" ref_url="https://www.suse.com/security/cve/CVE-2023-54244/" source="CVE"/>
		<reference ref_id="CVE-2023-54245" ref_url="https://www.suse.com/security/cve/CVE-2023-54245/" source="CVE"/>
		<reference ref_id="CVE-2023-54252" ref_url="https://www.suse.com/security/cve/CVE-2023-54252/" source="CVE"/>
		<reference ref_id="CVE-2023-54260" ref_url="https://www.suse.com/security/cve/CVE-2023-54260/" source="CVE"/>
		<reference ref_id="CVE-2023-54264" ref_url="https://www.suse.com/security/cve/CVE-2023-54264/" source="CVE"/>
		<reference ref_id="CVE-2023-54266" ref_url="https://www.suse.com/security/cve/CVE-2023-54266/" source="CVE"/>
		<reference ref_id="CVE-2023-54269" ref_url="https://www.suse.com/security/cve/CVE-2023-54269/" source="CVE"/>
		<reference ref_id="CVE-2023-54270" ref_url="https://www.suse.com/security/cve/CVE-2023-54270/" source="CVE"/>
		<reference ref_id="CVE-2023-54271" ref_url="https://www.suse.com/security/cve/CVE-2023-54271/" source="CVE"/>
		<reference ref_id="CVE-2023-54274" ref_url="https://www.suse.com/security/cve/CVE-2023-54274/" source="CVE"/>
		<reference ref_id="CVE-2023-54275" ref_url="https://www.suse.com/security/cve/CVE-2023-54275/" source="CVE"/>
		<reference ref_id="CVE-2023-54277" ref_url="https://www.suse.com/security/cve/CVE-2023-54277/" source="CVE"/>
		<reference ref_id="CVE-2023-54280" ref_url="https://www.suse.com/security/cve/CVE-2023-54280/" source="CVE"/>
		<reference ref_id="CVE-2023-54284" ref_url="https://www.suse.com/security/cve/CVE-2023-54284/" source="CVE"/>
		<reference ref_id="CVE-2023-54286" ref_url="https://www.suse.com/security/cve/CVE-2023-54286/" source="CVE"/>
		<reference ref_id="CVE-2023-54287" ref_url="https://www.suse.com/security/cve/CVE-2023-54287/" source="CVE"/>
		<reference ref_id="CVE-2023-54289" ref_url="https://www.suse.com/security/cve/CVE-2023-54289/" source="CVE"/>
		<reference ref_id="CVE-2023-54292" ref_url="https://www.suse.com/security/cve/CVE-2023-54292/" source="CVE"/>
		<reference ref_id="CVE-2023-54293" ref_url="https://www.suse.com/security/cve/CVE-2023-54293/" source="CVE"/>
		<reference ref_id="CVE-2023-54294" ref_url="https://www.suse.com/security/cve/CVE-2023-54294/" source="CVE"/>
		<reference ref_id="CVE-2023-54295" ref_url="https://www.suse.com/security/cve/CVE-2023-54295/" source="CVE"/>
		<reference ref_id="CVE-2023-54298" ref_url="https://www.suse.com/security/cve/CVE-2023-54298/" source="CVE"/>
		<reference ref_id="CVE-2023-54299" ref_url="https://www.suse.com/security/cve/CVE-2023-54299/" source="CVE"/>
		<reference ref_id="CVE-2023-54300" ref_url="https://www.suse.com/security/cve/CVE-2023-54300/" source="CVE"/>
		<reference ref_id="CVE-2023-54301" ref_url="https://www.suse.com/security/cve/CVE-2023-54301/" source="CVE"/>
		<reference ref_id="CVE-2023-54302" ref_url="https://www.suse.com/security/cve/CVE-2023-54302/" source="CVE"/>
		<reference ref_id="CVE-2023-54304" ref_url="https://www.suse.com/security/cve/CVE-2023-54304/" source="CVE"/>
		<reference ref_id="CVE-2023-54305" ref_url="https://www.suse.com/security/cve/CVE-2023-54305/" source="CVE"/>
		<reference ref_id="CVE-2023-54309" ref_url="https://www.suse.com/security/cve/CVE-2023-54309/" source="CVE"/>
		<reference ref_id="CVE-2023-54311" ref_url="https://www.suse.com/security/cve/CVE-2023-54311/" source="CVE"/>
		<reference ref_id="CVE-2023-54315" ref_url="https://www.suse.com/security/cve/CVE-2023-54315/" source="CVE"/>
		<reference ref_id="CVE-2023-54317" ref_url="https://www.suse.com/security/cve/CVE-2023-54317/" source="CVE"/>
		<reference ref_id="CVE-2023-54319" ref_url="https://www.suse.com/security/cve/CVE-2023-54319/" source="CVE"/>
		<reference ref_id="CVE-2023-54321" ref_url="https://www.suse.com/security/cve/CVE-2023-54321/" source="CVE"/>
		<reference ref_id="CVE-2023-54325" ref_url="https://www.suse.com/security/cve/CVE-2023-54325/" source="CVE"/>
		<reference ref_id="CVE-2023-54326" ref_url="https://www.suse.com/security/cve/CVE-2023-54326/" source="CVE"/>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-36348" ref_url="https://www.suse.com/security/cve/CVE-2024-36348/" source="CVE"/>
		<reference ref_id="CVE-2024-36349" ref_url="https://www.suse.com/security/cve/CVE-2024-36349/" source="CVE"/>
		<reference ref_id="CVE-2024-36350" ref_url="https://www.suse.com/security/cve/CVE-2024-36350/" source="CVE"/>
		<reference ref_id="CVE-2024-36357" ref_url="https://www.suse.com/security/cve/CVE-2024-36357/" source="CVE"/>
		<reference ref_id="CVE-2024-44987" ref_url="https://www.suse.com/security/cve/CVE-2024-44987/" source="CVE"/>
		<reference ref_id="CVE-2025-38068" ref_url="https://www.suse.com/security/cve/CVE-2025-38068/" source="CVE"/>
		<reference ref_id="CVE-2025-38129" ref_url="https://www.suse.com/security/cve/CVE-2025-38129/" source="CVE"/>
		<reference ref_id="CVE-2025-38159" ref_url="https://www.suse.com/security/cve/CVE-2025-38159/" source="CVE"/>
		<reference ref_id="CVE-2025-38375" ref_url="https://www.suse.com/security/cve/CVE-2025-38375/" source="CVE"/>
		<reference ref_id="CVE-2025-39977" ref_url="https://www.suse.com/security/cve/CVE-2025-39977/" source="CVE"/>
		<reference ref_id="CVE-2025-40019" ref_url="https://www.suse.com/security/cve/CVE-2025-40019/" source="CVE"/>
		<reference ref_id="CVE-2025-40139" ref_url="https://www.suse.com/security/cve/CVE-2025-40139/" source="CVE"/>
		<reference ref_id="CVE-2025-40215" ref_url="https://www.suse.com/security/cve/CVE-2025-40215/" source="CVE"/>
		<reference ref_id="CVE-2025-40220" ref_url="https://www.suse.com/security/cve/CVE-2025-40220/" source="CVE"/>
		<reference ref_id="CVE-2025-40233" ref_url="https://www.suse.com/security/cve/CVE-2025-40233/" source="CVE"/>
		<reference ref_id="CVE-2025-40256" ref_url="https://www.suse.com/security/cve/CVE-2025-40256/" source="CVE"/>
		<reference ref_id="CVE-2025-40257" ref_url="https://www.suse.com/security/cve/CVE-2025-40257/" source="CVE"/>
		<reference ref_id="CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258/" source="CVE"/>
		<reference ref_id="CVE-2025-40277" ref_url="https://www.suse.com/security/cve/CVE-2025-40277/" source="CVE"/>
		<reference ref_id="CVE-2025-40280" ref_url="https://www.suse.com/security/cve/CVE-2025-40280/" source="CVE"/>
		<reference ref_id="CVE-2025-40300" ref_url="https://www.suse.com/security/cve/CVE-2025-40300/" source="CVE"/>
		<reference ref_id="CVE-2025-40331" ref_url="https://www.suse.com/security/cve/CVE-2025-40331/" source="CVE"/>
		<reference ref_id="CVE-2025-68183" ref_url="https://www.suse.com/security/cve/CVE-2025-68183/" source="CVE"/>
		<reference ref_id="CVE-2025-68284" ref_url="https://www.suse.com/security/cve/CVE-2025-68284/" source="CVE"/>
		<reference ref_id="CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285/" source="CVE"/>
		<reference ref_id="CVE-2025-68732" ref_url="https://www.suse.com/security/cve/CVE-2025-68732/" source="CVE"/>
		<reference ref_id="CVE-2025-68771" ref_url="https://www.suse.com/security/cve/CVE-2025-68771/" source="CVE"/>
		<reference ref_id="CVE-2025-68813" ref_url="https://www.suse.com/security/cve/CVE-2025-68813/" source="CVE"/>
		<reference ref_id="CVE-2025-71089" ref_url="https://www.suse.com/security/cve/CVE-2025-71089/" source="CVE"/>
		<reference ref_id="CVE-2025-71116" ref_url="https://www.suse.com/security/cve/CVE-2025-71116/" source="CVE"/>
		<reference ref_id="CVE-2025-71120" ref_url="https://www.suse.com/security/cve/CVE-2025-71120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785).
- CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant uninit (bsc#1255594).
- CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576).
- CVE-2023-53215: sched/fair: Don't balance task to its current running CPU (bsc#1250397).
- CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels (bsc#1249871).
- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751).
- CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256095).
- CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free (bsc#1255908).
- CVE-2024-28956: x86/its: Enumerate Indirect Target Selection (ITS) bug (bsc#1242006).
- CVE-2024-36348: x86/bugs: Add a Transient Scheduler Attacks mitigation (bsc#1238896).
- CVE-2024-36349: x86/bugs: Add a Transient Scheduler Attacks mitigation (bsc#1238896).
- CVE-2024-36350: x86/bugs: Add a Transient Scheduler Attacks mitigation (bsc#1238896).
- CVE-2024-36357: x86/bugs: Add a Transient Scheduler Attacks mitigation (bsc#1238896).
- CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
- CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).
- CVE-2025-38129: page_pool: fix inconsistency for page_pool_ring_lock() (bsc#1245723).
- CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (bsc#1245751).
- CVE-2025-38375: virtio-net: ensure the received length does not exceed allocated size (bsc#1247177).
- CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046).
- CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place encryption (bsc#1252678).
- CVE-2025-40139: net: ipv4: Consolidate ipv4_mtu and ip_dst_mtu_maybe_forward (bsc#1253409).
- CVE-2025-40215: kABI: xfrm: delete x-&gt;tunnel as we delete x (bsc#1254959).
- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).
- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).
- CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843).
- CVE-2025-40277: drm/vmwgfx: Validate command header size against (bsc#1254894).
- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).
- CVE-2025-40300: Documentation/hw-vuln: Add VMSCAPE documentation (bsc#1247483).
- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
- CVE-2025-68183: ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr (bsc#1255251).
- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255377).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401).
- CVE-2025-68732: gpu: host1x: Fix race in syncpt alloc/free (bsc#1255688).
- CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).
- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
- CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744).
- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).

The following non security issues were fixed:

- x86/CPU/AMD: Add ZenX generations flags (bsc#1238896).
- x86: make page fault handling disable interrupts properly (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-09"/>
	<updated date="2026-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204957">SUSE bug 1204957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205567">SUSE bug 1205567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206889">SUSE bug 1206889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207088">SUSE bug 1207088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207611">SUSE bug 1207611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207620">SUSE bug 1207620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207622">SUSE bug 1207622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207636">SUSE bug 1207636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207644">SUSE bug 1207644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207646">SUSE bug 1207646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207652">SUSE bug 1207652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207653">SUSE bug 1207653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208570">SUSE bug 1208570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208758">SUSE bug 1208758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210817">SUSE bug 1210817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210943">SUSE bug 1210943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211690">SUSE bug 1211690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213025">SUSE bug 1213025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213032">SUSE bug 1213032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213093">SUSE bug 1213093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213105">SUSE bug 1213105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213110">SUSE bug 1213110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213111">SUSE bug 1213111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213653">SUSE bug 1213653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213747">SUSE bug 1213747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213867">SUSE bug 1213867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214635">SUSE bug 1214635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214940">SUSE bug 1214940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214962">SUSE bug 1214962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214986">SUSE bug 1214986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214990">SUSE bug 1214990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216062">SUSE bug 1216062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228015">SUSE bug 1228015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230185">SUSE bug 1230185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238896">SUSE bug 1238896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245210">SUSE bug 1245210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245723">SUSE bug 1245723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245751">SUSE bug 1245751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247177">SUSE bug 1247177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247483">SUSE bug 1247483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249871">SUSE bug 1249871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250397">SUSE bug 1250397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252046">SUSE bug 1252046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252678">SUSE bug 1252678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253409">SUSE bug 1253409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253702">SUSE bug 1253702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254520">SUSE bug 1254520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254559">SUSE bug 1254559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254562">SUSE bug 1254562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254572">SUSE bug 1254572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254578">SUSE bug 1254578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254580">SUSE bug 1254580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254592">SUSE bug 1254592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254608">SUSE bug 1254608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254609">SUSE bug 1254609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254614">SUSE bug 1254614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254615">SUSE bug 1254615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254617">SUSE bug 1254617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254625">SUSE bug 1254625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254631">SUSE bug 1254631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254632">SUSE bug 1254632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254634">SUSE bug 1254634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254644">SUSE bug 1254644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254645">SUSE bug 1254645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254649">SUSE bug 1254649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254653">SUSE bug 1254653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254656">SUSE bug 1254656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254658">SUSE bug 1254658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254660">SUSE bug 1254660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254664">SUSE bug 1254664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254671">SUSE bug 1254671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254674">SUSE bug 1254674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254676">SUSE bug 1254676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254677">SUSE bug 1254677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254686">SUSE bug 1254686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254690">SUSE bug 1254690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254692">SUSE bug 1254692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254694">SUSE bug 1254694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254696">SUSE bug 1254696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254698">SUSE bug 1254698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254699">SUSE bug 1254699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254704">SUSE bug 1254704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254706">SUSE bug 1254706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254709">SUSE bug 1254709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254710">SUSE bug 1254710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254711">SUSE bug 1254711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254712">SUSE bug 1254712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254713">SUSE bug 1254713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254714">SUSE bug 1254714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254716">SUSE bug 1254716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254723">SUSE bug 1254723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254725">SUSE bug 1254725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254728">SUSE bug 1254728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254729">SUSE bug 1254729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254743">SUSE bug 1254743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254745">SUSE bug 1254745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254751">SUSE bug 1254751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254756">SUSE bug 1254756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254759">SUSE bug 1254759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254763">SUSE bug 1254763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254775">SUSE bug 1254775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254780">SUSE bug 1254780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254781">SUSE bug 1254781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254782">SUSE bug 1254782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254783">SUSE bug 1254783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254785">SUSE bug 1254785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254788">SUSE bug 1254788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254789">SUSE bug 1254789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254792">SUSE bug 1254792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254813">SUSE bug 1254813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254842">SUSE bug 1254842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254843">SUSE bug 1254843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254847">SUSE bug 1254847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254851">SUSE bug 1254851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254894">SUSE bug 1254894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254902">SUSE bug 1254902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254915">SUSE bug 1254915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254916">SUSE bug 1254916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254917">SUSE bug 1254917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254920">SUSE bug 1254920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254959">SUSE bug 1254959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254974">SUSE bug 1254974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254986">SUSE bug 1254986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254994">SUSE bug 1254994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255002">SUSE bug 1255002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255005">SUSE bug 1255005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255007">SUSE bug 1255007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255049">SUSE bug 1255049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255060">SUSE bug 1255060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255163">SUSE bug 1255163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255165">SUSE bug 1255165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255251">SUSE bug 1255251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255377">SUSE bug 1255377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255401">SUSE bug 1255401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255467">SUSE bug 1255467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255469">SUSE bug 1255469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255521">SUSE bug 1255521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255528">SUSE bug 1255528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255546">SUSE bug 1255546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255549">SUSE bug 1255549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255554">SUSE bug 1255554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255555">SUSE bug 1255555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255558">SUSE bug 1255558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255560">SUSE bug 1255560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255562">SUSE bug 1255562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255565">SUSE bug 1255565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255574">SUSE bug 1255574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255576">SUSE bug 1255576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255578">SUSE bug 1255578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255582">SUSE bug 1255582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255594">SUSE bug 1255594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255600">SUSE bug 1255600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255607">SUSE bug 1255607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255608">SUSE bug 1255608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255609">SUSE bug 1255609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255618">SUSE bug 1255618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255619">SUSE bug 1255619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255620">SUSE bug 1255620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255623">SUSE bug 1255623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255624">SUSE bug 1255624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255626">SUSE bug 1255626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255627">SUSE bug 1255627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255628">SUSE bug 1255628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255636">SUSE bug 1255636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255688">SUSE bug 1255688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255690">SUSE bug 1255690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255697">SUSE bug 1255697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255702">SUSE bug 1255702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255704">SUSE bug 1255704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255749">SUSE bug 1255749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255750">SUSE bug 1255750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255757">SUSE bug 1255757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255758">SUSE bug 1255758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255760">SUSE bug 1255760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255762">SUSE bug 1255762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255769">SUSE bug 1255769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255771">SUSE bug 1255771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255773">SUSE bug 1255773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255780">SUSE bug 1255780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255786">SUSE bug 1255786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255787">SUSE bug 1255787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255789">SUSE bug 1255789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255790">SUSE bug 1255790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255791">SUSE bug 1255791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255792">SUSE bug 1255792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255796">SUSE bug 1255796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255797">SUSE bug 1255797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255800">SUSE bug 1255800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255801">SUSE bug 1255801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255802">SUSE bug 1255802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255803">SUSE bug 1255803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255804">SUSE bug 1255804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255806">SUSE bug 1255806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255808">SUSE bug 1255808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255819">SUSE bug 1255819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255839">SUSE bug 1255839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255843">SUSE bug 1255843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255844">SUSE bug 1255844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255872">SUSE bug 1255872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255875">SUSE bug 1255875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255876">SUSE bug 1255876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255877">SUSE bug 1255877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255878">SUSE bug 1255878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255880">SUSE bug 1255880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255889">SUSE bug 1255889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255901">SUSE bug 1255901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255902">SUSE bug 1255902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255905">SUSE bug 1255905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255906">SUSE bug 1255906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255908">SUSE bug 1255908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255909">SUSE bug 1255909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255910">SUSE bug 1255910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255912">SUSE bug 1255912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255919">SUSE bug 1255919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255922">SUSE bug 1255922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255925">SUSE bug 1255925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255939">SUSE bug 1255939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255950">SUSE bug 1255950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255953">SUSE bug 1255953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255954">SUSE bug 1255954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255962">SUSE bug 1255962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255964">SUSE bug 1255964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255968">SUSE bug 1255968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255969">SUSE bug 1255969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255970">SUSE bug 1255970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255971">SUSE bug 1255971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255978">SUSE bug 1255978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255979">SUSE bug 1255979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255983">SUSE bug 1255983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255985">SUSE bug 1255985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255990">SUSE bug 1255990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255993">SUSE bug 1255993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255994">SUSE bug 1255994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255996">SUSE bug 1255996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256034">SUSE bug 1256034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256040">SUSE bug 1256040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256042">SUSE bug 1256042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256045">SUSE bug 1256045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256046">SUSE bug 1256046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256048">SUSE bug 1256048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256049">SUSE bug 1256049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256053">SUSE bug 1256053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256056">SUSE bug 1256056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256057">SUSE bug 1256057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256062">SUSE bug 1256062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256063">SUSE bug 1256063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256064">SUSE bug 1256064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256065">SUSE bug 1256065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256074">SUSE bug 1256074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256081">SUSE bug 1256081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256086">SUSE bug 1256086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256091">SUSE bug 1256091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256093">SUSE bug 1256093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256095">SUSE bug 1256095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256099">SUSE bug 1256099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256114">SUSE bug 1256114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256115">SUSE bug 1256115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256118">SUSE bug 1256118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256119">SUSE bug 1256119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256121">SUSE bug 1256121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256122">SUSE bug 1256122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256124">SUSE bug 1256124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256125">SUSE bug 1256125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256126">SUSE bug 1256126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256127">SUSE bug 1256127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256130">SUSE bug 1256130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256131">SUSE bug 1256131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256132">SUSE bug 1256132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256133">SUSE bug 1256133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256136">SUSE bug 1256136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256137">SUSE bug 1256137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256140">SUSE bug 1256140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256141">SUSE bug 1256141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256142">SUSE bug 1256142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256143">SUSE bug 1256143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256145">SUSE bug 1256145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256149">SUSE bug 1256149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256152">SUSE bug 1256152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256154">SUSE bug 1256154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256155">SUSE bug 1256155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256157">SUSE bug 1256157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256158">SUSE bug 1256158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256162">SUSE bug 1256162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256165">SUSE bug 1256165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256167">SUSE bug 1256167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256172">SUSE bug 1256172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256173">SUSE bug 1256173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256174">SUSE bug 1256174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256177">SUSE bug 1256177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256178">SUSE bug 1256178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256179">SUSE bug 1256179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256182">SUSE bug 1256182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256184">SUSE bug 1256184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256185">SUSE bug 1256185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256186">SUSE bug 1256186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256188">SUSE bug 1256188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256189">SUSE bug 1256189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256191">SUSE bug 1256191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256192">SUSE bug 1256192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256193">SUSE bug 1256193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256194">SUSE bug 1256194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256196">SUSE bug 1256196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256199">SUSE bug 1256199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256200">SUSE bug 1256200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256202">SUSE bug 1256202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256203">SUSE bug 1256203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256204">SUSE bug 1256204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256205">SUSE bug 1256205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256206">SUSE bug 1256206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256207">SUSE bug 1256207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256208">SUSE bug 1256208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256211">SUSE bug 1256211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256215">SUSE bug 1256215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256216">SUSE bug 1256216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256219">SUSE bug 1256219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256220">SUSE bug 1256220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256221">SUSE bug 1256221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256223">SUSE bug 1256223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256228">SUSE bug 1256228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256230">SUSE bug 1256230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256231">SUSE bug 1256231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256235">SUSE bug 1256235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256241">SUSE bug 1256241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256242">SUSE bug 1256242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256245">SUSE bug 1256245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256248">SUSE bug 1256248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256250">SUSE bug 1256250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256254">SUSE bug 1256254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256260">SUSE bug 1256260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256265">SUSE bug 1256265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256269">SUSE bug 1256269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256271">SUSE bug 1256271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256274">SUSE bug 1256274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256282">SUSE bug 1256282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256285">SUSE bug 1256285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256291">SUSE bug 1256291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256295">SUSE bug 1256295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256300">SUSE bug 1256300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256306">SUSE bug 1256306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256317">SUSE bug 1256317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256320">SUSE bug 1256320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256323">SUSE bug 1256323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256326">SUSE bug 1256326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256328">SUSE bug 1256328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256333">SUSE bug 1256333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256334">SUSE bug 1256334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256335">SUSE bug 1256335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256337">SUSE bug 1256337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256338">SUSE bug 1256338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256344">SUSE bug 1256344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256346">SUSE bug 1256346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256349">SUSE bug 1256349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256353">SUSE bug 1256353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256355">SUSE bug 1256355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256368">SUSE bug 1256368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256370">SUSE bug 1256370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256375">SUSE bug 1256375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256382">SUSE bug 1256382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256383">SUSE bug 1256383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256384">SUSE bug 1256384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256386">SUSE bug 1256386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256388">SUSE bug 1256388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256391">SUSE bug 1256391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256394">SUSE bug 1256394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256395">SUSE bug 1256395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256396">SUSE bug 1256396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256397">SUSE bug 1256397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256423">SUSE bug 1256423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256426">SUSE bug 1256426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256432">SUSE bug 1256432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256582">SUSE bug 1256582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256612">SUSE bug 1256612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256641">SUSE bug 1256641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256744">SUSE bug 1256744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256779">SUSE bug 1256779</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0854">CVE-2022-0854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48853/">CVE-2022-48853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48853">CVE-2022-48853 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50614/">CVE-2022-50614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50614">CVE-2022-50614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50615/">CVE-2022-50615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50615">CVE-2022-50615 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50617/">CVE-2022-50617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50617">CVE-2022-50617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50618/">CVE-2022-50618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50618">CVE-2022-50618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50619/">CVE-2022-50619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50619">CVE-2022-50619 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50622/">CVE-2022-50622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50622">CVE-2022-50622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50623/">CVE-2022-50623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50623">CVE-2022-50623 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-50625/">CVE-2022-50625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50625">CVE-2022-50625 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50626/">CVE-2022-50626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50626">CVE-2022-50626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50629/">CVE-2022-50629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50629">CVE-2022-50629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50630/">CVE-2022-50630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50630">CVE-2022-50630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50633/">CVE-2022-50633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50633">CVE-2022-50633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50635/">CVE-2022-50635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50635">CVE-2022-50635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50636/">CVE-2022-50636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50636">CVE-2022-50636 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50638/">CVE-2022-50638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50638">CVE-2022-50638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50640/">CVE-2022-50640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50640">CVE-2022-50640 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50641/">CVE-2022-50641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50641">CVE-2022-50641 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50643/">CVE-2022-50643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50643">CVE-2022-50643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50644/">CVE-2022-50644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50644">CVE-2022-50644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50646/">CVE-2022-50646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50646">CVE-2022-50646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50649/">CVE-2022-50649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50649">CVE-2022-50649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50652/">CVE-2022-50652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50652">CVE-2022-50652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50653/">CVE-2022-50653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50653">CVE-2022-50653 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50656/">CVE-2022-50656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50656">CVE-2022-50656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50658/">CVE-2022-50658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50658">CVE-2022-50658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50660/">CVE-2022-50660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50660">CVE-2022-50660 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50661/">CVE-2022-50661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50661">CVE-2022-50661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50662/">CVE-2022-50662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50662">CVE-2022-50662 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50664/">CVE-2022-50664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50664">CVE-2022-50664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50666/">CVE-2022-50666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50666">CVE-2022-50666 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50668/">CVE-2022-50668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50668">CVE-2022-50668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50669/">CVE-2022-50669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50669">CVE-2022-50669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50670/">CVE-2022-50670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50670">CVE-2022-50670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50671/">CVE-2022-50671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50671">CVE-2022-50671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50672/">CVE-2022-50672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50672">CVE-2022-50672 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50673/">CVE-2022-50673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50673">CVE-2022-50673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50675/">CVE-2022-50675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50675">CVE-2022-50675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50677/">CVE-2022-50677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50677">CVE-2022-50677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50678/">CVE-2022-50678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50678">CVE-2022-50678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50679/">CVE-2022-50679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50679">CVE-2022-50679 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50697/">CVE-2022-50697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50697">CVE-2022-50697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50698/">CVE-2022-50698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50698">CVE-2022-50698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50699/">CVE-2022-50699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50699">CVE-2022-50699 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50700/">CVE-2022-50700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50700">CVE-2022-50700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50702/">CVE-2022-50702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50702">CVE-2022-50702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50703/">CVE-2022-50703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50703">CVE-2022-50703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50704/">CVE-2022-50704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50704">CVE-2022-50704 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50709/">CVE-2022-50709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50709">CVE-2022-50709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50715/">CVE-2022-50715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50715">CVE-2022-50715 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50716/">CVE-2022-50716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50716">CVE-2022-50716 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50717/">CVE-2022-50717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50717">CVE-2022-50717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50718/">CVE-2022-50718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50718">CVE-2022-50718 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50719/">CVE-2022-50719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50719">CVE-2022-50719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50722/">CVE-2022-50722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50722">CVE-2022-50722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50724/">CVE-2022-50724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50724">CVE-2022-50724 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50726/">CVE-2022-50726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50726">CVE-2022-50726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50727/">CVE-2022-50727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50727">CVE-2022-50727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50728/">CVE-2022-50728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50728">CVE-2022-50728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50730/">CVE-2022-50730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50730">CVE-2022-50730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50731/">CVE-2022-50731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50731">CVE-2022-50731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50732/">CVE-2022-50732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50732">CVE-2022-50732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50733/">CVE-2022-50733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50733">CVE-2022-50733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50735/">CVE-2022-50735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50735">CVE-2022-50735 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50736/">CVE-2022-50736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50736">CVE-2022-50736 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50740/">CVE-2022-50740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50740">CVE-2022-50740 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50742/">CVE-2022-50742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50742">CVE-2022-50742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50744/">CVE-2022-50744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50744">CVE-2022-50744 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50745/">CVE-2022-50745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50745">CVE-2022-50745 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50747/">CVE-2022-50747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50747">CVE-2022-50747 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50749/">CVE-2022-50749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50749">CVE-2022-50749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50750/">CVE-2022-50750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50750">CVE-2022-50750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50751/">CVE-2022-50751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50751">CVE-2022-50751 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50752/">CVE-2022-50752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50752">CVE-2022-50752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50754/">CVE-2022-50754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50754">CVE-2022-50754 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50755/">CVE-2022-50755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50755">CVE-2022-50755 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50756/">CVE-2022-50756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50756">CVE-2022-50756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50757/">CVE-2022-50757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50757">CVE-2022-50757 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50758/">CVE-2022-50758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50758">CVE-2022-50758 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50760/">CVE-2022-50760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50760">CVE-2022-50760 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50761/">CVE-2022-50761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50761">CVE-2022-50761 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50763/">CVE-2022-50763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50763">CVE-2022-50763 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50767/">CVE-2022-50767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50767">CVE-2022-50767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50769/">CVE-2022-50769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50769">CVE-2022-50769 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50770/">CVE-2022-50770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50770">CVE-2022-50770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50773/">CVE-2022-50773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50773">CVE-2022-50773 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50774/">CVE-2022-50774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50774">CVE-2022-50774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50776/">CVE-2022-50776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50776">CVE-2022-50776 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50777/">CVE-2022-50777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50777">CVE-2022-50777 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50779/">CVE-2022-50779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50779">CVE-2022-50779 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50781/">CVE-2022-50781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50781">CVE-2022-50781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50782/">CVE-2022-50782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50782">CVE-2022-50782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50809/">CVE-2022-50809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50809">CVE-2022-50809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50814/">CVE-2022-50814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50814">CVE-2022-50814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50819/">CVE-2022-50819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50819">CVE-2022-50819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50821/">CVE-2022-50821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50821">CVE-2022-50821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50822/">CVE-2022-50822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50822">CVE-2022-50822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50823/">CVE-2022-50823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50823">CVE-2022-50823 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50824/">CVE-2022-50824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50824">CVE-2022-50824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50826/">CVE-2022-50826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50826">CVE-2022-50826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50827/">CVE-2022-50827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50827">CVE-2022-50827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50828/">CVE-2022-50828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50828">CVE-2022-50828 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50829/">CVE-2022-50829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50829">CVE-2022-50829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50830/">CVE-2022-50830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50830">CVE-2022-50830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50832/">CVE-2022-50832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50832">CVE-2022-50832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50834/">CVE-2022-50834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50834">CVE-2022-50834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50835/">CVE-2022-50835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50835">CVE-2022-50835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50836/">CVE-2022-50836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50836">CVE-2022-50836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50839/">CVE-2022-50839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50839">CVE-2022-50839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50840/">CVE-2022-50840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50840">CVE-2022-50840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50842/">CVE-2022-50842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50842">CVE-2022-50842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50843/">CVE-2022-50843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50843">CVE-2022-50843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50844/">CVE-2022-50844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50844">CVE-2022-50844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50845/">CVE-2022-50845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50845">CVE-2022-50845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50846/">CVE-2022-50846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50846">CVE-2022-50846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50848/">CVE-2022-50848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50848">CVE-2022-50848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50849/">CVE-2022-50849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50849">CVE-2022-50849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50850/">CVE-2022-50850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50850">CVE-2022-50850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50851/">CVE-2022-50851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50851">CVE-2022-50851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50853/">CVE-2022-50853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50853">CVE-2022-50853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50856/">CVE-2022-50856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50856">CVE-2022-50856 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50858/">CVE-2022-50858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50858">CVE-2022-50858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50859/">CVE-2022-50859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50859">CVE-2022-50859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50860/">CVE-2022-50860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50860">CVE-2022-50860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50861/">CVE-2022-50861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50861">CVE-2022-50861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50864/">CVE-2022-50864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50864">CVE-2022-50864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50866/">CVE-2022-50866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50866">CVE-2022-50866 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50868/">CVE-2022-50868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50868">CVE-2022-50868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50870/">CVE-2022-50870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50870">CVE-2022-50870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50872/">CVE-2022-50872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50872">CVE-2022-50872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50876/">CVE-2022-50876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50876">CVE-2022-50876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50878/">CVE-2022-50878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50878">CVE-2022-50878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50880/">CVE-2022-50880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50880">CVE-2022-50880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50881/">CVE-2022-50881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50881">CVE-2022-50881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50882/">CVE-2022-50882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50882">CVE-2022-50882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50884/">CVE-2022-50884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50884">CVE-2022-50884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50885/">CVE-2022-50885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50885">CVE-2022-50885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50886/">CVE-2022-50886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50886">CVE-2022-50886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50887/">CVE-2022-50887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50887">CVE-2022-50887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50888/">CVE-2022-50888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50888">CVE-2022-50888 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50889/">CVE-2022-50889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50889">CVE-2022-50889 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53215/">CVE-2023-53215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53215">CVE-2023-53215 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53254/">CVE-2023-53254 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53254">CVE-2023-53254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53743/">CVE-2023-53743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53743">CVE-2023-53743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53744/">CVE-2023-53744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53744">CVE-2023-53744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53746/">CVE-2023-53746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53746">CVE-2023-53746 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53747/">CVE-2023-53747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53747">CVE-2023-53747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53751/">CVE-2023-53751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53751">CVE-2023-53751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53754/">CVE-2023-53754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53754">CVE-2023-53754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53755/">CVE-2023-53755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53755">CVE-2023-53755 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53761/">CVE-2023-53761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53761">CVE-2023-53761 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53766/">CVE-2023-53766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53766">CVE-2023-53766 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53781/">CVE-2023-53781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53781">CVE-2023-53781 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53783/">CVE-2023-53783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53783">CVE-2023-53783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53786/">CVE-2023-53786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53786">CVE-2023-53786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53788/">CVE-2023-53788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53788">CVE-2023-53788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53792/">CVE-2023-53792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53792">CVE-2023-53792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53794/">CVE-2023-53794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53794">CVE-2023-53794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53802/">CVE-2023-53802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53802">CVE-2023-53802 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53803/">CVE-2023-53803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53803">CVE-2023-53803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53804/">CVE-2023-53804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53804">CVE-2023-53804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53808/">CVE-2023-53808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53808">CVE-2023-53808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53811/">CVE-2023-53811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53811">CVE-2023-53811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53814/">CVE-2023-53814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53814">CVE-2023-53814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53818/">CVE-2023-53818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53818">CVE-2023-53818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53819/">CVE-2023-53819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53819">CVE-2023-53819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53820/">CVE-2023-53820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53820">CVE-2023-53820 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53827/">CVE-2023-53827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53827">CVE-2023-53827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53830/">CVE-2023-53830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53830">CVE-2023-53830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53832/">CVE-2023-53832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53832">CVE-2023-53832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53834/">CVE-2023-53834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53834">CVE-2023-53834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53837/">CVE-2023-53837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53837">CVE-2023-53837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53840/">CVE-2023-53840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53840">CVE-2023-53840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53842/">CVE-2023-53842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53842">CVE-2023-53842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53844/">CVE-2023-53844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53844">CVE-2023-53844 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53845/">CVE-2023-53845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53845">CVE-2023-53845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53847/">CVE-2023-53847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53847">CVE-2023-53847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53850/">CVE-2023-53850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53850">CVE-2023-53850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53852/">CVE-2023-53852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53852">CVE-2023-53852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53858/">CVE-2023-53858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53858">CVE-2023-53858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53862/">CVE-2023-53862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53862">CVE-2023-53862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53866/">CVE-2023-53866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53866">CVE-2023-53866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53990/">CVE-2023-53990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53990">CVE-2023-53990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53991/">CVE-2023-53991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53991">CVE-2023-53991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53996/">CVE-2023-53996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53996">CVE-2023-53996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53998/">CVE-2023-53998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53998">CVE-2023-53998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54001/">CVE-2023-54001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54001">CVE-2023-54001 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54003/">CVE-2023-54003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54003">CVE-2023-54003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54007/">CVE-2023-54007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54007">CVE-2023-54007 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54009/">CVE-2023-54009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54009">CVE-2023-54009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54010/">CVE-2023-54010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54010">CVE-2023-54010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54014/">CVE-2023-54014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54014">CVE-2023-54014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54015/">CVE-2023-54015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54015">CVE-2023-54015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54018/">CVE-2023-54018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54018">CVE-2023-54018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54019/">CVE-2023-54019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54019">CVE-2023-54019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54020/">CVE-2023-54020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54020">CVE-2023-54020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54021/">CVE-2023-54021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54021">CVE-2023-54021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54024/">CVE-2023-54024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54024">CVE-2023-54024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54025/">CVE-2023-54025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54025">CVE-2023-54025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54026/">CVE-2023-54026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54026">CVE-2023-54026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54028/">CVE-2023-54028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54028">CVE-2023-54028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54036/">CVE-2023-54036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54036">CVE-2023-54036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54039/">CVE-2023-54039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54039">CVE-2023-54039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54040/">CVE-2023-54040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54040">CVE-2023-54040 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54042/">CVE-2023-54042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54042">CVE-2023-54042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54045/">CVE-2023-54045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54045">CVE-2023-54045 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54046/">CVE-2023-54046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54046">CVE-2023-54046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54048/">CVE-2023-54048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54048">CVE-2023-54048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54049/">CVE-2023-54049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54049">CVE-2023-54049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54050/">CVE-2023-54050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54050">CVE-2023-54050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54051/">CVE-2023-54051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54051">CVE-2023-54051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54053/">CVE-2023-54053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54053">CVE-2023-54053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54055/">CVE-2023-54055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54055">CVE-2023-54055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54058/">CVE-2023-54058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54058">CVE-2023-54058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54064/">CVE-2023-54064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54064">CVE-2023-54064 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54072/">CVE-2023-54072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54072">CVE-2023-54072 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54076/">CVE-2023-54076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54076">CVE-2023-54076 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54078/">CVE-2023-54078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54078">CVE-2023-54078 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54079/">CVE-2023-54079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54079">CVE-2023-54079 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54083/">CVE-2023-54083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54083">CVE-2023-54083 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54084/">CVE-2023-54084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54084">CVE-2023-54084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54090/">CVE-2023-54090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54090">CVE-2023-54090 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54091/">CVE-2023-54091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54091">CVE-2023-54091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54092/">CVE-2023-54092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54092">CVE-2023-54092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54095/">CVE-2023-54095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54095">CVE-2023-54095 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54096/">CVE-2023-54096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54096">CVE-2023-54096 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54097/">CVE-2023-54097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54097">CVE-2023-54097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54098/">CVE-2023-54098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54098">CVE-2023-54098 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54100/">CVE-2023-54100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54100">CVE-2023-54100 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54102/">CVE-2023-54102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54102">CVE-2023-54102 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54104/">CVE-2023-54104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54104">CVE-2023-54104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54108/">CVE-2023-54108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54108">CVE-2023-54108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54110/">CVE-2023-54110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54110">CVE-2023-54110 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54111/">CVE-2023-54111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54111">CVE-2023-54111 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54115/">CVE-2023-54115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54115">CVE-2023-54115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54118/">CVE-2023-54118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54118">CVE-2023-54118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54119/">CVE-2023-54119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54119">CVE-2023-54119 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54120/">CVE-2023-54120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54120">CVE-2023-54120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54122/">CVE-2023-54122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54122">CVE-2023-54122 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54123/">CVE-2023-54123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54123">CVE-2023-54123 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54126/">CVE-2023-54126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54126">CVE-2023-54126 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54127/">CVE-2023-54127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54127">CVE-2023-54127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54130/">CVE-2023-54130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54130">CVE-2023-54130 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54131/">CVE-2023-54131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54131">CVE-2023-54131 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54136/">CVE-2023-54136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54136">CVE-2023-54136 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54140/">CVE-2023-54140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54140">CVE-2023-54140 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54142/">CVE-2023-54142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54142">CVE-2023-54142 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54146/">CVE-2023-54146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54146">CVE-2023-54146 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54150/">CVE-2023-54150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54150">CVE-2023-54150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54153/">CVE-2023-54153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54153">CVE-2023-54153 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54156/">CVE-2023-54156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54156">CVE-2023-54156 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54159/">CVE-2023-54159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54159">CVE-2023-54159 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54166/">CVE-2023-54166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54166">CVE-2023-54166 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-54168/">CVE-2023-54168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54168">CVE-2023-54168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54170/">CVE-2023-54170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54170">CVE-2023-54170 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54171/">CVE-2023-54171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54171">CVE-2023-54171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54173/">CVE-2023-54173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54173">CVE-2023-54173 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54177/">CVE-2023-54177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54177">CVE-2023-54177 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54179/">CVE-2023-54179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54179">CVE-2023-54179 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54183/">CVE-2023-54183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54183">CVE-2023-54183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54186/">CVE-2023-54186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54186">CVE-2023-54186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54189/">CVE-2023-54189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54189">CVE-2023-54189 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54190/">CVE-2023-54190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54190">CVE-2023-54190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54197/">CVE-2023-54197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54197">CVE-2023-54197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54198/">CVE-2023-54198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54198">CVE-2023-54198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54199/">CVE-2023-54199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54199">CVE-2023-54199 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54201/">CVE-2023-54201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54201">CVE-2023-54201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54202/">CVE-2023-54202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54202">CVE-2023-54202 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54205/">CVE-2023-54205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54205">CVE-2023-54205 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54208/">CVE-2023-54208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54208">CVE-2023-54208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54211/">CVE-2023-54211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54211">CVE-2023-54211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54213/">CVE-2023-54213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54213">CVE-2023-54213 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54214/">CVE-2023-54214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54214">CVE-2023-54214 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54219/">CVE-2023-54219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54219">CVE-2023-54219 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54230/">CVE-2023-54230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54230">CVE-2023-54230 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54236/">CVE-2023-54236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54236">CVE-2023-54236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54242/">CVE-2023-54242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54242">CVE-2023-54242 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54243/">CVE-2023-54243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54243">CVE-2023-54243 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54244/">CVE-2023-54244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54244">CVE-2023-54244 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54245/">CVE-2023-54245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54245">CVE-2023-54245 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54252/">CVE-2023-54252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54252">CVE-2023-54252 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54260/">CVE-2023-54260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54260">CVE-2023-54260 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54264/">CVE-2023-54264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54264">CVE-2023-54264 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54266/">CVE-2023-54266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54266">CVE-2023-54266 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54269/">CVE-2023-54269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54269">CVE-2023-54269 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54270/">CVE-2023-54270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54270">CVE-2023-54270 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54271/">CVE-2023-54271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54271">CVE-2023-54271 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54274/">CVE-2023-54274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54274">CVE-2023-54274 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54275/">CVE-2023-54275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54275">CVE-2023-54275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54277/">CVE-2023-54277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54277">CVE-2023-54277 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54280/">CVE-2023-54280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54280">CVE-2023-54280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54284/">CVE-2023-54284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54284">CVE-2023-54284 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54286/">CVE-2023-54286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54286">CVE-2023-54286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54287/">CVE-2023-54287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54287">CVE-2023-54287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54289/">CVE-2023-54289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54289">CVE-2023-54289 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54292/">CVE-2023-54292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54292">CVE-2023-54292 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54293/">CVE-2023-54293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54293">CVE-2023-54293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54294/">CVE-2023-54294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54294">CVE-2023-54294 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54295/">CVE-2023-54295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54295">CVE-2023-54295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54298/">CVE-2023-54298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54298">CVE-2023-54298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54299/">CVE-2023-54299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54299">CVE-2023-54299 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54300/">CVE-2023-54300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54300">CVE-2023-54300 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54301/">CVE-2023-54301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54301">CVE-2023-54301 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54302/">CVE-2023-54302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54302">CVE-2023-54302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54304/">CVE-2023-54304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54304">CVE-2023-54304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54305/">CVE-2023-54305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54305">CVE-2023-54305 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54309/">CVE-2023-54309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54309">CVE-2023-54309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54311/">CVE-2023-54311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54311">CVE-2023-54311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54315/">CVE-2023-54315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54315">CVE-2023-54315 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54317/">CVE-2023-54317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54317">CVE-2023-54317 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54319/">CVE-2023-54319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54319">CVE-2023-54319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54321/">CVE-2023-54321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-54321">CVE-2023-54321 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54325/">CVE-2023-54325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54325">CVE-2023-54325 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54326/">CVE-2023-54326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54326">CVE-2023-54326 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36348/">CVE-2024-36348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36348">CVE-2024-36348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36349/">CVE-2024-36349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36349">CVE-2024-36349 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36350/">CVE-2024-36350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36350">CVE-2024-36350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36357/">CVE-2024-36357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36357">CVE-2024-36357 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44987/">CVE-2024-44987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38068/">CVE-2025-38068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38068">CVE-2025-38068 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38129/">CVE-2025-38129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38129">CVE-2025-38129 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38159/">CVE-2025-38159 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38375/">CVE-2025-38375 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38375">CVE-2025-38375 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39977/">CVE-2025-39977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39977">CVE-2025-39977 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40019/">CVE-2025-40019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40019">CVE-2025-40019 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40139/">CVE-2025-40139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40139">CVE-2025-40139 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40215/">CVE-2025-40215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40215">CVE-2025-40215 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40220/">CVE-2025-40220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40220">CVE-2025-40220 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40233/">CVE-2025-40233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40233">CVE-2025-40233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40256/">CVE-2025-40256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40256">CVE-2025-40256 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-40257/">CVE-2025-40257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40257">CVE-2025-40257 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40277/">CVE-2025-40277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40280/">CVE-2025-40280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40280">CVE-2025-40280 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40300/">CVE-2025-40300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40331/">CVE-2025-40331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40331">CVE-2025-40331 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68183/">CVE-2025-68183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68183">CVE-2025-68183 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68284/">CVE-2025-68284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68284">CVE-2025-68284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68732/">CVE-2025-68732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68732">CVE-2025-68732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68771/">CVE-2025-68771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68771">CVE-2025-68771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68813/">CVE-2025-68813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71089/">CVE-2025-71089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71089">CVE-2025-71089 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71116/">CVE-2025-71116 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71116">CVE-2025-71116 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71120/">CVE-2025-71120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71120">CVE-2025-71120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042510" comment="kernel-rt-5.14.21-150400.15.142.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042511" comment="kernel-source-rt-5.14.21-150400.15.142.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206503" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1209554" ref_url="https://bugzilla.suse.com/1209554" source="BUGZILLA"/>
		<reference ref_id="1227397" ref_url="https://bugzilla.suse.com/1227397" source="BUGZILLA"/>
		<reference ref_id="1252768" ref_url="https://bugzilla.suse.com/1252768" source="BUGZILLA"/>
		<reference ref_id="1253002" ref_url="https://bugzilla.suse.com/1253002" source="BUGZILLA"/>
		<reference ref_id="1254286" ref_url="https://bugzilla.suse.com/1254286" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1544" ref_url="https://www.suse.com/security/cve/CVE-2023-1544/" source="CVE"/>
		<reference ref_id="CVE-2024-6505" ref_url="https://www.suse.com/security/cve/CVE-2024-6505/" source="CVE"/>
		<reference ref_id="CVE-2025-12464" ref_url="https://www.suse.com/security/cve/CVE-2025-12464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023694.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2023-1544: out-of-bounds read in VMWare's paravirtual RDMA device operations can be exploited through a malicious
  guest driver to crash the QEMU process on the host (bsc#1209554).
- CVE-2024-6505: heap-based buffer overflow in the virtio-net device operations can be exploited by a malicious
  privileged user to crash the QEMU process on the host (bsc#1227397).
- CVE-2025-12464: stack-based buffer overflow in the e1000 network device operations can be exploited by a malicious
  guest user to crash the QEMU process on the host (bsc#1253002).

Other updates and bugfixes: 
  
- [openSUSE][RPM] spec: require qemu-hw-display-virtio-gpu-pci for x86 too.
- [openSUSE][RPM} spec: delete old specfile constructs.
- block/curl: fix curl internal handles handling (bsc#1252768).
- [openSUSE][RPM]: really fix *-virtio-gpu-pci dependency on ARM (bsc#1254286).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-01-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209554">SUSE bug 1209554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227397">SUSE bug 1227397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252768">SUSE bug 1252768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253002">SUSE bug 1253002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254286">SUSE bug 1254286</bugzilla>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1544/">CVE-2023-1544 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1544">CVE-2023-1544 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-6505/">CVE-2024-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6505">CVE-2024-6505 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12464/">CVE-2025-12464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12464">CVE-2025-12464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036402" comment="qemu-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036183" comment="qemu-accel-tcg-x86-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036184" comment="qemu-arm-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036403" comment="qemu-audio-spice-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036404" comment="qemu-chardev-spice-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036405" comment="qemu-guest-agent-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036406" comment="qemu-hw-display-qxl-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036407" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036408" comment="qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036409" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036410" comment="qemu-hw-usb-redirect-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036202" comment="qemu-ipxe-1.0.0+-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036207" comment="qemu-s390x-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036208" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036209" comment="qemu-sgabios-8-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036411" comment="qemu-tools-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036412" comment="qemu-ui-opengl-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036413" comment="qemu-ui-spice-core-6.2.0-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036217" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036218" comment="qemu-x86-6.2.0-150400.37.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206504" version="1" class="patch">
	<metadata>
		<title>Security update for python-pyasn1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1256902" ref_url="https://bugzilla.suse.com/1256902" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024118.html" source="SUSE-SU"/>
		<description>
This update for python-pyasn1 fixes the following issues:

- CVE-2026-23490: Fixed malformed RELATIVE-OID with excessive continuation 
  octets leading to Denial of Service (bsc#1256902)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256902">SUSE bug 1256902</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042802" comment="python3-pyasn1-0.4.2-150000.3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206505" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1248586" ref_url="https://bugzilla.suse.com/1248586" source="BUGZILLA"/>
		<reference ref_id="1254670" ref_url="https://bugzilla.suse.com/1254670" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-7709" ref_url="https://www.suse.com/security/cve/CVE-2025-7709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024116.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- Update to v3.51.2:
- CVE-2025-7709: Fixed an integer overflow in the FTS5 extension. (bsc#1254670)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1248586">SUSE bug 1248586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254670">SUSE bug 1254670</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-7709/">CVE-2025-7709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7709">CVE-2025-7709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043279" comment="libsqlite3-0-3.51.2-150000.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043280" comment="sqlite3-tcl-3.51.2-150000.3.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206506" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1250984" ref_url="https://bugzilla.suse.com/1250984" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11234" ref_url="https://www.suse.com/security/cve/CVE-2025-11234/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024112.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2025-11234: Fixed use-after-free in websocket handshake code can lead to denial of service (bsc#1250984).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1250984">SUSE bug 1250984</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11234/">CVE-2025-11234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11234">CVE-2025-11234 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043281" comment="qemu-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042944" comment="qemu-accel-tcg-x86-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042945" comment="qemu-arm-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043282" comment="qemu-audio-spice-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043283" comment="qemu-chardev-spice-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043284" comment="qemu-guest-agent-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043285" comment="qemu-hw-display-qxl-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043286" comment="qemu-hw-display-virtio-gpu-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043287" comment="qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043288" comment="qemu-hw-display-virtio-vga-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043289" comment="qemu-hw-usb-redirect-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042963" comment="qemu-ipxe-1.0.0+-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042968" comment="qemu-s390x-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042969" comment="qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042970" comment="qemu-sgabios-8-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043290" comment="qemu-tools-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043291" comment="qemu-ui-opengl-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043292" comment="qemu-ui-spice-core-6.2.0-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042978" comment="qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042979" comment="qemu-x86-6.2.0-150400.37.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206507" version="1" class="patch">
	<metadata>
		<title>Security update for mozjs60 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1230036" ref_url="https://bugzilla.suse.com/1230036" source="BUGZILLA"/>
		<reference ref_id="1230037" ref_url="https://bugzilla.suse.com/1230037" source="BUGZILLA"/>
		<reference ref_id="1230038" ref_url="https://bugzilla.suse.com/1230038" source="BUGZILLA"/>
		<reference ref_id="1232602" ref_url="https://bugzilla.suse.com/1232602" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023693.html" source="SUSE-SU"/>
		<description>
This update for mozjs60 fixes the following issues:

- CVE-2024-45492: embedded expat: detect integer overflow in function nextScaffoldPart (bsc#1230038)
- CVE-2024-45491: embedded expat: detect integer overflow in dtdCopy (bsc#1230037)
- CVE-2024-45490: embedded expat: reject negative len for XML_ParseBuffer (bsc#1230036)
- CVE-2024-50602: libexpat: DoS via XML_ResumeParser (bsc#1232602)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-01-06"/>
	<updated date="2026-01-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230036">SUSE bug 1230036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230037">SUSE bug 1230037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230038">SUSE bug 1230038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232602">SUSE bug 1232602</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036400" comment="libmozjs-60-60.9.0-150200.6.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206508" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254866" ref_url="https://bugzilla.suse.com/1254866" source="BUGZILLA"/>
		<reference ref_id="1254867" ref_url="https://bugzilla.suse.com/1254867" source="BUGZILLA"/>
		<reference ref_id="1256331" ref_url="https://bugzilla.suse.com/1256331" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024105.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3_1 fixes the following issues:

- CVE-2025-66471: excessive resource consumption via decompression of highly compressed data in Streaming API (bsc#1254867).
- CVE-2025-66418: resource exhaustion via unbounded number of links in the decompression chain (bsc#1254866).
- CVE-2026-21441: excessive resource consumption during decompression of data in HTTP redirect responses (bsc#1256331).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254866">SUSE bug 1254866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254867">SUSE bug 1254867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256331">SUSE bug 1256331</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042819" comment="python3-urllib3-1.25.10-150300.4.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206509" version="1" class="patch">
	<metadata>
		<title>Security update for rust-keylime (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1257908" ref_url="https://bugzilla.suse.com/1257908" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024129.html" source="SUSE-SU"/>
		<description>
This update for rust-keylime fixes the following issues:

Update to version 0.2.8+116.

Security issues fixed:

- CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion
  (bsc#1257908).

Other updates and bugfixes:

- Update vendored crates `time` to version 0.3.47.

- Update to version 0.2.8+116:

  * build(deps): bump bytes from 1.7.2 to 1.11.1
  * api: Modify /version endpoint output in version 2.5
  * Add API v2.5 with backward-compatible /v2.5/quotes/integrity
  * tests: add unit test for resolve_agent_id (#1182)
  * (pull-model): enable retry logic for registration
  * rpm: Update specfiles to apply on master
  * workflows: Add test to detect unused crates
  * lib: Drop unused crates
  * push-model: Drop unused crates
  * keylime-agent: Drop unused crates
  * build(deps): bump uuid from 1.18.1 to 1.19.0
  * Update reqwest-retry to 0.8, retry-policies to 0.5
  * rpm: Fix cargo_build macro usage on CentOS Stream
  * fix(push-model): resolve hash_ek uuid to actual EK hash
  * build(deps): bump thiserror from 2.0.16 to 2.0.17
  * workflows: Separate upstream test suite from e2e coverage
  * Send UEFI measured boot logs as raw bytes (#1173)
  * auth: Add unit tests for SecretToken implementation
  * packit: Enable push-attestation tests
  * resilient_client: Prevent authentication token leakage in logs

- Use tmpfiles.d for /var directories (PED-14736)
  
- Update to version 0.2.8+96:
  
  * build(deps): bump wiremock from 0.6.4 to 0.6.5
  * build(deps): bump actions/checkout from 5 to 6
  * build(deps): bump chrono from 0.4.41 to 0.4.42
  * packit: Get coverage from Fedora 43 runs
  * Fix issues pointed out by clippy
  * Replace mutex unwraps with proper error handling in TPM library
  * Remove unused session request methods from StructureFiller
  * Fix config panic on missing ek_handle in push model agent
  * build(deps): bump tempfile from 3.21.0 to 3.23.0
  * build(deps): bump actions/upload-artifact from 4 to 6 (#1163)
  * Fix clippy warnings project-wide
  * Add KEYLIME_DIR support for verifier TLS certificates in push model agent
  * Thread privileged resources and use MeasurementList for IMA reading
  * Add privileged resource initialization and privilege dropping to push model agent
  * Fix privilege dropping order in run_as()
  * add documentation on FQDN hostnames
  * Remove confusing logs for push mode agent
  * Set correct default Verifier port (8891-&gt;8881) (#1159)
  * Add verifier_url to reference configuration file (#1158)
  * Add TLS support for Registrar communication (#1139)
  * Fix agent handling of 403 registration responses (#1154)
  * Add minor README.md rephrasing (#1151)
  * build(deps): bump actions/checkout from 5 to 6 (#1153)
  * ci: update spec files for packit COPR build
  * docs: improve challenge encoding and async TPM documentation
  * refactor: improve middleware and error handling
  * feat: add authentication client with middleware integration
  * docker: Include keylime_push_model_agent binary
  * Include attestation_interval configuration (#1146)
  * Persist payload keys to avoid attestation failure on restart
  * crypto: Implement the load or generate pattern for keys
  * Use simple algorithm specifiers in certification_keys object (#1140)
  * tests: Enable more tests in CI
  * Fix RSA2048 algorithm reporting in keylime agent
  * Remove disabled_signing_algorithms configuration
  * rpm: Fix metadata patches to apply to current code
  * workflows/rpm.yml: Use more strict patching
  * build(deps): bump uuid from 1.17.0 to 1.18.1
  * Fix ECC algorithm selection and reporting for keylime agent
  * Improve logging consistency and coherency
  * Implement minimal RFC compliance for Location header and URI parsing (#1125)
  * Use separate keys for payload mechanism and mTLS
  * docker: update rust to 1.81 for distroless Dockerfile
  * Ensure UEFI log capabilities are set to false
  * build(deps): bump http from 1.1.0 to 1.3.1
  * build(deps): bump log from 0.4.27 to 0.4.28
  * build(deps): bump cfg-if from 1.0.1 to 1.0.3
  * build(deps): bump actix-rt from 2.10.0 to 2.11.0
  * build(deps): bump async-trait from 0.1.88 to 0.1.89
  * build(deps): bump trybuild from 1.0.105 to 1.0.110
  * Accept evidence handling structures null entries
  * workflows: Add test to check if RPM patches still apply
  * CI: Enable test add-agent-with-malformed-ek-cert
  * config: Fix singleton tests
  * FSM: Remove needless lifetime annotations (#1105)
  * rpm: Do not remove wiremock which is now available in Fedora
  * Use latest Fedora httpdate version (1.0.3)
  * Enhance coverage with parse_retry_after test
  * Fix issues reported by CI regarding unwrap() calls
  * Reuse max retries indicated to the ResilientClient
  * Include limit of retries to 5 for Retry-After
  * Add policy to handle Retry-After response headers
  * build(deps): bump wiremock from 0.6.3 to 0.6.4
  * build(deps): bump serde_json from 1.0.140 to 1.0.143
  * build(deps): bump pest_derive from 2.8.0 to 2.8.1
  * build(deps): bump syn from 2.0.90 to 2.0.106
  * build(deps): bump tempfile from 3.20.0 to 3.21.0
  * build(deps): bump thiserror from 2.0.12 to 2.0.16
  * rpm: Fix patches to apply to current master code
  * build(deps): bump anyhow from 1.0.98 to 1.0.99
  * state_machine: Automatically clean config override during tests
  * config: Implement singleton and factory pattern
  * testing: Support overriding configuration during tests
  * feat: implement standalone challenge-response authentication module
  * structures: rename session structs for clarity and fix typos
  * tpm: refactor certify_credential_with_iak() into a more generic function
  * Add Push Model Agent Mermaid FSM chart (#1095)
  * Add state to avoid exiting on wrong attestation (#1093)
  * Add 6 alphanumeric lowercase X-Request-ID header
  * Enhance Evidence Handling response parsing
  * build(deps): bump quote from 1.0.35 to 1.0.40
  * build(deps): bump libc from 0.2.172 to 0.2.175
  * build(deps): bump glob from 0.3.2 to 0.3.3
  * build(deps): bump actix-web from 4.10.2 to 4.11.0
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257908">SUSE bug 1257908</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043299" comment="rust-keylime-0.2.8+116-150400.3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206510" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1257049" ref_url="https://bugzilla.suse.com/1257049" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-0988" ref_url="https://www.suse.com/security/cve/CVE-2026-0988/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024133.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2026-1485: Fixed buffer underflow and out-of-bounds access due to integer wraparound in content type parsing (bsc#1257354).
- CVE-2026-1484: Fixed buffer underflow and out-of-bounds access due to miscalculated buffer boundaries in the Base64 encoding routine (bsc#1257355).
- CVE-2026-1489: Fixed undersized heap allocation followed by out-of-bounds access due to integer overflow in Unicode case conversion (bsc#1257353).
- CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257049">SUSE bug 1257049</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0988/">CVE-2026-0988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0988">CVE-2026-0988 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043294" comment="glib2-tools-2.70.5-150400.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043295" comment="libgio-2_0-0-2.70.5-150400.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043296" comment="libglib-2_0-0-2.70.5-150400.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043297" comment="libgmodule-2_0-0-2.70.5-150400.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043298" comment="libgobject-2_0-0-2.70.5-150400.3.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206511" version="1" class="patch">
	<metadata>
		<title>Security update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254801" ref_url="https://bugzilla.suse.com/1254801" source="BUGZILLA"/>
		<reference ref_id="1255858" ref_url="https://bugzilla.suse.com/1255858" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2026:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024132.html" source="SUSE-SU"/>
		<description>
This update for nvidia-modprobe.cuda, nvidia-open-driver-G06-signed, nvidia-persistenced.cuda fixes the following issues:

Changes in nvidia-open-driver-G06-signed:

- updated CUDA variant to version 580.126.09

- update non-CUDA variant to version 580.126.09 (bsc#1255858)
- update non-CUDA variant to version 580.119.02 (bsc#1254801)

Changes in nvidia-persistenced.cuda:

- update to version 580.126.09

Changes in nvidia-modprobe.cuda:

- update to version 580.126.09
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1254801">SUSE bug 1254801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255858">SUSE bug 1255858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042992" comment="nv-prefer-signed-open-driver-580.126.09-150400.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042998" comment="nvidia-open-driver-G06-signed-cuda-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043001" comment="nvidia-open-driver-G06-signed-kmp-default-580.126.09_k5.14.21_150400.24.187-150400.107.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206512" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1243422" ref_url="https://bugzilla.suse.com/1243422" source="BUGZILLA"/>
		<reference ref_id="1256418" ref_url="https://bugzilla.suse.com/1256418" source="BUGZILLA"/>
		<reference ref_id="1257598" ref_url="https://bugzilla.suse.com/1257598" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-4476" ref_url="https://www.suse.com/security/cve/CVE-2025-4476/" source="CVE"/>
		<reference ref_id="CVE-2026-0716" ref_url="https://www.suse.com/security/cve/CVE-2026-0716/" source="CVE"/>
		<reference ref_id="CVE-2026-1761" ref_url="https://www.suse.com/security/cve/CVE-2026-1761/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024157.html" source="SUSE-SU"/>
		<description>
This update for libsoup2 fixes the following issues:

- CVE-2026-1761: Check length of bytes read in soup_filter_input_stream_read_until to avoid a stack-based buffer
  overflow (bsc#1257598).
- CVE-2026-0716: improper bounds handling may allow out-of-bounds read (bsc#1256418).
- CVE-2025-4476: null pointer dereference may lead to denial of service (bsc#1243422).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1243422">SUSE bug 1243422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256418">SUSE bug 1256418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257598">SUSE bug 1257598</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4476/">CVE-2025-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4476">CVE-2025-4476 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0716/">CVE-2026-0716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0716">CVE-2026-0716 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1761/">CVE-2026-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1761">CVE-2026-1761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043795" comment="libsoup-2_4-1-2.74.2-150400.3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206513" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1255731" ref_url="https://bugzilla.suse.com/1255731" source="BUGZILLA"/>
		<reference ref_id="1255732" ref_url="https://bugzilla.suse.com/1255732" source="BUGZILLA"/>
		<reference ref_id="1255733" ref_url="https://bugzilla.suse.com/1255733" source="BUGZILLA"/>
		<reference ref_id="1255734" ref_url="https://bugzilla.suse.com/1255734" source="BUGZILLA"/>
		<reference ref_id="1256105" ref_url="https://bugzilla.suse.com/1256105" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-14017" ref_url="https://www.suse.com/security/cve/CVE-2025-14017/" source="CVE"/>
		<reference ref_id="CVE-2025-14524" ref_url="https://www.suse.com/security/cve/CVE-2025-14524/" source="CVE"/>
		<reference ref_id="CVE-2025-14819" ref_url="https://www.suse.com/security/cve/CVE-2025-14819/" source="CVE"/>
		<reference ref_id="CVE-2025-15079" ref_url="https://www.suse.com/security/cve/CVE-2025-15079/" source="CVE"/>
		<reference ref_id="CVE-2025-15224" ref_url="https://www.suse.com/security/cve/CVE-2025-15224/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2025-14017: Fixed broken TLS options for threaded LDAPS (bsc#1256105).
- CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731).
- CVE-2025-14819: libssh global knownhost override (bsc#1255732).
- CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733).
- CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1255731">SUSE bug 1255731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255732">SUSE bug 1255732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255733">SUSE bug 1255733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255734">SUSE bug 1255734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256105">SUSE bug 1256105</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14017/">CVE-2025-14017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14017">CVE-2025-14017 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14524/">CVE-2025-14524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14524">CVE-2025-14524 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14819/">CVE-2025-14819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14819">CVE-2025-14819 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15079/">CVE-2025-15079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15079">CVE-2025-15079 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15224/">CVE-2025-15224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15224">CVE-2025-15224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043796" comment="curl-8.14.1-150400.5.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043797" comment="libcurl4-8.14.1-150400.5.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206514" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254666" ref_url="https://bugzilla.suse.com/1254666" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-14104" ref_url="https://www.suse.com/security/cve/CVE-2025-14104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024236.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666).
- lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-13"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254666">SUSE bug 1254666</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14104/">CVE-2025-14104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14104">CVE-2025-14104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043798" comment="libblkid1-2.37.2-150400.8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043799" comment="libfdisk1-2.37.2-150400.8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043800" comment="libmount1-2.37.2-150400.8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043801" comment="libsmartcols1-2.37.2-150400.8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043802" comment="libuuid1-2.37.2-150400.8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043803" comment="util-linux-2.37.2-150400.8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043804" comment="util-linux-systemd-2.37.2-150400.8.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206515" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1257173" ref_url="https://bugzilla.suse.com/1257173" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-0994" ref_url="https://www.suse.com/security/cve/CVE-2026-0994/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024285.html" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:

- CVE-2026-0994: Fixed google.protobuf.Any recursion depth bypass in Python json_format.ParseDict (bsc#1257173).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-16"/>
	<updated date="2026-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1257173">SUSE bug 1257173</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0994/">CVE-2026-0994 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0994">CVE-2026-0994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044086" comment="libprotobuf-lite25_1_0-25.1-150400.9.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206516" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1255765" ref_url="https://bugzilla.suse.com/1255765" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11961" ref_url="https://www.suse.com/security/cve/CVE-2025-11961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024350.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2025-11961: missing validation of provided MAC-48 address string in `pcap_ether_aton()` can lead to out-of-bounds
  read and write (bsc#1255765).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1255765">SUSE bug 1255765</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11961/">CVE-2025-11961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11961">CVE-2025-11961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044297" comment="libpcap1-1.10.1-150400.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206517" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1256498" ref_url="https://bugzilla.suse.com/1256498" source="BUGZILLA"/>
		<reference ref_id="1256499" ref_url="https://bugzilla.suse.com/1256499" source="BUGZILLA"/>
		<reference ref_id="1256500" ref_url="https://bugzilla.suse.com/1256500" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-68276" ref_url="https://www.suse.com/security/cve/CVE-2025-68276/" source="CVE"/>
		<reference ref_id="CVE-2025-68468" ref_url="https://www.suse.com/security/cve/CVE-2025-68468/" source="CVE"/>
		<reference ref_id="CVE-2025-68471" ref_url="https://www.suse.com/security/cve/CVE-2025-68471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024352.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2025-68276: Fixed refuse to create wide-area record browsers when 
  wide-area is off (bsc#1256498)
- CVE-2025-68471: Fixed DoS bug by changing assert to return (bsc#1256500)
- CVE-2025-68468: Fixed DoS bug by removing incorrect assertion (bsc#1256499)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256498">SUSE bug 1256498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256499">SUSE bug 1256499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256500">SUSE bug 1256500</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68276/">CVE-2025-68276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68276">CVE-2025-68276 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68468/">CVE-2025-68468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68468">CVE-2025-68468 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68471/">CVE-2025-68471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68471">CVE-2025-68471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044299" comment="avahi-0.8-150400.7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044300" comment="libavahi-client3-0.8-150400.7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044301" comment="libavahi-common3-0.8-150400.7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044302" comment="libavahi-core7-0.8-150400.7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206518" version="1" class="patch">
	<metadata>
		<title>Security update for libpng16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1256525" ref_url="https://bugzilla.suse.com/1256525" source="BUGZILLA"/>
		<reference ref_id="1256526" ref_url="https://bugzilla.suse.com/1256526" source="BUGZILLA"/>
		<reference ref_id="1257364" ref_url="https://bugzilla.suse.com/1257364" source="BUGZILLA"/>
		<reference ref_id="1257365" ref_url="https://bugzilla.suse.com/1257365" source="BUGZILLA"/>
		<reference ref_id="1258020" ref_url="https://bugzilla.suse.com/1258020" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-28162" ref_url="https://www.suse.com/security/cve/CVE-2025-28162/" source="CVE"/>
		<reference ref_id="CVE-2025-28164" ref_url="https://www.suse.com/security/cve/CVE-2025-28164/" source="CVE"/>
		<reference ref_id="CVE-2026-22695" ref_url="https://www.suse.com/security/cve/CVE-2026-22695/" source="CVE"/>
		<reference ref_id="CVE-2026-22801" ref_url="https://www.suse.com/security/cve/CVE-2026-22801/" source="CVE"/>
		<reference ref_id="CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<description>
This update for libpng16 fixes the following issues:

- CVE-2025-28162: memory leaks when running `pngimage` (bsc#1257364).
- CVE-2025-28164: memory leaks when running `pngimage` (bsc#1257365).
- CVE-2026-22695: heap buffer over-read in png_image_finish_read (bsc#1256525).
- CVE-2026-22801: integer truncation causing heap buffer over-read in png_image_write_* (bsc#1256526).
- CVE-2026-25646: heap buffer overflow vulnerability in png_set_dither/png_set_quantize (bsc#1258020).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-23"/>
	<updated date="2026-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1256525">SUSE bug 1256525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256526">SUSE bug 1256526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257364">SUSE bug 1257364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257365">SUSE bug 1257365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258020">SUSE bug 1258020</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-28162/">CVE-2025-28162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-28162">CVE-2025-28162 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-28164/">CVE-2025-28164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-28164">CVE-2025-28164 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22695/">CVE-2026-22695 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22695">CVE-2026-22695 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22801/">CVE-2026-22801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22801">CVE-2026-22801 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044707" comment="libpng16-16-1.6.34-150000.3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206519" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1250553" ref_url="https://bugzilla.suse.com/1250553" source="BUGZILLA"/>
		<reference ref_id="1256804" ref_url="https://bugzilla.suse.com/1256804" source="BUGZILLA"/>
		<reference ref_id="1256805" ref_url="https://bugzilla.suse.com/1256805" source="BUGZILLA"/>
		<reference ref_id="1256807" ref_url="https://bugzilla.suse.com/1256807" source="BUGZILLA"/>
		<reference ref_id="1256808" ref_url="https://bugzilla.suse.com/1256808" source="BUGZILLA"/>
		<reference ref_id="1256809" ref_url="https://bugzilla.suse.com/1256809" source="BUGZILLA"/>
		<reference ref_id="1256810" ref_url="https://bugzilla.suse.com/1256810" source="BUGZILLA"/>
		<reference ref_id="1256811" ref_url="https://bugzilla.suse.com/1256811" source="BUGZILLA"/>
		<reference ref_id="1256812" ref_url="https://bugzilla.suse.com/1256812" source="BUGZILLA"/>
		<reference ref_id="1257593" ref_url="https://bugzilla.suse.com/1257593" source="BUGZILLA"/>
		<reference ref_id="1257594" ref_url="https://bugzilla.suse.com/1257594" source="BUGZILLA"/>
		<reference ref_id="1257595" ref_url="https://bugzilla.suse.com/1257595" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10911" ref_url="https://www.suse.com/security/cve/CVE-2025-10911/" source="CVE"/>
		<reference ref_id="CVE-2026-0989" ref_url="https://www.suse.com/security/cve/CVE-2026-0989/" source="CVE"/>
		<reference ref_id="CVE-2026-0990" ref_url="https://www.suse.com/security/cve/CVE-2026-0990/" source="CVE"/>
		<reference ref_id="CVE-2026-0992" ref_url="https://www.suse.com/security/cve/CVE-2026-0992/" source="CVE"/>
		<reference ref_id="CVE-2026-1757" ref_url="https://www.suse.com/security/cve/CVE-2026-1757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024370.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2026-0990: Fixed a call stack overflow leading to application crash due to infinite recursion in `xmlCatalogXMLResolveURI`. (bsc#1256807, bsc#1256811)
- CVE-2026-0992: Fixed an excessive resource consumption when processing XML catalogs due to exponential behavior. (bsc#1256809, bsc#1256812)
- CVE-2026-1757: Fixed a memory leak in the `xmllint` interactive shell. (bsc#1257594, bsc#1257595)
- CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT. (bsc#1250553)
- CVE-2026-0989: Fixe a call stack exhaustion leading to application crash due to RelaxNG parser not limiting the recursion depth. (bsc#1256805, bsc#1256810)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1250553">SUSE bug 1250553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256804">SUSE bug 1256804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256805">SUSE bug 1256805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256807">SUSE bug 1256807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256808">SUSE bug 1256808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256809">SUSE bug 1256809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256810">SUSE bug 1256810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256811">SUSE bug 1256811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256812">SUSE bug 1256812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257593">SUSE bug 1257593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257594">SUSE bug 1257594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257595">SUSE bug 1257595</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10911/">CVE-2025-10911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10911">CVE-2025-10911 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0989/">CVE-2026-0989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0989">CVE-2026-0989 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0990/">CVE-2026-0990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0990">CVE-2026-0990 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0992/">CVE-2026-0992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0992">CVE-2026-0992 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1757/">CVE-2026-1757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1757">CVE-2026-1757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045055" comment="libxml2-2-2.9.14-150400.5.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045056" comment="libxml2-tools-2.9.14-150400.5.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045057" comment="python3-libxml2-2.9.14-150400.5.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206520" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1204957" ref_url="https://bugzilla.suse.com/1204957" source="BUGZILLA"/>
		<reference ref_id="1205567" ref_url="https://bugzilla.suse.com/1205567" source="BUGZILLA"/>
		<reference ref_id="1206889" ref_url="https://bugzilla.suse.com/1206889" source="BUGZILLA"/>
		<reference ref_id="1207051" ref_url="https://bugzilla.suse.com/1207051" source="BUGZILLA"/>
		<reference ref_id="1207088" ref_url="https://bugzilla.suse.com/1207088" source="BUGZILLA"/>
		<reference ref_id="1207611" ref_url="https://bugzilla.suse.com/1207611" source="BUGZILLA"/>
		<reference ref_id="1207620" ref_url="https://bugzilla.suse.com/1207620" source="BUGZILLA"/>
		<reference ref_id="1207622" ref_url="https://bugzilla.suse.com/1207622" source="BUGZILLA"/>
		<reference ref_id="1207636" ref_url="https://bugzilla.suse.com/1207636" source="BUGZILLA"/>
		<reference ref_id="1207644" ref_url="https://bugzilla.suse.com/1207644" source="BUGZILLA"/>
		<reference ref_id="1207646" ref_url="https://bugzilla.suse.com/1207646" source="BUGZILLA"/>
		<reference ref_id="1207652" ref_url="https://bugzilla.suse.com/1207652" source="BUGZILLA"/>
		<reference ref_id="1207653" ref_url="https://bugzilla.suse.com/1207653" source="BUGZILLA"/>
		<reference ref_id="1208570" ref_url="https://bugzilla.suse.com/1208570" source="BUGZILLA"/>
		<reference ref_id="1208758" ref_url="https://bugzilla.suse.com/1208758" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1210817" ref_url="https://bugzilla.suse.com/1210817" source="BUGZILLA"/>
		<reference ref_id="1210943" ref_url="https://bugzilla.suse.com/1210943" source="BUGZILLA"/>
		<reference ref_id="1211690" ref_url="https://bugzilla.suse.com/1211690" source="BUGZILLA"/>
		<reference ref_id="1213025" ref_url="https://bugzilla.suse.com/1213025" source="BUGZILLA"/>
		<reference ref_id="1213032" ref_url="https://bugzilla.suse.com/1213032" source="BUGZILLA"/>
		<reference ref_id="1213093" ref_url="https://bugzilla.suse.com/1213093" source="BUGZILLA"/>
		<reference ref_id="1213105" ref_url="https://bugzilla.suse.com/1213105" source="BUGZILLA"/>
		<reference ref_id="1213110" ref_url="https://bugzilla.suse.com/1213110" source="BUGZILLA"/>
		<reference ref_id="1213111" ref_url="https://bugzilla.suse.com/1213111" source="BUGZILLA"/>
		<reference ref_id="1213653" ref_url="https://bugzilla.suse.com/1213653" source="BUGZILLA"/>
		<reference ref_id="1213747" ref_url="https://bugzilla.suse.com/1213747" source="BUGZILLA"/>
		<reference ref_id="1213867" ref_url="https://bugzilla.suse.com/1213867" source="BUGZILLA"/>
		<reference ref_id="1214635" ref_url="https://bugzilla.suse.com/1214635" source="BUGZILLA"/>
		<reference ref_id="1214940" ref_url="https://bugzilla.suse.com/1214940" source="BUGZILLA"/>
		<reference ref_id="1214962" ref_url="https://bugzilla.suse.com/1214962" source="BUGZILLA"/>
		<reference ref_id="1214986" ref_url="https://bugzilla.suse.com/1214986" source="BUGZILLA"/>
		<reference ref_id="1214990" ref_url="https://bugzilla.suse.com/1214990" source="BUGZILLA"/>
		<reference ref_id="1216062" ref_url="https://bugzilla.suse.com/1216062" source="BUGZILLA"/>
		<reference ref_id="1220137" ref_url="https://bugzilla.suse.com/1220137" source="BUGZILLA"/>
		<reference ref_id="1220144" ref_url="https://bugzilla.suse.com/1220144" source="BUGZILLA"/>
		<reference ref_id="1223007" ref_url="https://bugzilla.suse.com/1223007" source="BUGZILLA"/>
		<reference ref_id="1228015" ref_url="https://bugzilla.suse.com/1228015" source="BUGZILLA"/>
		<reference ref_id="1230185" ref_url="https://bugzilla.suse.com/1230185" source="BUGZILLA"/>
		<reference ref_id="1231084" ref_url="https://bugzilla.suse.com/1231084" source="BUGZILLA"/>
		<reference ref_id="1233038" ref_url="https://bugzilla.suse.com/1233038" source="BUGZILLA"/>
		<reference ref_id="1235905" ref_url="https://bugzilla.suse.com/1235905" source="BUGZILLA"/>
		<reference ref_id="1236104" ref_url="https://bugzilla.suse.com/1236104" source="BUGZILLA"/>
		<reference ref_id="1236208" ref_url="https://bugzilla.suse.com/1236208" source="BUGZILLA"/>
		<reference ref_id="1237885" ref_url="https://bugzilla.suse.com/1237885" source="BUGZILLA"/>
		<reference ref_id="1237906" ref_url="https://bugzilla.suse.com/1237906" source="BUGZILLA"/>
		<reference ref_id="1238414" ref_url="https://bugzilla.suse.com/1238414" source="BUGZILLA"/>
		<reference ref_id="1238754" ref_url="https://bugzilla.suse.com/1238754" source="BUGZILLA"/>
		<reference ref_id="1238763" ref_url="https://bugzilla.suse.com/1238763" source="BUGZILLA"/>
		<reference ref_id="1238896" ref_url="https://bugzilla.suse.com/1238896" source="BUGZILLA"/>
		<reference ref_id="1238917" ref_url="https://bugzilla.suse.com/1238917" source="BUGZILLA"/>
		<reference ref_id="1242006" ref_url="https://bugzilla.suse.com/1242006" source="BUGZILLA"/>
		<reference ref_id="1244758" ref_url="https://bugzilla.suse.com/1244758" source="BUGZILLA"/>
		<reference ref_id="1244904" ref_url="https://bugzilla.suse.com/1244904" source="BUGZILLA"/>
		<reference ref_id="1245110" ref_url="https://bugzilla.suse.com/1245110" source="BUGZILLA"/>
		<reference ref_id="1245210" ref_url="https://bugzilla.suse.com/1245210" source="BUGZILLA"/>
		<reference ref_id="1245723" ref_url="https://bugzilla.suse.com/1245723" source="BUGZILLA"/>
		<reference ref_id="1245751" ref_url="https://bugzilla.suse.com/1245751" source="BUGZILLA"/>
		<reference ref_id="1247177" ref_url="https://bugzilla.suse.com/1247177" source="BUGZILLA"/>
		<reference ref_id="1247483" ref_url="https://bugzilla.suse.com/1247483" source="BUGZILLA"/>
		<reference ref_id="1248306" ref_url="https://bugzilla.suse.com/1248306" source="BUGZILLA"/>
		<reference ref_id="1248377" ref_url="https://bugzilla.suse.com/1248377" source="BUGZILLA"/>
		<reference ref_id="1249156" ref_url="https://bugzilla.suse.com/1249156" source="BUGZILLA"/>
		<reference ref_id="1249158" ref_url="https://bugzilla.suse.com/1249158" source="BUGZILLA"/>
		<reference ref_id="1249827" ref_url="https://bugzilla.suse.com/1249827" source="BUGZILLA"/>
		<reference ref_id="1249871" ref_url="https://bugzilla.suse.com/1249871" source="BUGZILLA"/>
		<reference ref_id="1250397" ref_url="https://bugzilla.suse.com/1250397" source="BUGZILLA"/>
		<reference ref_id="1252046" ref_url="https://bugzilla.suse.com/1252046" source="BUGZILLA"/>
		<reference ref_id="1252678" ref_url="https://bugzilla.suse.com/1252678" source="BUGZILLA"/>
		<reference ref_id="1252785" ref_url="https://bugzilla.suse.com/1252785" source="BUGZILLA"/>
		<reference ref_id="1253028" ref_url="https://bugzilla.suse.com/1253028" source="BUGZILLA"/>
		<reference ref_id="1253409" ref_url="https://bugzilla.suse.com/1253409" source="BUGZILLA"/>
		<reference ref_id="1253702" ref_url="https://bugzilla.suse.com/1253702" source="BUGZILLA"/>
		<reference ref_id="1254462" ref_url="https://bugzilla.suse.com/1254462" source="BUGZILLA"/>
		<reference ref_id="1254463" ref_url="https://bugzilla.suse.com/1254463" source="BUGZILLA"/>
		<reference ref_id="1254464" ref_url="https://bugzilla.suse.com/1254464" source="BUGZILLA"/>
		<reference ref_id="1254520" ref_url="https://bugzilla.suse.com/1254520" source="BUGZILLA"/>
		<reference ref_id="1254559" ref_url="https://bugzilla.suse.com/1254559" source="BUGZILLA"/>
		<reference ref_id="1254562" ref_url="https://bugzilla.suse.com/1254562" source="BUGZILLA"/>
		<reference ref_id="1254572" ref_url="https://bugzilla.suse.com/1254572" source="BUGZILLA"/>
		<reference ref_id="1254578" ref_url="https://bugzilla.suse.com/1254578" source="BUGZILLA"/>
		<reference ref_id="1254580" ref_url="https://bugzilla.suse.com/1254580" source="BUGZILLA"/>
		<reference ref_id="1254592" ref_url="https://bugzilla.suse.com/1254592" source="BUGZILLA"/>
		<reference ref_id="1254608" ref_url="https://bugzilla.suse.com/1254608" source="BUGZILLA"/>
		<reference ref_id="1254609" ref_url="https://bugzilla.suse.com/1254609" source="BUGZILLA"/>
		<reference ref_id="1254614" ref_url="https://bugzilla.suse.com/1254614" source="BUGZILLA"/>
		<reference ref_id="1254615" ref_url="https://bugzilla.suse.com/1254615" source="BUGZILLA"/>
		<reference ref_id="1254617" ref_url="https://bugzilla.suse.com/1254617" source="BUGZILLA"/>
		<reference ref_id="1254625" ref_url="https://bugzilla.suse.com/1254625" source="BUGZILLA"/>
		<reference ref_id="1254631" ref_url="https://bugzilla.suse.com/1254631" source="BUGZILLA"/>
		<reference ref_id="1254632" ref_url="https://bugzilla.suse.com/1254632" source="BUGZILLA"/>
		<reference ref_id="1254634" ref_url="https://bugzilla.suse.com/1254634" source="BUGZILLA"/>
		<reference ref_id="1254644" ref_url="https://bugzilla.suse.com/1254644" source="BUGZILLA"/>
		<reference ref_id="1254645" ref_url="https://bugzilla.suse.com/1254645" source="BUGZILLA"/>
		<reference ref_id="1254649" ref_url="https://bugzilla.suse.com/1254649" source="BUGZILLA"/>
		<reference ref_id="1254653" ref_url="https://bugzilla.suse.com/1254653" source="BUGZILLA"/>
		<reference ref_id="1254656" ref_url="https://bugzilla.suse.com/1254656" source="BUGZILLA"/>
		<reference ref_id="1254658" ref_url="https://bugzilla.suse.com/1254658" source="BUGZILLA"/>
		<reference ref_id="1254660" ref_url="https://bugzilla.suse.com/1254660" source="BUGZILLA"/>
		<reference ref_id="1254664" ref_url="https://bugzilla.suse.com/1254664" source="BUGZILLA"/>
		<reference ref_id="1254671" ref_url="https://bugzilla.suse.com/1254671" source="BUGZILLA"/>
		<reference ref_id="1254674" ref_url="https://bugzilla.suse.com/1254674" source="BUGZILLA"/>
		<reference ref_id="1254676" ref_url="https://bugzilla.suse.com/1254676" source="BUGZILLA"/>
		<reference ref_id="1254677" ref_url="https://bugzilla.suse.com/1254677" source="BUGZILLA"/>
		<reference ref_id="1254686" ref_url="https://bugzilla.suse.com/1254686" source="BUGZILLA"/>
		<reference ref_id="1254690" ref_url="https://bugzilla.suse.com/1254690" source="BUGZILLA"/>
		<reference ref_id="1254692" ref_url="https://bugzilla.suse.com/1254692" source="BUGZILLA"/>
		<reference ref_id="1254694" ref_url="https://bugzilla.suse.com/1254694" source="BUGZILLA"/>
		<reference ref_id="1254696" ref_url="https://bugzilla.suse.com/1254696" source="BUGZILLA"/>
		<reference ref_id="1254698" ref_url="https://bugzilla.suse.com/1254698" source="BUGZILLA"/>
		<reference ref_id="1254699" ref_url="https://bugzilla.suse.com/1254699" source="BUGZILLA"/>
		<reference ref_id="1254704" ref_url="https://bugzilla.suse.com/1254704" source="BUGZILLA"/>
		<reference ref_id="1254706" ref_url="https://bugzilla.suse.com/1254706" source="BUGZILLA"/>
		<reference ref_id="1254709" ref_url="https://bugzilla.suse.com/1254709" source="BUGZILLA"/>
		<reference ref_id="1254710" ref_url="https://bugzilla.suse.com/1254710" source="BUGZILLA"/>
		<reference ref_id="1254711" ref_url="https://bugzilla.suse.com/1254711" source="BUGZILLA"/>
		<reference ref_id="1254712" ref_url="https://bugzilla.suse.com/1254712" source="BUGZILLA"/>
		<reference ref_id="1254713" ref_url="https://bugzilla.suse.com/1254713" source="BUGZILLA"/>
		<reference ref_id="1254714" ref_url="https://bugzilla.suse.com/1254714" source="BUGZILLA"/>
		<reference ref_id="1254716" ref_url="https://bugzilla.suse.com/1254716" source="BUGZILLA"/>
		<reference ref_id="1254723" ref_url="https://bugzilla.suse.com/1254723" source="BUGZILLA"/>
		<reference ref_id="1254725" ref_url="https://bugzilla.suse.com/1254725" source="BUGZILLA"/>
		<reference ref_id="1254728" ref_url="https://bugzilla.suse.com/1254728" source="BUGZILLA"/>
		<reference ref_id="1254729" ref_url="https://bugzilla.suse.com/1254729" source="BUGZILLA"/>
		<reference ref_id="1254743" ref_url="https://bugzilla.suse.com/1254743" source="BUGZILLA"/>
		<reference ref_id="1254745" ref_url="https://bugzilla.suse.com/1254745" source="BUGZILLA"/>
		<reference ref_id="1254751" ref_url="https://bugzilla.suse.com/1254751" source="BUGZILLA"/>
		<reference ref_id="1254756" ref_url="https://bugzilla.suse.com/1254756" source="BUGZILLA"/>
		<reference ref_id="1254759" ref_url="https://bugzilla.suse.com/1254759" source="BUGZILLA"/>
		<reference ref_id="1254763" ref_url="https://bugzilla.suse.com/1254763" source="BUGZILLA"/>
		<reference ref_id="1254767" ref_url="https://bugzilla.suse.com/1254767" source="BUGZILLA"/>
		<reference ref_id="1254775" ref_url="https://bugzilla.suse.com/1254775" source="BUGZILLA"/>
		<reference ref_id="1254780" ref_url="https://bugzilla.suse.com/1254780" source="BUGZILLA"/>
		<reference ref_id="1254781" ref_url="https://bugzilla.suse.com/1254781" source="BUGZILLA"/>
		<reference ref_id="1254782" ref_url="https://bugzilla.suse.com/1254782" source="BUGZILLA"/>
		<reference ref_id="1254783" ref_url="https://bugzilla.suse.com/1254783" source="BUGZILLA"/>
		<reference ref_id="1254785" ref_url="https://bugzilla.suse.com/1254785" source="BUGZILLA"/>
		<reference ref_id="1254788" ref_url="https://bugzilla.suse.com/1254788" source="BUGZILLA"/>
		<reference ref_id="1254789" ref_url="https://bugzilla.suse.com/1254789" source="BUGZILLA"/>
		<reference ref_id="1254792" ref_url="https://bugzilla.suse.com/1254792" source="BUGZILLA"/>
		<reference ref_id="1254813" ref_url="https://bugzilla.suse.com/1254813" source="BUGZILLA"/>
		<reference ref_id="1254842" ref_url="https://bugzilla.suse.com/1254842" source="BUGZILLA"/>
		<reference ref_id="1254843" ref_url="https://bugzilla.suse.com/1254843" source="BUGZILLA"/>
		<reference ref_id="1254847" ref_url="https://bugzilla.suse.com/1254847" source="BUGZILLA"/>
		<reference ref_id="1254851" ref_url="https://bugzilla.suse.com/1254851" source="BUGZILLA"/>
		<reference ref_id="1254894" ref_url="https://bugzilla.suse.com/1254894" source="BUGZILLA"/>
		<reference ref_id="1254902" ref_url="https://bugzilla.suse.com/1254902" source="BUGZILLA"/>
		<reference ref_id="1254915" ref_url="https://bugzilla.suse.com/1254915" source="BUGZILLA"/>
		<reference ref_id="1254916" ref_url="https://bugzilla.suse.com/1254916" source="BUGZILLA"/>
		<reference ref_id="1254917" ref_url="https://bugzilla.suse.com/1254917" source="BUGZILLA"/>
		<reference ref_id="1254920" ref_url="https://bugzilla.suse.com/1254920" source="BUGZILLA"/>
		<reference ref_id="1254959" ref_url="https://bugzilla.suse.com/1254959" source="BUGZILLA"/>
		<reference ref_id="1254974" ref_url="https://bugzilla.suse.com/1254974" source="BUGZILLA"/>
		<reference ref_id="1254986" ref_url="https://bugzilla.suse.com/1254986" source="BUGZILLA"/>
		<reference ref_id="1254994" ref_url="https://bugzilla.suse.com/1254994" source="BUGZILLA"/>
		<reference ref_id="1255002" ref_url="https://bugzilla.suse.com/1255002" source="BUGZILLA"/>
		<reference ref_id="1255005" ref_url="https://bugzilla.suse.com/1255005" source="BUGZILLA"/>
		<reference ref_id="1255007" ref_url="https://bugzilla.suse.com/1255007" source="BUGZILLA"/>
		<reference ref_id="1255049" ref_url="https://bugzilla.suse.com/1255049" source="BUGZILLA"/>
		<reference ref_id="1255060" ref_url="https://bugzilla.suse.com/1255060" source="BUGZILLA"/>
		<reference ref_id="1255163" ref_url="https://bugzilla.suse.com/1255163" source="BUGZILLA"/>
		<reference ref_id="1255165" ref_url="https://bugzilla.suse.com/1255165" source="BUGZILLA"/>
		<reference ref_id="1255171" ref_url="https://bugzilla.suse.com/1255171" source="BUGZILLA"/>
		<reference ref_id="1255251" ref_url="https://bugzilla.suse.com/1255251" source="BUGZILLA"/>
		<reference ref_id="1255377" ref_url="https://bugzilla.suse.com/1255377" source="BUGZILLA"/>
		<reference ref_id="1255401" ref_url="https://bugzilla.suse.com/1255401" source="BUGZILLA"/>
		<reference ref_id="1255467" ref_url="https://bugzilla.suse.com/1255467" source="BUGZILLA"/>
		<reference ref_id="1255469" ref_url="https://bugzilla.suse.com/1255469" source="BUGZILLA"/>
		<reference ref_id="1255521" ref_url="https://bugzilla.suse.com/1255521" source="BUGZILLA"/>
		<reference ref_id="1255528" ref_url="https://bugzilla.suse.com/1255528" source="BUGZILLA"/>
		<reference ref_id="1255546" ref_url="https://bugzilla.suse.com/1255546" source="BUGZILLA"/>
		<reference ref_id="1255549" ref_url="https://bugzilla.suse.com/1255549" source="BUGZILLA"/>
		<reference ref_id="1255554" ref_url="https://bugzilla.suse.com/1255554" source="BUGZILLA"/>
		<reference ref_id="1255555" ref_url="https://bugzilla.suse.com/1255555" source="BUGZILLA"/>
		<reference ref_id="1255558" ref_url="https://bugzilla.suse.com/1255558" source="BUGZILLA"/>
		<reference ref_id="1255560" ref_url="https://bugzilla.suse.com/1255560" source="BUGZILLA"/>
		<reference ref_id="1255562" ref_url="https://bugzilla.suse.com/1255562" source="BUGZILLA"/>
		<reference ref_id="1255565" ref_url="https://bugzilla.suse.com/1255565" source="BUGZILLA"/>
		<reference ref_id="1255574" ref_url="https://bugzilla.suse.com/1255574" source="BUGZILLA"/>
		<reference ref_id="1255576" ref_url="https://bugzilla.suse.com/1255576" source="BUGZILLA"/>
		<reference ref_id="1255578" ref_url="https://bugzilla.suse.com/1255578" source="BUGZILLA"/>
		<reference ref_id="1255582" ref_url="https://bugzilla.suse.com/1255582" source="BUGZILLA"/>
		<reference ref_id="1255594" ref_url="https://bugzilla.suse.com/1255594" source="BUGZILLA"/>
		<reference ref_id="1255600" ref_url="https://bugzilla.suse.com/1255600" source="BUGZILLA"/>
		<reference ref_id="1255607" ref_url="https://bugzilla.suse.com/1255607" source="BUGZILLA"/>
		<reference ref_id="1255608" ref_url="https://bugzilla.suse.com/1255608" source="BUGZILLA"/>
		<reference ref_id="1255609" ref_url="https://bugzilla.suse.com/1255609" source="BUGZILLA"/>
		<reference ref_id="1255618" ref_url="https://bugzilla.suse.com/1255618" source="BUGZILLA"/>
		<reference ref_id="1255619" ref_url="https://bugzilla.suse.com/1255619" source="BUGZILLA"/>
		<reference ref_id="1255620" ref_url="https://bugzilla.suse.com/1255620" source="BUGZILLA"/>
		<reference ref_id="1255623" ref_url="https://bugzilla.suse.com/1255623" source="BUGZILLA"/>
		<reference ref_id="1255624" ref_url="https://bugzilla.suse.com/1255624" source="BUGZILLA"/>
		<reference ref_id="1255626" ref_url="https://bugzilla.suse.com/1255626" source="BUGZILLA"/>
		<reference ref_id="1255627" ref_url="https://bugzilla.suse.com/1255627" source="BUGZILLA"/>
		<reference ref_id="1255628" ref_url="https://bugzilla.suse.com/1255628" source="BUGZILLA"/>
		<reference ref_id="1255636" ref_url="https://bugzilla.suse.com/1255636" source="BUGZILLA"/>
		<reference ref_id="1255688" ref_url="https://bugzilla.suse.com/1255688" source="BUGZILLA"/>
		<reference ref_id="1255690" ref_url="https://bugzilla.suse.com/1255690" source="BUGZILLA"/>
		<reference ref_id="1255697" ref_url="https://bugzilla.suse.com/1255697" source="BUGZILLA"/>
		<reference ref_id="1255702" ref_url="https://bugzilla.suse.com/1255702" source="BUGZILLA"/>
		<reference ref_id="1255704" ref_url="https://bugzilla.suse.com/1255704" source="BUGZILLA"/>
		<reference ref_id="1255749" ref_url="https://bugzilla.suse.com/1255749" source="BUGZILLA"/>
		<reference ref_id="1255750" ref_url="https://bugzilla.suse.com/1255750" source="BUGZILLA"/>
		<reference ref_id="1255757" ref_url="https://bugzilla.suse.com/1255757" source="BUGZILLA"/>
		<reference ref_id="1255758" ref_url="https://bugzilla.suse.com/1255758" source="BUGZILLA"/>
		<reference ref_id="1255760" ref_url="https://bugzilla.suse.com/1255760" source="BUGZILLA"/>
		<reference ref_id="1255762" ref_url="https://bugzilla.suse.com/1255762" source="BUGZILLA"/>
		<reference ref_id="1255769" ref_url="https://bugzilla.suse.com/1255769" source="BUGZILLA"/>
		<reference ref_id="1255771" ref_url="https://bugzilla.suse.com/1255771" source="BUGZILLA"/>
		<reference ref_id="1255773" ref_url="https://bugzilla.suse.com/1255773" source="BUGZILLA"/>
		<reference ref_id="1255780" ref_url="https://bugzilla.suse.com/1255780" source="BUGZILLA"/>
		<reference ref_id="1255786" ref_url="https://bugzilla.suse.com/1255786" source="BUGZILLA"/>
		<reference ref_id="1255787" ref_url="https://bugzilla.suse.com/1255787" source="BUGZILLA"/>
		<reference ref_id="1255789" ref_url="https://bugzilla.suse.com/1255789" source="BUGZILLA"/>
		<reference ref_id="1255790" ref_url="https://bugzilla.suse.com/1255790" source="BUGZILLA"/>
		<reference ref_id="1255791" ref_url="https://bugzilla.suse.com/1255791" source="BUGZILLA"/>
		<reference ref_id="1255792" ref_url="https://bugzilla.suse.com/1255792" source="BUGZILLA"/>
		<reference ref_id="1255796" ref_url="https://bugzilla.suse.com/1255796" source="BUGZILLA"/>
		<reference ref_id="1255797" ref_url="https://bugzilla.suse.com/1255797" source="BUGZILLA"/>
		<reference ref_id="1255800" ref_url="https://bugzilla.suse.com/1255800" source="BUGZILLA"/>
		<reference ref_id="1255801" ref_url="https://bugzilla.suse.com/1255801" source="BUGZILLA"/>
		<reference ref_id="1255802" ref_url="https://bugzilla.suse.com/1255802" source="BUGZILLA"/>
		<reference ref_id="1255803" ref_url="https://bugzilla.suse.com/1255803" source="BUGZILLA"/>
		<reference ref_id="1255804" ref_url="https://bugzilla.suse.com/1255804" source="BUGZILLA"/>
		<reference ref_id="1255806" ref_url="https://bugzilla.suse.com/1255806" source="BUGZILLA"/>
		<reference ref_id="1255808" ref_url="https://bugzilla.suse.com/1255808" source="BUGZILLA"/>
		<reference ref_id="1255819" ref_url="https://bugzilla.suse.com/1255819" source="BUGZILLA"/>
		<reference ref_id="1255839" ref_url="https://bugzilla.suse.com/1255839" source="BUGZILLA"/>
		<reference ref_id="1255843" ref_url="https://bugzilla.suse.com/1255843" source="BUGZILLA"/>
		<reference ref_id="1255844" ref_url="https://bugzilla.suse.com/1255844" source="BUGZILLA"/>
		<reference ref_id="1255872" ref_url="https://bugzilla.suse.com/1255872" source="BUGZILLA"/>
		<reference ref_id="1255875" ref_url="https://bugzilla.suse.com/1255875" source="BUGZILLA"/>
		<reference ref_id="1255876" ref_url="https://bugzilla.suse.com/1255876" source="BUGZILLA"/>
		<reference ref_id="1255877" ref_url="https://bugzilla.suse.com/1255877" source="BUGZILLA"/>
		<reference ref_id="1255878" ref_url="https://bugzilla.suse.com/1255878" source="BUGZILLA"/>
		<reference ref_id="1255880" ref_url="https://bugzilla.suse.com/1255880" source="BUGZILLA"/>
		<reference ref_id="1255889" ref_url="https://bugzilla.suse.com/1255889" source="BUGZILLA"/>
		<reference ref_id="1255901" ref_url="https://bugzilla.suse.com/1255901" source="BUGZILLA"/>
		<reference ref_id="1255902" ref_url="https://bugzilla.suse.com/1255902" source="BUGZILLA"/>
		<reference ref_id="1255905" ref_url="https://bugzilla.suse.com/1255905" source="BUGZILLA"/>
		<reference ref_id="1255906" ref_url="https://bugzilla.suse.com/1255906" source="BUGZILLA"/>
		<reference ref_id="1255908" ref_url="https://bugzilla.suse.com/1255908" source="BUGZILLA"/>
		<reference ref_id="1255909" ref_url="https://bugzilla.suse.com/1255909" source="BUGZILLA"/>
		<reference ref_id="1255910" ref_url="https://bugzilla.suse.com/1255910" source="BUGZILLA"/>
		<reference ref_id="1255912" ref_url="https://bugzilla.suse.com/1255912" source="BUGZILLA"/>
		<reference ref_id="1255919" ref_url="https://bugzilla.suse.com/1255919" source="BUGZILLA"/>
		<reference ref_id="1255922" ref_url="https://bugzilla.suse.com/1255922" source="BUGZILLA"/>
		<reference ref_id="1255925" ref_url="https://bugzilla.suse.com/1255925" source="BUGZILLA"/>
		<reference ref_id="1255939" ref_url="https://bugzilla.suse.com/1255939" source="BUGZILLA"/>
		<reference ref_id="1255950" ref_url="https://bugzilla.suse.com/1255950" source="BUGZILLA"/>
		<reference ref_id="1255953" ref_url="https://bugzilla.suse.com/1255953" source="BUGZILLA"/>
		<reference ref_id="1255954" ref_url="https://bugzilla.suse.com/1255954" source="BUGZILLA"/>
		<reference ref_id="1255962" ref_url="https://bugzilla.suse.com/1255962" source="BUGZILLA"/>
		<reference ref_id="1255964" ref_url="https://bugzilla.suse.com/1255964" source="BUGZILLA"/>
		<reference ref_id="1255968" ref_url="https://bugzilla.suse.com/1255968" source="BUGZILLA"/>
		<reference ref_id="1255969" ref_url="https://bugzilla.suse.com/1255969" source="BUGZILLA"/>
		<reference ref_id="1255970" ref_url="https://bugzilla.suse.com/1255970" source="BUGZILLA"/>
		<reference ref_id="1255971" ref_url="https://bugzilla.suse.com/1255971" source="BUGZILLA"/>
		<reference ref_id="1255978" ref_url="https://bugzilla.suse.com/1255978" source="BUGZILLA"/>
		<reference ref_id="1255979" ref_url="https://bugzilla.suse.com/1255979" source="BUGZILLA"/>
		<reference ref_id="1255983" ref_url="https://bugzilla.suse.com/1255983" source="BUGZILLA"/>
		<reference ref_id="1255985" ref_url="https://bugzilla.suse.com/1255985" source="BUGZILLA"/>
		<reference ref_id="1255990" ref_url="https://bugzilla.suse.com/1255990" source="BUGZILLA"/>
		<reference ref_id="1255993" ref_url="https://bugzilla.suse.com/1255993" source="BUGZILLA"/>
		<reference ref_id="1255994" ref_url="https://bugzilla.suse.com/1255994" source="BUGZILLA"/>
		<reference ref_id="1255996" ref_url="https://bugzilla.suse.com/1255996" source="BUGZILLA"/>
		<reference ref_id="1256034" ref_url="https://bugzilla.suse.com/1256034" source="BUGZILLA"/>
		<reference ref_id="1256040" ref_url="https://bugzilla.suse.com/1256040" source="BUGZILLA"/>
		<reference ref_id="1256042" ref_url="https://bugzilla.suse.com/1256042" source="BUGZILLA"/>
		<reference ref_id="1256045" ref_url="https://bugzilla.suse.com/1256045" source="BUGZILLA"/>
		<reference ref_id="1256046" ref_url="https://bugzilla.suse.com/1256046" source="BUGZILLA"/>
		<reference ref_id="1256048" ref_url="https://bugzilla.suse.com/1256048" source="BUGZILLA"/>
		<reference ref_id="1256049" ref_url="https://bugzilla.suse.com/1256049" source="BUGZILLA"/>
		<reference ref_id="1256053" ref_url="https://bugzilla.suse.com/1256053" source="BUGZILLA"/>
		<reference ref_id="1256056" ref_url="https://bugzilla.suse.com/1256056" source="BUGZILLA"/>
		<reference ref_id="1256057" ref_url="https://bugzilla.suse.com/1256057" source="BUGZILLA"/>
		<reference ref_id="1256062" ref_url="https://bugzilla.suse.com/1256062" source="BUGZILLA"/>
		<reference ref_id="1256063" ref_url="https://bugzilla.suse.com/1256063" source="BUGZILLA"/>
		<reference ref_id="1256064" ref_url="https://bugzilla.suse.com/1256064" source="BUGZILLA"/>
		<reference ref_id="1256065" ref_url="https://bugzilla.suse.com/1256065" source="BUGZILLA"/>
		<reference ref_id="1256074" ref_url="https://bugzilla.suse.com/1256074" source="BUGZILLA"/>
		<reference ref_id="1256081" ref_url="https://bugzilla.suse.com/1256081" source="BUGZILLA"/>
		<reference ref_id="1256086" ref_url="https://bugzilla.suse.com/1256086" source="BUGZILLA"/>
		<reference ref_id="1256091" ref_url="https://bugzilla.suse.com/1256091" source="BUGZILLA"/>
		<reference ref_id="1256093" ref_url="https://bugzilla.suse.com/1256093" source="BUGZILLA"/>
		<reference ref_id="1256095" ref_url="https://bugzilla.suse.com/1256095" source="BUGZILLA"/>
		<reference ref_id="1256099" ref_url="https://bugzilla.suse.com/1256099" source="BUGZILLA"/>
		<reference ref_id="1256114" ref_url="https://bugzilla.suse.com/1256114" source="BUGZILLA"/>
		<reference ref_id="1256115" ref_url="https://bugzilla.suse.com/1256115" source="BUGZILLA"/>
		<reference ref_id="1256118" ref_url="https://bugzilla.suse.com/1256118" source="BUGZILLA"/>
		<reference ref_id="1256119" ref_url="https://bugzilla.suse.com/1256119" source="BUGZILLA"/>
		<reference ref_id="1256121" ref_url="https://bugzilla.suse.com/1256121" source="BUGZILLA"/>
		<reference ref_id="1256122" ref_url="https://bugzilla.suse.com/1256122" source="BUGZILLA"/>
		<reference ref_id="1256124" ref_url="https://bugzilla.suse.com/1256124" source="BUGZILLA"/>
		<reference ref_id="1256125" ref_url="https://bugzilla.suse.com/1256125" source="BUGZILLA"/>
		<reference ref_id="1256126" ref_url="https://bugzilla.suse.com/1256126" source="BUGZILLA"/>
		<reference ref_id="1256127" ref_url="https://bugzilla.suse.com/1256127" source="BUGZILLA"/>
		<reference ref_id="1256130" ref_url="https://bugzilla.suse.com/1256130" source="BUGZILLA"/>
		<reference ref_id="1256131" ref_url="https://bugzilla.suse.com/1256131" source="BUGZILLA"/>
		<reference ref_id="1256132" ref_url="https://bugzilla.suse.com/1256132" source="BUGZILLA"/>
		<reference ref_id="1256133" ref_url="https://bugzilla.suse.com/1256133" source="BUGZILLA"/>
		<reference ref_id="1256136" ref_url="https://bugzilla.suse.com/1256136" source="BUGZILLA"/>
		<reference ref_id="1256137" ref_url="https://bugzilla.suse.com/1256137" source="BUGZILLA"/>
		<reference ref_id="1256140" ref_url="https://bugzilla.suse.com/1256140" source="BUGZILLA"/>
		<reference ref_id="1256141" ref_url="https://bugzilla.suse.com/1256141" source="BUGZILLA"/>
		<reference ref_id="1256142" ref_url="https://bugzilla.suse.com/1256142" source="BUGZILLA"/>
		<reference ref_id="1256143" ref_url="https://bugzilla.suse.com/1256143" source="BUGZILLA"/>
		<reference ref_id="1256145" ref_url="https://bugzilla.suse.com/1256145" source="BUGZILLA"/>
		<reference ref_id="1256149" ref_url="https://bugzilla.suse.com/1256149" source="BUGZILLA"/>
		<reference ref_id="1256152" ref_url="https://bugzilla.suse.com/1256152" source="BUGZILLA"/>
		<reference ref_id="1256154" ref_url="https://bugzilla.suse.com/1256154" source="BUGZILLA"/>
		<reference ref_id="1256155" ref_url="https://bugzilla.suse.com/1256155" source="BUGZILLA"/>
		<reference ref_id="1256157" ref_url="https://bugzilla.suse.com/1256157" source="BUGZILLA"/>
		<reference ref_id="1256158" ref_url="https://bugzilla.suse.com/1256158" source="BUGZILLA"/>
		<reference ref_id="1256162" ref_url="https://bugzilla.suse.com/1256162" source="BUGZILLA"/>
		<reference ref_id="1256165" ref_url="https://bugzilla.suse.com/1256165" source="BUGZILLA"/>
		<reference ref_id="1256167" ref_url="https://bugzilla.suse.com/1256167" source="BUGZILLA"/>
		<reference ref_id="1256172" ref_url="https://bugzilla.suse.com/1256172" source="BUGZILLA"/>
		<reference ref_id="1256173" ref_url="https://bugzilla.suse.com/1256173" source="BUGZILLA"/>
		<reference ref_id="1256174" ref_url="https://bugzilla.suse.com/1256174" source="BUGZILLA"/>
		<reference ref_id="1256177" ref_url="https://bugzilla.suse.com/1256177" source="BUGZILLA"/>
		<reference ref_id="1256178" ref_url="https://bugzilla.suse.com/1256178" source="BUGZILLA"/>
		<reference ref_id="1256179" ref_url="https://bugzilla.suse.com/1256179" source="BUGZILLA"/>
		<reference ref_id="1256182" ref_url="https://bugzilla.suse.com/1256182" source="BUGZILLA"/>
		<reference ref_id="1256184" ref_url="https://bugzilla.suse.com/1256184" source="BUGZILLA"/>
		<reference ref_id="1256185" ref_url="https://bugzilla.suse.com/1256185" source="BUGZILLA"/>
		<reference ref_id="1256186" ref_url="https://bugzilla.suse.com/1256186" source="BUGZILLA"/>
		<reference ref_id="1256188" ref_url="https://bugzilla.suse.com/1256188" source="BUGZILLA"/>
		<reference ref_id="1256189" ref_url="https://bugzilla.suse.com/1256189" source="BUGZILLA"/>
		<reference ref_id="1256191" ref_url="https://bugzilla.suse.com/1256191" source="BUGZILLA"/>
		<reference ref_id="1256192" ref_url="https://bugzilla.suse.com/1256192" source="BUGZILLA"/>
		<reference ref_id="1256193" ref_url="https://bugzilla.suse.com/1256193" source="BUGZILLA"/>
		<reference ref_id="1256194" ref_url="https://bugzilla.suse.com/1256194" source="BUGZILLA"/>
		<reference ref_id="1256196" ref_url="https://bugzilla.suse.com/1256196" source="BUGZILLA"/>
		<reference ref_id="1256199" ref_url="https://bugzilla.suse.com/1256199" source="BUGZILLA"/>
		<reference ref_id="1256200" ref_url="https://bugzilla.suse.com/1256200" source="BUGZILLA"/>
		<reference ref_id="1256202" ref_url="https://bugzilla.suse.com/1256202" source="BUGZILLA"/>
		<reference ref_id="1256203" ref_url="https://bugzilla.suse.com/1256203" source="BUGZILLA"/>
		<reference ref_id="1256204" ref_url="https://bugzilla.suse.com/1256204" source="BUGZILLA"/>
		<reference ref_id="1256205" ref_url="https://bugzilla.suse.com/1256205" source="BUGZILLA"/>
		<reference ref_id="1256206" ref_url="https://bugzilla.suse.com/1256206" source="BUGZILLA"/>
		<reference ref_id="1256207" ref_url="https://bugzilla.suse.com/1256207" source="BUGZILLA"/>
		<reference ref_id="1256208" ref_url="https://bugzilla.suse.com/1256208" source="BUGZILLA"/>
		<reference ref_id="1256211" ref_url="https://bugzilla.suse.com/1256211" source="BUGZILLA"/>
		<reference ref_id="1256215" ref_url="https://bugzilla.suse.com/1256215" source="BUGZILLA"/>
		<reference ref_id="1256216" ref_url="https://bugzilla.suse.com/1256216" source="BUGZILLA"/>
		<reference ref_id="1256219" ref_url="https://bugzilla.suse.com/1256219" source="BUGZILLA"/>
		<reference ref_id="1256220" ref_url="https://bugzilla.suse.com/1256220" source="BUGZILLA"/>
		<reference ref_id="1256221" ref_url="https://bugzilla.suse.com/1256221" source="BUGZILLA"/>
		<reference ref_id="1256223" ref_url="https://bugzilla.suse.com/1256223" source="BUGZILLA"/>
		<reference ref_id="1256228" ref_url="https://bugzilla.suse.com/1256228" source="BUGZILLA"/>
		<reference ref_id="1256230" ref_url="https://bugzilla.suse.com/1256230" source="BUGZILLA"/>
		<reference ref_id="1256231" ref_url="https://bugzilla.suse.com/1256231" source="BUGZILLA"/>
		<reference ref_id="1256235" ref_url="https://bugzilla.suse.com/1256235" source="BUGZILLA"/>
		<reference ref_id="1256241" ref_url="https://bugzilla.suse.com/1256241" source="BUGZILLA"/>
		<reference ref_id="1256242" ref_url="https://bugzilla.suse.com/1256242" source="BUGZILLA"/>
		<reference ref_id="1256245" ref_url="https://bugzilla.suse.com/1256245" source="BUGZILLA"/>
		<reference ref_id="1256248" ref_url="https://bugzilla.suse.com/1256248" source="BUGZILLA"/>
		<reference ref_id="1256250" ref_url="https://bugzilla.suse.com/1256250" source="BUGZILLA"/>
		<reference ref_id="1256254" ref_url="https://bugzilla.suse.com/1256254" source="BUGZILLA"/>
		<reference ref_id="1256260" ref_url="https://bugzilla.suse.com/1256260" source="BUGZILLA"/>
		<reference ref_id="1256265" ref_url="https://bugzilla.suse.com/1256265" source="BUGZILLA"/>
		<reference ref_id="1256269" ref_url="https://bugzilla.suse.com/1256269" source="BUGZILLA"/>
		<reference ref_id="1256271" ref_url="https://bugzilla.suse.com/1256271" source="BUGZILLA"/>
		<reference ref_id="1256274" ref_url="https://bugzilla.suse.com/1256274" source="BUGZILLA"/>
		<reference ref_id="1256282" ref_url="https://bugzilla.suse.com/1256282" source="BUGZILLA"/>
		<reference ref_id="1256285" ref_url="https://bugzilla.suse.com/1256285" source="BUGZILLA"/>
		<reference ref_id="1256291" ref_url="https://bugzilla.suse.com/1256291" source="BUGZILLA"/>
		<reference ref_id="1256295" ref_url="https://bugzilla.suse.com/1256295" source="BUGZILLA"/>
		<reference ref_id="1256300" ref_url="https://bugzilla.suse.com/1256300" source="BUGZILLA"/>
		<reference ref_id="1256306" ref_url="https://bugzilla.suse.com/1256306" source="BUGZILLA"/>
		<reference ref_id="1256317" ref_url="https://bugzilla.suse.com/1256317" source="BUGZILLA"/>
		<reference ref_id="1256320" ref_url="https://bugzilla.suse.com/1256320" source="BUGZILLA"/>
		<reference ref_id="1256323" ref_url="https://bugzilla.suse.com/1256323" source="BUGZILLA"/>
		<reference ref_id="1256326" ref_url="https://bugzilla.suse.com/1256326" source="BUGZILLA"/>
		<reference ref_id="1256328" ref_url="https://bugzilla.suse.com/1256328" source="BUGZILLA"/>
		<reference ref_id="1256333" ref_url="https://bugzilla.suse.com/1256333" source="BUGZILLA"/>
		<reference ref_id="1256334" ref_url="https://bugzilla.suse.com/1256334" source="BUGZILLA"/>
		<reference ref_id="1256335" ref_url="https://bugzilla.suse.com/1256335" source="BUGZILLA"/>
		<reference ref_id="1256337" ref_url="https://bugzilla.suse.com/1256337" source="BUGZILLA"/>
		<reference ref_id="1256338" ref_url="https://bugzilla.suse.com/1256338" source="BUGZILLA"/>
		<reference ref_id="1256344" ref_url="https://bugzilla.suse.com/1256344" source="BUGZILLA"/>
		<reference ref_id="1256346" ref_url="https://bugzilla.suse.com/1256346" source="BUGZILLA"/>
		<reference ref_id="1256349" ref_url="https://bugzilla.suse.com/1256349" source="BUGZILLA"/>
		<reference ref_id="1256353" ref_url="https://bugzilla.suse.com/1256353" source="BUGZILLA"/>
		<reference ref_id="1256355" ref_url="https://bugzilla.suse.com/1256355" source="BUGZILLA"/>
		<reference ref_id="1256368" ref_url="https://bugzilla.suse.com/1256368" source="BUGZILLA"/>
		<reference ref_id="1256370" ref_url="https://bugzilla.suse.com/1256370" source="BUGZILLA"/>
		<reference ref_id="1256375" ref_url="https://bugzilla.suse.com/1256375" source="BUGZILLA"/>
		<reference ref_id="1256382" ref_url="https://bugzilla.suse.com/1256382" source="BUGZILLA"/>
		<reference ref_id="1256383" ref_url="https://bugzilla.suse.com/1256383" source="BUGZILLA"/>
		<reference ref_id="1256384" ref_url="https://bugzilla.suse.com/1256384" source="BUGZILLA"/>
		<reference ref_id="1256386" ref_url="https://bugzilla.suse.com/1256386" source="BUGZILLA"/>
		<reference ref_id="1256388" ref_url="https://bugzilla.suse.com/1256388" source="BUGZILLA"/>
		<reference ref_id="1256391" ref_url="https://bugzilla.suse.com/1256391" source="BUGZILLA"/>
		<reference ref_id="1256394" ref_url="https://bugzilla.suse.com/1256394" source="BUGZILLA"/>
		<reference ref_id="1256395" ref_url="https://bugzilla.suse.com/1256395" source="BUGZILLA"/>
		<reference ref_id="1256396" ref_url="https://bugzilla.suse.com/1256396" source="BUGZILLA"/>
		<reference ref_id="1256397" ref_url="https://bugzilla.suse.com/1256397" source="BUGZILLA"/>
		<reference ref_id="1256423" ref_url="https://bugzilla.suse.com/1256423" source="BUGZILLA"/>
		<reference ref_id="1256426" ref_url="https://bugzilla.suse.com/1256426" source="BUGZILLA"/>
		<reference ref_id="1256432" ref_url="https://bugzilla.suse.com/1256432" source="BUGZILLA"/>
		<reference ref_id="1256582" ref_url="https://bugzilla.suse.com/1256582" source="BUGZILLA"/>
		<reference ref_id="1256612" ref_url="https://bugzilla.suse.com/1256612" source="BUGZILLA"/>
		<reference ref_id="1256623" ref_url="https://bugzilla.suse.com/1256623" source="BUGZILLA"/>
		<reference ref_id="1256641" ref_url="https://bugzilla.suse.com/1256641" source="BUGZILLA"/>
		<reference ref_id="1256726" ref_url="https://bugzilla.suse.com/1256726" source="BUGZILLA"/>
		<reference ref_id="1256744" ref_url="https://bugzilla.suse.com/1256744" source="BUGZILLA"/>
		<reference ref_id="1256779" ref_url="https://bugzilla.suse.com/1256779" source="BUGZILLA"/>
		<reference ref_id="1256792" ref_url="https://bugzilla.suse.com/1256792" source="BUGZILLA"/>
		<reference ref_id="1257232" ref_url="https://bugzilla.suse.com/1257232" source="BUGZILLA"/>
		<reference ref_id="1257236" ref_url="https://bugzilla.suse.com/1257236" source="BUGZILLA"/>
		<reference ref_id="1257296" ref_url="https://bugzilla.suse.com/1257296" source="BUGZILLA"/>
		<reference ref_id="1257473" ref_url="https://bugzilla.suse.com/1257473" source="BUGZILLA"/>
		<reference ref_id="1257749" ref_url="https://bugzilla.suse.com/1257749" source="BUGZILLA"/>
		<reference ref_id="1257771" ref_url="https://bugzilla.suse.com/1257771" source="BUGZILLA"/>
		<reference ref_id="1257790" ref_url="https://bugzilla.suse.com/1257790" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-48853" ref_url="https://www.suse.com/security/cve/CVE-2022-48853/" source="CVE"/>
		<reference ref_id="CVE-2022-49604" ref_url="https://www.suse.com/security/cve/CVE-2022-49604/" source="CVE"/>
		<reference ref_id="CVE-2022-49943" ref_url="https://www.suse.com/security/cve/CVE-2022-49943/" source="CVE"/>
		<reference ref_id="CVE-2022-49980" ref_url="https://www.suse.com/security/cve/CVE-2022-49980/" source="CVE"/>
		<reference ref_id="CVE-2022-50232" ref_url="https://www.suse.com/security/cve/CVE-2022-50232/" source="CVE"/>
		<reference ref_id="CVE-2022-50614" ref_url="https://www.suse.com/security/cve/CVE-2022-50614/" source="CVE"/>
		<reference ref_id="CVE-2022-50615" ref_url="https://www.suse.com/security/cve/CVE-2022-50615/" source="CVE"/>
		<reference ref_id="CVE-2022-50617" ref_url="https://www.suse.com/security/cve/CVE-2022-50617/" source="CVE"/>
		<reference ref_id="CVE-2022-50618" ref_url="https://www.suse.com/security/cve/CVE-2022-50618/" source="CVE"/>
		<reference ref_id="CVE-2022-50619" ref_url="https://www.suse.com/security/cve/CVE-2022-50619/" source="CVE"/>
		<reference ref_id="CVE-2022-50622" ref_url="https://www.suse.com/security/cve/CVE-2022-50622/" source="CVE"/>
		<reference ref_id="CVE-2022-50623" ref_url="https://www.suse.com/security/cve/CVE-2022-50623/" source="CVE"/>
		<reference ref_id="CVE-2022-50625" ref_url="https://www.suse.com/security/cve/CVE-2022-50625/" source="CVE"/>
		<reference ref_id="CVE-2022-50626" ref_url="https://www.suse.com/security/cve/CVE-2022-50626/" source="CVE"/>
		<reference ref_id="CVE-2022-50629" ref_url="https://www.suse.com/security/cve/CVE-2022-50629/" source="CVE"/>
		<reference ref_id="CVE-2022-50630" ref_url="https://www.suse.com/security/cve/CVE-2022-50630/" source="CVE"/>
		<reference ref_id="CVE-2022-50633" ref_url="https://www.suse.com/security/cve/CVE-2022-50633/" source="CVE"/>
		<reference ref_id="CVE-2022-50635" ref_url="https://www.suse.com/security/cve/CVE-2022-50635/" source="CVE"/>
		<reference ref_id="CVE-2022-50636" ref_url="https://www.suse.com/security/cve/CVE-2022-50636/" source="CVE"/>
		<reference ref_id="CVE-2022-50638" ref_url="https://www.suse.com/security/cve/CVE-2022-50638/" source="CVE"/>
		<reference ref_id="CVE-2022-50640" ref_url="https://www.suse.com/security/cve/CVE-2022-50640/" source="CVE"/>
		<reference ref_id="CVE-2022-50641" ref_url="https://www.suse.com/security/cve/CVE-2022-50641/" source="CVE"/>
		<reference ref_id="CVE-2022-50643" ref_url="https://www.suse.com/security/cve/CVE-2022-50643/" source="CVE"/>
		<reference ref_id="CVE-2022-50644" ref_url="https://www.suse.com/security/cve/CVE-2022-50644/" source="CVE"/>
		<reference ref_id="CVE-2022-50646" ref_url="https://www.suse.com/security/cve/CVE-2022-50646/" source="CVE"/>
		<reference ref_id="CVE-2022-50649" ref_url="https://www.suse.com/security/cve/CVE-2022-50649/" source="CVE"/>
		<reference ref_id="CVE-2022-50652" ref_url="https://www.suse.com/security/cve/CVE-2022-50652/" source="CVE"/>
		<reference ref_id="CVE-2022-50653" ref_url="https://www.suse.com/security/cve/CVE-2022-50653/" source="CVE"/>
		<reference ref_id="CVE-2022-50656" ref_url="https://www.suse.com/security/cve/CVE-2022-50656/" source="CVE"/>
		<reference ref_id="CVE-2022-50658" ref_url="https://www.suse.com/security/cve/CVE-2022-50658/" source="CVE"/>
		<reference ref_id="CVE-2022-50660" ref_url="https://www.suse.com/security/cve/CVE-2022-50660/" source="CVE"/>
		<reference ref_id="CVE-2022-50661" ref_url="https://www.suse.com/security/cve/CVE-2022-50661/" source="CVE"/>
		<reference ref_id="CVE-2022-50662" ref_url="https://www.suse.com/security/cve/CVE-2022-50662/" source="CVE"/>
		<reference ref_id="CVE-2022-50664" ref_url="https://www.suse.com/security/cve/CVE-2022-50664/" source="CVE"/>
		<reference ref_id="CVE-2022-50666" ref_url="https://www.suse.com/security/cve/CVE-2022-50666/" source="CVE"/>
		<reference ref_id="CVE-2022-50668" ref_url="https://www.suse.com/security/cve/CVE-2022-50668/" source="CVE"/>
		<reference ref_id="CVE-2022-50669" ref_url="https://www.suse.com/security/cve/CVE-2022-50669/" source="CVE"/>
		<reference ref_id="CVE-2022-50670" ref_url="https://www.suse.com/security/cve/CVE-2022-50670/" source="CVE"/>
		<reference ref_id="CVE-2022-50671" ref_url="https://www.suse.com/security/cve/CVE-2022-50671/" source="CVE"/>
		<reference ref_id="CVE-2022-50672" ref_url="https://www.suse.com/security/cve/CVE-2022-50672/" source="CVE"/>
		<reference ref_id="CVE-2022-50673" ref_url="https://www.suse.com/security/cve/CVE-2022-50673/" source="CVE"/>
		<reference ref_id="CVE-2022-50675" ref_url="https://www.suse.com/security/cve/CVE-2022-50675/" source="CVE"/>
		<reference ref_id="CVE-2022-50677" ref_url="https://www.suse.com/security/cve/CVE-2022-50677/" source="CVE"/>
		<reference ref_id="CVE-2022-50678" ref_url="https://www.suse.com/security/cve/CVE-2022-50678/" source="CVE"/>
		<reference ref_id="CVE-2022-50679" ref_url="https://www.suse.com/security/cve/CVE-2022-50679/" source="CVE"/>
		<reference ref_id="CVE-2022-50697" ref_url="https://www.suse.com/security/cve/CVE-2022-50697/" source="CVE"/>
		<reference ref_id="CVE-2022-50698" ref_url="https://www.suse.com/security/cve/CVE-2022-50698/" source="CVE"/>
		<reference ref_id="CVE-2022-50699" ref_url="https://www.suse.com/security/cve/CVE-2022-50699/" source="CVE"/>
		<reference ref_id="CVE-2022-50700" ref_url="https://www.suse.com/security/cve/CVE-2022-50700/" source="CVE"/>
		<reference ref_id="CVE-2022-50702" ref_url="https://www.suse.com/security/cve/CVE-2022-50702/" source="CVE"/>
		<reference ref_id="CVE-2022-50703" ref_url="https://www.suse.com/security/cve/CVE-2022-50703/" source="CVE"/>
		<reference ref_id="CVE-2022-50704" ref_url="https://www.suse.com/security/cve/CVE-2022-50704/" source="CVE"/>
		<reference ref_id="CVE-2022-50709" ref_url="https://www.suse.com/security/cve/CVE-2022-50709/" source="CVE"/>
		<reference ref_id="CVE-2022-50715" ref_url="https://www.suse.com/security/cve/CVE-2022-50715/" source="CVE"/>
		<reference ref_id="CVE-2022-50716" ref_url="https://www.suse.com/security/cve/CVE-2022-50716/" source="CVE"/>
		<reference ref_id="CVE-2022-50717" ref_url="https://www.suse.com/security/cve/CVE-2022-50717/" source="CVE"/>
		<reference ref_id="CVE-2022-50718" ref_url="https://www.suse.com/security/cve/CVE-2022-50718/" source="CVE"/>
		<reference ref_id="CVE-2022-50719" ref_url="https://www.suse.com/security/cve/CVE-2022-50719/" source="CVE"/>
		<reference ref_id="CVE-2022-50722" ref_url="https://www.suse.com/security/cve/CVE-2022-50722/" source="CVE"/>
		<reference ref_id="CVE-2022-50724" ref_url="https://www.suse.com/security/cve/CVE-2022-50724/" source="CVE"/>
		<reference ref_id="CVE-2022-50726" ref_url="https://www.suse.com/security/cve/CVE-2022-50726/" source="CVE"/>
		<reference ref_id="CVE-2022-50727" ref_url="https://www.suse.com/security/cve/CVE-2022-50727/" source="CVE"/>
		<reference ref_id="CVE-2022-50728" ref_url="https://www.suse.com/security/cve/CVE-2022-50728/" source="CVE"/>
		<reference ref_id="CVE-2022-50730" ref_url="https://www.suse.com/security/cve/CVE-2022-50730/" source="CVE"/>
		<reference ref_id="CVE-2022-50731" ref_url="https://www.suse.com/security/cve/CVE-2022-50731/" source="CVE"/>
		<reference ref_id="CVE-2022-50732" ref_url="https://www.suse.com/security/cve/CVE-2022-50732/" source="CVE"/>
		<reference ref_id="CVE-2022-50733" ref_url="https://www.suse.com/security/cve/CVE-2022-50733/" source="CVE"/>
		<reference ref_id="CVE-2022-50735" ref_url="https://www.suse.com/security/cve/CVE-2022-50735/" source="CVE"/>
		<reference ref_id="CVE-2022-50736" ref_url="https://www.suse.com/security/cve/CVE-2022-50736/" source="CVE"/>
		<reference ref_id="CVE-2022-50740" ref_url="https://www.suse.com/security/cve/CVE-2022-50740/" source="CVE"/>
		<reference ref_id="CVE-2022-50742" ref_url="https://www.suse.com/security/cve/CVE-2022-50742/" source="CVE"/>
		<reference ref_id="CVE-2022-50744" ref_url="https://www.suse.com/security/cve/CVE-2022-50744/" source="CVE"/>
		<reference ref_id="CVE-2022-50745" ref_url="https://www.suse.com/security/cve/CVE-2022-50745/" source="CVE"/>
		<reference ref_id="CVE-2022-50747" ref_url="https://www.suse.com/security/cve/CVE-2022-50747/" source="CVE"/>
		<reference ref_id="CVE-2022-50749" ref_url="https://www.suse.com/security/cve/CVE-2022-50749/" source="CVE"/>
		<reference ref_id="CVE-2022-50750" ref_url="https://www.suse.com/security/cve/CVE-2022-50750/" source="CVE"/>
		<reference ref_id="CVE-2022-50751" ref_url="https://www.suse.com/security/cve/CVE-2022-50751/" source="CVE"/>
		<reference ref_id="CVE-2022-50752" ref_url="https://www.suse.com/security/cve/CVE-2022-50752/" source="CVE"/>
		<reference ref_id="CVE-2022-50754" ref_url="https://www.suse.com/security/cve/CVE-2022-50754/" source="CVE"/>
		<reference ref_id="CVE-2022-50755" ref_url="https://www.suse.com/security/cve/CVE-2022-50755/" source="CVE"/>
		<reference ref_id="CVE-2022-50756" ref_url="https://www.suse.com/security/cve/CVE-2022-50756/" source="CVE"/>
		<reference ref_id="CVE-2022-50757" ref_url="https://www.suse.com/security/cve/CVE-2022-50757/" source="CVE"/>
		<reference ref_id="CVE-2022-50758" ref_url="https://www.suse.com/security/cve/CVE-2022-50758/" source="CVE"/>
		<reference ref_id="CVE-2022-50760" ref_url="https://www.suse.com/security/cve/CVE-2022-50760/" source="CVE"/>
		<reference ref_id="CVE-2022-50761" ref_url="https://www.suse.com/security/cve/CVE-2022-50761/" source="CVE"/>
		<reference ref_id="CVE-2022-50763" ref_url="https://www.suse.com/security/cve/CVE-2022-50763/" source="CVE"/>
		<reference ref_id="CVE-2022-50767" ref_url="https://www.suse.com/security/cve/CVE-2022-50767/" source="CVE"/>
		<reference ref_id="CVE-2022-50769" ref_url="https://www.suse.com/security/cve/CVE-2022-50769/" source="CVE"/>
		<reference ref_id="CVE-2022-50770" ref_url="https://www.suse.com/security/cve/CVE-2022-50770/" source="CVE"/>
		<reference ref_id="CVE-2022-50773" ref_url="https://www.suse.com/security/cve/CVE-2022-50773/" source="CVE"/>
		<reference ref_id="CVE-2022-50774" ref_url="https://www.suse.com/security/cve/CVE-2022-50774/" source="CVE"/>
		<reference ref_id="CVE-2022-50776" ref_url="https://www.suse.com/security/cve/CVE-2022-50776/" source="CVE"/>
		<reference ref_id="CVE-2022-50777" ref_url="https://www.suse.com/security/cve/CVE-2022-50777/" source="CVE"/>
		<reference ref_id="CVE-2022-50779" ref_url="https://www.suse.com/security/cve/CVE-2022-50779/" source="CVE"/>
		<reference ref_id="CVE-2022-50781" ref_url="https://www.suse.com/security/cve/CVE-2022-50781/" source="CVE"/>
		<reference ref_id="CVE-2022-50782" ref_url="https://www.suse.com/security/cve/CVE-2022-50782/" source="CVE"/>
		<reference ref_id="CVE-2022-50809" ref_url="https://www.suse.com/security/cve/CVE-2022-50809/" source="CVE"/>
		<reference ref_id="CVE-2022-50814" ref_url="https://www.suse.com/security/cve/CVE-2022-50814/" source="CVE"/>
		<reference ref_id="CVE-2022-50819" ref_url="https://www.suse.com/security/cve/CVE-2022-50819/" source="CVE"/>
		<reference ref_id="CVE-2022-50821" ref_url="https://www.suse.com/security/cve/CVE-2022-50821/" source="CVE"/>
		<reference ref_id="CVE-2022-50822" ref_url="https://www.suse.com/security/cve/CVE-2022-50822/" source="CVE"/>
		<reference ref_id="CVE-2022-50823" ref_url="https://www.suse.com/security/cve/CVE-2022-50823/" source="CVE"/>
		<reference ref_id="CVE-2022-50824" ref_url="https://www.suse.com/security/cve/CVE-2022-50824/" source="CVE"/>
		<reference ref_id="CVE-2022-50826" ref_url="https://www.suse.com/security/cve/CVE-2022-50826/" source="CVE"/>
		<reference ref_id="CVE-2022-50827" ref_url="https://www.suse.com/security/cve/CVE-2022-50827/" source="CVE"/>
		<reference ref_id="CVE-2022-50828" ref_url="https://www.suse.com/security/cve/CVE-2022-50828/" source="CVE"/>
		<reference ref_id="CVE-2022-50829" ref_url="https://www.suse.com/security/cve/CVE-2022-50829/" source="CVE"/>
		<reference ref_id="CVE-2022-50830" ref_url="https://www.suse.com/security/cve/CVE-2022-50830/" source="CVE"/>
		<reference ref_id="CVE-2022-50832" ref_url="https://www.suse.com/security/cve/CVE-2022-50832/" source="CVE"/>
		<reference ref_id="CVE-2022-50834" ref_url="https://www.suse.com/security/cve/CVE-2022-50834/" source="CVE"/>
		<reference ref_id="CVE-2022-50835" ref_url="https://www.suse.com/security/cve/CVE-2022-50835/" source="CVE"/>
		<reference ref_id="CVE-2022-50836" ref_url="https://www.suse.com/security/cve/CVE-2022-50836/" source="CVE"/>
		<reference ref_id="CVE-2022-50839" ref_url="https://www.suse.com/security/cve/CVE-2022-50839/" source="CVE"/>
		<reference ref_id="CVE-2022-50840" ref_url="https://www.suse.com/security/cve/CVE-2022-50840/" source="CVE"/>
		<reference ref_id="CVE-2022-50842" ref_url="https://www.suse.com/security/cve/CVE-2022-50842/" source="CVE"/>
		<reference ref_id="CVE-2022-50843" ref_url="https://www.suse.com/security/cve/CVE-2022-50843/" source="CVE"/>
		<reference ref_id="CVE-2022-50844" ref_url="https://www.suse.com/security/cve/CVE-2022-50844/" source="CVE"/>
		<reference ref_id="CVE-2022-50845" ref_url="https://www.suse.com/security/cve/CVE-2022-50845/" source="CVE"/>
		<reference ref_id="CVE-2022-50846" ref_url="https://www.suse.com/security/cve/CVE-2022-50846/" source="CVE"/>
		<reference ref_id="CVE-2022-50848" ref_url="https://www.suse.com/security/cve/CVE-2022-50848/" source="CVE"/>
		<reference ref_id="CVE-2022-50849" ref_url="https://www.suse.com/security/cve/CVE-2022-50849/" source="CVE"/>
		<reference ref_id="CVE-2022-50850" ref_url="https://www.suse.com/security/cve/CVE-2022-50850/" source="CVE"/>
		<reference ref_id="CVE-2022-50851" ref_url="https://www.suse.com/security/cve/CVE-2022-50851/" source="CVE"/>
		<reference ref_id="CVE-2022-50853" ref_url="https://www.suse.com/security/cve/CVE-2022-50853/" source="CVE"/>
		<reference ref_id="CVE-2022-50856" ref_url="https://www.suse.com/security/cve/CVE-2022-50856/" source="CVE"/>
		<reference ref_id="CVE-2022-50858" ref_url="https://www.suse.com/security/cve/CVE-2022-50858/" source="CVE"/>
		<reference ref_id="CVE-2022-50859" ref_url="https://www.suse.com/security/cve/CVE-2022-50859/" source="CVE"/>
		<reference ref_id="CVE-2022-50860" ref_url="https://www.suse.com/security/cve/CVE-2022-50860/" source="CVE"/>
		<reference ref_id="CVE-2022-50861" ref_url="https://www.suse.com/security/cve/CVE-2022-50861/" source="CVE"/>
		<reference ref_id="CVE-2022-50864" ref_url="https://www.suse.com/security/cve/CVE-2022-50864/" source="CVE"/>
		<reference ref_id="CVE-2022-50866" ref_url="https://www.suse.com/security/cve/CVE-2022-50866/" source="CVE"/>
		<reference ref_id="CVE-2022-50868" ref_url="https://www.suse.com/security/cve/CVE-2022-50868/" source="CVE"/>
		<reference ref_id="CVE-2022-50870" ref_url="https://www.suse.com/security/cve/CVE-2022-50870/" source="CVE"/>
		<reference ref_id="CVE-2022-50872" ref_url="https://www.suse.com/security/cve/CVE-2022-50872/" source="CVE"/>
		<reference ref_id="CVE-2022-50876" ref_url="https://www.suse.com/security/cve/CVE-2022-50876/" source="CVE"/>
		<reference ref_id="CVE-2022-50878" ref_url="https://www.suse.com/security/cve/CVE-2022-50878/" source="CVE"/>
		<reference ref_id="CVE-2022-50880" ref_url="https://www.suse.com/security/cve/CVE-2022-50880/" source="CVE"/>
		<reference ref_id="CVE-2022-50881" ref_url="https://www.suse.com/security/cve/CVE-2022-50881/" source="CVE"/>
		<reference ref_id="CVE-2022-50882" ref_url="https://www.suse.com/security/cve/CVE-2022-50882/" source="CVE"/>
		<reference ref_id="CVE-2022-50884" ref_url="https://www.suse.com/security/cve/CVE-2022-50884/" source="CVE"/>
		<reference ref_id="CVE-2022-50885" ref_url="https://www.suse.com/security/cve/CVE-2022-50885/" source="CVE"/>
		<reference ref_id="CVE-2022-50886" ref_url="https://www.suse.com/security/cve/CVE-2022-50886/" source="CVE"/>
		<reference ref_id="CVE-2022-50887" ref_url="https://www.suse.com/security/cve/CVE-2022-50887/" source="CVE"/>
		<reference ref_id="CVE-2022-50888" ref_url="https://www.suse.com/security/cve/CVE-2022-50888/" source="CVE"/>
		<reference ref_id="CVE-2022-50889" ref_url="https://www.suse.com/security/cve/CVE-2022-50889/" source="CVE"/>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<reference ref_id="CVE-2023-52433" ref_url="https://www.suse.com/security/cve/CVE-2023-52433/" source="CVE"/>
		<reference ref_id="CVE-2023-52923" ref_url="https://www.suse.com/security/cve/CVE-2023-52923/" source="CVE"/>
		<reference ref_id="CVE-2023-53178" ref_url="https://www.suse.com/security/cve/CVE-2023-53178/" source="CVE"/>
		<reference ref_id="CVE-2023-53215" ref_url="https://www.suse.com/security/cve/CVE-2023-53215/" source="CVE"/>
		<reference ref_id="CVE-2023-53254" ref_url="https://www.suse.com/security/cve/CVE-2023-53254/" source="CVE"/>
		<reference ref_id="CVE-2023-53407" ref_url="https://www.suse.com/security/cve/CVE-2023-53407/" source="CVE"/>
		<reference ref_id="CVE-2023-53412" ref_url="https://www.suse.com/security/cve/CVE-2023-53412/" source="CVE"/>
		<reference ref_id="CVE-2023-53417" ref_url="https://www.suse.com/security/cve/CVE-2023-53417/" source="CVE"/>
		<reference ref_id="CVE-2023-53418" ref_url="https://www.suse.com/security/cve/CVE-2023-53418/" source="CVE"/>
		<reference ref_id="CVE-2023-53743" ref_url="https://www.suse.com/security/cve/CVE-2023-53743/" source="CVE"/>
		<reference ref_id="CVE-2023-53744" ref_url="https://www.suse.com/security/cve/CVE-2023-53744/" source="CVE"/>
		<reference ref_id="CVE-2023-53746" ref_url="https://www.suse.com/security/cve/CVE-2023-53746/" source="CVE"/>
		<reference ref_id="CVE-2023-53747" ref_url="https://www.suse.com/security/cve/CVE-2023-53747/" source="CVE"/>
		<reference ref_id="CVE-2023-53751" ref_url="https://www.suse.com/security/cve/CVE-2023-53751/" source="CVE"/>
		<reference ref_id="CVE-2023-53754" ref_url="https://www.suse.com/security/cve/CVE-2023-53754/" source="CVE"/>
		<reference ref_id="CVE-2023-53755" ref_url="https://www.suse.com/security/cve/CVE-2023-53755/" source="CVE"/>
		<reference ref_id="CVE-2023-53761" ref_url="https://www.suse.com/security/cve/CVE-2023-53761/" source="CVE"/>
		<reference ref_id="CVE-2023-53766" ref_url="https://www.suse.com/security/cve/CVE-2023-53766/" source="CVE"/>
		<reference ref_id="CVE-2023-53781" ref_url="https://www.suse.com/security/cve/CVE-2023-53781/" source="CVE"/>
		<reference ref_id="CVE-2023-53783" ref_url="https://www.suse.com/security/cve/CVE-2023-53783/" source="CVE"/>
		<reference ref_id="CVE-2023-53786" ref_url="https://www.suse.com/security/cve/CVE-2023-53786/" source="CVE"/>
		<reference ref_id="CVE-2023-53788" ref_url="https://www.suse.com/security/cve/CVE-2023-53788/" source="CVE"/>
		<reference ref_id="CVE-2023-53792" ref_url="https://www.suse.com/security/cve/CVE-2023-53792/" source="CVE"/>
		<reference ref_id="CVE-2023-53794" ref_url="https://www.suse.com/security/cve/CVE-2023-53794/" source="CVE"/>
		<reference ref_id="CVE-2023-53802" ref_url="https://www.suse.com/security/cve/CVE-2023-53802/" source="CVE"/>
		<reference ref_id="CVE-2023-53803" ref_url="https://www.suse.com/security/cve/CVE-2023-53803/" source="CVE"/>
		<reference ref_id="CVE-2023-53804" ref_url="https://www.suse.com/security/cve/CVE-2023-53804/" source="CVE"/>
		<reference ref_id="CVE-2023-53808" ref_url="https://www.suse.com/security/cve/CVE-2023-53808/" source="CVE"/>
		<reference ref_id="CVE-2023-53811" ref_url="https://www.suse.com/security/cve/CVE-2023-53811/" source="CVE"/>
		<reference ref_id="CVE-2023-53814" ref_url="https://www.suse.com/security/cve/CVE-2023-53814/" source="CVE"/>
		<reference ref_id="CVE-2023-53818" ref_url="https://www.suse.com/security/cve/CVE-2023-53818/" source="CVE"/>
		<reference ref_id="CVE-2023-53819" ref_url="https://www.suse.com/security/cve/CVE-2023-53819/" source="CVE"/>
		<reference ref_id="CVE-2023-53820" ref_url="https://www.suse.com/security/cve/CVE-2023-53820/" source="CVE"/>
		<reference ref_id="CVE-2023-53827" ref_url="https://www.suse.com/security/cve/CVE-2023-53827/" source="CVE"/>
		<reference ref_id="CVE-2023-53830" ref_url="https://www.suse.com/security/cve/CVE-2023-53830/" source="CVE"/>
		<reference ref_id="CVE-2023-53832" ref_url="https://www.suse.com/security/cve/CVE-2023-53832/" source="CVE"/>
		<reference ref_id="CVE-2023-53834" ref_url="https://www.suse.com/security/cve/CVE-2023-53834/" source="CVE"/>
		<reference ref_id="CVE-2023-53837" ref_url="https://www.suse.com/security/cve/CVE-2023-53837/" source="CVE"/>
		<reference ref_id="CVE-2023-53840" ref_url="https://www.suse.com/security/cve/CVE-2023-53840/" source="CVE"/>
		<reference ref_id="CVE-2023-53842" ref_url="https://www.suse.com/security/cve/CVE-2023-53842/" source="CVE"/>
		<reference ref_id="CVE-2023-53844" ref_url="https://www.suse.com/security/cve/CVE-2023-53844/" source="CVE"/>
		<reference ref_id="CVE-2023-53845" ref_url="https://www.suse.com/security/cve/CVE-2023-53845/" source="CVE"/>
		<reference ref_id="CVE-2023-53847" ref_url="https://www.suse.com/security/cve/CVE-2023-53847/" source="CVE"/>
		<reference ref_id="CVE-2023-53850" ref_url="https://www.suse.com/security/cve/CVE-2023-53850/" source="CVE"/>
		<reference ref_id="CVE-2023-53852" ref_url="https://www.suse.com/security/cve/CVE-2023-53852/" source="CVE"/>
		<reference ref_id="CVE-2023-53858" ref_url="https://www.suse.com/security/cve/CVE-2023-53858/" source="CVE"/>
		<reference ref_id="CVE-2023-53862" ref_url="https://www.suse.com/security/cve/CVE-2023-53862/" source="CVE"/>
		<reference ref_id="CVE-2023-53866" ref_url="https://www.suse.com/security/cve/CVE-2023-53866/" source="CVE"/>
		<reference ref_id="CVE-2023-53990" ref_url="https://www.suse.com/security/cve/CVE-2023-53990/" source="CVE"/>
		<reference ref_id="CVE-2023-53991" ref_url="https://www.suse.com/security/cve/CVE-2023-53991/" source="CVE"/>
		<reference ref_id="CVE-2023-53996" ref_url="https://www.suse.com/security/cve/CVE-2023-53996/" source="CVE"/>
		<reference ref_id="CVE-2023-53998" ref_url="https://www.suse.com/security/cve/CVE-2023-53998/" source="CVE"/>
		<reference ref_id="CVE-2023-54001" ref_url="https://www.suse.com/security/cve/CVE-2023-54001/" source="CVE"/>
		<reference ref_id="CVE-2023-54003" ref_url="https://www.suse.com/security/cve/CVE-2023-54003/" source="CVE"/>
		<reference ref_id="CVE-2023-54007" ref_url="https://www.suse.com/security/cve/CVE-2023-54007/" source="CVE"/>
		<reference ref_id="CVE-2023-54009" ref_url="https://www.suse.com/security/cve/CVE-2023-54009/" source="CVE"/>
		<reference ref_id="CVE-2023-54010" ref_url="https://www.suse.com/security/cve/CVE-2023-54010/" source="CVE"/>
		<reference ref_id="CVE-2023-54014" ref_url="https://www.suse.com/security/cve/CVE-2023-54014/" source="CVE"/>
		<reference ref_id="CVE-2023-54015" ref_url="https://www.suse.com/security/cve/CVE-2023-54015/" source="CVE"/>
		<reference ref_id="CVE-2023-54018" ref_url="https://www.suse.com/security/cve/CVE-2023-54018/" source="CVE"/>
		<reference ref_id="CVE-2023-54019" ref_url="https://www.suse.com/security/cve/CVE-2023-54019/" source="CVE"/>
		<reference ref_id="CVE-2023-54020" ref_url="https://www.suse.com/security/cve/CVE-2023-54020/" source="CVE"/>
		<reference ref_id="CVE-2023-54021" ref_url="https://www.suse.com/security/cve/CVE-2023-54021/" source="CVE"/>
		<reference ref_id="CVE-2023-54024" ref_url="https://www.suse.com/security/cve/CVE-2023-54024/" source="CVE"/>
		<reference ref_id="CVE-2023-54025" ref_url="https://www.suse.com/security/cve/CVE-2023-54025/" source="CVE"/>
		<reference ref_id="CVE-2023-54026" ref_url="https://www.suse.com/security/cve/CVE-2023-54026/" source="CVE"/>
		<reference ref_id="CVE-2023-54028" ref_url="https://www.suse.com/security/cve/CVE-2023-54028/" source="CVE"/>
		<reference ref_id="CVE-2023-54036" ref_url="https://www.suse.com/security/cve/CVE-2023-54036/" source="CVE"/>
		<reference ref_id="CVE-2023-54039" ref_url="https://www.suse.com/security/cve/CVE-2023-54039/" source="CVE"/>
		<reference ref_id="CVE-2023-54040" ref_url="https://www.suse.com/security/cve/CVE-2023-54040/" source="CVE"/>
		<reference ref_id="CVE-2023-54042" ref_url="https://www.suse.com/security/cve/CVE-2023-54042/" source="CVE"/>
		<reference ref_id="CVE-2023-54045" ref_url="https://www.suse.com/security/cve/CVE-2023-54045/" source="CVE"/>
		<reference ref_id="CVE-2023-54046" ref_url="https://www.suse.com/security/cve/CVE-2023-54046/" source="CVE"/>
		<reference ref_id="CVE-2023-54048" ref_url="https://www.suse.com/security/cve/CVE-2023-54048/" source="CVE"/>
		<reference ref_id="CVE-2023-54049" ref_url="https://www.suse.com/security/cve/CVE-2023-54049/" source="CVE"/>
		<reference ref_id="CVE-2023-54050" ref_url="https://www.suse.com/security/cve/CVE-2023-54050/" source="CVE"/>
		<reference ref_id="CVE-2023-54051" ref_url="https://www.suse.com/security/cve/CVE-2023-54051/" source="CVE"/>
		<reference ref_id="CVE-2023-54053" ref_url="https://www.suse.com/security/cve/CVE-2023-54053/" source="CVE"/>
		<reference ref_id="CVE-2023-54055" ref_url="https://www.suse.com/security/cve/CVE-2023-54055/" source="CVE"/>
		<reference ref_id="CVE-2023-54058" ref_url="https://www.suse.com/security/cve/CVE-2023-54058/" source="CVE"/>
		<reference ref_id="CVE-2023-54064" ref_url="https://www.suse.com/security/cve/CVE-2023-54064/" source="CVE"/>
		<reference ref_id="CVE-2023-54072" ref_url="https://www.suse.com/security/cve/CVE-2023-54072/" source="CVE"/>
		<reference ref_id="CVE-2023-54076" ref_url="https://www.suse.com/security/cve/CVE-2023-54076/" source="CVE"/>
		<reference ref_id="CVE-2023-54078" ref_url="https://www.suse.com/security/cve/CVE-2023-54078/" source="CVE"/>
		<reference ref_id="CVE-2023-54079" ref_url="https://www.suse.com/security/cve/CVE-2023-54079/" source="CVE"/>
		<reference ref_id="CVE-2023-54083" ref_url="https://www.suse.com/security/cve/CVE-2023-54083/" source="CVE"/>
		<reference ref_id="CVE-2023-54084" ref_url="https://www.suse.com/security/cve/CVE-2023-54084/" source="CVE"/>
		<reference ref_id="CVE-2023-54090" ref_url="https://www.suse.com/security/cve/CVE-2023-54090/" source="CVE"/>
		<reference ref_id="CVE-2023-54091" ref_url="https://www.suse.com/security/cve/CVE-2023-54091/" source="CVE"/>
		<reference ref_id="CVE-2023-54092" ref_url="https://www.suse.com/security/cve/CVE-2023-54092/" source="CVE"/>
		<reference ref_id="CVE-2023-54095" ref_url="https://www.suse.com/security/cve/CVE-2023-54095/" source="CVE"/>
		<reference ref_id="CVE-2023-54096" ref_url="https://www.suse.com/security/cve/CVE-2023-54096/" source="CVE"/>
		<reference ref_id="CVE-2023-54097" ref_url="https://www.suse.com/security/cve/CVE-2023-54097/" source="CVE"/>
		<reference ref_id="CVE-2023-54098" ref_url="https://www.suse.com/security/cve/CVE-2023-54098/" source="CVE"/>
		<reference ref_id="CVE-2023-54100" ref_url="https://www.suse.com/security/cve/CVE-2023-54100/" source="CVE"/>
		<reference ref_id="CVE-2023-54102" ref_url="https://www.suse.com/security/cve/CVE-2023-54102/" source="CVE"/>
		<reference ref_id="CVE-2023-54104" ref_url="https://www.suse.com/security/cve/CVE-2023-54104/" source="CVE"/>
		<reference ref_id="CVE-2023-54108" ref_url="https://www.suse.com/security/cve/CVE-2023-54108/" source="CVE"/>
		<reference ref_id="CVE-2023-54110" ref_url="https://www.suse.com/security/cve/CVE-2023-54110/" source="CVE"/>
		<reference ref_id="CVE-2023-54111" ref_url="https://www.suse.com/security/cve/CVE-2023-54111/" source="CVE"/>
		<reference ref_id="CVE-2023-54115" ref_url="https://www.suse.com/security/cve/CVE-2023-54115/" source="CVE"/>
		<reference ref_id="CVE-2023-54118" ref_url="https://www.suse.com/security/cve/CVE-2023-54118/" source="CVE"/>
		<reference ref_id="CVE-2023-54119" ref_url="https://www.suse.com/security/cve/CVE-2023-54119/" source="CVE"/>
		<reference ref_id="CVE-2023-54120" ref_url="https://www.suse.com/security/cve/CVE-2023-54120/" source="CVE"/>
		<reference ref_id="CVE-2023-54122" ref_url="https://www.suse.com/security/cve/CVE-2023-54122/" source="CVE"/>
		<reference ref_id="CVE-2023-54123" ref_url="https://www.suse.com/security/cve/CVE-2023-54123/" source="CVE"/>
		<reference ref_id="CVE-2023-54126" ref_url="https://www.suse.com/security/cve/CVE-2023-54126/" source="CVE"/>
		<reference ref_id="CVE-2023-54127" ref_url="https://www.suse.com/security/cve/CVE-2023-54127/" source="CVE"/>
		<reference ref_id="CVE-2023-54130" ref_url="https://www.suse.com/security/cve/CVE-2023-54130/" source="CVE"/>
		<reference ref_id="CVE-2023-54131" ref_url="https://www.suse.com/security/cve/CVE-2023-54131/" source="CVE"/>
		<reference ref_id="CVE-2023-54136" ref_url="https://www.suse.com/security/cve/CVE-2023-54136/" source="CVE"/>
		<reference ref_id="CVE-2023-54140" ref_url="https://www.suse.com/security/cve/CVE-2023-54140/" source="CVE"/>
		<reference ref_id="CVE-2023-54142" ref_url="https://www.suse.com/security/cve/CVE-2023-54142/" source="CVE"/>
		<reference ref_id="CVE-2023-54146" ref_url="https://www.suse.com/security/cve/CVE-2023-54146/" source="CVE"/>
		<reference ref_id="CVE-2023-54150" ref_url="https://www.suse.com/security/cve/CVE-2023-54150/" source="CVE"/>
		<reference ref_id="CVE-2023-54153" ref_url="https://www.suse.com/security/cve/CVE-2023-54153/" source="CVE"/>
		<reference ref_id="CVE-2023-54156" ref_url="https://www.suse.com/security/cve/CVE-2023-54156/" source="CVE"/>
		<reference ref_id="CVE-2023-54159" ref_url="https://www.suse.com/security/cve/CVE-2023-54159/" source="CVE"/>
		<reference ref_id="CVE-2023-54166" ref_url="https://www.suse.com/security/cve/CVE-2023-54166/" source="CVE"/>
		<reference ref_id="CVE-2023-54168" ref_url="https://www.suse.com/security/cve/CVE-2023-54168/" source="CVE"/>
		<reference ref_id="CVE-2023-54170" ref_url="https://www.suse.com/security/cve/CVE-2023-54170/" source="CVE"/>
		<reference ref_id="CVE-2023-54171" ref_url="https://www.suse.com/security/cve/CVE-2023-54171/" source="CVE"/>
		<reference ref_id="CVE-2023-54173" ref_url="https://www.suse.com/security/cve/CVE-2023-54173/" source="CVE"/>
		<reference ref_id="CVE-2023-54177" ref_url="https://www.suse.com/security/cve/CVE-2023-54177/" source="CVE"/>
		<reference ref_id="CVE-2023-54179" ref_url="https://www.suse.com/security/cve/CVE-2023-54179/" source="CVE"/>
		<reference ref_id="CVE-2023-54183" ref_url="https://www.suse.com/security/cve/CVE-2023-54183/" source="CVE"/>
		<reference ref_id="CVE-2023-54186" ref_url="https://www.suse.com/security/cve/CVE-2023-54186/" source="CVE"/>
		<reference ref_id="CVE-2023-54189" ref_url="https://www.suse.com/security/cve/CVE-2023-54189/" source="CVE"/>
		<reference ref_id="CVE-2023-54190" ref_url="https://www.suse.com/security/cve/CVE-2023-54190/" source="CVE"/>
		<reference ref_id="CVE-2023-54197" ref_url="https://www.suse.com/security/cve/CVE-2023-54197/" source="CVE"/>
		<reference ref_id="CVE-2023-54198" ref_url="https://www.suse.com/security/cve/CVE-2023-54198/" source="CVE"/>
		<reference ref_id="CVE-2023-54199" ref_url="https://www.suse.com/security/cve/CVE-2023-54199/" source="CVE"/>
		<reference ref_id="CVE-2023-54201" ref_url="https://www.suse.com/security/cve/CVE-2023-54201/" source="CVE"/>
		<reference ref_id="CVE-2023-54202" ref_url="https://www.suse.com/security/cve/CVE-2023-54202/" source="CVE"/>
		<reference ref_id="CVE-2023-54205" ref_url="https://www.suse.com/security/cve/CVE-2023-54205/" source="CVE"/>
		<reference ref_id="CVE-2023-54208" ref_url="https://www.suse.com/security/cve/CVE-2023-54208/" source="CVE"/>
		<reference ref_id="CVE-2023-54211" ref_url="https://www.suse.com/security/cve/CVE-2023-54211/" source="CVE"/>
		<reference ref_id="CVE-2023-54213" ref_url="https://www.suse.com/security/cve/CVE-2023-54213/" source="CVE"/>
		<reference ref_id="CVE-2023-54214" ref_url="https://www.suse.com/security/cve/CVE-2023-54214/" source="CVE"/>
		<reference ref_id="CVE-2023-54219" ref_url="https://www.suse.com/security/cve/CVE-2023-54219/" source="CVE"/>
		<reference ref_id="CVE-2023-54230" ref_url="https://www.suse.com/security/cve/CVE-2023-54230/" source="CVE"/>
		<reference ref_id="CVE-2023-54236" ref_url="https://www.suse.com/security/cve/CVE-2023-54236/" source="CVE"/>
		<reference ref_id="CVE-2023-54242" ref_url="https://www.suse.com/security/cve/CVE-2023-54242/" source="CVE"/>
		<reference ref_id="CVE-2023-54243" ref_url="https://www.suse.com/security/cve/CVE-2023-54243/" source="CVE"/>
		<reference ref_id="CVE-2023-54244" ref_url="https://www.suse.com/security/cve/CVE-2023-54244/" source="CVE"/>
		<reference ref_id="CVE-2023-54245" ref_url="https://www.suse.com/security/cve/CVE-2023-54245/" source="CVE"/>
		<reference ref_id="CVE-2023-54252" ref_url="https://www.suse.com/security/cve/CVE-2023-54252/" source="CVE"/>
		<reference ref_id="CVE-2023-54260" ref_url="https://www.suse.com/security/cve/CVE-2023-54260/" source="CVE"/>
		<reference ref_id="CVE-2023-54264" ref_url="https://www.suse.com/security/cve/CVE-2023-54264/" source="CVE"/>
		<reference ref_id="CVE-2023-54266" ref_url="https://www.suse.com/security/cve/CVE-2023-54266/" source="CVE"/>
		<reference ref_id="CVE-2023-54269" ref_url="https://www.suse.com/security/cve/CVE-2023-54269/" source="CVE"/>
		<reference ref_id="CVE-2023-54270" ref_url="https://www.suse.com/security/cve/CVE-2023-54270/" source="CVE"/>
		<reference ref_id="CVE-2023-54271" ref_url="https://www.suse.com/security/cve/CVE-2023-54271/" source="CVE"/>
		<reference ref_id="CVE-2023-54274" ref_url="https://www.suse.com/security/cve/CVE-2023-54274/" source="CVE"/>
		<reference ref_id="CVE-2023-54275" ref_url="https://www.suse.com/security/cve/CVE-2023-54275/" source="CVE"/>
		<reference ref_id="CVE-2023-54277" ref_url="https://www.suse.com/security/cve/CVE-2023-54277/" source="CVE"/>
		<reference ref_id="CVE-2023-54280" ref_url="https://www.suse.com/security/cve/CVE-2023-54280/" source="CVE"/>
		<reference ref_id="CVE-2023-54284" ref_url="https://www.suse.com/security/cve/CVE-2023-54284/" source="CVE"/>
		<reference ref_id="CVE-2023-54286" ref_url="https://www.suse.com/security/cve/CVE-2023-54286/" source="CVE"/>
		<reference ref_id="CVE-2023-54287" ref_url="https://www.suse.com/security/cve/CVE-2023-54287/" source="CVE"/>
		<reference ref_id="CVE-2023-54289" ref_url="https://www.suse.com/security/cve/CVE-2023-54289/" source="CVE"/>
		<reference ref_id="CVE-2023-54292" ref_url="https://www.suse.com/security/cve/CVE-2023-54292/" source="CVE"/>
		<reference ref_id="CVE-2023-54293" ref_url="https://www.suse.com/security/cve/CVE-2023-54293/" source="CVE"/>
		<reference ref_id="CVE-2023-54294" ref_url="https://www.suse.com/security/cve/CVE-2023-54294/" source="CVE"/>
		<reference ref_id="CVE-2023-54295" ref_url="https://www.suse.com/security/cve/CVE-2023-54295/" source="CVE"/>
		<reference ref_id="CVE-2023-54298" ref_url="https://www.suse.com/security/cve/CVE-2023-54298/" source="CVE"/>
		<reference ref_id="CVE-2023-54299" ref_url="https://www.suse.com/security/cve/CVE-2023-54299/" source="CVE"/>
		<reference ref_id="CVE-2023-54300" ref_url="https://www.suse.com/security/cve/CVE-2023-54300/" source="CVE"/>
		<reference ref_id="CVE-2023-54301" ref_url="https://www.suse.com/security/cve/CVE-2023-54301/" source="CVE"/>
		<reference ref_id="CVE-2023-54302" ref_url="https://www.suse.com/security/cve/CVE-2023-54302/" source="CVE"/>
		<reference ref_id="CVE-2023-54304" ref_url="https://www.suse.com/security/cve/CVE-2023-54304/" source="CVE"/>
		<reference ref_id="CVE-2023-54305" ref_url="https://www.suse.com/security/cve/CVE-2023-54305/" source="CVE"/>
		<reference ref_id="CVE-2023-54309" ref_url="https://www.suse.com/security/cve/CVE-2023-54309/" source="CVE"/>
		<reference ref_id="CVE-2023-54311" ref_url="https://www.suse.com/security/cve/CVE-2023-54311/" source="CVE"/>
		<reference ref_id="CVE-2023-54315" ref_url="https://www.suse.com/security/cve/CVE-2023-54315/" source="CVE"/>
		<reference ref_id="CVE-2023-54317" ref_url="https://www.suse.com/security/cve/CVE-2023-54317/" source="CVE"/>
		<reference ref_id="CVE-2023-54319" ref_url="https://www.suse.com/security/cve/CVE-2023-54319/" source="CVE"/>
		<reference ref_id="CVE-2023-54321" ref_url="https://www.suse.com/security/cve/CVE-2023-54321/" source="CVE"/>
		<reference ref_id="CVE-2023-54325" ref_url="https://www.suse.com/security/cve/CVE-2023-54325/" source="CVE"/>
		<reference ref_id="CVE-2023-54326" ref_url="https://www.suse.com/security/cve/CVE-2023-54326/" source="CVE"/>
		<reference ref_id="CVE-2024-26581" ref_url="https://www.suse.com/security/cve/CVE-2024-26581/" source="CVE"/>
		<reference ref_id="CVE-2024-26832" ref_url="https://www.suse.com/security/cve/CVE-2024-26832/" source="CVE"/>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-36348" ref_url="https://www.suse.com/security/cve/CVE-2024-36348/" source="CVE"/>
		<reference ref_id="CVE-2024-36349" ref_url="https://www.suse.com/security/cve/CVE-2024-36349/" source="CVE"/>
		<reference ref_id="CVE-2024-36350" ref_url="https://www.suse.com/security/cve/CVE-2024-36350/" source="CVE"/>
		<reference ref_id="CVE-2024-36357" ref_url="https://www.suse.com/security/cve/CVE-2024-36357/" source="CVE"/>
		<reference ref_id="CVE-2024-44987" ref_url="https://www.suse.com/security/cve/CVE-2024-44987/" source="CVE"/>
		<reference ref_id="CVE-2024-46854" ref_url="https://www.suse.com/security/cve/CVE-2024-46854/" source="CVE"/>
		<reference ref_id="CVE-2024-50143" ref_url="https://www.suse.com/security/cve/CVE-2024-50143/" source="CVE"/>
		<reference ref_id="CVE-2024-54031" ref_url="https://www.suse.com/security/cve/CVE-2024-54031/" source="CVE"/>
		<reference ref_id="CVE-2025-21658" ref_url="https://www.suse.com/security/cve/CVE-2025-21658/" source="CVE"/>
		<reference ref_id="CVE-2025-21738" ref_url="https://www.suse.com/security/cve/CVE-2025-21738/" source="CVE"/>
		<reference ref_id="CVE-2025-21760" ref_url="https://www.suse.com/security/cve/CVE-2025-21760/" source="CVE"/>
		<reference ref_id="CVE-2025-21764" ref_url="https://www.suse.com/security/cve/CVE-2025-21764/" source="CVE"/>
		<reference ref_id="CVE-2025-21765" ref_url="https://www.suse.com/security/cve/CVE-2025-21765/" source="CVE"/>
		<reference ref_id="CVE-2025-21766" ref_url="https://www.suse.com/security/cve/CVE-2025-21766/" source="CVE"/>
		<reference ref_id="CVE-2025-38068" ref_url="https://www.suse.com/security/cve/CVE-2025-38068/" source="CVE"/>
		<reference ref_id="CVE-2025-38129" ref_url="https://www.suse.com/security/cve/CVE-2025-38129/" source="CVE"/>
		<reference ref_id="CVE-2025-38159" ref_url="https://www.suse.com/security/cve/CVE-2025-38159/" source="CVE"/>
		<reference ref_id="CVE-2025-38375" ref_url="https://www.suse.com/security/cve/CVE-2025-38375/" source="CVE"/>
		<reference ref_id="CVE-2025-38563" ref_url="https://www.suse.com/security/cve/CVE-2025-38563/" source="CVE"/>
		<reference ref_id="CVE-2025-38565" ref_url="https://www.suse.com/security/cve/CVE-2025-38565/" source="CVE"/>
		<reference ref_id="CVE-2025-38684" ref_url="https://www.suse.com/security/cve/CVE-2025-38684/" source="CVE"/>
		<reference ref_id="CVE-2025-39977" ref_url="https://www.suse.com/security/cve/CVE-2025-39977/" source="CVE"/>
		<reference ref_id="CVE-2025-40019" ref_url="https://www.suse.com/security/cve/CVE-2025-40019/" source="CVE"/>
		<reference ref_id="CVE-2025-40044" ref_url="https://www.suse.com/security/cve/CVE-2025-40044/" source="CVE"/>
		<reference ref_id="CVE-2025-40139" ref_url="https://www.suse.com/security/cve/CVE-2025-40139/" source="CVE"/>
		<reference ref_id="CVE-2025-40215" ref_url="https://www.suse.com/security/cve/CVE-2025-40215/" source="CVE"/>
		<reference ref_id="CVE-2025-40220" ref_url="https://www.suse.com/security/cve/CVE-2025-40220/" source="CVE"/>
		<reference ref_id="CVE-2025-40233" ref_url="https://www.suse.com/security/cve/CVE-2025-40233/" source="CVE"/>
		<reference ref_id="CVE-2025-40256" ref_url="https://www.suse.com/security/cve/CVE-2025-40256/" source="CVE"/>
		<reference ref_id="CVE-2025-40257" ref_url="https://www.suse.com/security/cve/CVE-2025-40257/" source="CVE"/>
		<reference ref_id="CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258/" source="CVE"/>
		<reference ref_id="CVE-2025-40277" ref_url="https://www.suse.com/security/cve/CVE-2025-40277/" source="CVE"/>
		<reference ref_id="CVE-2025-40280" ref_url="https://www.suse.com/security/cve/CVE-2025-40280/" source="CVE"/>
		<reference ref_id="CVE-2025-40300" ref_url="https://www.suse.com/security/cve/CVE-2025-40300/" source="CVE"/>
		<reference ref_id="CVE-2025-40331" ref_url="https://www.suse.com/security/cve/CVE-2025-40331/" source="CVE"/>
		<reference ref_id="CVE-2025-68183" ref_url="https://www.suse.com/security/cve/CVE-2025-68183/" source="CVE"/>
		<reference ref_id="CVE-2025-68284" ref_url="https://www.suse.com/security/cve/CVE-2025-68284/" source="CVE"/>
		<reference ref_id="CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285/" source="CVE"/>
		<reference ref_id="CVE-2025-68312" ref_url="https://www.suse.com/security/cve/CVE-2025-68312/" source="CVE"/>
		<reference ref_id="CVE-2025-68732" ref_url="https://www.suse.com/security/cve/CVE-2025-68732/" source="CVE"/>
		<reference ref_id="CVE-2025-68813" ref_url="https://www.suse.com/security/cve/CVE-2025-68813/" source="CVE"/>
		<reference ref_id="CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085/" source="CVE"/>
		<reference ref_id="CVE-2025-71089" ref_url="https://www.suse.com/security/cve/CVE-2025-71089/" source="CVE"/>
		<reference ref_id="CVE-2025-71112" ref_url="https://www.suse.com/security/cve/CVE-2025-71112/" source="CVE"/>
		<reference ref_id="CVE-2025-71116" ref_url="https://www.suse.com/security/cve/CVE-2025-71116/" source="CVE"/>
		<reference ref_id="CVE-2025-71120" ref_url="https://www.suse.com/security/cve/CVE-2025-71120/" source="CVE"/>
		<reference ref_id="CVE-2026-22999" ref_url="https://www.suse.com/security/cve/CVE-2026-22999/" source="CVE"/>
		<reference ref_id="CVE-2026-23001" ref_url="https://www.suse.com/security/cve/CVE-2026-23001/" source="CVE"/>
		<reference ref_id="CVE-2026-23074" ref_url="https://www.suse.com/security/cve/CVE-2026-23074/" source="CVE"/>
		<reference ref_id="CVE-2026-23089" ref_url="https://www.suse.com/security/cve/CVE-2026-23089/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785).
- CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant uninit (bsc#1255594).
- CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576).
- CVE-2023-53215: sched/fair: Don't balance task to its current running CPU (bsc#1250397).
- CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels (bsc#1249871).
- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751).
- CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256095).
- CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free (bsc#1255908).
- CVE-2024-28956: x86/its: Enumerate Indirect Target Selection (ITS) bug (bsc#1242006).
- CVE-2024-36348: x86/bugs: Add a Transient Scheduler Attacks mitigation (bsc#1238896).
- CVE-2024-36349: x86/bugs: Add a Transient Scheduler Attacks mitigation (bsc#1238896).
- CVE-2024-36350: x86/bugs: Add a Transient Scheduler Attacks mitigation (bsc#1238896).
- CVE-2024-36357: x86/bugs: Add a Transient Scheduler Attacks mitigation (bsc#1238896).
- CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
- CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
- CVE-2025-21738: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (bsc#1238917).
- CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).
- CVE-2025-38129: page_pool: fix inconsistency for page_pool_ring_lock() (bsc#1245723).
- CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (bsc#1245751).
- CVE-2025-38375: virtio-net: ensure the received length does not exceed allocated size (bsc#1247177).
- CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046).
- CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place encryption (bsc#1252678).
- CVE-2025-40139: net: ipv4: Consolidate ipv4_mtu and ip_dst_mtu_maybe_forward (bsc#1253409).
- CVE-2025-40215: kABI: xfrm: delete x-&gt;tunnel as we delete x (bsc#1254959).
- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).
- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).
- CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843).
- CVE-2025-40277: drm/vmwgfx: Validate command header size against (bsc#1254894).
- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).
- CVE-2025-40300: Documentation/hw-vuln: Add VMSCAPE documentation (bsc#1247483).
- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
- CVE-2025-68183: ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr (bsc#1255251).
- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255377).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401).
- CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).
- CVE-2025-68732: gpu: host1x: Fix race in syncpt alloc/free (bsc#1255688).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).
- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).
- CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744).
- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).
- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).
- CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232).
- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).
- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).

The following non security issues were fixed:

- net: hv_netvsc: reject RSS hash key programming without RX indirection table (bsc#1257473).
- net: tcp: allow zero-window ACK update the window (bsc#1254767).
- net: tcp: send zero-window ACK when no memory (bsc#1254767).
- scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
- tcp: correct handling of extreme memory squeeze (bsc#1254767).
- x86/CPU/AMD: Add ZenX generations flags (bsc#1238896).
- x86/its: Fix crash during dynamic its initialization (bsc#1257771).
- x86/modules: Set VM_FLUSH_RESET_PERMS in module_alloc() (bsc#1257771).
- x86: make page fault handling disable interrupts properly (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204957">SUSE bug 1204957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205567">SUSE bug 1205567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206889">SUSE bug 1206889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207088">SUSE bug 1207088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207611">SUSE bug 1207611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207620">SUSE bug 1207620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207622">SUSE bug 1207622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207636">SUSE bug 1207636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207644">SUSE bug 1207644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207646">SUSE bug 1207646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207652">SUSE bug 1207652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207653">SUSE bug 1207653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208570">SUSE bug 1208570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208758">SUSE bug 1208758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210817">SUSE bug 1210817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210943">SUSE bug 1210943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211690">SUSE bug 1211690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213025">SUSE bug 1213025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213032">SUSE bug 1213032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213093">SUSE bug 1213093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213105">SUSE bug 1213105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213110">SUSE bug 1213110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213111">SUSE bug 1213111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213653">SUSE bug 1213653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213747">SUSE bug 1213747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213867">SUSE bug 1213867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214635">SUSE bug 1214635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214940">SUSE bug 1214940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214962">SUSE bug 1214962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214986">SUSE bug 1214986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214990">SUSE bug 1214990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216062">SUSE bug 1216062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220137">SUSE bug 1220137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220144">SUSE bug 1220144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223007">SUSE bug 1223007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228015">SUSE bug 1228015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230185">SUSE bug 1230185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231084">SUSE bug 1231084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233038">SUSE bug 1233038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235905">SUSE bug 1235905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236104">SUSE bug 1236104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236208">SUSE bug 1236208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237885">SUSE bug 1237885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237906">SUSE bug 1237906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238414">SUSE bug 1238414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238754">SUSE bug 1238754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238763">SUSE bug 1238763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238896">SUSE bug 1238896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238917">SUSE bug 1238917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244758">SUSE bug 1244758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244904">SUSE bug 1244904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245110">SUSE bug 1245110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245210">SUSE bug 1245210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245723">SUSE bug 1245723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245751">SUSE bug 1245751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247177">SUSE bug 1247177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247483">SUSE bug 1247483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248306">SUSE bug 1248306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248377">SUSE bug 1248377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249156">SUSE bug 1249156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249158">SUSE bug 1249158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249827">SUSE bug 1249827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249871">SUSE bug 1249871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250397">SUSE bug 1250397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252046">SUSE bug 1252046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252678">SUSE bug 1252678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252785">SUSE bug 1252785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253028">SUSE bug 1253028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253409">SUSE bug 1253409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253702">SUSE bug 1253702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254462">SUSE bug 1254462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254463">SUSE bug 1254463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254464">SUSE bug 1254464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254520">SUSE bug 1254520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254559">SUSE bug 1254559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254562">SUSE bug 1254562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254572">SUSE bug 1254572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254578">SUSE bug 1254578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254580">SUSE bug 1254580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254592">SUSE bug 1254592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254608">SUSE bug 1254608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254609">SUSE bug 1254609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254614">SUSE bug 1254614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254615">SUSE bug 1254615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254617">SUSE bug 1254617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254625">SUSE bug 1254625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254631">SUSE bug 1254631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254632">SUSE bug 1254632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254634">SUSE bug 1254634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254644">SUSE bug 1254644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254645">SUSE bug 1254645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254649">SUSE bug 1254649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254653">SUSE bug 1254653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254656">SUSE bug 1254656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254658">SUSE bug 1254658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254660">SUSE bug 1254660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254664">SUSE bug 1254664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254671">SUSE bug 1254671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254674">SUSE bug 1254674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254676">SUSE bug 1254676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254677">SUSE bug 1254677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254686">SUSE bug 1254686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254690">SUSE bug 1254690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254692">SUSE bug 1254692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254694">SUSE bug 1254694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254696">SUSE bug 1254696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254698">SUSE bug 1254698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254699">SUSE bug 1254699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254704">SUSE bug 1254704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254706">SUSE bug 1254706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254709">SUSE bug 1254709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254710">SUSE bug 1254710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254711">SUSE bug 1254711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254712">SUSE bug 1254712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254713">SUSE bug 1254713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254714">SUSE bug 1254714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254716">SUSE bug 1254716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254723">SUSE bug 1254723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254725">SUSE bug 1254725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254728">SUSE bug 1254728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254729">SUSE bug 1254729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254743">SUSE bug 1254743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254745">SUSE bug 1254745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254751">SUSE bug 1254751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254756">SUSE bug 1254756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254759">SUSE bug 1254759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254763">SUSE bug 1254763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254767">SUSE bug 1254767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254775">SUSE bug 1254775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254780">SUSE bug 1254780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254781">SUSE bug 1254781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254782">SUSE bug 1254782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254783">SUSE bug 1254783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254785">SUSE bug 1254785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254788">SUSE bug 1254788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254789">SUSE bug 1254789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254792">SUSE bug 1254792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254813">SUSE bug 1254813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254842">SUSE bug 1254842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254843">SUSE bug 1254843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254847">SUSE bug 1254847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254851">SUSE bug 1254851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254894">SUSE bug 1254894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254902">SUSE bug 1254902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254915">SUSE bug 1254915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254916">SUSE bug 1254916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254917">SUSE bug 1254917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254920">SUSE bug 1254920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254959">SUSE bug 1254959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254974">SUSE bug 1254974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254986">SUSE bug 1254986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254994">SUSE bug 1254994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255002">SUSE bug 1255002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255005">SUSE bug 1255005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255007">SUSE bug 1255007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255049">SUSE bug 1255049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255060">SUSE bug 1255060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255163">SUSE bug 1255163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255165">SUSE bug 1255165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255171">SUSE bug 1255171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255251">SUSE bug 1255251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255377">SUSE bug 1255377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255401">SUSE bug 1255401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255467">SUSE bug 1255467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255469">SUSE bug 1255469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255521">SUSE bug 1255521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255528">SUSE bug 1255528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255546">SUSE bug 1255546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255549">SUSE bug 1255549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255554">SUSE bug 1255554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255555">SUSE bug 1255555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255558">SUSE bug 1255558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255560">SUSE bug 1255560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255562">SUSE bug 1255562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255565">SUSE bug 1255565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255574">SUSE bug 1255574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255576">SUSE bug 1255576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255578">SUSE bug 1255578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255582">SUSE bug 1255582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255594">SUSE bug 1255594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255600">SUSE bug 1255600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255607">SUSE bug 1255607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255608">SUSE bug 1255608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255609">SUSE bug 1255609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255618">SUSE bug 1255618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255619">SUSE bug 1255619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255620">SUSE bug 1255620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255623">SUSE bug 1255623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255624">SUSE bug 1255624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255626">SUSE bug 1255626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255627">SUSE bug 1255627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255628">SUSE bug 1255628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255636">SUSE bug 1255636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255688">SUSE bug 1255688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255690">SUSE bug 1255690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255697">SUSE bug 1255697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255702">SUSE bug 1255702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255704">SUSE bug 1255704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255749">SUSE bug 1255749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255750">SUSE bug 1255750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255757">SUSE bug 1255757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255758">SUSE bug 1255758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255760">SUSE bug 1255760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255762">SUSE bug 1255762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255769">SUSE bug 1255769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255771">SUSE bug 1255771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255773">SUSE bug 1255773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255780">SUSE bug 1255780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255786">SUSE bug 1255786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255787">SUSE bug 1255787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255789">SUSE bug 1255789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255790">SUSE bug 1255790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255791">SUSE bug 1255791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255792">SUSE bug 1255792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255796">SUSE bug 1255796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255797">SUSE bug 1255797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255800">SUSE bug 1255800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255801">SUSE bug 1255801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255802">SUSE bug 1255802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255803">SUSE bug 1255803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255804">SUSE bug 1255804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255806">SUSE bug 1255806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255808">SUSE bug 1255808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255819">SUSE bug 1255819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255839">SUSE bug 1255839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255843">SUSE bug 1255843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255844">SUSE bug 1255844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255872">SUSE bug 1255872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255875">SUSE bug 1255875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255876">SUSE bug 1255876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255877">SUSE bug 1255877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255878">SUSE bug 1255878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255880">SUSE bug 1255880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255889">SUSE bug 1255889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255901">SUSE bug 1255901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255902">SUSE bug 1255902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255905">SUSE bug 1255905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255906">SUSE bug 1255906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255908">SUSE bug 1255908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255909">SUSE bug 1255909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255910">SUSE bug 1255910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255912">SUSE bug 1255912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255919">SUSE bug 1255919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255922">SUSE bug 1255922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255925">SUSE bug 1255925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255939">SUSE bug 1255939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255950">SUSE bug 1255950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255953">SUSE bug 1255953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255954">SUSE bug 1255954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255962">SUSE bug 1255962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255964">SUSE bug 1255964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255968">SUSE bug 1255968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255969">SUSE bug 1255969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255970">SUSE bug 1255970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255971">SUSE bug 1255971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255978">SUSE bug 1255978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255979">SUSE bug 1255979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255983">SUSE bug 1255983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255985">SUSE bug 1255985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255990">SUSE bug 1255990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255993">SUSE bug 1255993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255994">SUSE bug 1255994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255996">SUSE bug 1255996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256034">SUSE bug 1256034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256040">SUSE bug 1256040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256042">SUSE bug 1256042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256045">SUSE bug 1256045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256046">SUSE bug 1256046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256048">SUSE bug 1256048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256049">SUSE bug 1256049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256053">SUSE bug 1256053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256056">SUSE bug 1256056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256057">SUSE bug 1256057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256062">SUSE bug 1256062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256063">SUSE bug 1256063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256064">SUSE bug 1256064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256065">SUSE bug 1256065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256074">SUSE bug 1256074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256081">SUSE bug 1256081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256086">SUSE bug 1256086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256091">SUSE bug 1256091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256093">SUSE bug 1256093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256095">SUSE bug 1256095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256099">SUSE bug 1256099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256114">SUSE bug 1256114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256115">SUSE bug 1256115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256118">SUSE bug 1256118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256119">SUSE bug 1256119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256121">SUSE bug 1256121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256122">SUSE bug 1256122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256124">SUSE bug 1256124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256125">SUSE bug 1256125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256126">SUSE bug 1256126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256127">SUSE bug 1256127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256130">SUSE bug 1256130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256131">SUSE bug 1256131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256132">SUSE bug 1256132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256133">SUSE bug 1256133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256136">SUSE bug 1256136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256137">SUSE bug 1256137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256140">SUSE bug 1256140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256141">SUSE bug 1256141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256142">SUSE bug 1256142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256143">SUSE bug 1256143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256145">SUSE bug 1256145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256149">SUSE bug 1256149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256152">SUSE bug 1256152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256154">SUSE bug 1256154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256155">SUSE bug 1256155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256157">SUSE bug 1256157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256158">SUSE bug 1256158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256162">SUSE bug 1256162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256165">SUSE bug 1256165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256167">SUSE bug 1256167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256172">SUSE bug 1256172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256173">SUSE bug 1256173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256174">SUSE bug 1256174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256177">SUSE bug 1256177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256178">SUSE bug 1256178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256179">SUSE bug 1256179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256182">SUSE bug 1256182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256184">SUSE bug 1256184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256185">SUSE bug 1256185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256186">SUSE bug 1256186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256188">SUSE bug 1256188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256189">SUSE bug 1256189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256191">SUSE bug 1256191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256192">SUSE bug 1256192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256193">SUSE bug 1256193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256194">SUSE bug 1256194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256196">SUSE bug 1256196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256199">SUSE bug 1256199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256200">SUSE bug 1256200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256202">SUSE bug 1256202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256203">SUSE bug 1256203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256204">SUSE bug 1256204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256205">SUSE bug 1256205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256206">SUSE bug 1256206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256207">SUSE bug 1256207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256208">SUSE bug 1256208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256211">SUSE bug 1256211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256215">SUSE bug 1256215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256216">SUSE bug 1256216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256219">SUSE bug 1256219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256220">SUSE bug 1256220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256221">SUSE bug 1256221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256223">SUSE bug 1256223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256228">SUSE bug 1256228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256230">SUSE bug 1256230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256231">SUSE bug 1256231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256235">SUSE bug 1256235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256241">SUSE bug 1256241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256242">SUSE bug 1256242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256245">SUSE bug 1256245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256248">SUSE bug 1256248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256250">SUSE bug 1256250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256254">SUSE bug 1256254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256260">SUSE bug 1256260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256265">SUSE bug 1256265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256269">SUSE bug 1256269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256271">SUSE bug 1256271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256274">SUSE bug 1256274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256282">SUSE bug 1256282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256285">SUSE bug 1256285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256291">SUSE bug 1256291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256295">SUSE bug 1256295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256300">SUSE bug 1256300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256306">SUSE bug 1256306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256317">SUSE bug 1256317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256320">SUSE bug 1256320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256323">SUSE bug 1256323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256326">SUSE bug 1256326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256328">SUSE bug 1256328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256333">SUSE bug 1256333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256334">SUSE bug 1256334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256335">SUSE bug 1256335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256337">SUSE bug 1256337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256338">SUSE bug 1256338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256344">SUSE bug 1256344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256346">SUSE bug 1256346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256349">SUSE bug 1256349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256353">SUSE bug 1256353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256355">SUSE bug 1256355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256368">SUSE bug 1256368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256370">SUSE bug 1256370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256375">SUSE bug 1256375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256382">SUSE bug 1256382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256383">SUSE bug 1256383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256384">SUSE bug 1256384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256386">SUSE bug 1256386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256388">SUSE bug 1256388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256391">SUSE bug 1256391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256394">SUSE bug 1256394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256395">SUSE bug 1256395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256396">SUSE bug 1256396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256397">SUSE bug 1256397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256423">SUSE bug 1256423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256426">SUSE bug 1256426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256432">SUSE bug 1256432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256582">SUSE bug 1256582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256612">SUSE bug 1256612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256623">SUSE bug 1256623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256641">SUSE bug 1256641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256726">SUSE bug 1256726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256744">SUSE bug 1256744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256779">SUSE bug 1256779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256792">SUSE bug 1256792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257232">SUSE bug 1257232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257236">SUSE bug 1257236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257296">SUSE bug 1257296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257473">SUSE bug 1257473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257749">SUSE bug 1257749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257771">SUSE bug 1257771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257790">SUSE bug 1257790</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0854">CVE-2022-0854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48853/">CVE-2022-48853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48853">CVE-2022-48853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49604/">CVE-2022-49604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49604">CVE-2022-49604 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49943/">CVE-2022-49943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49943">CVE-2022-49943 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49980/">CVE-2022-49980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49980">CVE-2022-49980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50232/">CVE-2022-50232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50232">CVE-2022-50232 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50614/">CVE-2022-50614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50614">CVE-2022-50614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50615/">CVE-2022-50615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50615">CVE-2022-50615 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50617/">CVE-2022-50617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50617">CVE-2022-50617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50618/">CVE-2022-50618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50618">CVE-2022-50618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50619/">CVE-2022-50619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50619">CVE-2022-50619 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50622/">CVE-2022-50622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50622">CVE-2022-50622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50623/">CVE-2022-50623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50623">CVE-2022-50623 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-50625/">CVE-2022-50625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50625">CVE-2022-50625 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50626/">CVE-2022-50626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50626">CVE-2022-50626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50629/">CVE-2022-50629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50629">CVE-2022-50629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50630/">CVE-2022-50630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50630">CVE-2022-50630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50633/">CVE-2022-50633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50633">CVE-2022-50633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50635/">CVE-2022-50635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50635">CVE-2022-50635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50636/">CVE-2022-50636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50636">CVE-2022-50636 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50638/">CVE-2022-50638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50638">CVE-2022-50638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50640/">CVE-2022-50640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50640">CVE-2022-50640 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50641/">CVE-2022-50641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50641">CVE-2022-50641 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50643/">CVE-2022-50643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50643">CVE-2022-50643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50644/">CVE-2022-50644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50644">CVE-2022-50644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50646/">CVE-2022-50646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50646">CVE-2022-50646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50649/">CVE-2022-50649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50649">CVE-2022-50649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50652/">CVE-2022-50652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50652">CVE-2022-50652 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50653/">CVE-2022-50653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50653">CVE-2022-50653 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50656/">CVE-2022-50656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50656">CVE-2022-50656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50658/">CVE-2022-50658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50658">CVE-2022-50658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50660/">CVE-2022-50660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50660">CVE-2022-50660 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50661/">CVE-2022-50661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50661">CVE-2022-50661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50662/">CVE-2022-50662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50662">CVE-2022-50662 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50664/">CVE-2022-50664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50664">CVE-2022-50664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50666/">CVE-2022-50666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50666">CVE-2022-50666 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50668/">CVE-2022-50668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50668">CVE-2022-50668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50669/">CVE-2022-50669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50669">CVE-2022-50669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50670/">CVE-2022-50670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50670">CVE-2022-50670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50671/">CVE-2022-50671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50671">CVE-2022-50671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50672/">CVE-2022-50672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50672">CVE-2022-50672 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50673/">CVE-2022-50673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50673">CVE-2022-50673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50675/">CVE-2022-50675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50675">CVE-2022-50675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50677/">CVE-2022-50677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50677">CVE-2022-50677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50678/">CVE-2022-50678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50678">CVE-2022-50678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50679/">CVE-2022-50679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50679">CVE-2022-50679 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50697/">CVE-2022-50697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50697">CVE-2022-50697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50698/">CVE-2022-50698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50698">CVE-2022-50698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50699/">CVE-2022-50699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50699">CVE-2022-50699 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50700/">CVE-2022-50700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50700">CVE-2022-50700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50702/">CVE-2022-50702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50702">CVE-2022-50702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50703/">CVE-2022-50703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50703">CVE-2022-50703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50704/">CVE-2022-50704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50704">CVE-2022-50704 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50709/">CVE-2022-50709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50709">CVE-2022-50709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50715/">CVE-2022-50715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50715">CVE-2022-50715 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50716/">CVE-2022-50716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50716">CVE-2022-50716 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50717/">CVE-2022-50717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50717">CVE-2022-50717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50718/">CVE-2022-50718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50718">CVE-2022-50718 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50719/">CVE-2022-50719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50719">CVE-2022-50719 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50722/">CVE-2022-50722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50722">CVE-2022-50722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50724/">CVE-2022-50724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50724">CVE-2022-50724 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50726/">CVE-2022-50726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50726">CVE-2022-50726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50727/">CVE-2022-50727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50727">CVE-2022-50727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50728/">CVE-2022-50728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50728">CVE-2022-50728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50730/">CVE-2022-50730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50730">CVE-2022-50730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50731/">CVE-2022-50731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50731">CVE-2022-50731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50732/">CVE-2022-50732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50732">CVE-2022-50732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50733/">CVE-2022-50733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50733">CVE-2022-50733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50735/">CVE-2022-50735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50735">CVE-2022-50735 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50736/">CVE-2022-50736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50736">CVE-2022-50736 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50740/">CVE-2022-50740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50740">CVE-2022-50740 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50742/">CVE-2022-50742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50742">CVE-2022-50742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50744/">CVE-2022-50744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50744">CVE-2022-50744 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50745/">CVE-2022-50745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50745">CVE-2022-50745 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50747/">CVE-2022-50747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50747">CVE-2022-50747 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50749/">CVE-2022-50749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50749">CVE-2022-50749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50750/">CVE-2022-50750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50750">CVE-2022-50750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50751/">CVE-2022-50751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50751">CVE-2022-50751 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50752/">CVE-2022-50752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50752">CVE-2022-50752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50754/">CVE-2022-50754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50754">CVE-2022-50754 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50755/">CVE-2022-50755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50755">CVE-2022-50755 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50756/">CVE-2022-50756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50756">CVE-2022-50756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50757/">CVE-2022-50757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50757">CVE-2022-50757 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50758/">CVE-2022-50758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50758">CVE-2022-50758 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50760/">CVE-2022-50760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50760">CVE-2022-50760 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50761/">CVE-2022-50761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50761">CVE-2022-50761 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50763/">CVE-2022-50763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50763">CVE-2022-50763 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50767/">CVE-2022-50767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50767">CVE-2022-50767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50769/">CVE-2022-50769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50769">CVE-2022-50769 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50770/">CVE-2022-50770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50770">CVE-2022-50770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50773/">CVE-2022-50773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50773">CVE-2022-50773 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50774/">CVE-2022-50774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50774">CVE-2022-50774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50776/">CVE-2022-50776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50776">CVE-2022-50776 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50777/">CVE-2022-50777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50777">CVE-2022-50777 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50779/">CVE-2022-50779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50779">CVE-2022-50779 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50781/">CVE-2022-50781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50781">CVE-2022-50781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50782/">CVE-2022-50782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50782">CVE-2022-50782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50809/">CVE-2022-50809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50809">CVE-2022-50809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50814/">CVE-2022-50814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50814">CVE-2022-50814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50819/">CVE-2022-50819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50819">CVE-2022-50819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50821/">CVE-2022-50821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50821">CVE-2022-50821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50822/">CVE-2022-50822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50822">CVE-2022-50822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50823/">CVE-2022-50823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50823">CVE-2022-50823 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50824/">CVE-2022-50824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50824">CVE-2022-50824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50826/">CVE-2022-50826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50826">CVE-2022-50826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50827/">CVE-2022-50827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50827">CVE-2022-50827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50828/">CVE-2022-50828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50828">CVE-2022-50828 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50829/">CVE-2022-50829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50829">CVE-2022-50829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50830/">CVE-2022-50830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50830">CVE-2022-50830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50832/">CVE-2022-50832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50832">CVE-2022-50832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50834/">CVE-2022-50834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50834">CVE-2022-50834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50835/">CVE-2022-50835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50835">CVE-2022-50835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50836/">CVE-2022-50836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50836">CVE-2022-50836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50839/">CVE-2022-50839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50839">CVE-2022-50839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50840/">CVE-2022-50840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50840">CVE-2022-50840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50842/">CVE-2022-50842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50842">CVE-2022-50842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50843/">CVE-2022-50843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50843">CVE-2022-50843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50844/">CVE-2022-50844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50844">CVE-2022-50844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50845/">CVE-2022-50845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50845">CVE-2022-50845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50846/">CVE-2022-50846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50846">CVE-2022-50846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50848/">CVE-2022-50848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50848">CVE-2022-50848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50849/">CVE-2022-50849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50849">CVE-2022-50849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50850/">CVE-2022-50850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50850">CVE-2022-50850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50851/">CVE-2022-50851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50851">CVE-2022-50851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50853/">CVE-2022-50853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50853">CVE-2022-50853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50856/">CVE-2022-50856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50856">CVE-2022-50856 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50858/">CVE-2022-50858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50858">CVE-2022-50858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50859/">CVE-2022-50859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50859">CVE-2022-50859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50860/">CVE-2022-50860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50860">CVE-2022-50860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50861/">CVE-2022-50861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50861">CVE-2022-50861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50864/">CVE-2022-50864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50864">CVE-2022-50864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50866/">CVE-2022-50866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50866">CVE-2022-50866 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50868/">CVE-2022-50868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50868">CVE-2022-50868 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50870/">CVE-2022-50870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50870">CVE-2022-50870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50872/">CVE-2022-50872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50872">CVE-2022-50872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50876/">CVE-2022-50876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50876">CVE-2022-50876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50878/">CVE-2022-50878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50878">CVE-2022-50878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50880/">CVE-2022-50880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50880">CVE-2022-50880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50881/">CVE-2022-50881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50881">CVE-2022-50881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50882/">CVE-2022-50882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50882">CVE-2022-50882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50884/">CVE-2022-50884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50884">CVE-2022-50884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50885/">CVE-2022-50885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50885">CVE-2022-50885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50886/">CVE-2022-50886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50886">CVE-2022-50886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50887/">CVE-2022-50887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50887">CVE-2022-50887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50888/">CVE-2022-50888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50888">CVE-2022-50888 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50889/">CVE-2022-50889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50889">CVE-2022-50889 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52433/">CVE-2023-52433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52433">CVE-2023-52433 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52923/">CVE-2023-52923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52923">CVE-2023-52923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53178/">CVE-2023-53178 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53178">CVE-2023-53178 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53215/">CVE-2023-53215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53215">CVE-2023-53215 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53254/">CVE-2023-53254 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53254">CVE-2023-53254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53407/">CVE-2023-53407 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53407">CVE-2023-53407 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53412/">CVE-2023-53412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53412">CVE-2023-53412 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53417/">CVE-2023-53417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53417">CVE-2023-53417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-53418/">CVE-2023-53418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53418">CVE-2023-53418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53743/">CVE-2023-53743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53743">CVE-2023-53743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53744/">CVE-2023-53744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53744">CVE-2023-53744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53746/">CVE-2023-53746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53746">CVE-2023-53746 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53747/">CVE-2023-53747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53747">CVE-2023-53747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53751/">CVE-2023-53751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53751">CVE-2023-53751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53754/">CVE-2023-53754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53754">CVE-2023-53754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53755/">CVE-2023-53755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53755">CVE-2023-53755 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53761/">CVE-2023-53761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53761">CVE-2023-53761 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53766/">CVE-2023-53766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53766">CVE-2023-53766 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53781/">CVE-2023-53781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53781">CVE-2023-53781 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53783/">CVE-2023-53783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53783">CVE-2023-53783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53786/">CVE-2023-53786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53786">CVE-2023-53786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53788/">CVE-2023-53788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53788">CVE-2023-53788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53792/">CVE-2023-53792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53792">CVE-2023-53792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53794/">CVE-2023-53794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53794">CVE-2023-53794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53802/">CVE-2023-53802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53802">CVE-2023-53802 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53803/">CVE-2023-53803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53803">CVE-2023-53803 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53804/">CVE-2023-53804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53804">CVE-2023-53804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53808/">CVE-2023-53808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53808">CVE-2023-53808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53811/">CVE-2023-53811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53811">CVE-2023-53811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53814/">CVE-2023-53814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53814">CVE-2023-53814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53818/">CVE-2023-53818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53818">CVE-2023-53818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53819/">CVE-2023-53819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53819">CVE-2023-53819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53820/">CVE-2023-53820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53820">CVE-2023-53820 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53827/">CVE-2023-53827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53827">CVE-2023-53827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53830/">CVE-2023-53830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53830">CVE-2023-53830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53832/">CVE-2023-53832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53832">CVE-2023-53832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53834/">CVE-2023-53834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53834">CVE-2023-53834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53837/">CVE-2023-53837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53837">CVE-2023-53837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53840/">CVE-2023-53840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53840">CVE-2023-53840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53842/">CVE-2023-53842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53842">CVE-2023-53842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53844/">CVE-2023-53844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53844">CVE-2023-53844 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53845/">CVE-2023-53845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53845">CVE-2023-53845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53847/">CVE-2023-53847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53847">CVE-2023-53847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53850/">CVE-2023-53850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53850">CVE-2023-53850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53852/">CVE-2023-53852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53852">CVE-2023-53852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53858/">CVE-2023-53858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53858">CVE-2023-53858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53862/">CVE-2023-53862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53862">CVE-2023-53862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53866/">CVE-2023-53866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53866">CVE-2023-53866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53990/">CVE-2023-53990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53990">CVE-2023-53990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53991/">CVE-2023-53991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53991">CVE-2023-53991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53996/">CVE-2023-53996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53996">CVE-2023-53996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53998/">CVE-2023-53998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53998">CVE-2023-53998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54001/">CVE-2023-54001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54001">CVE-2023-54001 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54003/">CVE-2023-54003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54003">CVE-2023-54003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54007/">CVE-2023-54007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54007">CVE-2023-54007 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54009/">CVE-2023-54009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54009">CVE-2023-54009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54010/">CVE-2023-54010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54010">CVE-2023-54010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54014/">CVE-2023-54014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54014">CVE-2023-54014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54015/">CVE-2023-54015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54015">CVE-2023-54015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54018/">CVE-2023-54018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54018">CVE-2023-54018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54019/">CVE-2023-54019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54019">CVE-2023-54019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54020/">CVE-2023-54020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54020">CVE-2023-54020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54021/">CVE-2023-54021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54021">CVE-2023-54021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54024/">CVE-2023-54024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54024">CVE-2023-54024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54025/">CVE-2023-54025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54025">CVE-2023-54025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54026/">CVE-2023-54026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54026">CVE-2023-54026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54028/">CVE-2023-54028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54028">CVE-2023-54028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54036/">CVE-2023-54036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54036">CVE-2023-54036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54039/">CVE-2023-54039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54039">CVE-2023-54039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54040/">CVE-2023-54040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54040">CVE-2023-54040 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54042/">CVE-2023-54042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54042">CVE-2023-54042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54045/">CVE-2023-54045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54045">CVE-2023-54045 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54046/">CVE-2023-54046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54046">CVE-2023-54046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54048/">CVE-2023-54048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54048">CVE-2023-54048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54049/">CVE-2023-54049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54049">CVE-2023-54049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54050/">CVE-2023-54050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54050">CVE-2023-54050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54051/">CVE-2023-54051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54051">CVE-2023-54051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54053/">CVE-2023-54053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54053">CVE-2023-54053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54055/">CVE-2023-54055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54055">CVE-2023-54055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54058/">CVE-2023-54058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54058">CVE-2023-54058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54064/">CVE-2023-54064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54064">CVE-2023-54064 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54072/">CVE-2023-54072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54072">CVE-2023-54072 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54076/">CVE-2023-54076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54076">CVE-2023-54076 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54078/">CVE-2023-54078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54078">CVE-2023-54078 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54079/">CVE-2023-54079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54079">CVE-2023-54079 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54083/">CVE-2023-54083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54083">CVE-2023-54083 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54084/">CVE-2023-54084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54084">CVE-2023-54084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54090/">CVE-2023-54090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54090">CVE-2023-54090 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54091/">CVE-2023-54091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54091">CVE-2023-54091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54092/">CVE-2023-54092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54092">CVE-2023-54092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54095/">CVE-2023-54095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54095">CVE-2023-54095 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54096/">CVE-2023-54096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54096">CVE-2023-54096 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54097/">CVE-2023-54097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54097">CVE-2023-54097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54098/">CVE-2023-54098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54098">CVE-2023-54098 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54100/">CVE-2023-54100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54100">CVE-2023-54100 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54102/">CVE-2023-54102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54102">CVE-2023-54102 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54104/">CVE-2023-54104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54104">CVE-2023-54104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54108/">CVE-2023-54108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54108">CVE-2023-54108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54110/">CVE-2023-54110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54110">CVE-2023-54110 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54111/">CVE-2023-54111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54111">CVE-2023-54111 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54115/">CVE-2023-54115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54115">CVE-2023-54115 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54118/">CVE-2023-54118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54118">CVE-2023-54118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54119/">CVE-2023-54119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54119">CVE-2023-54119 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54120/">CVE-2023-54120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54120">CVE-2023-54120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54122/">CVE-2023-54122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54122">CVE-2023-54122 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54123/">CVE-2023-54123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54123">CVE-2023-54123 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54126/">CVE-2023-54126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54126">CVE-2023-54126 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54127/">CVE-2023-54127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54127">CVE-2023-54127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54130/">CVE-2023-54130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54130">CVE-2023-54130 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54131/">CVE-2023-54131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54131">CVE-2023-54131 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54136/">CVE-2023-54136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54136">CVE-2023-54136 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54140/">CVE-2023-54140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54140">CVE-2023-54140 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54142/">CVE-2023-54142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54142">CVE-2023-54142 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54146/">CVE-2023-54146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54146">CVE-2023-54146 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54150/">CVE-2023-54150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54150">CVE-2023-54150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54153/">CVE-2023-54153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54153">CVE-2023-54153 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54156/">CVE-2023-54156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54156">CVE-2023-54156 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54159/">CVE-2023-54159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54159">CVE-2023-54159 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54166/">CVE-2023-54166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54166">CVE-2023-54166 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-54168/">CVE-2023-54168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54168">CVE-2023-54168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54170/">CVE-2023-54170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54170">CVE-2023-54170 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54171/">CVE-2023-54171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54171">CVE-2023-54171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54173/">CVE-2023-54173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54173">CVE-2023-54173 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54177/">CVE-2023-54177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54177">CVE-2023-54177 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54179/">CVE-2023-54179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54179">CVE-2023-54179 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54183/">CVE-2023-54183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54183">CVE-2023-54183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54186/">CVE-2023-54186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54186">CVE-2023-54186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54189/">CVE-2023-54189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54189">CVE-2023-54189 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54190/">CVE-2023-54190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54190">CVE-2023-54190 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54197/">CVE-2023-54197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54197">CVE-2023-54197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54198/">CVE-2023-54198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54198">CVE-2023-54198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54199/">CVE-2023-54199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54199">CVE-2023-54199 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54201/">CVE-2023-54201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54201">CVE-2023-54201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54202/">CVE-2023-54202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54202">CVE-2023-54202 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54205/">CVE-2023-54205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54205">CVE-2023-54205 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54208/">CVE-2023-54208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54208">CVE-2023-54208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54211/">CVE-2023-54211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54211">CVE-2023-54211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54213/">CVE-2023-54213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54213">CVE-2023-54213 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54214/">CVE-2023-54214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54214">CVE-2023-54214 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54219/">CVE-2023-54219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54219">CVE-2023-54219 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54230/">CVE-2023-54230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54230">CVE-2023-54230 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54236/">CVE-2023-54236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54236">CVE-2023-54236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54242/">CVE-2023-54242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54242">CVE-2023-54242 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54243/">CVE-2023-54243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54243">CVE-2023-54243 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54244/">CVE-2023-54244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54244">CVE-2023-54244 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54245/">CVE-2023-54245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54245">CVE-2023-54245 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54252/">CVE-2023-54252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54252">CVE-2023-54252 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54260/">CVE-2023-54260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54260">CVE-2023-54260 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54264/">CVE-2023-54264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54264">CVE-2023-54264 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54266/">CVE-2023-54266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54266">CVE-2023-54266 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54269/">CVE-2023-54269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54269">CVE-2023-54269 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54270/">CVE-2023-54270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54270">CVE-2023-54270 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54271/">CVE-2023-54271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54271">CVE-2023-54271 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54274/">CVE-2023-54274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54274">CVE-2023-54274 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54275/">CVE-2023-54275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54275">CVE-2023-54275 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54277/">CVE-2023-54277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54277">CVE-2023-54277 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54280/">CVE-2023-54280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54280">CVE-2023-54280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54284/">CVE-2023-54284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54284">CVE-2023-54284 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54286/">CVE-2023-54286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54286">CVE-2023-54286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54287/">CVE-2023-54287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54287">CVE-2023-54287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54289/">CVE-2023-54289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54289">CVE-2023-54289 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54292/">CVE-2023-54292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54292">CVE-2023-54292 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54293/">CVE-2023-54293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54293">CVE-2023-54293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54294/">CVE-2023-54294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54294">CVE-2023-54294 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54295/">CVE-2023-54295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54295">CVE-2023-54295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54298/">CVE-2023-54298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54298">CVE-2023-54298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54299/">CVE-2023-54299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54299">CVE-2023-54299 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54300/">CVE-2023-54300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54300">CVE-2023-54300 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54301/">CVE-2023-54301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54301">CVE-2023-54301 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54302/">CVE-2023-54302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54302">CVE-2023-54302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54304/">CVE-2023-54304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54304">CVE-2023-54304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54305/">CVE-2023-54305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54305">CVE-2023-54305 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54309/">CVE-2023-54309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54309">CVE-2023-54309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54311/">CVE-2023-54311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54311">CVE-2023-54311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54315/">CVE-2023-54315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54315">CVE-2023-54315 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54317/">CVE-2023-54317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54317">CVE-2023-54317 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54319/">CVE-2023-54319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54319">CVE-2023-54319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54321/">CVE-2023-54321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-54321">CVE-2023-54321 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54325/">CVE-2023-54325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54325">CVE-2023-54325 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54326/">CVE-2023-54326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54326">CVE-2023-54326 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26581/">CVE-2024-26581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26581">CVE-2024-26581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26832/">CVE-2024-26832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26832">CVE-2024-26832 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36348/">CVE-2024-36348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36348">CVE-2024-36348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36349/">CVE-2024-36349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36349">CVE-2024-36349 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36350/">CVE-2024-36350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36350">CVE-2024-36350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36357/">CVE-2024-36357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36357">CVE-2024-36357 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44987/">CVE-2024-44987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46854/">CVE-2024-46854 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46854">CVE-2024-46854 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50143/">CVE-2024-50143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54031/">CVE-2024-54031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21658/">CVE-2025-21658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21658">CVE-2025-21658 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21738/">CVE-2025-21738 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21738">CVE-2025-21738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21760/">CVE-2025-21760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21760">CVE-2025-21760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21764/">CVE-2025-21764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21765/">CVE-2025-21765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21765">CVE-2025-21765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21766/">CVE-2025-21766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21766">CVE-2025-21766 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38068/">CVE-2025-38068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38068">CVE-2025-38068 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38129/">CVE-2025-38129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38129">CVE-2025-38129 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38159/">CVE-2025-38159 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38375/">CVE-2025-38375 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38375">CVE-2025-38375 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38563/">CVE-2025-38563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38565/">CVE-2025-38565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38565">CVE-2025-38565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38684/">CVE-2025-38684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39977/">CVE-2025-39977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39977">CVE-2025-39977 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40019/">CVE-2025-40019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40019">CVE-2025-40019 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40044/">CVE-2025-40044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40139/">CVE-2025-40139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40139">CVE-2025-40139 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40215/">CVE-2025-40215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40215">CVE-2025-40215 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40220/">CVE-2025-40220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40220">CVE-2025-40220 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40233/">CVE-2025-40233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40233">CVE-2025-40233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40256/">CVE-2025-40256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40256">CVE-2025-40256 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-40257/">CVE-2025-40257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40257">CVE-2025-40257 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40277/">CVE-2025-40277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40280/">CVE-2025-40280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40280">CVE-2025-40280 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40300/">CVE-2025-40300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40331/">CVE-2025-40331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40331">CVE-2025-40331 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68183/">CVE-2025-68183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68183">CVE-2025-68183 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68284/">CVE-2025-68284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68284">CVE-2025-68284 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68312/">CVE-2025-68312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68312">CVE-2025-68312 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68732/">CVE-2025-68732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68732">CVE-2025-68732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68813/">CVE-2025-68813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71089/">CVE-2025-71089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71089">CVE-2025-71089 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71112/">CVE-2025-71112 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71112">CVE-2025-71112 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71116/">CVE-2025-71116 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71116">CVE-2025-71116 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71120/">CVE-2025-71120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71120">CVE-2025-71120 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22999/">CVE-2026-22999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22999">CVE-2026-22999 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23001/">CVE-2026-23001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23001">CVE-2026-23001 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23074/">CVE-2026-23074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23089/">CVE-2026-23089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23089">CVE-2026-23089 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045058" comment="kernel-default-5.14.21-150400.24.194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045032" comment="kernel-default-base-5.14.21-150400.24.194.1.150400.24.98.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206521" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1257173" ref_url="https://bugzilla.suse.com/1257173" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-0994" ref_url="https://www.suse.com/security/cve/CVE-2026-0994/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024376.html" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:i

- CVE-2026-0994: Fixed google.protobuf.Any recursion depth bypass in Python json_format.ParseDict (bsc#1257173).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1257173">SUSE bug 1257173</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0994/">CVE-2026-0994 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0994">CVE-2026-0994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045054" comment="libprotobuf-lite20-3.9.2-150200.4.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206522" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1257029" ref_url="https://bugzilla.suse.com/1257029" source="BUGZILLA"/>
		<reference ref_id="1257031" ref_url="https://bugzilla.suse.com/1257031" source="BUGZILLA"/>
		<reference ref_id="1257041" ref_url="https://bugzilla.suse.com/1257041" source="BUGZILLA"/>
		<reference ref_id="1257042" ref_url="https://bugzilla.suse.com/1257042" source="BUGZILLA"/>
		<reference ref_id="1257044" ref_url="https://bugzilla.suse.com/1257044" source="BUGZILLA"/>
		<reference ref_id="1257046" ref_url="https://bugzilla.suse.com/1257046" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-11468" ref_url="https://www.suse.com/security/cve/CVE-2025-11468/" source="CVE"/>
		<reference ref_id="CVE-2025-15282" ref_url="https://www.suse.com/security/cve/CVE-2025-15282/" source="CVE"/>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-0672" ref_url="https://www.suse.com/security/cve/CVE-2026-0672/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2025-11468: header injection when folding a long comment in an email header containing exclusively unfoldable
  characters (bsc#1257029).
- CVE-2026-0672: HTTP header injection via user-controlled cookie values and parameters when using http.cookies.Morsel
  (bsc#1257031).
- CVE-2026-0865: user-controlled header containing newlines can allow injecting HTTP headers (bsc#1257042).
- CVE-2025-15366: user-controlled command can allow additional commands injected using newlines (bsc#1257044).
- CVE-2025-15282: user-controlled data URLs parsed may allow injecting headers (bsc#1257046).
- CVE-2025-15367: control characters may allow the injection of additional commands (bsc#1257041).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1257029">SUSE bug 1257029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257031">SUSE bug 1257031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257041">SUSE bug 1257041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257042">SUSE bug 1257042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257044">SUSE bug 1257044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257046">SUSE bug 1257046</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11468/">CVE-2025-11468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11468">CVE-2025-11468 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15282/">CVE-2025-15282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15282">CVE-2025-15282 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0672/">CVE-2026-0672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0672">CVE-2026-0672 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045853" comment="libpython3_6m1_0-3.6.15-150300.10.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045854" comment="python3-3.6.15-150300.10.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045855" comment="python3-base-3.6.15-150300.10.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206523" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1253904" ref_url="https://bugzilla.suse.com/1253904" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024444.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

- CVE-2025-58181: Fixed a bug in crypto/ssh where invalidated number of mechanisms can cause unbounded memory consumption. (bsc#1253904)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1253904">SUSE bug 1253904</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045856" comment="docker-28.5.1_ce-150000.241.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045857" comment="docker-buildx-0.29.0-150000.241.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206524" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1229129" ref_url="https://bugzilla.suse.com/1229129" source="BUGZILLA"/>
		<reference ref_id="1258046" ref_url="https://bugzilla.suse.com/1258046" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24853" ref_url="https://www.suse.com/security/cve/CVE-2024-24853/" source="CVE"/>
		<reference ref_id="CVE-2025-31648" ref_url="https://www.suse.com/security/cve/CVE-2025-31648/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024442.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode was updated to the 20260210 release (bsc#1258046)
- CVE-2024-24853: Updated fix for incorrect behavior order in transition
  between executive monitor and SMI transfer monitor (STM) in some Intel(R)
  Processor may allow a privileged user to potentially enable escalation
  of privilege via local access. (bsc#1229129)
- CVE-2025-31648: Improper handling of values in the microcode flow for
  some Intel Processor Family may allow an escalation of privilege. (bsc#1258046)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258046">SUSE bug 1258046</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-24853/">CVE-2024-24853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-31648/">CVE-2025-31648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31648">CVE-2025-31648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045394" comment="ucode-intel-20260210-150200.62.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206525" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1256389" ref_url="https://bugzilla.suse.com/1256389" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2026:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024501.html" source="SUSE-SU"/>
		<description>
This update for gpg2 fixes the following issues:

Security fix:

- Fixed GnuPG accepting Path Separators and Path Traversals 
  in Literal Data (bsc#1256389)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-02-27"/>
	<updated date="2026-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1256389">SUSE bug 1256389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045858" comment="gpg2-2.2.27-150300.3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206526" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1240871" ref_url="https://bugzilla.suse.com/1240871" source="BUGZILLA"/>
		<reference ref_id="1247432" ref_url="https://bugzilla.suse.com/1247432" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2312" ref_url="https://www.suse.com/security/cve/CVE-2024-2312/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024522.html" source="SUSE-SU"/>
		<description>

This update for shim fixes the following issues:

shim is updated to version 16.1:

- shim_start_image(): fix guid/handle pairing when uninstalling protocols
- Fix uncompressed ipv6 netboot
- fix test segfaults caused by uninitialized memory
- SbatLevel_Variable.txt: minor typo fix.
- Realloc() needs to allocate one more byte for sprintf()
- IPv6: Add more check to avoid multiple double colon and illegal char
- Loader proto v2
- loader-protocol: add workaround for EDK2 2025.02 page fault on FreePages
- Generate Authenticode for the entire PE file
- README: mention new loader protocol and interaction with UKIs
- shim: change automatically enable MOK_POLICY_REQUIRE_NX
- Save var info
- add SbatLevel entry 2025051000 for PSA-2025-00012-1
- Coverity fixes 20250804
- fix http boot
- Fix double free and leak in the loader protocol


shim is updated to version 16.0:


- Validate that a supplied vendor cert is not in PEM format
- sbat: Add grub.peimage,2 to latest (CVE-2024-2312)
- sbat: Also bump latest for grub,4 (and to todays date)
- undo change that limits certificate files to a single file
- shim: don't set second_stage to the empty string
- Fix SBAT.md for today's consensus about numbers
- Update Code of Conduct contact address
- make-certs: Handle missing OpenSSL installation
- Update MokVars.txt
- export DEFINES for sub makefile
- Drop unused EFI_IMAGE_SECURITY_DATABASE_GUID definition
- Null-terminate 'arguments' in fallback
- Fix 'Verifiying' typo in error message
- Update Fedora CI targets
- Force gcc to produce DWARF4 so that gdb can use it
- Minor housekeeping 2024121700
- Discard load-options that start with WINDOWS
- Fix the issue that the gBS-&gt;LoadImage pointer was empty.
- shim: Allow data after the end of device path node in load options
- Handle network file not found like disks
- Update gnu-efi submodule for EFI_HTTP_ERROR
- Increase EFI file alignment
- avoid EFIv2 runtime services on Apple x86 machines
- Improve shortcut performance when comparing two boolean expressions
- Provide better error message when MokManager is not found
- tpm: Boot with a warning if the event log is full
- MokManager: remove redundant logical constraints
- Test import_mok_state() when MokListRT would be bigger than available size
- test-mok-mirror: minor bug fix
- Fix file system browser hang when enrolling MOK from disk
- Ignore a minor clang-tidy nit
- Allow fallback to default loader when encountering errors on network boot
- test.mk: don't use a temporary random.bin
- pe: Enhance debug report for update_mem_attrs
- Multiple certificate handling improvements
- Generate SbatLevel Metadata from SbatLevel_Variable.txt
- Apply EKU check with compile option
- Add configuration option to boot an alternative 2nd stage
- Loader protocol (with Device Path resolution support)
- netboot cleanup for additional files
- Document how revocations can be delivered
- post-process-pe: add tests to validate NX compliance
- regression: CopyMem() in ad8692e copies out of bounds
- Save the debug and error logs in mok-variables
- Add features for the Host Security ID program
- Mirror some more efi variables to mok-variables
- This adds DXE Services measurements to HSI and uses them for NX
- Add shim's current NX_COMPAT status to HSIStatus
- README.tpm: reflect that vendor_db is in fact logged as 'vendor_db'
- Reject HTTP message with duplicate Content-Length header fields
- Disable log saving
- fallback: don't add new boot order entries backwards
- README.tpm: Update MokList entry to MokListRT
- SBAT Level update for February 2025 GRUB CVEs
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-02"/>
	<updated date="2026-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1240871">SUSE bug 1240871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247432">SUSE bug 1247432</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2312/">CVE-2024-2312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2312">CVE-2024-2312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046368" comment="shim-16.1-150300.4.31.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206527" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1250553" ref_url="https://bugzilla.suse.com/1250553" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-10911" ref_url="https://www.suse.com/security/cve/CVE-2025-10911/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024570.html" source="SUSE-SU"/>
		<description>
This update for libxslt fixes the following issues:

- CVE-2025-10911: use-after-free will be fixed on libxml2 side instead (bsc#1250553).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-04"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1250553">SUSE bug 1250553</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10911/">CVE-2025-10911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10911">CVE-2025-10911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047412" comment="libxslt1-1.1.34-150400.3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206528" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1258568" ref_url="https://bugzilla.suse.com/1258568" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-2781" ref_url="https://www.suse.com/security/cve/CVE-2026-2781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024585.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to NSS 3.112.3:

* CVE-2026-2781: Avoid integer overflow in platform-independent ghash (bsc#1258568)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2781/">CVE-2026-2781 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2781">CVE-2026-2781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047413" comment="libfreebl3-3.112.3-150400.3.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047414" comment="libsoftokn3-3.112.3-150400.3.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047415" comment="mozilla-nss-3.112.3-150400.3.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047416" comment="mozilla-nss-certs-3.112.3-150400.3.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047417" comment="mozilla-nss-tools-3.112.3-150400.3.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206529" version="1" class="patch">
	<metadata>
		<title>Security update for openCryptoki (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1257116" ref_url="https://bugzilla.suse.com/1257116" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-23893" ref_url="https://www.suse.com/security/cve/CVE-2026-23893/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024635.html" source="SUSE-SU"/>
		<description>
This update for openCryptoki fixes the following issues:

- CVE-2026-23893: Fixed privilege escalation or data exposure via symlink following (bsc#1257116)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1257116">SUSE bug 1257116</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-23893/">CVE-2026-23893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23893">CVE-2026-23893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047420" comment="openCryptoki-3.17.0-150400.4.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206530" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1257144" ref_url="https://bugzilla.suse.com/1257144" source="BUGZILLA"/>
		<reference ref_id="1257496" ref_url="https://bugzilla.suse.com/1257496" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-24515" ref_url="https://www.suse.com/security/cve/CVE-2026-24515/" source="CVE"/>
		<reference ref_id="CVE-2026-25210" ref_url="https://www.suse.com/security/cve/CVE-2026-25210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024633.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2026-24515: Fixed a null dereference in XML_ExternalEntityParserCreate. (bsc#1257144)
- CVE-2026-25210: Fixed an integer overflow in doContent. (bsc#1257496)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1257144">SUSE bug 1257144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257496">SUSE bug 1257496</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24515/">CVE-2026-24515 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24515">CVE-2026-24515 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25210/">CVE-2026-25210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25210">CVE-2026-25210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047418" comment="libexpat1-2.7.1-150400.3.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206531" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1240751" ref_url="https://bugzilla.suse.com/1240751" source="BUGZILLA"/>
		<reference ref_id="1257398" ref_url="https://bugzilla.suse.com/1257398" source="BUGZILLA"/>
		<reference ref_id="1257441" ref_url="https://bugzilla.suse.com/1257441" source="BUGZILLA"/>
		<reference ref_id="1257597" ref_url="https://bugzilla.suse.com/1257597" source="BUGZILLA"/>
		<reference ref_id="1258120" ref_url="https://bugzilla.suse.com/1258120" source="BUGZILLA"/>
		<reference ref_id="1258170" ref_url="https://bugzilla.suse.com/1258170" source="BUGZILLA"/>
		<reference ref_id="1258508" ref_url="https://bugzilla.suse.com/1258508" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-32049" ref_url="https://www.suse.com/security/cve/CVE-2025-32049/" source="CVE"/>
		<reference ref_id="CVE-2026-1467" ref_url="https://www.suse.com/security/cve/CVE-2026-1467/" source="CVE"/>
		<reference ref_id="CVE-2026-1539" ref_url="https://www.suse.com/security/cve/CVE-2026-1539/" source="CVE"/>
		<reference ref_id="CVE-2026-1760" ref_url="https://www.suse.com/security/cve/CVE-2026-1760/" source="CVE"/>
		<reference ref_id="CVE-2026-2369" ref_url="https://www.suse.com/security/cve/CVE-2026-2369/" source="CVE"/>
		<reference ref_id="CVE-2026-2443" ref_url="https://www.suse.com/security/cve/CVE-2026-2443/" source="CVE"/>
		<reference ref_id="CVE-2026-2708" ref_url="https://www.suse.com/security/cve/CVE-2026-2708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<description>
This update for libsoup2 fixes the following issues:

- CVE-2025-32049: denial of service attack to websocket server (bsc#1240751).
- CVE-2026-1467: lack of input sanitization can lead to unintended or unauthorized HTTP requests (bsc#1257398).
- CVE-2026-1539: proxy authentication credentials leaked via the Proxy-Authorization header when handling HTTP redirects
  (bsc#1257441).
- CVE-2026-1760: improper handling of HTTP requests combining certain headers by SoupServer can lead to HTTP request
  smuggling and potential DoS (bsc#1257597).
- CVE-2026-2369: buffer overread due to integer underflow when handling zero-length resources (bsc#1258120).
- CVE-2026-2443: out-of-bounds read when processing specially crafted HTTP Range headers can lead to heap information
  disclosure to remote attackers (bsc#1258170).
- CVE-2026-2708: HTTP request smuggling via duplicate Content-Length headers (bsc#1258508).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-05"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1240751">SUSE bug 1240751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257398">SUSE bug 1257398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257441">SUSE bug 1257441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257597">SUSE bug 1257597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258120">SUSE bug 1258120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258170">SUSE bug 1258170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258508">SUSE bug 1258508</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32049/">CVE-2025-32049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32049">CVE-2025-32049 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1467/">CVE-2026-1467 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1467">CVE-2026-1467 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1539/">CVE-2026-1539 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1539">CVE-2026-1539 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1760/">CVE-2026-1760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1760">CVE-2026-1760 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2369/">CVE-2026-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2369">CVE-2026-2369 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2443/">CVE-2026-2443 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2443">CVE-2026-2443 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2708/">CVE-2026-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2708">CVE-2026-2708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047419" comment="libsoup-2_4-1-2.74.2-150400.3.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206532" version="1" class="patch">
	<metadata>
		<title>Security update for python-tornado (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1254903" ref_url="https://bugzilla.suse.com/1254903" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-67724" ref_url="https://www.suse.com/security/cve/CVE-2025-67724/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024640.html" source="SUSE-SU"/>
		<description>
This update for python-tornado fixes the following issue:

- CVE-2025-67724: missing validation of the supplied reason phrase (bsc#1254903).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254903">SUSE bug 1254903</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67724/">CVE-2025-67724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67724">CVE-2025-67724 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047554" comment="python3-tornado-4.5.3-150000.3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206533" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1257960" ref_url="https://bugzilla.suse.com/1257960" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-14831" ref_url="https://www.suse.com/security/cve/CVE-2025-14831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024672.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2025-14831: excessive resource consumption when verifying  specially crafted malicious certificates containing
  a large number of name constraints and subject alternative names (SANs) (bsc#1257960).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1257960">SUSE bug 1257960</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14831/">CVE-2025-14831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14831">CVE-2025-14831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048484" comment="gnutls-3.7.3-150400.4.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048485" comment="libgnutls30-3.7.3-150400.4.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048486" comment="libgnutls30-hmac-3.7.3-150400.4.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206534" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1246965" ref_url="https://bugzilla.suse.com/1246965" source="BUGZILLA"/>
		<reference ref_id="1256766" ref_url="https://bugzilla.suse.com/1256766" source="BUGZILLA"/>
		<reference ref_id="1256822" ref_url="https://bugzilla.suse.com/1256822" source="BUGZILLA"/>
		<reference ref_id="1257005" ref_url="https://bugzilla.suse.com/1257005" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-15281" ref_url="https://www.suse.com/security/cve/CVE-2025-15281/" source="CVE"/>
		<reference ref_id="CVE-2025-8058" ref_url="https://www.suse.com/security/cve/CVE-2025-8058/" source="CVE"/>
		<reference ref_id="CVE-2026-0861" ref_url="https://www.suse.com/security/cve/CVE-2026-0861/" source="CVE"/>
		<reference ref_id="CVE-2026-0915" ref_url="https://www.suse.com/security/cve/CVE-2026-0915/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024696.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2026-0861: memalign: reinstate alignment overflow check (bsc#1256766)
- CVE-2026-0915: resolv: Fix NSS DNS backend for getnetbyaddr (bsc#1256822)
- CVE-2025-15281: posix: Reset wordexp_t fields with WRDE_REUSE (bsc#1257005)
- CVE-2025-8058: posix: Fix double-free after allocation failure in regcomp (bsc#1246965)
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1246965">SUSE bug 1246965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256766">SUSE bug 1256766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256822">SUSE bug 1256822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257005">SUSE bug 1257005</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15281/">CVE-2025-15281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15281">CVE-2025-15281 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H" href="https://www.suse.com/security/cve/CVE-2025-8058/">CVE-2025-8058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8058">CVE-2025-8058 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0861/">CVE-2026-0861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0861">CVE-2026-0861 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0915/">CVE-2026-0915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0915">CVE-2026-0915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048740" comment="glibc-2.31-150300.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048741" comment="glibc-devel-2.31-150300.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048742" comment="glibc-locale-2.31-150300.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048743" comment="glibc-locale-base-2.31-150300.98.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206535" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1259362" ref_url="https://bugzilla.suse.com/1259362" source="BUGZILLA"/>
		<reference ref_id="1259363" ref_url="https://bugzilla.suse.com/1259363" source="BUGZILLA"/>
		<reference ref_id="1259364" ref_url="https://bugzilla.suse.com/1259364" source="BUGZILLA"/>
		<reference ref_id="1259365" ref_url="https://bugzilla.suse.com/1259365" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-1965" ref_url="https://www.suse.com/security/cve/CVE-2026-1965/" source="CVE"/>
		<reference ref_id="CVE-2026-3783" ref_url="https://www.suse.com/security/cve/CVE-2026-3783/" source="CVE"/>
		<reference ref_id="CVE-2026-3784" ref_url="https://www.suse.com/security/cve/CVE-2026-3784/" source="CVE"/>
		<reference ref_id="CVE-2026-3805" ref_url="https://www.suse.com/security/cve/CVE-2026-3805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024704.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2026-1965: bad reuse of HTTP Negotiate connection (bsc#1259362).
- CVE-2026-3783: token leak with redirect and netrc (bsc#1259363).
- CVE-2026-3784: wrong proxy connection reuse with credentials (bsc#1259364).
- CVE-2026-3805: use after free in SMB connection reuse (bsc#1259365).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1259362">SUSE bug 1259362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259363">SUSE bug 1259363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259364">SUSE bug 1259364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259365">SUSE bug 1259365</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1965/">CVE-2026-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1965">CVE-2026-1965 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3783/">CVE-2026-3783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3783">CVE-2026-3783 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3784/">CVE-2026-3784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3784">CVE-2026-3784 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3805/">CVE-2026-3805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3805">CVE-2026-3805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049152" comment="curl-8.14.1-150400.5.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049153" comment="libcurl4-8.14.1-150400.5.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206536" version="1" class="patch">
	<metadata>
		<title>Security update for jq (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1248600" ref_url="https://bugzilla.suse.com/1248600" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-9403" ref_url="https://www.suse.com/security/cve/CVE-2025-9403/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024775.html" source="SUSE-SU"/>
		<description>
This update for jq fixes the following issue:

- CVE-2025-9403: test suite assertion failure in JSON parsing consistency validation (bsc#1248600).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-03-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1248600">SUSE bug 1248600</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-9403/">CVE-2025-9403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9403">CVE-2025-9403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049508" comment="jq-1.6-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049509" comment="libjq1-1.6-150000.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206537" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="SUSE-SU-2026:0949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024790.html" source="SUSE-SU"/>
		<description>

This update for runc rebuilds it against the current go 1.25 security release.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049692" comment="runc-1.3.4-150000.90.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206538" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="SUSE-SU-2026:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024789.html" source="SUSE-SU"/>
		<description>

This update for docker rebuilds it against the current go 1.25 security release.
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-20"/>
	<updated date="2026-03-20"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049693" comment="docker-28.5.1_ce-150000.243.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049694" comment="docker-buildx-0.29.0-150000.243.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206539" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1258859" ref_url="https://bugzilla.suse.com/1258859" source="BUGZILLA"/>
		<reference ref_id="CVE-2026-3184" ref_url="https://www.suse.com/security/cve/CVE-2026-3184/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024815.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2026-3184: Fix full hostname usage for PAM to ensure correct access control for 'login -h' (bsc#1258859).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-23"/>
	<updated date="2026-03-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1258859">SUSE bug 1258859</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3184/">CVE-2026-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3184">CVE-2026-3184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049994" comment="libblkid1-2.37.2-150400.8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049995" comment="libfdisk1-2.37.2-150400.8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049996" comment="libmount1-2.37.2-150400.8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049997" comment="libsmartcols1-2.37.2-150400.8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049998" comment="libuuid1-2.37.2-150400.8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049999" comment="util-linux-2.37.2-150400.8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050000" comment="util-linux-systemd-2.37.2-150400.8.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206540" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Micro 5.4</platform>
		</affected>
		<reference ref_id="1238917" ref_url="https://bugzilla.suse.com/1238917" source="BUGZILLA"/>
		<reference ref_id="1255075" ref_url="https://bugzilla.suse.com/1255075" source="BUGZILLA"/>
		<reference ref_id="1256645" ref_url="https://bugzilla.suse.com/1256645" source="BUGZILLA"/>
		<reference ref_id="1257231" ref_url="https://bugzilla.suse.com/1257231" source="BUGZILLA"/>
		<reference ref_id="1257473" ref_url="https://bugzilla.suse.com/1257473" source="BUGZILLA"/>
		<reference ref_id="1257732" ref_url="https://bugzilla.suse.com/1257732" source="BUGZILLA"/>
		<reference ref_id="1257735" ref_url="https://bugzilla.suse.com/1257735" source="BUGZILLA"/>
		<reference ref_id="1258340" ref_url="https://bugzilla.suse.com/1258340" source="BUGZILLA"/>
		<reference ref_id="1258395" ref_url="https://bugzilla.suse.com/1258395" source="BUGZILLA"/>
		<reference ref_id="1258518" ref_url="https://bugzilla.suse.com/1258518" source="BUGZILLA"/>
		<reference ref_id="1258849" ref_url="https://bugzilla.suse.com/1258849" source="BUGZILLA"/>
		<reference ref_id="1258850" ref_url="https://bugzilla.suse.com/1258850" source="BUGZILLA"/>
		<reference ref_id="1259857" ref_url="https://bugzilla.suse.com/1259857" source="BUGZILLA"/>
		<reference ref_id="CVE-2025-21738" ref_url="https://www.suse.com/security/cve/CVE-2025-21738/" source="CVE"/>
		<reference ref_id="CVE-2025-40242" ref_url="https://www.suse.com/security/cve/CVE-2025-40242/" source="CVE"/>
		<reference ref_id="CVE-2025-71066" ref_url="https://www.suse.com/security/cve/CVE-2025-71066/" source="CVE"/>
		<reference ref_id="CVE-2026-23004" ref_url="https://www.suse.com/security/cve/CVE-2026-23004/" source="CVE"/>
		<reference ref_id="CVE-2026-23054" ref_url="https://www.suse.com/security/cve/CVE-2026-23054/" source="CVE"/>
		<reference ref_id="CVE-2026-23060" ref_url="https://www.suse.com/security/cve/CVE-2026-23060/" source="CVE"/>
		<reference ref_id="CVE-2026-23191" ref_url="https://www.suse.com/security/cve/CVE-2026-23191/" source="CVE"/>
		<reference ref_id="CVE-2026-23204" ref_url="https://www.suse.com/security/cve/CVE-2026-23204/" source="CVE"/>
		<reference ref_id="CVE-2026-23209" ref_url="https://www.suse.com/security/cve/CVE-2026-23209/" source="CVE"/>
		<reference ref_id="CVE-2026-23268" ref_url="https://www.suse.com/security/cve/CVE-2026-23268/" source="CVE"/>
		<reference ref_id="CVE-2026-23269" ref_url="https://www.suse.com/security/cve/CVE-2026-23269/" source="CVE"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2025-21738: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (bsc#1238917).
- CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change (bsc#1256645).
- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).
- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen&lt;8) to match ESP/ESN spec (bsc#1257735).
- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).
- CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful() (bsc#1258340).
- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).
- CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management (bsc#1258850).
- CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1259857).

The following non-security bugs were fixed:

- Disable CONFIG_NET_SCH_ATM (jsc#PED-12836).
- apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).
- apparmor: fix differential encoding verification (bsc#1258849).
- apparmor: fix memory leak in verify_header (bsc#1258849).
- apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).
- apparmor: fix race between freeing data and fs accessing it (bsc#1258849).
- apparmor: fix race on rawdata dereference (bsc#1258849).
- apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).
- apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).
- apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).
- apparmor: replace recursive profile removal with iterative approach (bsc#1258849).
- apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).
		</description>
<advisory from="security@suse.de">
	<issued date="2026-03-23"/>
	<updated date="2026-03-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1238917">SUSE bug 1238917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255075">SUSE bug 1255075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256645">SUSE bug 1256645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257231">SUSE bug 1257231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257473">SUSE bug 1257473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257732">SUSE bug 1257732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257735">SUSE bug 1257735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258340">SUSE bug 1258340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258395">SUSE bug 1258395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258518">SUSE bug 1258518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258849">SUSE bug 1258849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258850">SUSE bug 1258850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259857">SUSE bug 1259857</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21738/">CVE-2025-21738 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21738">CVE-2025-21738 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40242/">CVE-2025-40242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40242">CVE-2025-40242 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-71066/">CVE-2025-71066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71066">CVE-2025-71066 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23004/">CVE-2026-23004 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23004">CVE-2026-23004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23054/">CVE-2026-23054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23054">CVE-2026-23054 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23060/">CVE-2026-23060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23060">CVE-2026-23060 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23191/">CVE-2026-23191 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23191">CVE-2026-23191 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23204/">CVE-2026-23204 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23204">CVE-2026-23204 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23209/">CVE-2026-23209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23209">CVE-2026-23209 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23268/">CVE-2026-23268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23268">CVE-2026-23268 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23269/">CVE-2026-23269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23269">CVE-2026-23269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-micro:5.4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009952223" comment="SUSE Linux Enterprise Micro 5.4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050001" comment="kernel-default-5.14.21-150400.24.197.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049970" comment="kernel-default-base-5.14.21-150400.24.197.1.150400.24.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904852" version="1" comment="NetworkManager is &lt;1.38.2-150400.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904853" version="1" comment="NetworkManager-bluetooth is &lt;1.38.2-150400.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904854" version="1" comment="NetworkManager-cloud-setup is &lt;1.38.2-150400.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904855" version="1" comment="NetworkManager-pppoe is &lt;1.38.2-150400.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904856" version="1" comment="NetworkManager-tui is &lt;1.38.2-150400.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904857" version="1" comment="NetworkManager-wwan is &lt;1.38.2-150400.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904858" version="1" comment="libnm0 is &lt;1.38.2-150400.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904859" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.38.2-150400.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952223" version="1" comment="SLE-Micro-release is ==5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904860" version="1" comment="afterburn is &lt;5.2.0-150400.1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904861" version="1" comment="afterburn-dracut is &lt;5.2.0-150400.1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664151" version="1" comment="aide is &lt;0.16-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904862" version="1" comment="apparmor-parser is &lt;3.0.4-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904863" version="1" comment="libapparmor1 is &lt;3.0.4-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904864" version="1" comment="pam_apparmor is &lt;3.0.4-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894380" version="1" comment="augeas is &lt;1.12.0-150400.3.3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894382" version="1" comment="augeas-lenses is &lt;1.12.0-150400.3.3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894383" version="1" comment="libaugeas0 is &lt;1.12.0-150400.3.3.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887248" version="1" comment="avahi is &lt;0.8-150400.5.73 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887253" version="1" comment="libavahi-client3 is &lt;0.8-150400.5.73 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887255" version="1" comment="libavahi-common3 is &lt;0.8-150400.5.73 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887257" version="1" comment="libavahi-core7 is &lt;0.8-150400.5.73 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904865" version="1" comment="aws-cli is &lt;1.24.4-150200.30.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887262" version="1" comment="bash is &lt;4.4-150400.25.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887266" version="1" comment="bash-sh is &lt;4.4-150400.25.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887267" version="1" comment="libreadline7 is &lt;7.0-150400.25.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887271" version="1" comment="bcm43xx-firmware is &lt;20180314-150400.28.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893508" version="1" comment="btrfsmaintenance is &lt;0.4.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887280" version="1" comment="bzip2 is &lt;1.0.8-150400.1.122 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887281" version="1" comment="libbz2-1 is &lt;1.0.8-150400.1.122 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887308" version="1" comment="chrony is &lt;4.1-150400.19.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887310" version="1" comment="chrony-pool-suse is &lt;4.1-150400.19.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716241" version="1" comment="cifs-utils is &lt;6.15-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725840" version="1" comment="cni is &lt;0.7.1-150100.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725841" version="1" comment="cni-plugins is &lt;0.8.6-150100.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729770" version="1" comment="conmon is &lt;2.1.5-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881770" version="1" comment="conntrack-tools is &lt;1.4.5-1.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009728091" version="1" comment="containerd is &lt;1.6.12-150000.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904866" version="1" comment="containerized-data-importer-manifests is &lt;1.51.0-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904510" version="1" comment="coolkey is &lt;1.1.0-1.31 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887349" version="1" comment="coreutils is &lt;8.32-150400.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887353" version="1" comment="cpio is &lt;2.13-150400.1.98 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893485" version="1" comment="cracklib is &lt;2.9.7-11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893487" version="1" comment="cracklib-dict-small is &lt;2.9.7-11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893488" version="1" comment="libcrack2 is &lt;2.9.7-11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887368" version="1" comment="cryptsetup is &lt;2.4.3-150400.1.110 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887372" version="1" comment="libcryptsetup12 is &lt;2.4.3-150400.1.110 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887374" version="1" comment="libcryptsetup12-hmac is &lt;2.4.3-150400.1.110 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904867" version="1" comment="cups-config is &lt;2.2.7-150000.3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904868" version="1" comment="libcups2 is &lt;2.2.7-150000.3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739936" version="1" comment="curl is &lt;7.79.1-150400.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739939" version="1" comment="libcurl4 is &lt;7.79.1-150400.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669166" version="1" comment="cyrus-sasl is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669171" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669173" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669179" version="1" comment="libsasl2-3 is &lt;2.1.27-150300.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725448" version="1" comment="db48-utils is &lt;4.8.30-150000.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725449" version="1" comment="libdb-4_8 is &lt;4.8.30-150000.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717526" version="1" comment="dbus-1 is &lt;1.12.2-150400.18.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717530" version="1" comment="dbus-1-x11 is &lt;1.12.2-150400.18.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717531" version="1" comment="libdbus-1-3 is &lt;1.12.2-150400.18.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887385" version="1" comment="dnsmasq is &lt;2.86-150400.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904869" version="1" comment="docker is &lt;20.10.17_ce-150000.169.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882521" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2908_55e924b8a842-4.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494431" version="1" comment="docker-runc is &lt;1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904870" version="1" comment="dracut is &lt;055+suse.331.g05b9ccb7-150400.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904871" version="1" comment="dracut-fips is &lt;055+suse.331.g05b9ccb7-150400.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904872" version="1" comment="dracut-mkinitrd-deprecated is &lt;055+suse.331.g05b9ccb7-150400.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682222" version="1" comment="e2fsprogs is &lt;1.46.4-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682226" version="1" comment="libcom_err2 is &lt;1.46.4-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682230" version="1" comment="libext2fs2 is &lt;1.46.4-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894397" version="1" comment="elfutils is &lt;0.185-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894400" version="1" comment="libasm1 is &lt;0.185-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894402" version="1" comment="libdw1 is &lt;0.185-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894405" version="1" comment="libelf1 is &lt;0.185-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893456" version="1" comment="file is &lt;5.32-7.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893458" version="1" comment="file-magic is &lt;5.32-7.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893459" version="1" comment="libmagic1 is &lt;5.32-7.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904736" version="1" comment="firewalld is &lt;0.9.3-150400.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904737" version="1" comment="python3-firewall is &lt;0.9.3-150400.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489671" version="1" comment="fuse is &lt;2.9.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489674" version="1" comment="libfuse2 is &lt;2.9.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893629" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.52.9-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893630" version="1" comment="librsvg-2-2 is &lt;2.52.9-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709915" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.9-150400.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709918" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.9-150400.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709920" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.9-150400.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887435" version="1" comment="glib-networking is &lt;2.70.1-150400.1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904873" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904874" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904875" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904876" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904877" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904878" version="1" comment="glibc is &lt;2.31-150300.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904879" version="1" comment="glibc-devel is &lt;2.31-150300.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904880" version="1" comment="glibc-locale is &lt;2.31-150300.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904881" version="1" comment="glibc-locale-base is &lt;2.31-150300.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740467" version="1" comment="gnutls is &lt;3.7.3-150400.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740471" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740473" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700997" version="1" comment="gpg2 is &lt;2.2.27-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887458" version="1" comment="gptfdisk is &lt;1.0.8-150400.1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894412" version="1" comment="grep is &lt;3.1-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887463" version="1" comment="groff is &lt;1.22.4-150400.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726179" version="1" comment="grub2 is &lt;2.06-150400.11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904882" version="1" comment="grub2-arm64-efi is &lt;2.06-150400.11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904883" version="1" comment="grub2-i386-pc is &lt;2.06-150400.11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904884" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.06-150400.11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904885" version="1" comment="grub2-s390x-emu is &lt;2.06-150400.11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904886" version="1" comment="grub2-snapper-plugin is &lt;2.06-150400.11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904887" version="1" comment="grub2-x86_64-efi is &lt;2.06-150400.11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904888" version="1" comment="grub2-x86_64-xen is &lt;2.06-150400.11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887474" version="1" comment="gstreamer is &lt;1.20.1-150400.1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887478" version="1" comment="libgstreamer-1_0-0 is &lt;1.20.1-150400.1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887480" version="1" comment="gstreamer-plugins-base is &lt;1.20.1-150400.1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887483" version="1" comment="libgstallocators-1_0-0 is &lt;1.20.1-150400.1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887484" version="1" comment="libgstapp-1_0-0 is &lt;1.20.1-150400.1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887485" version="1" comment="libgstaudio-1_0-0 is &lt;1.20.1-150400.1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887487" version="1" comment="libgstgl-1_0-0 is &lt;1.20.1-150400.1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887488" version="1" comment="libgstpbutils-1_0-0 is &lt;1.20.1-150400.1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887489" version="1" comment="libgstriff-1_0-0 is &lt;1.20.1-150400.1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887493" version="1" comment="libgsttag-1_0-0 is &lt;1.20.1-150400.1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887494" version="1" comment="libgstvideo-1_0-0 is &lt;1.20.1-150400.1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887512" version="1" comment="gtk2-tools is &lt;2.24.33-150400.2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887513" version="1" comment="libgtk-2_0-0 is &lt;2.24.33-150400.2.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698993" version="1" comment="guestfs-data is &lt;1.44.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698994" version="1" comment="guestfs-tools is &lt;1.44.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698998" version="1" comment="libguestfs0 is &lt;1.44.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698999" version="1" comment="perl-Sys-Guestfs is &lt;1.44.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682353" version="1" comment="gzip is &lt;1.10-150200.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679123" version="1" comment="liblzma5 is &lt;5.2.3-150000.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679125" version="1" comment="xz is &lt;5.2.3-150000.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739103" version="1" comment="haproxy is &lt;2.4.8+git0.d1f8d41e0-150400.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904752" version="1" comment="iscsiuio is &lt;0.7.8.6-150400.39.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904753" version="1" comment="libopeniscsiusr0_2_0 is &lt;2.1.7-150400.39.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904754" version="1" comment="open-iscsi is &lt;2.1.7-150400.39.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887090" version="1" comment="jq is &lt;1.6-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887092" version="1" comment="libjq1 is &lt;1.6-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904889" version="1" comment="kdump is &lt;1.0.2+git20.g64239cc-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904890" version="1" comment="keepalived is &lt;2.2.2-150400.3.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739211" version="1" comment="kernel-default is &lt;5.14.21-150400.24.46.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904891" version="1" comment="kernel-firmware-all is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904892" version="1" comment="kernel-firmware-amdgpu is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904893" version="1" comment="kernel-firmware-ath10k is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904894" version="1" comment="kernel-firmware-ath11k is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904895" version="1" comment="kernel-firmware-atheros is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904896" version="1" comment="kernel-firmware-bluetooth is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904897" version="1" comment="kernel-firmware-bnx2 is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904898" version="1" comment="kernel-firmware-brcm is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904899" version="1" comment="kernel-firmware-chelsio is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904900" version="1" comment="kernel-firmware-dpaa2 is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904901" version="1" comment="kernel-firmware-i915 is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904902" version="1" comment="kernel-firmware-intel is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904903" version="1" comment="kernel-firmware-iwlwifi is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904904" version="1" comment="kernel-firmware-liquidio is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904905" version="1" comment="kernel-firmware-marvell is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904906" version="1" comment="kernel-firmware-media is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904907" version="1" comment="kernel-firmware-mediatek is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904908" version="1" comment="kernel-firmware-mellanox is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904909" version="1" comment="kernel-firmware-mwifiex is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904910" version="1" comment="kernel-firmware-network is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904911" version="1" comment="kernel-firmware-nfp is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904912" version="1" comment="kernel-firmware-nvidia is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904913" version="1" comment="kernel-firmware-platform is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904914" version="1" comment="kernel-firmware-prestera is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904915" version="1" comment="kernel-firmware-qcom is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904916" version="1" comment="kernel-firmware-qlogic is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904917" version="1" comment="kernel-firmware-radeon is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904918" version="1" comment="kernel-firmware-realtek is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904919" version="1" comment="kernel-firmware-serial is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904920" version="1" comment="kernel-firmware-sound is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904921" version="1" comment="kernel-firmware-ti is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904922" version="1" comment="kernel-firmware-ueagle is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904923" version="1" comment="kernel-firmware-usb-network is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904924" version="1" comment="ucode-amd is &lt;20220509-150400.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904925" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720090" version="1" comment="kpartx is &lt;0.9.0+62+suse.3e048d4-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720093" version="1" comment="libmpath0 is &lt;0.9.0+62+suse.3e048d4-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009720094" version="1" comment="multipath-tools is &lt;0.9.0+62+suse.3e048d4-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726194" version="1" comment="krb5 is &lt;1.19.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904926" version="1" comment="kubevirt-manifests is &lt;0.54.0-150400.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904927" version="1" comment="kubevirt-virtctl is &lt;0.54.0-150400.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738824" version="1" comment="less is &lt;590-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721526" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904928" version="1" comment="libX11-data is &lt;1.6.5-150000.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721530" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881980" version="1" comment="libXcursor1 is &lt;1.1.15-1.18 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881984" version="1" comment="libXext6 is &lt;1.3.3-1.30 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887638" version="1" comment="libXfixes3 is &lt;6.0.0-150400.1.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881994" version="1" comment="libXi6 is &lt;1.7.9-3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881997" version="1" comment="libXinerama1 is &lt;1.1.3-1.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882001" version="1" comment="libXrandr2 is &lt;1.5.1-2.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882003" version="1" comment="libXrender1 is &lt;0.9.10-1.30 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882008" version="1" comment="libXtst6 is &lt;1.2.3-1.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882011" version="1" comment="libXv1 is &lt;1.0.11-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726466" version="1" comment="libarchive13 is &lt;3.5.1-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887239" version="1" comment="libaudit1 is &lt;3.0.6-150400.2.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887241" version="1" comment="libauparse0 is &lt;3.0.6-150400.2.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904929" version="1" comment="libblkid1 is &lt;2.37.2-150400.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904930" version="1" comment="libfdisk1 is &lt;2.37.2-150400.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904931" version="1" comment="libmount1 is &lt;2.37.2-150400.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904932" version="1" comment="libsmartcols1 is &lt;2.37.2-150400.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904933" version="1" comment="libuuid1 is &lt;2.37.2-150400.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904934" version="1" comment="util-linux is &lt;2.37.2-150400.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904935" version="1" comment="util-linux-systemd is &lt;2.37.2-150400.8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733525" version="1" comment="libbluetooth3 is &lt;5.62-150400.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658532" version="1" comment="libbrotlicommon1 is &lt;1.0.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658533" version="1" comment="libbrotlidec1 is &lt;1.0.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492024" version="1" comment="libbsd0 is &lt;0.8.7-3.3.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887287" version="1" comment="libcairo-gobject2 is &lt;1.16.0-150400.9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887289" version="1" comment="libcairo2 is &lt;1.16.0-150400.9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739292" version="1" comment="libcares2 is &lt;1.19.0-150000.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714517" version="1" comment="libcolord2 is &lt;1.4.5-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887668" version="1" comment="libcontainers-common is &lt;20210626-150400.1.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904936" version="1" comment="libekmfweb1 is &lt;2.19.0-150400.7.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904937" version="1" comment="libkmipclient1 is &lt;2.19.0-150400.7.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904938" version="1" comment="s390-tools is &lt;2.19.0-150400.7.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882142" version="1" comment="libevent-2_1-8 is &lt;2.1.8-2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722359" version="1" comment="libexpat1 is &lt;2.4.4-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739294" version="1" comment="libfreebl3 is &lt;3.79.4-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739296" version="1" comment="libfreebl3-hmac is &lt;3.79.4-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739298" version="1" comment="libsoftokn3 is &lt;3.79.4-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739300" version="1" comment="libsoftokn3-hmac is &lt;3.79.4-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739302" version="1" comment="mozilla-nss is &lt;3.79.4-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739304" version="1" comment="mozilla-nss-certs is &lt;3.79.4-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739309" version="1" comment="mozilla-nss-tools is &lt;3.79.4-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708193" version="1" comment="libfreetype6 is &lt;2.10.4-150000.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009691894" version="1" comment="libfribidi0 is &lt;1.0.10-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904939" version="1" comment="libgbm1 is &lt;21.2.4-150400.68.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904940" version="1" comment="libgcrypt20 is &lt;1.9.4-150400.6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904941" version="1" comment="libgcrypt20-hmac is &lt;1.9.4-150400.6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656939" version="1" comment="libgmp10 is &lt;6.1.2-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893637" version="1" comment="libgraphite2-3 is &lt;1.3.11-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702488" version="1" comment="libharfbuzz-gobject0 is &lt;3.4.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702491" version="1" comment="libharfbuzz0 is &lt;3.4.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009702493" version="1" comment="typelib-1_0-HarfBuzz-0_0 is &lt;3.4.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887516" version="1" comment="libhivex0 is &lt;1.3.21-150400.2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887517" version="1" comment="perl-Win-Hivex is &lt;1.3.21-150400.2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887707" version="1" comment="libhogweed6 is &lt;3.7.3-150400.2.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887710" version="1" comment="libnettle8 is &lt;3.7.3-150400.2.21 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707445" version="1" comment="libicu-suse65_1 is &lt;65.1-150200.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893870" version="1" comment="libicu65_1-bedata is &lt;65.1-150200.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893871" version="1" comment="libicu65_1-ledata is &lt;65.1-150200.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882169" version="1" comment="libidn2-0 is &lt;2.2.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882196" version="1" comment="libjansson4 is &lt;2.9-1.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887750" version="1" comment="libjbig2 is &lt;2.1-3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887754" version="1" comment="libjpeg8 is &lt;8.2.2-150400.15.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664149" version="1" comment="libjson-c3 is &lt;0.13-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730902" version="1" comment="libksba8 is &lt;1.3.5-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887759" version="1" comment="liblcms2-2 is &lt;2.12-150400.1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893900" version="1" comment="libldap-2_4-2 is &lt;2.4.46-150200.14.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893902" version="1" comment="libldap-data is &lt;2.4.46-150200.14.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009703383" version="1" comment="libldb2 is &lt;2.4.3-150400.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494048" version="1" comment="liblua5_3-5 is &lt;5.3.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887768" version="1" comment="liblz4-1 is &lt;1.9.3-150400.1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882217" version="1" comment="liblzo2-2 is &lt;2.10-2.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882223" version="1" comment="libmicrohttpd12 is &lt;0.9.57-1.33 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882231" version="1" comment="libmpfr6 is &lt;4.0.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662615" version="1" comment="libmspack0 is &lt;0.6-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701000" version="1" comment="libncurses6 is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701003" version="1" comment="ncurses-utils is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701005" version="1" comment="terminfo is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701006" version="1" comment="terminfo-base is &lt;6.1-150000.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882882" version="1" comment="libndp0 is &lt;1.6-1.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882237" version="1" comment="libnewt0_52 is &lt;0.52.20-5.35 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887778" version="1" comment="libnghttp2-14 is &lt;1.40.0-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708026" version="1" comment="libonig4 is &lt;6.7.0-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904942" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904943" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904944" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904945" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893929" version="1" comment="libopus0 is &lt;1.3.1-150000.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887799" version="1" comment="libosinfo is &lt;1.7.1-150400.8.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887800" version="1" comment="libosinfo-1_0-0 is &lt;1.7.1-150400.8.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893111" version="1" comment="typelib-1_0-Libosinfo-1_0 is &lt;1.7.1-150400.8.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887802" version="1" comment="libp11-kit0 is &lt;0.23.22-150400.1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887804" version="1" comment="p11-kit is &lt;0.23.22-150400.1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887808" version="1" comment="p11-kit-tools is &lt;0.23.22-150400.1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887813" version="1" comment="libpango-1_0-0 is &lt;1.50.4-150400.1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887815" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.50.4-150400.1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887817" version="1" comment="libpcap1 is &lt;1.10.1-150400.1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684361" version="1" comment="libpcre1 is &lt;8.45-150000.20.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701284" version="1" comment="libpcre2-8-0 is &lt;10.39-150400.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887825" version="1" comment="libpcsclite1 is &lt;1.9.4-150400.1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887827" version="1" comment="pcsc-lite is &lt;1.9.4-150400.1.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724800" version="1" comment="libpixman-1-0 is &lt;0.40.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490148" version="1" comment="libpng16-16 is &lt;1.6.34-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668273" version="1" comment="libpolkit0 is &lt;0.116-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668274" version="1" comment="polkit is &lt;0.116-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904946" version="1" comment="libprocps7 is &lt;3.3.15-150000.7.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904947" version="1" comment="procps is &lt;3.3.15-150000.7.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721519" version="1" comment="libprotobuf-lite20 is &lt;3.9.2-150200.4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887843" version="1" comment="libproxy1 is &lt;0.4.17-150400.1.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742090" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742092" version="1" comment="python3 is &lt;3.6.15-150300.10.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742093" version="1" comment="python3-base is &lt;3.6.15-150300.10.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701035" version="1" comment="librados2 is &lt;16.2.9.536+g41a9f9a5573-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701038" version="1" comment="librbd1 is &lt;16.2.9.536+g41a9f9a5573-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887870" version="1" comment="libseccomp2 is &lt;2.5.3-150400.2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904948" version="1" comment="libsepol2 is &lt;3.4-150400.1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707677" version="1" comment="libslirp0 is &lt;4.3.1-150300.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731169" version="1" comment="libsnmp40 is &lt;5.9.3-150300.15.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009731176" version="1" comment="snmp-mibs is &lt;5.9.3-150300.15.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887877" version="1" comment="libsolv-tools is &lt;0.7.22-150400.1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887880" version="1" comment="libsoup-2_4-1 is &lt;2.74.2-150400.1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893113" version="1" comment="libspice-server1 is &lt;0.15.0-150400.2.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729556" version="1" comment="libsqlite3-0 is &lt;3.39.3-150000.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729561" version="1" comment="sqlite3-tcl is &lt;3.39.3-150000.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887892" version="1" comment="libssh-config is &lt;0.9.6-150400.1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887894" version="1" comment="libssh4 is &lt;0.9.6-150400.1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492903" version="1" comment="libssh2-1 is &lt;1.9.0-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904949" version="1" comment="libsss_certmap0 is &lt;2.5.2-150400.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904950" version="1" comment="libsss_idmap0 is &lt;2.5.2-150400.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904951" version="1" comment="libsss_nss_idmap0 is &lt;2.5.2-150400.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904952" version="1" comment="sssd is &lt;2.5.2-150400.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904953" version="1" comment="sssd-common is &lt;2.5.2-150400.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904954" version="1" comment="sssd-krb5-common is &lt;2.5.2-150400.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904955" version="1" comment="sssd-ldap is &lt;2.5.2-150400.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904956" version="1" comment="libsystemd0 is &lt;249.15-150400.8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904957" version="1" comment="libudev1 is &lt;249.15-150400.8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904958" version="1" comment="systemd is &lt;249.15-150400.8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904959" version="1" comment="systemd-container is &lt;249.15-150400.8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904960" version="1" comment="systemd-journal-remote is &lt;249.15-150400.8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904961" version="1" comment="systemd-sysvinit is &lt;249.15-150400.8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904962" version="1" comment="udev is &lt;249.15-150400.8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721368" version="1" comment="libtasn1 is &lt;4.13-150000.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009721369" version="1" comment="libtasn1-6 is &lt;4.13-150000.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735257" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894008" version="1" comment="libtirpc-netconfig is &lt;1.2.6-150300.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894009" version="1" comment="libtirpc3 is &lt;1.2.6-150300.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727178" version="1" comment="libtpms0 is &lt;0.8.2-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734646" version="1" comment="libtss2-esys0 is &lt;3.1.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734648" version="1" comment="libtss2-fapi1 is &lt;3.1.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734650" version="1" comment="libtss2-mu0 is &lt;3.1.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734652" version="1" comment="libtss2-rc0 is &lt;3.1.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734654" version="1" comment="libtss2-sys1 is &lt;3.1.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734658" version="1" comment="libtss2-tcti-device0 is &lt;3.1.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734665" version="1" comment="libtss2-tctildr0 is &lt;3.1.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009734667" version="1" comment="tpm2-0-tss is &lt;3.1.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009691895" version="1" comment="libudisks2-0 is &lt;2.9.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697795" version="1" comment="libudisks2-0_btrfs is &lt;2.9.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009697797" version="1" comment="libudisks2-0_lvm2 is &lt;2.9.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009691898" version="1" comment="udisks2 is &lt;2.9.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887073" version="1" comment="libunwind is &lt;1.5.0-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009692273" version="1" comment="libvirglrenderer1 is &lt;0.9.1-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009165429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904963" version="1" comment="libvirt-client is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904964" version="1" comment="libvirt-daemon is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904965" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904966" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904967" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904968" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904969" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904970" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904971" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904972" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904973" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904974" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904975" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904976" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904977" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904978" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904979" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904980" version="1" comment="libvirt-daemon-qemu is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904981" version="1" comment="libvirt-libs is &lt;8.0.0-150400.7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904982" version="1" comment="libvmtools0 is &lt;12.1.0-150300.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904983" version="1" comment="open-vm-tools is &lt;12.1.0-150300.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894028" version="1" comment="libvorbis0 is &lt;1.3.6-150000.4.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894029" version="1" comment="libvorbisenc2 is &lt;1.3.6-150000.4.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887954" version="1" comment="libxkbcommon0 is &lt;1.3.0-150400.1.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904984" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904985" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904986" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742087" version="1" comment="libxslt1 is &lt;1.1.34-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706239" version="1" comment="libyajl2 is &lt;2.1.0-150000.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894036" version="1" comment="libyaml-cpp0_6 is &lt;0.6.3-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904987" version="1" comment="libz1 is &lt;1.2.11-150000.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904988" version="1" comment="zlib-devel is &lt;1.2.11-150000.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492790" version="1" comment="libzmq5 is &lt;4.2.3-3.15.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887964" version="1" comment="libzstd1 is &lt;1.5.0-150400.1.71 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887966" version="1" comment="zstd is &lt;1.5.0-150400.1.71 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904989" version="1" comment="libzypp is &lt;17.31.2-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904990" version="1" comment="login_defs is &lt;4.8.1-150400.1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904991" version="1" comment="shadow is &lt;4.8.1-150400.1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698915" version="1" comment="logrotate is &lt;3.18.1-150400.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894039" version="1" comment="mozilla-nspr is &lt;4.34.1-150000.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904992" version="1" comment="nfs-client is &lt;2.1.1-150100.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904993" version="1" comment="nfs-kernel-server is &lt;2.1.1-150100.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887977" version="1" comment="opensc is &lt;0.22.0-150400.1.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887097" version="1" comment="openslp is &lt;2.0.0-6.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904994" version="1" comment="openssh is &lt;8.4p1-150300.3.15.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904995" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.15.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904996" version="1" comment="openssh-common is &lt;8.4p1-150300.3.15.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904997" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.15.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904998" version="1" comment="openssh-server is &lt;8.4p1-150300.3.15.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887798" version="1" comment="openssl is &lt;1.1.1l-150400.1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894415" version="1" comment="pam is &lt;1.3.0-150000.6.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887981" version="1" comment="pam_u2f is &lt;1.2.0-150400.2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710215" version="1" comment="perl is &lt;5.26.1-150300.17.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009710216" version="1" comment="perl-base is &lt;5.26.1-150300.17.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887202" version="1" comment="perl-ExtUtils-MakeMaker is &lt;7.62-150400.1.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894555" version="1" comment="permissions is &lt;20201225-150400.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009730195" version="1" comment="podman is &lt;4.3.1-150400.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904999" version="1" comment="podman-cni-config is &lt;4.3.1-150400.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905000" version="1" comment="policycoreutils is &lt;3.4-150400.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905001" version="1" comment="policycoreutils-devel is &lt;3.4-150400.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905002" version="1" comment="policycoreutils-python-utils is &lt;3.4-150400.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905003" version="1" comment="python3-policycoreutils is &lt;3.4-150400.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905004" version="1" comment="powerpc-utils is &lt;1.3.10-150400.19.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905005" version="1" comment="ppp is &lt;2.4.7-150000.5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882450" version="1" comment="procmail is &lt;3.22-2.34 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887995" version="1" comment="python3-Babel is &lt;2.8.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882454" version="1" comment="python3-Jinja2 is &lt;2.10.1-3.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704357" version="1" comment="python3-M2Crypto is &lt;0.38.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882455" version="1" comment="python3-PyYAML is &lt;5.4.1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894054" version="1" comment="python3-certifi is &lt;2018.1.18-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009699740" version="1" comment="python3-cryptography is &lt;3.3.2-150400.16.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894055" version="1" comment="python3-future is &lt;0.18.2-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707544" version="1" comment="python3-lxml is &lt;4.7.1-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894059" version="1" comment="python3-py is &lt;1.10.0-150100.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882466" version="1" comment="python3-requests is &lt;2.24.0-1.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894060" version="1" comment="python3-rsa is &lt;3.4.2-150000.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905006" version="1" comment="python3-salt is &lt;3004-150400.8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905007" version="1" comment="salt is &lt;3004-150400.8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905008" version="1" comment="salt-minion is &lt;3004-150400.8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905009" version="1" comment="salt-transactional-update is &lt;3004-150400.8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905010" version="1" comment="python3-setuptools is &lt;44.1.1-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009888020" version="1" comment="python3-urllib3 is &lt;1.25.10-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717082" version="1" comment="qemu is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905011" version="1" comment="qemu-SLOF is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717438" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717439" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717443" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717447" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717095" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717449" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717450" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717452" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717454" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905012" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717459" version="1" comment="qemu-ppc is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717460" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905013" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905014" version="1" comment="qemu-sgabios is &lt;8-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717081" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717463" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717465" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905015" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717467" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905016" version="1" comment="qemu-ovmf-x86_64 is &lt;202202-150400.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905017" version="1" comment="qemu-uefi-aarch64 is &lt;202202-150400.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887076" version="1" comment="rpcbind is &lt;0.2.3-5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905018" version="1" comment="rpm is &lt;4.14.3-150300.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894386" version="1" comment="rsync is &lt;3.2.3-150400.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905019" version="1" comment="runc is &lt;1.1.4-150000.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732650" version="1" comment="samba-client-libs is &lt;4.15.13+git.591.ab36624310c-150400.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732658" version="1" comment="samba-libs is &lt;4.15.13+git.591.ab36624310c-150400.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009893364" version="1" comment="shim is &lt;15.4-4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672521" version="1" comment="slirp4netns is &lt;0.4.7-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882489" version="1" comment="socat is &lt;1.7.3.2-4.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813337" version="1" comment="squashfs is &lt;4.4-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009733681" version="1" comment="sudo is &lt;1.9.9-150400.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894536" version="1" comment="supportutils is &lt;3.1.21-150300.7.35.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669983" version="1" comment="swtpm is &lt;0.5.3-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904720" version="1" comment="sysstat is &lt;12.0.2-3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009739928" version="1" comment="tar is &lt;1.34-150000.3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009888041" version="1" comment="tpm2.0-tools is &lt;5.2-150400.4.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887915" version="1" comment="trousers is &lt;0.3.15-150400.1.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894085" version="1" comment="u-boot-rpiarm64 is &lt;2021.10-150400.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009894507" version="1" comment="ucode-intel is &lt;20230214-150200.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009214821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009723003" version="1" comment="update-alternatives is &lt;1.19.0.4-150000.4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905020" version="1" comment="vim-data-common is &lt;9.0.1234-150000.5.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009735254" version="1" comment="vim-small is &lt;9.0.1234-150000.5.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904846" version="1" comment="virt-install is &lt;4.0.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904847" version="1" comment="virt-manager-common is &lt;4.0.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905021" version="1" comment="wicked is &lt;0.6.70-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905022" version="1" comment="wicked-service is &lt;0.6.70-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904848" version="1" comment="wpa_supplicant is &lt;2.9-150000.4.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905023" version="1" comment="xen-libs is &lt;4.16.3_02-150400.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905024" version="1" comment="zypper is &lt;1.14.57-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009905025" version="1" comment="zypper-needs-restarting is &lt;1.14.57-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750864" version="1" comment="librados2 is &lt;16.2.11.58+g38d6afd3b78-150400.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750865" version="1" comment="librbd1 is &lt;16.2.11.58+g38d6afd3b78-150400.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750746" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750866" version="1" comment="sudo is &lt;1.9.9-150400.4.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742931" version="1" comment="libmicrohttpd12 is &lt;0.9.57-150000.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009748401" version="1" comment="libzstd1 is &lt;1.5.0-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009748402" version="1" comment="zstd is &lt;1.5.0-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752074" version="1" comment="libldb2 is &lt;2.4.4-150400.4.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752075" version="1" comment="samba-client-libs is &lt;4.15.13+git.636.53d93c5b9d6-150400.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752076" version="1" comment="samba-libs is &lt;4.15.13+git.636.53d93c5b9d6-150400.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009748298" version="1" comment="shim is &lt;15.7-150300.4.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751439" version="1" comment="kernel-default is &lt;5.14.21-150400.24.55.3 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751440" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.55.3.150400.24.22.7 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743773" version="1" comment="glibc is &lt;2.31-150300.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743774" version="1" comment="glibc-devel is &lt;2.31-150300.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743775" version="1" comment="glibc-locale is &lt;2.31-150300.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743776" version="1" comment="glibc-locale-base is &lt;2.31-150300.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751441" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.31.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751442" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.31.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751443" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.31.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751444" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.31.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747156" version="1" comment="conmon is &lt;2.1.5-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752891" version="1" comment="podman is &lt;4.4.4-150400.4.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752640" version="1" comment="podman-cni-config is &lt;4.4.4-150400.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752239" version="1" comment="containerd is &lt;1.6.19-150000.87.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753479" version="1" comment="libharfbuzz-gobject0 is &lt;3.4.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753480" version="1" comment="libharfbuzz0 is &lt;3.4.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753481" version="1" comment="typelib-1_0-HarfBuzz-0_0 is &lt;3.4.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754594" version="1" comment="libwayland-client0 is &lt;1.19.0-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754595" version="1" comment="libwayland-cursor0 is &lt;1.19.0-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754596" version="1" comment="libwayland-egl1 is &lt;99~1.19.0-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754597" version="1" comment="libwayland-server0 is &lt;1.19.0-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754598" version="1" comment="kernel-default is &lt;5.14.21-150400.24.60.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754599" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.60.1.150400.24.24.3 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753143" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753144" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753145" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009753146" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754847" version="1" comment="dmidecode is &lt;3.4-150400.16.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754997" version="1" comment="containerized-data-importer-manifests is &lt;1.51.0-150400.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754984" version="1" comment="kubevirt-manifests is &lt;0.54.0-150400.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754991" version="1" comment="kubevirt-virtctl is &lt;0.54.0-150400.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754840" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.23.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754600" version="1" comment="avahi is &lt;0.8-150400.7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754601" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754602" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754603" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752885" version="1" comment="runc is &lt;1.1.5-150000.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009754982" version="1" comment="openssl-ibmca is &lt;2.4.0-150400.4.8.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755867" version="1" comment="libtpms0 is &lt;0.8.2-150300.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755320" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755321" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755322" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755558" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755559" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755560" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755561" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755562" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755871" version="1" comment="tftpboot-installation-SLE-Micro-5.4-aarch64 is &lt;16.57.26-150400.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755872" version="1" comment="tftpboot-installation-SLE-Micro-5.4-s390x is &lt;16.57.26-150400.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755873" version="1" comment="tftpboot-installation-SLE-Micro-5.4-x86_64 is &lt;16.57.26-150400.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755034" version="1" comment="shim is &lt;15.7-150300.4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755947" version="1" comment="vim-data-common is &lt;9.0.1443-150000.5.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756061" version="1" comment="vim-small is &lt;9.0.1443-150000.5.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756062" version="1" comment="xxd is &lt;9.0.1443-150000.5.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756063" version="1" comment="libncurses6 is &lt;6.1-150000.5.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756064" version="1" comment="ncurses-utils is &lt;6.1-150000.5.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756065" version="1" comment="terminfo is &lt;6.1-150000.5.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756066" version="1" comment="terminfo-base is &lt;6.1-150000.5.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756804" version="1" comment="ignition is &lt;2.15.0-150400.4.2.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756805" version="1" comment="ignition-dracut-grub2 is &lt;2.15.0-150400.4.2.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756419" version="1" comment="kernel-default is &lt;5.14.21-150400.24.63.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756420" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.63.1.150400.24.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756803" version="1" comment="conmon is &lt;2.1.5-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760493" version="1" comment="curl is &lt;8.0.1-150400.5.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760494" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756827" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.28.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757403" version="1" comment="qemu-ovmf-x86_64 is &lt;202202-150400.5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757406" version="1" comment="qemu-uefi-aarch64 is &lt;202202-150400.5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758961" version="1" comment="ucode-intel is &lt;20230512-150200.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757025" version="1" comment="containerd is &lt;1.6.19-150000.90.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756802" version="1" comment="runc is &lt;1.1.5-150000.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009762600" version="1" comment="libcares2 is &lt;1.19.1-150000.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757027" version="1" comment="cni-plugins is &lt;0.8.6-150100.3.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757026" version="1" comment="cni is &lt;0.7.1-150100.3.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763482" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763997" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763998" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763999" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764000" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764295" version="1" comment="cups-config is &lt;2.2.7-150000.3.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764296" version="1" comment="libcups2 is &lt;2.2.7-150000.3.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764001" version="1" comment="libvirt-client is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764002" version="1" comment="libvirt-daemon is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764003" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764004" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764005" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764006" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764007" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764008" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764009" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764010" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764011" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764012" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764013" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764014" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764015" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763777" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-150400.7.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764016" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764017" version="1" comment="libvirt-daemon-qemu is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764018" version="1" comment="libvirt-libs is &lt;8.0.0-150400.7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763996" version="1" comment="libldap-2_4-2 is &lt;2.4.46-150200.14.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763721" version="1" comment="libldap-data is &lt;2.4.46-150200.14.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764912" version="1" comment="opensc is &lt;0.22.0-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764905" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764906" version="1" comment="python3 is &lt;3.6.15-150300.10.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764907" version="1" comment="python3-base is &lt;3.6.15-150300.10.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767684" version="1" comment="python3-jmespath is &lt;0.9.3-150000.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767685" version="1" comment="python3-ply is &lt;3.10-150000.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768089" version="1" comment="python3-salt is &lt;3006.0-150400.8.34.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768086" version="1" comment="python3-simplejson is &lt;3.17.2-150300.3.2.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768090" version="1" comment="salt is &lt;3006.0-150400.8.34.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768091" version="1" comment="salt-minion is &lt;3006.0-150400.8.34.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768092" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.34.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768080" version="1" comment="python3-pyzmq is &lt;17.1.2-150000.3.5.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767211" version="1" comment="libvmtools0 is &lt;12.2.0-150300.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767212" version="1" comment="open-vm-tools is &lt;12.2.0-150300.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767001" version="1" comment="libbluetooth3 is &lt;5.62-150400.4.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768087" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767704" version="1" comment="libX11-data is &lt;1.6.5-150000.3.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768088" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769278" version="1" comment="cups-config is &lt;2.2.7-150000.3.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769279" version="1" comment="libcups2 is &lt;2.2.7-150000.3.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764656" version="1" comment="vim-data-common is &lt;9.0.1572-150000.5.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764903" version="1" comment="vim-small is &lt;9.0.1572-150000.5.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768420" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768421" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768422" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768423" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766878" version="1" comment="kernel-default is &lt;5.14.21-150400.24.66.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766879" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.66.1.150400.24.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770177" version="1" comment="libcap2 is &lt;2.63-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770398" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.37.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771322" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771273" version="1" comment="kernel-default is &lt;5.14.21-150400.24.69.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771274" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.69.1.150400.24.31.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767761" version="1" comment="python3-requests is &lt;2.24.0-150300.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768419" version="1" comment="cni is &lt;0.7.1-150100.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768859" version="1" comment="cni-plugins is &lt;0.8.6-150100.3.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769280" version="1" comment="dbus-1 is &lt;1.12.2-150400.18.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769281" version="1" comment="dbus-1-x11 is &lt;1.12.2-150400.18.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769282" version="1" comment="libdbus-1-3 is &lt;1.12.2-150400.18.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771462" version="1" comment="perl is &lt;5.26.1-150300.17.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771463" version="1" comment="perl-base is &lt;5.26.1-150300.17.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772448" version="1" comment="curl is &lt;8.0.1-150400.5.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772449" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772450" version="1" comment="samba-client-libs is &lt;4.15.13+git.663.9c654e06cdb-150400.3.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772451" version="1" comment="samba-libs is &lt;4.15.13+git.663.9c654e06cdb-150400.3.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773627" version="1" comment="openssh is &lt;8.4p1-150300.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773628" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773629" version="1" comment="openssh-common is &lt;8.4p1-150300.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773630" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773631" version="1" comment="openssh-server is &lt;8.4p1-150300.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772748" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772749" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772750" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772751" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772149" version="1" comment="conmon is &lt;2.1.7-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773744" version="1" comment="containerized-data-importer-manifests is &lt;1.51.0-150400.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774221" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.52.10-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774222" version="1" comment="librsvg-2-2 is &lt;2.52.10-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774833" version="1" comment="kernel-firmware-all is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774834" version="1" comment="kernel-firmware-amdgpu is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774835" version="1" comment="kernel-firmware-ath10k is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774836" version="1" comment="kernel-firmware-ath11k is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774837" version="1" comment="kernel-firmware-atheros is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774838" version="1" comment="kernel-firmware-bluetooth is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774839" version="1" comment="kernel-firmware-bnx2 is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774840" version="1" comment="kernel-firmware-brcm is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774841" version="1" comment="kernel-firmware-chelsio is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774842" version="1" comment="kernel-firmware-dpaa2 is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774843" version="1" comment="kernel-firmware-i915 is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774844" version="1" comment="kernel-firmware-intel is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774845" version="1" comment="kernel-firmware-iwlwifi is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774846" version="1" comment="kernel-firmware-liquidio is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774847" version="1" comment="kernel-firmware-marvell is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774848" version="1" comment="kernel-firmware-media is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774849" version="1" comment="kernel-firmware-mediatek is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774850" version="1" comment="kernel-firmware-mellanox is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774851" version="1" comment="kernel-firmware-mwifiex is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774852" version="1" comment="kernel-firmware-network is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774853" version="1" comment="kernel-firmware-nfp is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774854" version="1" comment="kernel-firmware-nvidia is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774855" version="1" comment="kernel-firmware-platform is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774856" version="1" comment="kernel-firmware-prestera is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774857" version="1" comment="kernel-firmware-qcom is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774858" version="1" comment="kernel-firmware-qlogic is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774859" version="1" comment="kernel-firmware-radeon is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774860" version="1" comment="kernel-firmware-realtek is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774861" version="1" comment="kernel-firmware-serial is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774862" version="1" comment="kernel-firmware-sound is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774863" version="1" comment="kernel-firmware-ti is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774864" version="1" comment="kernel-firmware-ueagle is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774865" version="1" comment="kernel-firmware-usb-network is &lt;20220509-150400.4.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774866" version="1" comment="ucode-amd is &lt;20220509-150400.4.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773730" version="1" comment="kubevirt-manifests is &lt;0.54.0-150400.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773737" version="1" comment="kubevirt-virtctl is &lt;0.54.0-150400.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774213" version="1" comment="python3-tornado is &lt;4.5.3-150000.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774216" version="1" comment="python3-salt is &lt;3006.0-150400.8.37.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774217" version="1" comment="salt is &lt;3006.0-150400.8.37.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774218" version="1" comment="salt-minion is &lt;3006.0-150400.8.37.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774219" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.37.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776011" version="1" comment="kernel-default is &lt;5.14.21-150400.24.74.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776012" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.74.1.150400.24.33.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776897" version="1" comment="gstreamer-plugins-base is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776898" version="1" comment="libgstallocators-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776899" version="1" comment="libgstapp-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776900" version="1" comment="libgstaudio-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776901" version="1" comment="libgstgl-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776902" version="1" comment="libgstpbutils-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776903" version="1" comment="libgstriff-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776904" version="1" comment="libgsttag-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776905" version="1" comment="libgstvideo-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777401" version="1" comment="qemu is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777182" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777183" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.20.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777402" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777403" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777404" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777405" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777406" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777407" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777408" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777056" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777195" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.20.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777064" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777065" version="1" comment="qemu-sgabios is &lt;8-150400.37.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777409" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777410" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777411" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777073" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777200" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777400" version="1" comment="libbluetooth3 is &lt;5.62-150400.4.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778396" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771735" version="1" comment="libyajl2 is &lt;2.1.0-150000.4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778394" version="1" comment="kernel-default is &lt;5.14.21-150400.24.81.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778395" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.81.1.150400.24.35.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778154" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.46.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774220" version="1" comment="libpcre2-8-0 is &lt;10.39-150400.4.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777869" version="1" comment="kernel-firmware-all is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777870" version="1" comment="kernel-firmware-amdgpu is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777871" version="1" comment="kernel-firmware-ath10k is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777872" version="1" comment="kernel-firmware-ath11k is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777873" version="1" comment="kernel-firmware-atheros is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777874" version="1" comment="kernel-firmware-bluetooth is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777875" version="1" comment="kernel-firmware-bnx2 is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777876" version="1" comment="kernel-firmware-brcm is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777877" version="1" comment="kernel-firmware-chelsio is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777878" version="1" comment="kernel-firmware-dpaa2 is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777879" version="1" comment="kernel-firmware-i915 is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777880" version="1" comment="kernel-firmware-intel is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777881" version="1" comment="kernel-firmware-iwlwifi is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777882" version="1" comment="kernel-firmware-liquidio is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777883" version="1" comment="kernel-firmware-marvell is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777884" version="1" comment="kernel-firmware-media is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777885" version="1" comment="kernel-firmware-mediatek is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777886" version="1" comment="kernel-firmware-mellanox is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777887" version="1" comment="kernel-firmware-mwifiex is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777888" version="1" comment="kernel-firmware-network is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777889" version="1" comment="kernel-firmware-nfp is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777890" version="1" comment="kernel-firmware-nvidia is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777891" version="1" comment="kernel-firmware-platform is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777892" version="1" comment="kernel-firmware-prestera is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777893" version="1" comment="kernel-firmware-qcom is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777894" version="1" comment="kernel-firmware-qlogic is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777895" version="1" comment="kernel-firmware-radeon is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777896" version="1" comment="kernel-firmware-realtek is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777897" version="1" comment="kernel-firmware-serial is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777898" version="1" comment="kernel-firmware-sound is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777899" version="1" comment="kernel-firmware-ti is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777900" version="1" comment="kernel-firmware-ueagle is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777901" version="1" comment="kernel-firmware-usb-network is &lt;20220509-150400.4.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777902" version="1" comment="ucode-amd is &lt;20220509-150400.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777843" version="1" comment="krb5 is &lt;1.19.2-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771765" version="1" comment="python3-configobj is &lt;5.0.6-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778161" version="1" comment="ucode-intel is &lt;20230808-150200.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778685" version="1" comment="xen-libs is &lt;4.16.5_02-150400.4.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777839" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777840" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777841" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777842" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780429" version="1" comment="libxmlsec1-1 is &lt;1.2.37-150400.14.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780433" version="1" comment="libxmlsec1-openssl1 is &lt;1.2.37-150400.14.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777837" version="1" comment="gawk is &lt;4.2.1-150000.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778601" version="1" comment="ca-certificates-mozilla is &lt;2.62-150200.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779699" version="1" comment="libfreetype6 is &lt;2.10.4-150000.4.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779189" version="1" comment="haproxy is &lt;2.4.22+git0.f8e3218e2-150400.3.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778866" version="1" comment="libprocps7 is &lt;3.3.15-150000.7.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778867" version="1" comment="procps is &lt;3.3.15-150000.7.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781037" version="1" comment="libvmtools0 is &lt;12.2.0-150300.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781038" version="1" comment="open-vm-tools is &lt;12.2.0-150300.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781414" version="1" comment="docker is &lt;24.0.5_ce-150000.185.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780690" version="1" comment="libssh2-1 is &lt;1.9.0-150000.4.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781398" version="1" comment="libicu73_2 is &lt;73.2-150000.1.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781386" version="1" comment="libicu73_2-bedata is &lt;73.2-150000.1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781389" version="1" comment="libicu73_2-ledata is &lt;73.2-150000.1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791547" version="1" comment="login_defs is &lt;4.8.1-150400.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009186988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791548" version="1" comment="shadow is &lt;4.8.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009186989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796564" version="1" comment="libgcc_s1 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796565" version="1" comment="libstdc++6 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782053" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782054" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782055" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797298" version="1" comment="cups-config is &lt;2.2.7-150000.3.51.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797299" version="1" comment="libcups2 is &lt;2.2.7-150000.3.51.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780980" version="1" comment="cni is &lt;0.7.1-150100.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780981" version="1" comment="cni-plugins is &lt;0.8.6-150100.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781300" version="1" comment="containerd is &lt;1.6.21-150000.95.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781703" version="1" comment="supportutils is &lt;3.1.26-150300.7.35.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797300" version="1" comment="curl is &lt;8.0.1-150400.5.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797301" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794920" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.51.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794921" version="1" comment="python3 is &lt;3.6.15-150300.10.51.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794922" version="1" comment="python3-base is &lt;3.6.15-150300.10.51.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796977" version="1" comment="xen-libs is &lt;4.16.5_04-150400.4.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797898" version="1" comment="libvmtools0 is &lt;12.3.0-150300.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797899" version="1" comment="open-vm-tools is &lt;12.3.0-150300.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797702" version="1" comment="python3-salt is &lt;3006.0-150400.8.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797703" version="1" comment="salt is &lt;3006.0-150400.8.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797704" version="1" comment="salt-minion is &lt;3006.0-150400.8.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797705" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781397" version="1" comment="runc is &lt;1.1.8-150000.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782049" version="1" comment="mdadm is &lt;4.1-150300.24.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791545" version="1" comment="libeconf0 is &lt;0.5.2-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009186986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796768" version="1" comment="vim-data-common is &lt;9.0.1894-150000.5.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797297" version="1" comment="vim-small is &lt;9.0.1894-150000.5.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799872" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799824" version="1" comment="libX11-data is &lt;1.6.5-150000.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799873" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798885" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798105" version="1" comment="kernel-default is &lt;5.14.21-150400.24.88.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798106" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.88.1.150400.24.40.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798971" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800353" version="1" comment="conmon is &lt;2.1.7-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801459" version="1" comment="curl is &lt;8.0.1-150400.5.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801460" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801299" version="1" comment="xen-libs is &lt;4.16.5_06-150400.4.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800600" version="1" comment="qemu is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800547" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800548" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.23.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800601" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800602" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800603" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800604" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800605" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800606" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800607" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800518" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800560" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.23.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800526" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800527" version="1" comment="qemu-sgabios is &lt;8-150400.37.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800608" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800609" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800610" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800535" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800565" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801461" version="1" comment="samba-client-libs is &lt;4.15.13+git.691.3d3cea0641-150400.3.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801462" version="1" comment="samba-libs is &lt;4.15.13+git.691.3d3cea0641-150400.3.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800972" version="1" comment="kernel-default is &lt;5.14.21-150400.24.92.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800973" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.92.1.150400.24.42.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801458" version="1" comment="opensc is &lt;0.22.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800648" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.56.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800538" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800217" version="1" comment="glibc is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800218" version="1" comment="glibc-devel is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800219" version="1" comment="glibc-locale is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800220" version="1" comment="glibc-locale-base is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801450" version="1" comment="cni is &lt;0.7.1-150100.3.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801451" version="1" comment="cni-plugins is &lt;0.8.6-150100.3.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802309" version="1" comment="suse-module-tools is &lt;15.4.18-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801457" version="1" comment="grub2 is &lt;2.06-150400.11.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801065" version="1" comment="grub2-arm64-efi is &lt;2.06-150400.11.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801070" version="1" comment="grub2-i386-pc is &lt;2.06-150400.11.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801077" version="1" comment="grub2-s390x-emu is &lt;2.06-150400.11.38.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801080" version="1" comment="grub2-snapper-plugin is &lt;2.06-150400.11.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801082" version="1" comment="grub2-x86_64-efi is &lt;2.06-150400.11.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801085" version="1" comment="grub2-x86_64-xen is &lt;2.06-150400.11.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801901" version="1" comment="libgcc_s1 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801902" version="1" comment="libstdc++6 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803274" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803273" version="1" comment="libssh2-1 is &lt;1.11.0-150000.4.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802970" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802971" version="1" comment="libz1 is &lt;1.2.11-150000.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802972" version="1" comment="zlib-devel is &lt;1.2.11-150000.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802976" version="1" comment="libzck1 is &lt;1.1.16-150400.3.7.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803782" version="1" comment="libvmtools0 is &lt;12.3.0-150300.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803783" version="1" comment="open-vm-tools is &lt;12.3.0-150300.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808417" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804076" version="1" comment="kubevirt-manifests is &lt;0.54.0-150400.3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804083" version="1" comment="kubevirt-virtctl is &lt;0.54.0-150400.3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808033" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808713" version="1" comment="kernel-default is &lt;5.14.21-150400.24.97.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808714" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.97.1.150400.24.44.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809295" version="1" comment="python3-salt is &lt;3006.0-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809296" version="1" comment="salt is &lt;3006.0-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809297" version="1" comment="salt-minion is &lt;3006.0-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809298" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809291" version="1" comment="python3-simplejson is &lt;3.17.2-150300.3.4.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809868" version="1" comment="containerized-data-importer-manifests is &lt;1.51.0-150400.4.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808381" version="1" comment="kernel-firmware-nvidia-gspx-G06 is &lt;535.129.03-150400.9.12.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808387" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;535.129.03_k5.14.21_150400.24.92-150400.9.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810296" version="1" comment="ucode-intel is &lt;20231113-150200.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803402" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810588" version="1" comment="xen-libs is &lt;4.16.5_08-150400.4.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810835" version="1" comment="ucode-intel is &lt;20231114-150200.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810251" version="1" comment="avahi is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810252" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810253" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810254" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810448" version="1" comment="python3-setuptools is &lt;44.1.1-150400.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810699" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810700" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810701" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810702" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810408" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810409" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810410" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811883" version="1" comment="fdo-client is &lt;1.0.0+git20210816.baa09b5-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811884" version="1" comment="fdo-client-devel is &lt;1.0.0+git20210816.baa09b5-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812201" version="1" comment="vim-data-common is &lt;9.0.2103-150000.5.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812851" version="1" comment="vim-small is &lt;9.0.2103-150000.5.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803949" version="1" comment="squashfs is &lt;4.6.1-150300.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813076" version="1" comment="libsqlite3-0 is &lt;3.44.0-150000.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813077" version="1" comment="sqlite3-tcl is &lt;3.44.0-150000.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813366" version="1" comment="traceroute is &lt;2.0.21-150000.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814269" version="1" comment="haproxy is &lt;2.4.22+git0.f8e3218e2-150400.3.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813365" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815364" version="1" comment="curl is &lt;8.0.1-150400.5.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815365" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815105" version="1" comment="kernel-firmware-all is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815106" version="1" comment="kernel-firmware-amdgpu is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815107" version="1" comment="kernel-firmware-ath10k is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815108" version="1" comment="kernel-firmware-ath11k is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815109" version="1" comment="kernel-firmware-atheros is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815110" version="1" comment="kernel-firmware-bluetooth is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815111" version="1" comment="kernel-firmware-bnx2 is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815112" version="1" comment="kernel-firmware-brcm is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815113" version="1" comment="kernel-firmware-chelsio is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815114" version="1" comment="kernel-firmware-dpaa2 is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815115" version="1" comment="kernel-firmware-i915 is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815116" version="1" comment="kernel-firmware-intel is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815117" version="1" comment="kernel-firmware-iwlwifi is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815118" version="1" comment="kernel-firmware-liquidio is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815119" version="1" comment="kernel-firmware-marvell is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815120" version="1" comment="kernel-firmware-media is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815121" version="1" comment="kernel-firmware-mediatek is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815122" version="1" comment="kernel-firmware-mellanox is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815123" version="1" comment="kernel-firmware-mwifiex is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815124" version="1" comment="kernel-firmware-network is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815125" version="1" comment="kernel-firmware-nfp is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815126" version="1" comment="kernel-firmware-nvidia is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815127" version="1" comment="kernel-firmware-platform is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815128" version="1" comment="kernel-firmware-prestera is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815129" version="1" comment="kernel-firmware-qcom is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815130" version="1" comment="kernel-firmware-qlogic is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815131" version="1" comment="kernel-firmware-radeon is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815132" version="1" comment="kernel-firmware-realtek is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815133" version="1" comment="kernel-firmware-serial is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815134" version="1" comment="kernel-firmware-sound is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815135" version="1" comment="kernel-firmware-ti is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815136" version="1" comment="kernel-firmware-ueagle is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815137" version="1" comment="kernel-firmware-usb-network is &lt;20220509-150400.4.25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815138" version="1" comment="ucode-amd is &lt;20220509-150400.4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813335" version="1" comment="suse-build-key is &lt;12.0-150000.8.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813780" version="1" comment="containerized-data-importer-manifests is &lt;1.51.0-150400.4.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813767" version="1" comment="kubevirt-manifests is &lt;0.54.0-150400.3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813774" version="1" comment="kubevirt-virtctl is &lt;0.54.0-150400.3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813859" version="1" comment="containerd is &lt;1.7.8-150000.103.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813861" version="1" comment="runc is &lt;1.1.10-150000.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815382" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815362" version="1" comment="kernel-default is &lt;5.14.21-150400.24.100.2 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815363" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.100.2.150400.24.46.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813863" version="1" comment="python3-cryptography is &lt;3.3.2-150400.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815623" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.35.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816335" version="1" comment="libncurses6 is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816336" version="1" comment="ncurses-utils is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816337" version="1" comment="terminfo is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816338" version="1" comment="terminfo-base is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814965" version="1" comment="avahi is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814966" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814967" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814968" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817184" version="1" comment="openssh is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817185" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817186" version="1" comment="openssh-common is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817187" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817188" version="1" comment="openssh-server is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816011" version="1" comment="docker is &lt;24.0.7_ce-150000.190.4 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817822" version="1" comment="ppp is &lt;2.4.7-150000.5.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817821" version="1" comment="libjbig2 is &lt;2.1-150000.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814270" version="1" comment="gnutls is &lt;3.7.3-150400.4.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814271" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814272" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743224" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743063" version="1" comment="libX11-data is &lt;1.6.5-150000.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743225" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009740809" version="1" comment="python3-cryptography is &lt;3.3.2-150400.16.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743831" version="1" comment="vim-data-common is &lt;9.0.1386-150000.5.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744036" version="1" comment="vim-small is &lt;9.0.1386-150000.5.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744035" version="1" comment="docker is &lt;20.10.23_ce-150000.175.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747893" version="1" comment="xen-libs is &lt;4.16.3_06-150400.4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747153" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.45.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747154" version="1" comment="python3 is &lt;3.6.15-150300.10.45.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009747155" version="1" comment="python3-base is &lt;3.6.15-150300.10.45.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744477" version="1" comment="qemu is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744319" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744320" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.14.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744478" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744479" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744480" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744481" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744482" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744483" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744484" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744194" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744332" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.14.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744203" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744204" version="1" comment="qemu-sgabios is &lt;8-150400.37.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744485" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744486" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744487" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744213" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009744337" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815621" version="1" comment="libpolkit0 is &lt;0.116-150200.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815622" version="1" comment="polkit is &lt;0.116-150200.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852271" version="1" comment="krb5 is &lt;1.19.2-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852272" version="1" comment="avahi is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852273" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852274" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852275" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852540" version="1" comment="podman is &lt;4.4.4-150400.4.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852433" version="1" comment="podman-cni-config is &lt;4.4.4-150400.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853062" version="1" comment="libvirt-client is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853063" version="1" comment="libvirt-daemon is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853064" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853065" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853066" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853067" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853068" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853069" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853070" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853071" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853072" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853073" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853074" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853075" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853076" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852838" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-150400.7.11.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853077" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853078" version="1" comment="libvirt-daemon-qemu is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853079" version="1" comment="libvirt-libs is &lt;8.0.0-150400.7.11.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853080" version="1" comment="xen-libs is &lt;4.16.5_14-150400.4.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853566" version="1" comment="libexpat1 is &lt;2.4.4-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853557" version="1" comment="libncurses6 is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853558" version="1" comment="ncurses-utils is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853559" version="1" comment="terminfo is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853560" version="1" comment="terminfo-base is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853561" version="1" comment="libcares2 is &lt;1.19.1-150000.3.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853332" version="1" comment="ucode-intel is &lt;20240312-150200.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853562" version="1" comment="cni is &lt;0.7.1-150100.3.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853563" version="1" comment="cni-plugins is &lt;0.8.6-150100.3.22.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853567" version="1" comment="curl is &lt;8.0.1-150400.5.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853568" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853565" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853981" version="1" comment="libblkid1 is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853982" version="1" comment="libfdisk1 is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853983" version="1" comment="libmount1 is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853984" version="1" comment="libsmartcols1 is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853985" version="1" comment="libuuid1 is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853986" version="1" comment="util-linux is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853987" version="1" comment="util-linux-systemd is &lt;2.37.2-150400.8.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854018" version="1" comment="less is &lt;590-150400.3.6.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854660" version="1" comment="xen-libs is &lt;4.16.6_02-150400.4.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854661" version="1" comment="gnutls is &lt;3.7.3-150400.4.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854662" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854663" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819466" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855248" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855249" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.76.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855250" version="1" comment="kernel-default is &lt;5.14.21-150400.24.116.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855166" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.116.1.150400.24.54.5 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819897" version="1" comment="pam is &lt;1.3.0-150000.6.66.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855732" version="1" comment="shim is &lt;15.8-150300.4.20.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855836" version="1" comment="glibc is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855837" version="1" comment="glibc-devel is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855838" version="1" comment="glibc-locale is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855839" version="1" comment="glibc-locale-base is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856046" version="1" comment="qemu is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855895" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855896" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.29.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856047" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856048" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856049" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856050" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856051" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856052" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856053" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855913" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855948" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.29.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855917" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855918" version="1" comment="qemu-sgabios is &lt;8-150400.37.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856054" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856055" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856056" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855925" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855926" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819387" version="1" comment="libssh-config is &lt;0.9.8-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819388" version="1" comment="libssh4 is &lt;0.9.8-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856057" version="1" comment="opensc is &lt;0.22.0-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857606" version="1" comment="cockpit-wicked is &lt;4.5-150400.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857793" version="1" comment="python3-idna is &lt;2.6-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859567" version="1" comment="python3-rpm is &lt;4.14.3-150400.59.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859568" version="1" comment="rpm is &lt;4.14.3-150400.59.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859569" version="1" comment="rpm-ndb is &lt;4.14.3-150400.59.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819464" version="1" comment="kernel-default is &lt;5.14.21-150400.24.103.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819417" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.103.1.150400.24.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859893" version="1" comment="libsss_certmap0 is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859894" version="1" comment="libsss_idmap0 is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859895" version="1" comment="libsss_nss_idmap0 is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859896" version="1" comment="sssd is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859897" version="1" comment="sssd-common is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859898" version="1" comment="sssd-krb5-common is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859899" version="1" comment="sssd-ldap is &lt;2.5.2-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860372" version="1" comment="less is &lt;590-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861073" version="1" comment="libtss2-esys0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861074" version="1" comment="libtss2-fapi1 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861075" version="1" comment="libtss2-mu0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861076" version="1" comment="libtss2-rc0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861077" version="1" comment="libtss2-sys1 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861078" version="1" comment="libtss2-tcti-device0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861079" version="1" comment="libtss2-tctildr0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861080" version="1" comment="tpm2-0-tss is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861081" version="1" comment="tpm2.0-tools is &lt;5.2-150400.6.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861082" version="1" comment="libprotobuf-lite25_1_0 is &lt;25.1-150400.9.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861083" version="1" comment="kernel-default is &lt;5.14.21-150400.24.119.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860903" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.119.1.150400.24.56.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861084" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861085" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861736" version="1" comment="libcairo-gobject2 is &lt;1.16.0-150400.11.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861737" version="1" comment="libcairo2 is &lt;1.16.0-150400.11.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861948" version="1" comment="perl is &lt;5.26.1-150300.17.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861949" version="1" comment="perl-base is &lt;5.26.1-150300.17.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862123" version="1" comment="ucode-intel is &lt;20240514-150200.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863159" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863160" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863161" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863162" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863163" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863244" version="1" comment="python3-Jinja2 is &lt;2.10.1-150000.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863423" version="1" comment="python3-requests is &lt;2.25.1-150300.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864024" version="1" comment="glibc is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864025" version="1" comment="glibc-devel is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864026" version="1" comment="glibc-locale is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864027" version="1" comment="glibc-locale-base is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864028" version="1" comment="gstreamer-plugins-base is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864029" version="1" comment="libgstallocators-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864030" version="1" comment="libgstapp-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864031" version="1" comment="libgstaudio-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864032" version="1" comment="libgstgl-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864033" version="1" comment="libgstpbutils-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864034" version="1" comment="libgstriff-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864035" version="1" comment="libgsttag-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864036" version="1" comment="libgstvideo-1_0-0 is &lt;1.20.1-150400.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865157" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865158" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.66.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865159" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.66.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865160" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.66.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865161" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.66.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865705" version="1" comment="cups-config is &lt;2.2.7-150000.3.59.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865706" version="1" comment="libcups2 is &lt;2.2.7-150000.3.59.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865655" version="1" comment="kernel-firmware-nvidia-gspx-G06 is &lt;550.90.07-150400.9.33.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865659" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;550.90.07_k5.14.21_150400.24.119-150400.9.62.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865707" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.82.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865708" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.82.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865820" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844431" version="1" comment="libbluetooth3 is &lt;5.62-150400.4.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868392" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-150400.5.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868393" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-150400.5.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868394" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-150400.5.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868395" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868396" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868397" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868398" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868399" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868400" version="1" comment="podman is &lt;4.9.5-150400.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868463" version="1" comment="containerd is &lt;1.7.17-150000.111.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868679" version="1" comment="libarchive13 is &lt;3.5.1-150400.3.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869879" version="1" comment="kernel-default is &lt;5.14.21-150400.24.122.2 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869533" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.122.2.150400.24.58.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871285" version="1" comment="podman is &lt;4.9.5-150400.4.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878199" version="1" comment="podman-remote is &lt;4.9.5-150400.4.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871286" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871287" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871288" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871289" version="1" comment="libndp0 is &lt;1.6-150000.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871749" version="1" comment="krb5 is &lt;1.19.2-150400.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819467" version="1" comment="cpio is &lt;2.13-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872402" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.85.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872403" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.85.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872658" version="1" comment="libonig4 is &lt;6.7.0-150000.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873840" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.65.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873841" version="1" comment="python3 is &lt;3.6.15-150300.10.65.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873842" version="1" comment="python3-base is &lt;3.6.15-150300.10.65.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874147" version="1" comment="cockpit is &lt;251.3-150400.6.7.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874148" version="1" comment="cockpit-bridge is &lt;251.3-150400.6.7.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874149" version="1" comment="cockpit-networkmanager is &lt;251.3-150400.6.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874150" version="1" comment="cockpit-selinux is &lt;251.3-150400.6.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874151" version="1" comment="cockpit-storaged is &lt;251.3-150400.6.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874152" version="1" comment="cockpit-system is &lt;251.3-150400.6.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874153" version="1" comment="cockpit-ws is &lt;251.3-150400.6.7.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874146" version="1" comment="kernel-default is &lt;5.14.21-150400.24.125.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874079" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.125.1.150400.24.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877243" version="1" comment="python3-dnspython is &lt;1.15.0-150000.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877670" version="1" comment="login_defs is &lt;4.8.1-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877671" version="1" comment="shadow is &lt;4.8.1-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877665" version="1" comment="gtk2-tools is &lt;2.24.33-150400.4.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877666" version="1" comment="libgtk-2_0-0 is &lt;2.24.33-150400.4.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877287" version="1" comment="gtk3-data is &lt;3.24.34-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877309" version="1" comment="gtk3-schema is &lt;3.24.34-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877667" version="1" comment="gtk3-tools is &lt;3.24.34-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877668" version="1" comment="libgtk-3-0 is &lt;3.24.34-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877669" version="1" comment="typelib-1_0-Gtk-3_0 is &lt;3.24.34-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877315" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877663" version="1" comment="liborc-0_4-0 is &lt;0.4.28-150000.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844743" version="1" comment="xen-libs is &lt;4.16.5_12-150400.4.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877772" version="1" comment="libfreebl3 is &lt;3.101.2-150400.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877773" version="1" comment="libsoftokn3 is &lt;3.101.2-150400.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877774" version="1" comment="mozilla-nss is &lt;3.101.2-150400.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877775" version="1" comment="mozilla-nss-certs is &lt;3.101.2-150400.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877776" version="1" comment="mozilla-nss-tools is &lt;3.101.2-150400.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878522" version="1" comment="login_defs is &lt;4.8.1-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878523" version="1" comment="shadow is &lt;4.8.1-150400.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878674" version="1" comment="ca-certificates-mozilla is &lt;2.68-150200.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879551" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879552" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879792" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879793" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879794" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879795" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879796" version="1" comment="kernel-default is &lt;5.14.21-150400.24.128.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879678" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.128.1.150400.24.62.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879797" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.60.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845233" version="1" comment="runc is &lt;1.1.11-150000.58.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880480" version="1" comment="kernel-firmware-all is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880481" version="1" comment="kernel-firmware-amdgpu is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880482" version="1" comment="kernel-firmware-ath10k is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880483" version="1" comment="kernel-firmware-ath11k is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880484" version="1" comment="kernel-firmware-atheros is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880485" version="1" comment="kernel-firmware-bluetooth is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880486" version="1" comment="kernel-firmware-bnx2 is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880487" version="1" comment="kernel-firmware-brcm is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880488" version="1" comment="kernel-firmware-chelsio is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880489" version="1" comment="kernel-firmware-dpaa2 is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880490" version="1" comment="kernel-firmware-i915 is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880491" version="1" comment="kernel-firmware-intel is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880492" version="1" comment="kernel-firmware-iwlwifi is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880493" version="1" comment="kernel-firmware-liquidio is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880494" version="1" comment="kernel-firmware-marvell is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880495" version="1" comment="kernel-firmware-media is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880496" version="1" comment="kernel-firmware-mediatek is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880497" version="1" comment="kernel-firmware-mellanox is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880498" version="1" comment="kernel-firmware-mwifiex is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880499" version="1" comment="kernel-firmware-network is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880500" version="1" comment="kernel-firmware-nfp is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880501" version="1" comment="kernel-firmware-nvidia is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880502" version="1" comment="kernel-firmware-platform is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880503" version="1" comment="kernel-firmware-prestera is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880504" version="1" comment="kernel-firmware-qcom is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880505" version="1" comment="kernel-firmware-qlogic is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880506" version="1" comment="kernel-firmware-radeon is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880507" version="1" comment="kernel-firmware-realtek is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880508" version="1" comment="kernel-firmware-serial is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880509" version="1" comment="kernel-firmware-sound is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880510" version="1" comment="kernel-firmware-ti is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880511" version="1" comment="kernel-firmware-ueagle is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880512" version="1" comment="kernel-firmware-usb-network is &lt;20220509-150400.4.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880513" version="1" comment="ucode-amd is &lt;20220509-150400.4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881294" version="1" comment="keepalived is &lt;2.2.2-150400.3.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845234" version="1" comment="cpio is &lt;2.13-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881385" version="1" comment="python3-setuptools is &lt;44.1.1-150400.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940478" version="1" comment="curl is &lt;8.0.1-150400.5.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940479" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941063" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941064" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941065" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941066" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941067" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940580" version="1" comment="ucode-intel is &lt;20240813-150200.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941068" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941062" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941061" version="1" comment="docker is &lt;25.0.6_ce-150000.207.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941349" version="1" comment="libsystemd0 is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941350" version="1" comment="libudev1 is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941351" version="1" comment="systemd is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941352" version="1" comment="systemd-container is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941353" version="1" comment="systemd-journal-remote is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941354" version="1" comment="systemd-sysvinit is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941355" version="1" comment="udev is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942412" version="1" comment="libpcap1 is &lt;1.10.1-150400.3.3.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942413" version="1" comment="curl is &lt;8.0.1-150400.5.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942414" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942542" version="1" comment="libexpat1 is &lt;2.4.4-150400.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942538" version="1" comment="containerd is &lt;1.7.21-150000.117.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942539" version="1" comment="runc is &lt;1.1.14-150000.70.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942543" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.91.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942544" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.91.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943081" version="1" comment="python3-dnspython is &lt;1.15.0-150000.3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943528" version="1" comment="ucode-intel is &lt;20240910-150200.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944358" version="1" comment="qemu is &lt;6.2.0-150400.37.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944207" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944208" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.34.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944359" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944360" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944361" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944362" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944363" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944364" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944365" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944225" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944260" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.34.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944229" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944230" version="1" comment="qemu-sgabios is &lt;8-150400.37.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944366" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944367" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944368" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944237" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944238" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944369" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.94.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944370" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.94.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944673" version="1" comment="kernel-default is &lt;5.14.21-150400.24.133.2 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944559" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.133.2.150400.24.64.5 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944581" version="1" comment="xen-libs is &lt;4.16.6_04-150400.4.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944754" version="1" comment="opensc is &lt;0.22.0-150400.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945179" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945180" version="1" comment="python3 is &lt;3.6.15-150300.10.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945181" version="1" comment="python3-base is &lt;3.6.15-150300.10.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945785" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.66.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946112" version="1" comment="libgbm1 is &lt;21.2.4-150400.68.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946113" version="1" comment="kernel-default is &lt;5.14.21-150400.24.136.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946020" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.136.1.150400.24.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946416" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.97.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946417" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.97.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948408" version="1" comment="libprotobuf-lite25_1_0 is &lt;25.1-150400.9.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950733" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950734" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950735" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950736" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950737" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950730" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950731" version="1" comment="python3 is &lt;3.6.15-150300.10.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950732" version="1" comment="python3-base is &lt;3.6.15-150300.10.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951188" version="1" comment="curl is &lt;8.0.1-150400.5.56.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951189" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.56.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953447" version="1" comment="libexpat1 is &lt;2.4.4-150400.3.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954845" version="1" comment="ucode-intel is &lt;20241112-150200.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955219" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955220" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955221" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955222" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955223" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955224" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.100.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955225" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.100.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955577" version="1" comment="xen-libs is &lt;4.16.6_06-150400.4.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955870" version="1" comment="kernel-default is &lt;5.14.21-150400.24.141.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955821" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.141.1.150400.24.68.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956787" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956788" version="1" comment="python3 is &lt;3.6.15-150300.10.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956789" version="1" comment="python3-base is &lt;3.6.15-150300.10.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958009" version="1" comment="socat is &lt;1.8.0.0-150400.14.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958010" version="1" comment="qemu is &lt;6.2.0-150400.37.37.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957657" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.37.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957658" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.37.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958011" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.37.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958012" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.37.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958013" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.37.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958014" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.37.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958015" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.37.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958016" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.37.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958017" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.37.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957675" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957710" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.37.3 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957679" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957680" version="1" comment="qemu-sgabios is &lt;8-150400.37.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958018" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.37.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958019" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.37.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958020" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.37.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957687" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957688" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.37.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958504" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.103.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958505" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.103.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958506" version="1" comment="kernel-default is &lt;5.14.21-150400.24.144.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958409" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.144.1.150400.24.70.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958510" version="1" comment="libsoup-2_4-1 is &lt;2.74.2-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958513" version="1" comment="tftpboot-installation-SLE-Micro-5.4-aarch64 is &lt;16.57.26-150400.3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958514" version="1" comment="tftpboot-installation-SLE-Micro-5.4-s390x is &lt;16.57.26-150400.3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958515" version="1" comment="tftpboot-installation-SLE-Micro-5.4-x86_64 is &lt;16.57.26-150400.3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958511" version="1" comment="curl is &lt;8.0.1-150400.5.59.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958512" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.59.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958498" version="1" comment="docker is &lt;26.1.5_ce-150000.212.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958672" version="1" comment="avahi is &lt;0.8-150400.7.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958673" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958674" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958675" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846162" version="1" comment="suse-build-key is &lt;12.0-150000.8.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818999" version="1" comment="libatomic1 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809550" version="1" comment="libgcc_s1 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809551" version="1" comment="libstdc++6 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847023" version="1" comment="runc is &lt;1.1.12-150000.61.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847037" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847038" version="1" comment="python3-salt is &lt;3006.0-150400.8.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847039" version="1" comment="salt is &lt;3006.0-150400.8.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847040" version="1" comment="salt-minion is &lt;3006.0-150400.8.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847041" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847042" version="1" comment="kernel-default is &lt;5.14.21-150400.24.108.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846724" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.108.1.150400.24.50.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847043" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848194" version="1" comment="libssh2-1 is &lt;1.11.0-150000.4.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848502" version="1" comment="libabsl2308_0_0 is &lt;20230802.1-150400.10.4.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848503" version="1" comment="libprotobuf-lite25_1_0 is &lt;25.1-150400.9.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848499" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848500" version="1" comment="python3 is &lt;3.6.15-150300.10.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848501" version="1" comment="python3-base is &lt;3.6.15-150300.10.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848741" version="1" comment="docker is &lt;24.0.7_ce-150000.193.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848747" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848742" version="1" comment="openssh is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848743" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848744" version="1" comment="openssh-common is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848745" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848746" version="1" comment="openssh-server is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848748" version="1" comment="libfreebl3 is &lt;3.90.2-150400.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848749" version="1" comment="libsoftokn3 is &lt;3.90.2-150400.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848750" version="1" comment="mozilla-nss is &lt;3.90.2-150400.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848751" version="1" comment="mozilla-nss-certs is &lt;3.90.2-150400.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848752" version="1" comment="mozilla-nss-tools is &lt;3.90.2-150400.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817820" version="1" comment="libssh2-1 is &lt;1.11.0-150000.4.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848936" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848937" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848938" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849010" version="1" comment="gnutls is &lt;3.7.3-150400.4.41.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849011" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.41.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849012" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.41.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816615" version="1" comment="tar is &lt;1.34-150000.3.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849778" version="1" comment="kernel-firmware-nvidia-gspx-G06 is &lt;550.54.14-150400.9.21.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849782" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;550.54.14_k5.14.21_150400.24.108-150400.9.50.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850745" version="1" comment="wpa_supplicant is &lt;2.9-150000.4.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850762" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850763" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850764" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850765" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851279" version="1" comment="glibc is &lt;2.31-150300.68.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851280" version="1" comment="glibc-devel is &lt;2.31-150300.68.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851281" version="1" comment="glibc-locale is &lt;2.31-150300.68.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851282" version="1" comment="glibc-locale-base is &lt;2.31-150300.68.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850732" version="1" comment="vim-data-common is &lt;9.1.0111-150000.5.60.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851283" version="1" comment="vim-small is &lt;9.1.0111-150000.5.60.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851287" version="1" comment="sudo is &lt;1.9.9-150400.4.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851288" version="1" comment="kernel-default is &lt;5.14.21-150400.24.111.2 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851097" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.111.2.150400.24.52.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851284" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851285" version="1" comment="python3 is &lt;3.6.15-150300.10.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851286" version="1" comment="python3-base is &lt;3.6.15-150300.10.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851780" version="1" comment="xen-libs is &lt;4.16.5_14-150400.4.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851790" version="1" comment="login_defs is &lt;4.8.1-150400.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851791" version="1" comment="shadow is &lt;4.8.1-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851902" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851903" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.71.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851904" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.71.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969574" version="1" comment="python3-Jinja2 is &lt;2.10.1-150000.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970276" version="1" comment="kernel-default is &lt;5.14.21-150400.24.158.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970267" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.158.1.150400.24.78.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970335" version="1" comment="podman is &lt;4.9.5-150400.4.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970336" version="1" comment="podman-remote is &lt;4.9.5-150400.4.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970568" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.84.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970569" version="1" comment="python3 is &lt;3.6.15-150300.10.84.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970570" version="1" comment="python3-base is &lt;3.6.15-150300.10.84.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970715" version="1" comment="docker is &lt;27.5.1_ce-150000.218.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974372" version="1" comment="libxslt1 is &lt;1.1.34-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974847" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.115.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974848" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.115.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974947" version="1" comment="apparmor-parser is &lt;3.0.4-150400.5.12.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974948" version="1" comment="libapparmor1 is &lt;3.0.4-150400.5.12.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974949" version="1" comment="pam_apparmor is &lt;3.0.4-150400.5.12.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974950" version="1" comment="kernel-default is &lt;5.14.21-150400.24.161.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974931" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.161.1.150400.24.80.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975016" version="1" comment="libexpat1 is &lt;2.7.1-150400.3.28.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975907" version="1" comment="pam is &lt;1.3.0-150000.6.76.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975909" version="1" comment="haproxy is &lt;2.4.22+git0.f8e3218e2-150400.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975908" version="1" comment="containerd is &lt;1.7.27-150000.123.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976361" version="1" comment="libmozjs-60 is &lt;60.9.0-150200.6.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976502" version="1" comment="cifs-utils is &lt;6.15-150400.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976867" version="1" comment="augeas is &lt;1.12.0-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976868" version="1" comment="augeas-lenses is &lt;1.12.0-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976869" version="1" comment="libaugeas0 is &lt;1.12.0-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977085" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977086" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977087" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977262" version="1" comment="libsqlite3-0 is &lt;3.49.1-150000.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977268" version="1" comment="sqlite3-tcl is &lt;3.49.1-150000.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981623" version="1" comment="libsoup-2_4-1 is &lt;2.74.2-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982049" version="1" comment="apparmor-parser is &lt;3.0.4-150400.5.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982050" version="1" comment="libapparmor1 is &lt;3.0.4-150400.5.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982051" version="1" comment="pam_apparmor is &lt;3.0.4-150400.5.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982176" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.118.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982177" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.118.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982446" version="1" comment="openssh is &lt;8.4p1-150300.3.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982447" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982448" version="1" comment="openssh-common is &lt;8.4p1-150300.3.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982449" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982450" version="1" comment="openssh-server is &lt;8.4p1-150300.3.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982403" version="1" comment="system-user-brltty is &lt;6.4-150400.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982503" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982504" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982505" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982506" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982507" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982921" version="1" comment="kernel-default is &lt;5.14.21-150400.24.164.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982902" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.164.1.150400.24.82.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982751" version="1" comment="libekmfweb1 is &lt;2.31.0-150400.7.31.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982753" version="1" comment="libkmipclient1 is &lt;2.31.0-150400.7.31.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982755" version="1" comment="s390-tools is &lt;2.31.0-150400.7.31.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982757" version="1" comment="s390-tools-genprotimg-data is &lt;2.31.0-150400.7.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960717" version="1" comment="rsync is &lt;3.2.3-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982955" version="1" comment="ucode-intel is &lt;20250512-150200.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983021" version="1" comment="libvmtools0 is &lt;12.5.2-150300.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983022" version="1" comment="open-vm-tools is &lt;12.5.2-150300.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983820" version="1" comment="python3-tornado is &lt;4.5.3-150000.3.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985227" version="1" comment="iputils is &lt;20211215-150400.3.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985223" version="1" comment="glibc is &lt;2.31-150300.95.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985224" version="1" comment="glibc-devel is &lt;2.31-150300.95.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985225" version="1" comment="glibc-locale is &lt;2.31-150300.95.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985226" version="1" comment="glibc-locale-base is &lt;2.31-150300.95.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985865" version="1" comment="python3-setuptools is &lt;44.1.1-150400.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988211" version="1" comment="libsoup-2_4-1 is &lt;2.74.2-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959147" version="1" comment="sysstat is &lt;12.0.2-150000.3.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988212" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.121.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988213" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.121.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987055" version="1" comment="python3-requests is &lt;2.25.1-150300.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961041" version="1" comment="pam_u2f is &lt;1.2.0-150400.4.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988178" version="1" comment="pam is &lt;1.3.0-150000.6.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988214" version="1" comment="screen is &lt;4.6.2-150000.5.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988186" version="1" comment="perl is &lt;5.26.1-150300.17.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988187" version="1" comment="perl-base is &lt;5.26.1-150300.17.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961042" version="1" comment="kernel-default is &lt;5.14.21-150400.24.147.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960907" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.147.1.150400.24.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988188" version="1" comment="pam_pkcs11 is &lt;0.6.10-150100.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988230" version="1" comment="ignition is &lt;2.15.0-150400.4.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988231" version="1" comment="ignition-dracut-grub2 is &lt;2.15.0-150400.4.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988215" version="1" comment="libbd_btrfs2 is &lt;2.26-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988216" version="1" comment="libbd_crypto2 is &lt;2.26-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988217" version="1" comment="libbd_fs2 is &lt;2.26-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988218" version="1" comment="libbd_loop2 is &lt;2.26-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988219" version="1" comment="libbd_lvm2 is &lt;2.26-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988220" version="1" comment="libbd_mdraid2 is &lt;2.26-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988221" version="1" comment="libbd_part2 is &lt;2.26-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988222" version="1" comment="libbd_swap2 is &lt;2.26-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988223" version="1" comment="libbd_utils2 is &lt;2.26-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988224" version="1" comment="libblockdev is &lt;2.26-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988225" version="1" comment="libblockdev2 is &lt;2.26-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988194" version="1" comment="libicu-suse65_1 is &lt;65.1-150200.4.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987600" version="1" comment="libicu65_1-bedata is &lt;65.1-150200.4.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987601" version="1" comment="libicu65_1-ledata is &lt;65.1-150200.4.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988195" version="1" comment="pam-config is &lt;1.1-150200.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988228" version="1" comment="podman is &lt;4.9.5-150400.4.47.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009988229" version="1" comment="podman-remote is &lt;4.9.5-150400.4.47.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997415" version="1" comment="sudo is &lt;1.9.9-150400.4.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998138" version="1" comment="runc is &lt;1.2.6-150000.73.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998960" version="1" comment="vim-data-common is &lt;9.1.1406-150000.5.75.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998991" version="1" comment="vim-small is &lt;9.1.1406-150000.5.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998992" version="1" comment="xxd is &lt;9.1.1406-150000.5.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999495" version="1" comment="kernel-default is &lt;5.14.21-150400.24.167.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999487" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.167.1.150400.24.84.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006069" version="1" comment="libssh-config is &lt;0.9.8-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006070" version="1" comment="libssh4 is &lt;0.9.8-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006067" version="1" comment="docker is &lt;28.2.2_ce-150000.227.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007702" version="1" comment="libprotobuf-lite25_1_0 is &lt;25.1-150400.9.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961640" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.106.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961641" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.106.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007703" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.124.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007704" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.124.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007899" version="1" comment="xen-libs is &lt;4.16.7_02-150400.4.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008253" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008254" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008255" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008508" version="1" comment="coreutils is &lt;8.32-150400.9.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008509" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008510" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008511" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008512" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008513" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008506" version="1" comment="jq is &lt;1.6-150000.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008507" version="1" comment="libjq1 is &lt;1.6-150000.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008930" version="1" comment="iputils is &lt;20211215-150400.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009431" version="1" comment="libgcrypt20 is &lt;1.9.4-150400.6.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009432" version="1" comment="libgcrypt20-hmac is &lt;1.9.4-150400.6.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010036" version="1" comment="gstreamer-plugins-base is &lt;1.20.1-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010037" version="1" comment="libgstallocators-1_0-0 is &lt;1.20.1-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010038" version="1" comment="libgstapp-1_0-0 is &lt;1.20.1-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010039" version="1" comment="libgstaudio-1_0-0 is &lt;1.20.1-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010040" version="1" comment="libgstgl-1_0-0 is &lt;1.20.1-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010041" version="1" comment="libgstpbutils-1_0-0 is &lt;1.20.1-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010042" version="1" comment="libgstriff-1_0-0 is &lt;1.20.1-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010043" version="1" comment="libgsttag-1_0-0 is &lt;1.20.1-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010044" version="1" comment="libgstvideo-1_0-0 is &lt;1.20.1-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010045" version="1" comment="python3-salt is &lt;3006.0-150400.8.80.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010046" version="1" comment="salt is &lt;3006.0-150400.8.80.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010047" version="1" comment="salt-minion is &lt;3006.0-150400.8.80.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010048" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.80.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010444" version="1" comment="libpolkit0 is &lt;0.116-150200.3.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010445" version="1" comment="polkit is &lt;0.116-150200.3.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010549" version="1" comment="boost-license1_66_0 is &lt;1.66.0-150200.12.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011157" version="1" comment="libboost_system1_66_0 is &lt;1.66.0-150200.12.7.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011158" version="1" comment="libboost_thread1_66_0 is &lt;1.66.0-150200.12.7.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011159" version="1" comment="kernel-default is &lt;5.14.21-150400.24.170.2 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011098" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.170.2.150400.24.86.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011819" version="1" comment="gnutls is &lt;3.7.3-150400.4.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011820" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011821" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011685" version="1" comment="kernel-firmware-nvidia-gspx-G06-cuda is &lt;565.57.01-150400.89.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011686" version="1" comment="nv-prefer-signed-open-driver is &lt;565.57.01-150400.89.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011691" version="1" comment="nvidia-open-driver-G06-signed-cuda-kmp-default is &lt;565.57.01_k5.14.21_150400.24.170-150400.89.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011694" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;550.144.03_k5.14.21_150400.24.170-150400.89.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012309" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012310" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012311" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961642" version="1" comment="podman is &lt;4.9.5-150400.4.35.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961643" version="1" comment="podman-remote is &lt;4.9.5-150400.4.35.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012307" version="1" comment="libsqlite3-0 is &lt;3.50.2-150000.3.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012312" version="1" comment="sqlite3-tcl is &lt;3.50.2-150000.3.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012313" version="1" comment="libsystemd0 is &lt;249.17-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012314" version="1" comment="libudev1 is &lt;249.17-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012315" version="1" comment="systemd is &lt;249.17-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012316" version="1" comment="systemd-container is &lt;249.17-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012317" version="1" comment="systemd-journal-remote is &lt;249.17-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012318" version="1" comment="systemd-sysvinit is &lt;249.17-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012319" version="1" comment="udev is &lt;249.17-150400.8.49.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012320" version="1" comment="libcairo-gobject2 is &lt;1.16.0-150400.11.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012321" version="1" comment="libcairo2 is &lt;1.16.0-150400.11.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013032" version="1" comment="libarchive13 is &lt;3.5.1-150400.3.21.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013152" version="1" comment="grub2 is &lt;2.06-150400.11.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013153" version="1" comment="grub2-arm64-efi is &lt;2.06-150400.11.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013124" version="1" comment="grub2-i386-pc is &lt;2.06-150400.11.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013154" version="1" comment="grub2-s390x-emu is &lt;2.06-150400.11.63.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013125" version="1" comment="grub2-snapper-plugin is &lt;2.06-150400.11.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013127" version="1" comment="grub2-x86_64-efi is &lt;2.06-150400.11.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013128" version="1" comment="grub2-x86_64-xen is &lt;2.06-150400.11.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013203" version="1" comment="update-alternatives is &lt;1.19.0.4-150000.4.7.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013874" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.97.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013875" version="1" comment="python3 is &lt;3.6.15-150300.10.97.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013876" version="1" comment="python3-base is &lt;3.6.15-150300.10.97.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014126" version="1" comment="podman is &lt;4.9.5-150400.4.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014127" version="1" comment="podman-remote is &lt;4.9.5-150400.4.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014129" version="1" comment="rust-keylime is &lt;0.2.7+141-150400.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014125" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014433" version="1" comment="kernel-default is &lt;5.14.21-150400.24.173.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014419" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.173.1.150400.24.88.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014434" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.127.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014435" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.127.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959155" version="1" comment="python3-Jinja2 is &lt;2.10.1-150000.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014633" version="1" comment="docker is &lt;28.3.3_ce-150000.230.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014634" version="1" comment="jq is &lt;1.6-150000.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014635" version="1" comment="libjq1 is &lt;1.6-150000.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015411" version="1" comment="rust-keylime is &lt;0.2.8+12-150400.3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015408" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-150400.5.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015409" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-150400.5.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015410" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-150400.5.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015406" version="1" comment="pam is &lt;1.3.0-150000.6.86.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015173" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016639" version="1" comment="libudisks2-0 is &lt;2.9.2-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016640" version="1" comment="libudisks2-0_btrfs is &lt;2.9.2-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016641" version="1" comment="libudisks2-0_lvm2 is &lt;2.9.2-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016642" version="1" comment="udisks2 is &lt;2.9.2-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016870" version="1" comment="python3-future is &lt;0.18.2-150300.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016871" version="1" comment="ucode-intel is &lt;20250812-150200.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017187" version="1" comment="libsoup-2_4-1 is &lt;2.74.2-150400.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017364" version="1" comment="regionServiceClientConfigAzure is &lt;3.0.0-150000.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017365" version="1" comment="regionServiceClientConfigEC2 is &lt;5.0.0-150000.3.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017366" version="1" comment="regionServiceClientConfigGCE is &lt;5.0.0-150000.4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962301" version="1" comment="ignition is &lt;2.15.0-150400.4.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962302" version="1" comment="ignition-dracut-grub2 is &lt;2.15.0-150400.4.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018299" version="1" comment="vim-data-common is &lt;9.1.1629-150000.5.78.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018310" version="1" comment="vim-small is &lt;9.1.1629-150000.5.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018370" version="1" comment="net-tools is &lt;2.0+git20170221.479bb4a-150000.5.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018624" version="1" comment="cups-config is &lt;2.2.7-150000.3.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018625" version="1" comment="libcups2 is &lt;2.2.7-150000.3.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018630" version="1" comment="curl is &lt;8.14.1-150400.5.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018631" version="1" comment="libcurl4 is &lt;8.14.1-150400.5.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018621" version="1" comment="libbrotlicommon1 is &lt;1.0.7-150200.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018622" version="1" comment="libbrotlidec1 is &lt;1.0.7-150200.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018721" version="1" comment="libbluetooth3 is &lt;5.62-150400.4.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018722" version="1" comment="libcairo-gobject2 is &lt;1.16.0-150400.11.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018723" version="1" comment="libcairo2 is &lt;1.16.0-150400.11.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018996" version="1" comment="kernel-default is &lt;5.14.21-150400.24.176.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018986" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.176.1.150400.24.90.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019379" version="1" comment="avahi is &lt;0.8-150400.7.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019380" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019381" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019382" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019378" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019611" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.130.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019612" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.130.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962911" version="1" comment="rsync is &lt;3.2.3-150400.3.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962912" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.35.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962913" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.35.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962914" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.35.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019843" version="1" comment="nv-prefer-signed-open-driver is &lt;580.82.07-150400.98.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019848" version="1" comment="nvidia-open-driver-G06-signed-cuda-kmp-default is &lt;580.82.07_k5.14.21_150400.24.173-150400.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019851" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;580.82.07_k5.14.21_150400.24.173-150400.98.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962917" version="1" comment="krb5 is &lt;1.19.2-150400.3.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019920" version="1" comment="libvmtools0 is &lt;13.0.0-150300.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019921" version="1" comment="open-vm-tools is &lt;13.0.0-150300.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020017" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.84.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020018" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.84.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020019" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.84.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020020" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.84.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020021" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962910" version="1" comment="liborc-0_4-0 is &lt;0.4.28-150000.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962918" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962919" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962920" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962921" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020815" version="1" comment="podman is &lt;4.9.5-150400.4.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020816" version="1" comment="podman-remote is &lt;4.9.5-150400.4.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020817" version="1" comment="haproxy is &lt;2.4.22+git0.f8e3218e2-150400.3.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022495" version="1" comment="samba-client-libs is &lt;4.15.13+git.736.b791be993ba-150400.3.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022496" version="1" comment="samba-libs is &lt;4.15.13+git.736.b791be993ba-150400.3.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022497" version="1" comment="libexpat1 is &lt;2.7.1-150400.3.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022498" version="1" comment="kernel-default is &lt;5.14.21-150400.24.179.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022243" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.179.1.150400.24.92.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962922" version="1" comment="curl is &lt;8.0.1-150400.5.62.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962923" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.62.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023011" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.133.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023012" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.133.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023010" version="1" comment="libprotobuf-lite20 is &lt;3.9.2-150200.4.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023013" version="1" comment="krb5 is &lt;1.19.2-150400.3.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023649" version="1" comment="afterburn is &lt;5.9.0.git21.a73f509-150400.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023650" version="1" comment="afterburn-dracut is &lt;5.9.0.git21.a73f509-150400.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023651" version="1" comment="libssh-config is &lt;0.9.8-150400.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023652" version="1" comment="libssh4 is &lt;0.9.8-150400.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023653" version="1" comment="chrony is &lt;4.1-150400.21.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023479" version="1" comment="chrony-pool-empty is &lt;4.1-150400.21.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023480" version="1" comment="chrony-pool-suse is &lt;4.1-150400.21.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023860" version="1" comment="libfreebl3 is &lt;3.112.2-150400.3.60.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023861" version="1" comment="libsoftokn3 is &lt;3.112.2-150400.3.60.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023862" version="1" comment="mozilla-nss is &lt;3.112.2-150400.3.60.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023863" version="1" comment="mozilla-nss-certs is &lt;3.112.2-150400.3.60.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023864" version="1" comment="mozilla-nss-tools is &lt;3.112.2-150400.3.60.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023963" version="1" comment="xen-libs is &lt;4.16.7_04-150400.4.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024405" version="1" comment="libxslt1 is &lt;1.1.34-150400.3.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962924" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024539" version="1" comment="libcolord2 is &lt;1.4.5-150400.4.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025061" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.60.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025062" version="1" comment="runc is &lt;1.2.7-150000.80.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025192" version="1" comment="gpg2 is &lt;2.2.27-150300.3.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025812" version="1" comment="runc is &lt;1.3.3-150000.85.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025813" version="1" comment="podman is &lt;4.9.5-150400.4.59.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025814" version="1" comment="podman-remote is &lt;4.9.5-150400.4.59.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031382" version="1" comment="elfutils is &lt;0.185-150400.5.8.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031383" version="1" comment="libasm1 is &lt;0.185-150400.5.8.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031384" version="1" comment="libdw1 is &lt;0.185-150400.5.8.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031385" version="1" comment="libelf1 is &lt;0.185-150400.5.8.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029738" version="1" comment="kernel-default is &lt;5.14.21-150400.24.184.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029704" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.184.1.150400.24.94.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029733" version="1" comment="openssh is &lt;8.4p1-150300.3.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029734" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029735" version="1" comment="openssh-common is &lt;8.4p1-150300.3.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029736" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029737" version="1" comment="openssh-server is &lt;8.4p1-150300.3.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029785" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029786" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029787" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030031" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.136.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030032" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.136.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030609" version="1" comment="podman is &lt;4.9.5-150400.4.62.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030610" version="1" comment="podman-remote is &lt;4.9.5-150400.4.62.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031386" version="1" comment="libsss_certmap0 is &lt;2.5.2-150400.4.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031387" version="1" comment="libsss_idmap0 is &lt;2.5.2-150400.4.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031388" version="1" comment="libsss_nss_idmap0 is &lt;2.5.2-150400.4.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031389" version="1" comment="sssd is &lt;2.5.2-150400.4.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031390" version="1" comment="sssd-common is &lt;2.5.2-150400.4.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031391" version="1" comment="sssd-krb5-common is &lt;2.5.2-150400.4.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031392" version="1" comment="sssd-ldap is &lt;2.5.2-150400.4.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031393" version="1" comment="grub2 is &lt;2.06-150400.11.66.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031394" version="1" comment="grub2-arm64-efi is &lt;2.06-150400.11.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030938" version="1" comment="grub2-i386-pc is &lt;2.06-150400.11.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031395" version="1" comment="grub2-s390x-emu is &lt;2.06-150400.11.66.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030939" version="1" comment="grub2-snapper-plugin is &lt;2.06-150400.11.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030941" version="1" comment="grub2-x86_64-efi is &lt;2.06-150400.11.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030942" version="1" comment="grub2-x86_64-xen is &lt;2.06-150400.11.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032138" version="1" comment="containerd is &lt;1.7.29-150000.128.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032139" version="1" comment="cups-config is &lt;2.2.7-150000.3.77.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032140" version="1" comment="libcups2 is &lt;2.2.7-150000.3.77.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032141" version="1" comment="curl is &lt;8.14.1-150400.5.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032142" version="1" comment="libcurl4 is &lt;8.14.1-150400.5.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032522" version="1" comment="cups-config is &lt;2.2.7-150000.3.80.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032523" version="1" comment="libcups2 is &lt;2.2.7-150000.3.80.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963626" version="1" comment="qemu is &lt;6.2.0-150400.37.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963515" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963627" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.40.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963628" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963629" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963630" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963631" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963632" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963633" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963634" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963532" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963635" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.40.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963536" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963537" version="1" comment="qemu-sgabios is &lt;8-150400.37.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963636" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963637" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963638" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.40.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963544" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963545" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032879" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032880" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032881" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032882" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032883" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033194" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.100.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033195" version="1" comment="python3 is &lt;3.6.15-150300.10.100.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033196" version="1" comment="python3-base is &lt;3.6.15-150300.10.100.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033767" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.52.12-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033768" version="1" comment="librsvg-2-2 is &lt;2.52.12-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034188" version="1" comment="cups-config is &lt;2.2.7-150000.3.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034189" version="1" comment="libcups2 is &lt;2.2.7-150000.3.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034190" version="1" comment="libpng16-16 is &lt;1.6.34-150000.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034544" version="1" comment="python3-salt is &lt;3006.0-150400.8.91.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034545" version="1" comment="salt is &lt;3006.0-150400.8.91.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034546" version="1" comment="salt-minion is &lt;3006.0-150400.8.91.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034547" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.91.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034872" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034873" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034874" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034875" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034876" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035436" version="1" comment="gnutls is &lt;3.7.3-150400.4.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035437" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035438" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.53.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964062" version="1" comment="qemu-ovmf-x86_64 is &lt;202202-150400.5.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964063" version="1" comment="qemu-uefi-aarch64 is &lt;202202-150400.5.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964549" version="1" comment="libtasn1 is &lt;4.13-150000.4.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964550" version="1" comment="libtasn1-6 is &lt;4.13-150000.4.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964555" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.81.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964556" version="1" comment="python3 is &lt;3.6.15-150300.10.81.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964557" version="1" comment="python3-base is &lt;3.6.15-150300.10.81.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964558" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.109.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964559" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.109.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964551" version="1" comment="glibc is &lt;2.31-150300.92.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964552" version="1" comment="glibc-devel is &lt;2.31-150300.92.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964553" version="1" comment="glibc-locale is &lt;2.31-150300.92.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964554" version="1" comment="glibc-locale-base is &lt;2.31-150300.92.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964560" version="1" comment="kernel-default is &lt;5.14.21-150400.24.150.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964487" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.150.1.150400.24.74.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964561" version="1" comment="podman is &lt;4.9.5-150400.4.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964562" version="1" comment="podman-remote is &lt;4.9.5-150400.4.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964920" version="1" comment="grub2 is &lt;2.06-150400.11.55.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964840" version="1" comment="grub2-arm64-efi is &lt;2.06-150400.11.55.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964841" version="1" comment="grub2-i386-pc is &lt;2.06-150400.11.55.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964843" version="1" comment="grub2-s390x-emu is &lt;2.06-150400.11.55.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964844" version="1" comment="grub2-snapper-plugin is &lt;2.06-150400.11.55.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964846" version="1" comment="grub2-x86_64-efi is &lt;2.06-150400.11.55.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964847" version="1" comment="grub2-x86_64-xen is &lt;2.06-150400.11.55.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964817" version="1" comment="ucode-intel is &lt;20250211-150200.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965239" version="1" comment="openssh is &lt;8.4p1-150300.3.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965240" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965241" version="1" comment="openssh-common is &lt;8.4p1-150300.3.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965242" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965243" version="1" comment="openssh-server is &lt;8.4p1-150300.3.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960008" version="1" comment="gstreamer-plugins-base is &lt;1.20.1-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960009" version="1" comment="libgstallocators-1_0-0 is &lt;1.20.1-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960010" version="1" comment="libgstapp-1_0-0 is &lt;1.20.1-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960011" version="1" comment="libgstaudio-1_0-0 is &lt;1.20.1-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960012" version="1" comment="libgstgl-1_0-0 is &lt;1.20.1-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960013" version="1" comment="libgstpbutils-1_0-0 is &lt;1.20.1-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960014" version="1" comment="libgstriff-1_0-0 is &lt;1.20.1-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960015" version="1" comment="libgsttag-1_0-0 is &lt;1.20.1-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960016" version="1" comment="libgstvideo-1_0-0 is &lt;1.20.1-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966191" version="1" comment="qemu-ovmf-x86_64 is &lt;202202-150400.5.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966192" version="1" comment="qemu-uefi-aarch64 is &lt;202202-150400.5.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960017" version="1" comment="gstreamer is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960018" version="1" comment="libgstreamer-1_0-0 is &lt;1.20.1-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960019" version="1" comment="dnsmasq is &lt;2.90-150400.16.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966324" version="1" comment="pam_pkcs11 is &lt;0.6.10-150100.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966485" version="1" comment="vim-data-common is &lt;9.1.1101-150000.5.69.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966599" version="1" comment="vim-small is &lt;9.1.1101-150000.5.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966600" version="1" comment="xxd is &lt;9.1.1101-150000.5.69.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966922" version="1" comment="libprocps8 is &lt;3.3.17-150000.7.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966923" version="1" comment="procps is &lt;3.3.17-150000.7.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966926" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966927" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966928" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966924" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966756" version="1" comment="libX11-data is &lt;1.6.5-150000.3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966925" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967082" version="1" comment="u-boot-rpiarm64 is &lt;2021.10-150400.4.14.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967083" version="1" comment="gnutls is &lt;3.7.3-150400.4.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967084" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967085" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967143" version="1" comment="docker is &lt;27.5.1_ce-150000.215.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967209" version="1" comment="podman is &lt;4.9.5-150400.4.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967210" version="1" comment="podman-remote is &lt;4.9.5-150400.4.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967418" version="1" comment="python3-M2Crypto is &lt;0.44.0-150400.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967690" version="1" comment="kernel-default is &lt;5.14.21-150400.24.153.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967665" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.153.1.150400.24.76.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968657" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968658" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.112.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969035" version="1" comment="libarchive13 is &lt;3.5.1-150400.3.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969532" version="1" comment="libfreetype6 is &lt;2.10.4-150000.4.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050898" version="1" comment="python3-salt is &lt;3006.0-150400.8.94.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050899" version="1" comment="salt is &lt;3006.0-150400.8.94.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050900" version="1" comment="salt-minion is &lt;3006.0-150400.8.94.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050901" version="1" comment="salt-transactional-update is &lt;3006.0-150400.8.94.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051425" version="1" comment="libsystemd0 is &lt;249.17-150400.8.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051426" version="1" comment="libudev1 is &lt;249.17-150400.8.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051427" version="1" comment="systemd is &lt;249.17-150400.8.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051428" version="1" comment="systemd-container is &lt;249.17-150400.8.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051429" version="1" comment="systemd-journal-remote is &lt;249.17-150400.8.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051430" version="1" comment="systemd-sysvinit is &lt;249.17-150400.8.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051431" version="1" comment="udev is &lt;249.17-150400.8.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051420" version="1" comment="libsqlite3-0 is &lt;3.51.3-150000.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051432" version="1" comment="sqlite3-tcl is &lt;3.51.3-150000.3.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051071" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051421" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.109.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051422" version="1" comment="python3 is &lt;3.6.15-150300.10.109.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051423" version="1" comment="python3-base is &lt;3.6.15-150300.10.109.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051163" version="1" comment="vim-data-common is &lt;9.2.0110-150000.5.86.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051424" version="1" comment="vim-small is &lt;9.2.0110-150000.5.86.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051974" version="1" comment="containerd is &lt;1.7.29-150000.130.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051976" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.145.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051977" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.145.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052319" version="1" comment="python3-pyasn1 is &lt;0.4.2-150000.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052485" version="1" comment="libexpat1 is &lt;2.7.1-150400.3.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052716" version="1" comment="python3-tornado is &lt;4.5.3-150000.3.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052717" version="1" comment="tar is &lt;1.34-150000.3.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052718" version="1" comment="libsoup-2_4-1 is &lt;2.74.2-150400.3.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053183" version="1" comment="ignition is &lt;2.15.0-150400.4.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053184" version="1" comment="ignition-dracut-grub2 is &lt;2.15.0-150400.4.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053182" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.81.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056157" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037483" version="1" comment="podman is &lt;4.9.5-150400.4.65.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037484" version="1" comment="podman-remote is &lt;4.9.5-150400.4.65.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056161" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.90.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056162" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.90.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056163" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.90.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056164" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.90.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038755" version="1" comment="qemu-ovmf-x86_64 is &lt;202202-150400.5.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038756" version="1" comment="qemu-uefi-aarch64 is &lt;202202-150400.5.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039541" version="1" comment="gpg2 is &lt;2.2.27-150300.3.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038760" version="1" comment="kernel-firmware-all is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038761" version="1" comment="kernel-firmware-amdgpu is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038762" version="1" comment="kernel-firmware-ath10k is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038763" version="1" comment="kernel-firmware-ath11k is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038764" version="1" comment="kernel-firmware-atheros is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038765" version="1" comment="kernel-firmware-bluetooth is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038766" version="1" comment="kernel-firmware-bnx2 is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038767" version="1" comment="kernel-firmware-brcm is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038768" version="1" comment="kernel-firmware-chelsio is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038769" version="1" comment="kernel-firmware-dpaa2 is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038770" version="1" comment="kernel-firmware-i915 is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038771" version="1" comment="kernel-firmware-intel is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038772" version="1" comment="kernel-firmware-iwlwifi is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038773" version="1" comment="kernel-firmware-liquidio is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038774" version="1" comment="kernel-firmware-marvell is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038775" version="1" comment="kernel-firmware-media is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038776" version="1" comment="kernel-firmware-mediatek is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038777" version="1" comment="kernel-firmware-mellanox is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038778" version="1" comment="kernel-firmware-mwifiex is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038779" version="1" comment="kernel-firmware-network is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038780" version="1" comment="kernel-firmware-nfp is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038781" version="1" comment="kernel-firmware-nvidia is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038782" version="1" comment="kernel-firmware-platform is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038783" version="1" comment="kernel-firmware-prestera is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038784" version="1" comment="kernel-firmware-qcom is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038785" version="1" comment="kernel-firmware-qlogic is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038786" version="1" comment="kernel-firmware-radeon is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038787" version="1" comment="kernel-firmware-realtek is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038788" version="1" comment="kernel-firmware-serial is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038789" version="1" comment="kernel-firmware-sound is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038790" version="1" comment="kernel-firmware-ti is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038791" version="1" comment="kernel-firmware-ueagle is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038792" version="1" comment="kernel-firmware-usb-network is &lt;20220509-150400.4.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038793" version="1" comment="ucode-amd is &lt;20220509-150400.4.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039542" version="1" comment="python3-tornado is &lt;4.5.3-150000.3.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039543" version="1" comment="libsodium23 is &lt;1.0.18-150000.4.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039544" version="1" comment="libtasn1 is &lt;4.13-150000.4.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039545" version="1" comment="libtasn1-6 is &lt;4.13-150000.4.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039552" version="1" comment="libsnmp40 is &lt;5.9.4-150300.15.21.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039553" version="1" comment="snmp-mibs is &lt;5.9.4-150300.15.21.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039554" version="1" comment="libsoup-2_4-1 is &lt;2.74.2-150400.3.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036160" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.103.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036161" version="1" comment="python3 is &lt;3.6.15-150300.10.103.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036162" version="1" comment="python3-base is &lt;3.6.15-150300.10.103.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036165" version="1" comment="kernel-default is &lt;5.14.21-150400.24.187.3 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036141" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.187.3.150400.24.96.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040510" version="1" comment="libopenssl3 is &lt;3.0.8-150400.4.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036166" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.139.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036167" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.139.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041662" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150400.7.87.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041663" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150400.7.87.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041664" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150400.7.87.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041665" version="1" comment="openssl-1_1 is &lt;1.1.1l-150400.7.87.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041952" version="1" comment="libsodium23 is &lt;1.0.18-150000.4.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042124" version="1" comment="libvirt-client is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042125" version="1" comment="libvirt-daemon is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042126" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042127" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042128" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042129" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042130" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042131" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042132" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042133" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042134" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042135" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042136" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042137" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042138" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042139" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-150400.7.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042140" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042141" version="1" comment="libvirt-daemon-qemu is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042142" version="1" comment="libvirt-libs is &lt;8.0.0-150400.7.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042192" version="1" comment="xen-libs is &lt;4.16.7_06-150400.4.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036401" version="1" comment="rsync is &lt;3.2.3-150400.3.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042510" version="1" comment="kernel-rt is &lt;5.14.21-150400.15.142.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042511" version="1" comment="kernel-source-rt is &lt;5.14.21-150400.15.142.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036402" version="1" comment="qemu is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036183" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036184" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.46.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036403" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036404" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036405" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036406" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036407" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036408" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036409" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036410" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036202" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036207" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.46.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036208" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036209" version="1" comment="qemu-sgabios is &lt;8-150400.37.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036411" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036412" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036413" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036217" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036218" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042802" version="1" comment="python3-pyasn1 is &lt;0.4.2-150000.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043279" version="1" comment="libsqlite3-0 is &lt;3.51.2-150000.3.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043280" version="1" comment="sqlite3-tcl is &lt;3.51.2-150000.3.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043281" version="1" comment="qemu is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042944" version="1" comment="qemu-accel-tcg-x86 is &lt;6.2.0-150400.37.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042945" version="1" comment="qemu-arm is &lt;6.2.0-150400.37.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043282" version="1" comment="qemu-audio-spice is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043283" version="1" comment="qemu-chardev-spice is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043284" version="1" comment="qemu-guest-agent is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043285" version="1" comment="qemu-hw-display-qxl is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043286" version="1" comment="qemu-hw-display-virtio-gpu is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043287" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043288" version="1" comment="qemu-hw-display-virtio-vga is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043289" version="1" comment="qemu-hw-usb-redirect is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042963" version="1" comment="qemu-ipxe is &lt;1.0.0+-150400.37.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042968" version="1" comment="qemu-s390x is &lt;6.2.0-150400.37.49.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042969" version="1" comment="qemu-seabios is &lt;1.15.0_0_g2dd4b9b-150400.37.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042970" version="1" comment="qemu-sgabios is &lt;8-150400.37.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043290" version="1" comment="qemu-tools is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043291" version="1" comment="qemu-ui-opengl is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043292" version="1" comment="qemu-ui-spice-core is &lt;6.2.0-150400.37.49.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042978" version="1" comment="qemu-vgabios is &lt;1.15.0_0_g2dd4b9b-150400.37.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042979" version="1" comment="qemu-x86 is &lt;6.2.0-150400.37.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036400" version="1" comment="libmozjs-60 is &lt;60.9.0-150200.6.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042819" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043299" version="1" comment="rust-keylime is &lt;0.2.8+116-150400.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043294" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043295" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043296" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043297" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043298" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042992" version="1" comment="nv-prefer-signed-open-driver is &lt;580.126.09-150400.107.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042998" version="1" comment="nvidia-open-driver-G06-signed-cuda-kmp-default is &lt;580.126.09_k5.14.21_150400.24.187-150400.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043001" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;580.126.09_k5.14.21_150400.24.187-150400.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043795" version="1" comment="libsoup-2_4-1 is &lt;2.74.2-150400.3.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043796" version="1" comment="curl is &lt;8.14.1-150400.5.77.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043797" version="1" comment="libcurl4 is &lt;8.14.1-150400.5.77.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043798" version="1" comment="libblkid1 is &lt;2.37.2-150400.8.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043799" version="1" comment="libfdisk1 is &lt;2.37.2-150400.8.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043800" version="1" comment="libmount1 is &lt;2.37.2-150400.8.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043801" version="1" comment="libsmartcols1 is &lt;2.37.2-150400.8.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043802" version="1" comment="libuuid1 is &lt;2.37.2-150400.8.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043803" version="1" comment="util-linux is &lt;2.37.2-150400.8.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043804" version="1" comment="util-linux-systemd is &lt;2.37.2-150400.8.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044086" version="1" comment="libprotobuf-lite25_1_0 is &lt;25.1-150400.9.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044297" version="1" comment="libpcap1 is &lt;1.10.1-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044299" version="1" comment="avahi is &lt;0.8-150400.7.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044300" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044301" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044302" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044707" version="1" comment="libpng16-16 is &lt;1.6.34-150000.3.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045055" version="1" comment="libxml2-2 is &lt;2.9.14-150400.5.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045056" version="1" comment="libxml2-tools is &lt;2.9.14-150400.5.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045057" version="1" comment="python3-libxml2 is &lt;2.9.14-150400.5.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045058" version="1" comment="kernel-default is &lt;5.14.21-150400.24.194.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045032" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.194.1.150400.24.98.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045054" version="1" comment="libprotobuf-lite20 is &lt;3.9.2-150200.4.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045853" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.106.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045854" version="1" comment="python3 is &lt;3.6.15-150300.10.106.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045855" version="1" comment="python3-base is &lt;3.6.15-150300.10.106.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045856" version="1" comment="docker is &lt;28.5.1_ce-150000.241.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045857" version="1" comment="docker-buildx is &lt;0.29.0-150000.241.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045394" version="1" comment="ucode-intel is &lt;20260210-150200.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045858" version="1" comment="gpg2 is &lt;2.2.27-150300.3.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046368" version="1" comment="shim is &lt;16.1-150300.4.31.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047412" version="1" comment="libxslt1 is &lt;1.1.34-150400.3.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047413" version="1" comment="libfreebl3 is &lt;3.112.3-150400.3.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047414" version="1" comment="libsoftokn3 is &lt;3.112.3-150400.3.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047415" version="1" comment="mozilla-nss is &lt;3.112.3-150400.3.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047416" version="1" comment="mozilla-nss-certs is &lt;3.112.3-150400.3.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047417" version="1" comment="mozilla-nss-tools is &lt;3.112.3-150400.3.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047420" version="1" comment="openCryptoki is &lt;3.17.0-150400.4.11.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047418" version="1" comment="libexpat1 is &lt;2.7.1-150400.3.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047419" version="1" comment="libsoup-2_4-1 is &lt;2.74.2-150400.3.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047554" version="1" comment="python3-tornado is &lt;4.5.3-150000.3.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048484" version="1" comment="gnutls is &lt;3.7.3-150400.4.56.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048485" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.56.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048486" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.56.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048740" version="1" comment="glibc is &lt;2.31-150300.98.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048741" version="1" comment="glibc-devel is &lt;2.31-150300.98.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048742" version="1" comment="glibc-locale is &lt;2.31-150300.98.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048743" version="1" comment="glibc-locale-base is &lt;2.31-150300.98.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049152" version="1" comment="curl is &lt;8.14.1-150400.5.80.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049153" version="1" comment="libcurl4 is &lt;8.14.1-150400.5.80.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049508" version="1" comment="jq is &lt;1.6-150000.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049509" version="1" comment="libjq1 is &lt;1.6-150000.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049692" version="1" comment="runc is &lt;1.3.4-150000.90.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049693" version="1" comment="docker is &lt;28.5.1_ce-150000.243.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049694" version="1" comment="docker-buildx is &lt;0.29.0-150000.243.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049994" version="1" comment="libblkid1 is &lt;2.37.2-150400.8.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049995" version="1" comment="libfdisk1 is &lt;2.37.2-150400.8.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049996" version="1" comment="libmount1 is &lt;2.37.2-150400.8.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049997" version="1" comment="libsmartcols1 is &lt;2.37.2-150400.8.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049998" version="1" comment="libuuid1 is &lt;2.37.2-150400.8.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049999" version="1" comment="util-linux is &lt;2.37.2-150400.8.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050000" version="1" comment="util-linux-systemd is &lt;2.37.2-150400.8.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050001" version="1" comment="kernel-default is &lt;5.14.21-150400.24.197.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049970" version="1" comment="kernel-default-base is &lt;5.14.21-150400.24.197.1.150400.24.100.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248959"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-cloud-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-pppoe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wwan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NM-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SLE-Micro-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>afterburn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>afterburn-dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-sh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcm43xx-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfsmaintenance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conntrack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-dict-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>db48-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-4_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-libnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-mkinitrd-deprecated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-firewall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gptfdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsiuio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopeniscsiusr0_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-amdgpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath10k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath11k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-atheros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bnx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-brcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-chelsio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-dpaa2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-i915</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-iwlwifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-liquidio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-marvell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-media</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mediatek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mellanox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mwifiex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nfp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-prestera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qlogic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-realtek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-sound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ueagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-usb-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virtctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libauparse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlicommon1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlidec1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbsd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcontainers-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libekmfweb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkmipclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_1-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfribidi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-HarfBuzz-0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-suse65_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu65_1-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu65_1-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libonig4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Libosinfo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslirp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp40</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-esys0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-fapi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-mu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-rc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-sys1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-device0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tctildr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-0-tss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_btrfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-cpp0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>login_defs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_u2f</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-MakeMaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-cni-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-M2Crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-future</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-transactional-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-SLOF</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-accel-tcg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-qxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slirp4netns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpiarm64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-needs-restarting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-client0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-cursor0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-egl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-server0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dmidecode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-ibmca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftpboot-installation-SLE-Micro-5.4-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftpboot-installation-SLE-Micro-5.4-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftpboot-installation-SLE-Micro-5.4-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ignition</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ignition-dracut-grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jmespath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ply</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-simplejson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyzmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tornado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-configobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gawk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ca-certificates-mozilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-module-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzck1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia-gspx-G06</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fdo-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fdo-client-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traceroute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-build-key</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-wicked</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ndb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite25_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-bridge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-storaged</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-system</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dnspython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-schema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborc-0_4-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl2308_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmozjs-60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-brltty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools-genprotimg-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_btrfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_crypto2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_loop2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_mdraid2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_part2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_swap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbd_utils2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_66_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_66_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_66_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia-gspx-G06-cuda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nv-prefer-signed-open-driver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-cuda-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>regionServiceClientConfigAzure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>regionServiceClientConfigEC2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>regionServiceClientConfigGCE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-empty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsodium23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu-pci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-buildx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38.2-150400.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">5.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150400.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-150400.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-150400.3.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.5.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.4-150200.30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-150400.25.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0-150400.25.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180314-150400.28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-150400.1.122</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-150400.19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.15-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-150100.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-150100.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.12-150000.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51.0-150400.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.32-150400.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-150400.1.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-150400.1.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.79.1-150400.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.27-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.30-150000.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-150400.18.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-150400.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.17_ce-150000.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2908_55e924b8a842-4.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0rc10+gitr3981_dc9208a3303f-6.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:055+suse.331.g05b9ccb7-150400.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.46.4-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.185-150400.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32-7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-150400.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.52.9-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.9-150400.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.1-150400.1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.27-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-150400.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-150000.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.4-150400.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150400.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150400.1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.33-150400.2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.44.2-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-150200.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8+git0.d1f8d41e0-150400.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8.6-150400.39.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.7-150400.39.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2+git20.g64239cc-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-150400.3.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220509-150400.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0+62+suse.3e048d4-150400.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.54.0-150400.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-150400.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.9-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.11-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-150400.2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.2-150400.8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-150400.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-3.3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-150400.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.0-150000.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-150400.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210626-150400.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.0-150400.7.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.8-2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.4-150400.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-150000.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.2.4-150400.68.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-150400.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-150000.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.21-150400.2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.2.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:65.1-150200.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2-150400.15.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-150000.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-150400.1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-150200.14.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-150400.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.3-150400.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.57-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.20-5.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.0-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-150000.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-150400.8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.22-150400.1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.50.4-150400.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150400.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-150000.20.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.39-150400.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-150400.1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.34-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.15-150000.7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-150200.4.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.17-150400.1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.9.536+g41a9f9a5573-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-150400.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-150400.1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-150300.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.3-150300.15.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.22-150400.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.0-150400.2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.39.3-150000.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-150400.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-150400.4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:249.15-150400.8.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-150000.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-150300.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.2-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009165429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-150400.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-150300.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-150000.4.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150400.1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-150000.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.3-150400.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-3.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-150400.1.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.31.2-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.1-150400.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.34.1-150000.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-150100.10.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150000.6.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-150400.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.62-150400.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201225-150400.5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-150400.4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-150400.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-150400.19.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-150000.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-3.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.38.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2018.1.18-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-150400.16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.2-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-150100.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150000.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3004-150400.8.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202202-150400.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-150300.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150400.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-150000.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.13+git.591.ab36624310c-150400.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3.2-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.9-150400.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.21-150300.7.35.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-150400.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-150400.1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.10-150400.4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009214821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230214-150200.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.0.4-150000.4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1234-150000.5.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.70-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-150000.4.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.3_02-150400.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.57-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2.11.58+g38d6afd3b78-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.9-150400.4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.57-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.13+git.636.53d93c5b9d6-150400.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-150300.4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.55.3.150400.24.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-150400.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-150400.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.19-150000.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:99~1.19.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.60.1.150400.24.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-150400.16.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51.0-150400.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.54.0-150400.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-150000.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-150400.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.57.26-150400.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-150300.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1443-150000.5.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1443-150000.5.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.0-150400.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.63.1.150400.24.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-150400.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:202202-150400.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230512-150200.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.19-150000.90.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-150000.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-150100.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-150100.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-150400.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-150400.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-150200.14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-150200.14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-150000.3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10-150000.3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-150300.3.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.1.2-150000.3.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.0-150300.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-150400.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1572-150000.5.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1572-150000.5.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.66.1.150400.24.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.63-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.69.1.150400.24.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-150100.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-150100.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-150400.18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.13+git.663.9c654e06cdb-150400.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.7-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51.0-150400.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.52.10-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220509-150400.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.54.0-150400.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.74.1.150400.24.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-150400.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-150000.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.81.1.150400.24.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.39-150400.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220509-150400.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.6-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230808-150200.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_02-150400.4.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.37-150400.14.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62-150200.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-150000.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22+git0.f8e3218e2-150400.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.15-150000.7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.0-150300.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.5_ce-150000.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-150000.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:73.2-150000.1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:73.2-150000.1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009186988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009186989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-150000.1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-150100.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-150100.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.21-150000.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.26-150300.7.35.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_04-150400.4.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-150300.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-150000.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-150300.24.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009186986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1894-150000.5.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1894-150000.5.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.88.1.150400.24.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.7-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_06-150400.4.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.13+git.691.3d3cea0641-150400.3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.92.1.150400.24.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-150100.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-150100.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4.18-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.16-150400.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-150300.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.54.0-150400.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.97.1.150400.24.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-150300.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51.0-150400.4.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:535.129.03-150400.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:535.129.03_k5.14.21_150400.24.92-150400.9.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231113-150200.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_08-150400.4.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231114-150200.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+git20210816.baa09b5-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2103-150000.5.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2103-150000.5.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.21-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22+git0.f8e3218e2-150400.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220509-150400.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0-150000.8.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51.0-150400.4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.54.0-150400.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.8-150000.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-150000.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.100.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.100.2.150400.24.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-150400.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.7_ce-150000.190.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-150000.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-150400.16.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1386-150000.5.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1386-150000.5.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.23_ce-150000.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.3_06-150400.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-150200.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-150400.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-150400.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-150400.7.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-150400.7.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_14-150400.4.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-150000.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240312-150200.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-150100.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-150100.3.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.2-150400.8.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-150400.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.6_02-150400.4.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.116.1.150400.24.54.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150000.6.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-150300.4.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-150400.59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.103.1.150400.24.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-150400.4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-150400.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.119.1.150400.24.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-150400.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240514-150200.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-150000.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150400.3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07-150400.9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07_k5.14.21_150400.24.119-150400.9.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-150400.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-150400.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.17-150000.111.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-150400.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.122.2.150400.24.58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.0-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:251.3-150400.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:251.3-150400.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.125.1.150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.33-150400.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.34-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.34-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.28-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_12-150400.4.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.101.2-150400.3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68-150200.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.128.1.150400.24.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.11-150000.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220509-150400.4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-150400.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-150400.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240813-150200.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.6_ce-150000.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:249.17-150400.8.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150400.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.21-150000.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-150000.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.91.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.91.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-150000.3.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240910-150200.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.133.2.150400.24.64.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.6_04-150400.4.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.2.4-150400.68.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.136.1.150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150400.9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20241112-150200.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.6_06-150400.4.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.141.1.150400.24.68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.0-150400.14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.144.1.150400.24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.57.26-150400.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1.5_ce-150000.212.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0-150000.8.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-150000.61.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.108.1.150400.24.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230802.1-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.7_ce-150000.193.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.2-150400.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.54.14-150400.9.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.54.14_k5.14.21_150400.24.108-150400.9.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-150000.4.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0111-150000.5.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0111-150000.5.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.9-150400.4.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.111.2.150400.24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.5_14-150400.4.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-150000.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.158.1.150400.24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.5.1_ce-150000.218.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-150400.5.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.161.1.150400.24.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-150400.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150000.6.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22+git0.f8e3218e2-150400.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.27-150000.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-150200.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.15-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-150400.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.49.1-150000.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-150400.5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4-150400.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.164.1.150400.24.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.0-150400.7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.0-150400.7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250512-150200.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5.2-150300.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3-150000.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20211215-150400.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-150400.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-150000.3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-150300.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-150400.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150000.6.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-150000.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.147.1.150400.24.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.10-150100.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.0-150400.4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-150400.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:65.1-150200.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:65.1-150200.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-150200.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.9-150400.4.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-150000.73.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.1406-150000.5.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.1406-150000.5.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.167.1.150400.24.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.2.2_ce-150000.227.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150400.9.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.7_02-150400.4.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.32-150400.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20211215-150400.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-150400.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-150200.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.0-150200.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.0-150200.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.170.2.150400.24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:565.57.01-150400.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:565.57.01_k5.14.21_150400.24.170-150400.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.144.03_k5.14.21_150400.24.170-150400.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.50.2-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:249.17-150400.8.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-150400.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-150400.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.0.4-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.97.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7+141-150400.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.173.1.150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-150000.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.3.3_ce-150000.230.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8+12-150400.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-150400.5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150000.6.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.2-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.2-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250812-150200.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-150000.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0-150000.3.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.0-150000.4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.0-150400.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.1629-150000.5.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.1629-150000.5.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0+git20170221.479bb4a-150000.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-150400.5.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-150200.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-150400.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-150400.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.176.1.150400.24.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150400.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:580.82.07-150400.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:580.82.07_k5.14.21_150400.24.173-150400.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150400.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.0-150300.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.28-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22+git0.f8e3218e2-150400.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.13+git.736.b791be993ba-150400.3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-150400.3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.179.1.150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-150200.4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-150400.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.0.git21.a73f509-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.0.git21.a73f509-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-150400.21.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-150400.21.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.112.2-150400.3.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.7_04-150400.4.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-150400.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-150400.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-150000.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.27-150300.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-150000.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.59.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.185-150400.5.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.184.1.150400.24.94.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-150400.4.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.29-150000.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-150400.5.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.52.12-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.34-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:202202-150400.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-150000.4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.150.1.150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150400.11.55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250211-150200.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:202202-150400.5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.90-150400.16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.10-150100.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.1101-150000.5.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.1101-150000.5.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.17-150000.7.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.10-150400.4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.5.1_ce-150000.215.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44.0-150400.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.153.1.150400.24.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-150400.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-150000.4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150400.8.94.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:249.17-150400.8.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.51.3-150000.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.0110-150000.5.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.0110-150000.5.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.29-150000.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-150000.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-150400.3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3-150000.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.0-150400.4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150400.4.65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:202202-150400.5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.27-150300.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220509-150400.4.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3-150000.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-150000.4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-150000.4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.4-150300.15.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.187.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.187.3.150400.24.96.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150400.4.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.139.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150400.7.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-150000.4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-150400.7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-150400.7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.7_06-150400.4.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150400.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.15.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-150000.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.51.2-150000.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150400.37.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150400.37.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0_0_g2dd4b9b-150400.37.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150400.37.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-150200.6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8+116-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:580.126.09-150400.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:580.126.09_k5.14.21_150400.24.187-150400.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-150400.5.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.2-150400.8.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150400.9.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.34-150000.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.14-150400.5.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.194.1.150400.24.98.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-150200.4.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-150000.241.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.0-150000.241.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20260210-150200.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.27-150300.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-150300.4.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-150400.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.112.3-150400.3.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.0-150400.4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-150400.3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3-150000.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-150400.5.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-150000.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-150000.243.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.0-150000.243.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.2-150400.8.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.197.1.150400.24.100.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
